• Title/Summary/Keyword: Key Issue

Search Result 1,229, Processing Time 0.028 seconds

The Key role of the Bulge Compactness in Star-forming Activity in Late-type Galaxies

  • Jee, Woong-bae;Yoon, Suk-Jin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.2
    • /
    • pp.32.2-32.2
    • /
    • 2015
  • Which mechanism governs star-formation activity in galaxies is still one of the most important, open questions in galactic astronomy. To address this issue, we investigate the specific star formation rate (sSFR) of late-type galaxies as functions of various structural parameters including the morphology, mass, radius, and mass compactness (MC). We use a sample of ~200,000 late-type galaxies with z = 0.02 ~ 0.2 from SDSS DR7 and a catalog of bulge-disk decomposition (Simard et al. 2011; Mendel et al. 2013). We find a remarkably strong correlation between bulge's MC and galaxy's sSFR, in the sense that galaxies with more compact bulge tend to be of lower sSFR. This seems counter-intuitive given that galactic sSFR is driven predominantly by disks rather than bulges and suggests that the central mass density plays a key role in recent star-forming activity. We discuss the physical cause of the new findings in terms of the bulge growth history and AGN activities.

  • PDF

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

A Robust and Efficient Anonymous Authentication Protocol in VANETs

  • Jung, Chae-Duk;Sur, Chul;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.607-614
    • /
    • 2009
  • Recently, Lu et al. proposed an efficient conditional privacy preservation protocol, named ECPP, based on group signature scheme for generating anonymous certificates from roadside units (RSUs). However, ECPP does not provide unlinkability and traceability when multiple RSUs are compromised. In this paper, we make up for the limitations and propose a robust and efficient anonymous authentication protocol without loss of efficiency as compared with ECPP. Furthermore, in the proposed protocol, RSUs can issue multiple anonymous certificates to an OBU to alleviate system overheads for mutual authentication between OBUs and RSUs. In order to achieve these goals, we consider a universal re-encryption scheme and identity-based key establishment scheme as our building blocks. Several simulations are conducted to verify the efficiency and effectiveness of the proposed protocol by comparing with those of the existing ECPP.

Mini-Batch Ensemble Method on Keystroke Dynamics based User Authentication

  • Ho, Jiacang;Kang, Dae-Ki
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.40-46
    • /
    • 2016
  • The internet allows the information to flow at anywhere in anytime easily. Unfortunately, the network also becomes a great tool for the criminals to operate cybercrimes such as identity theft. To prevent the issue, using a very complex password is not a very encouraging method. Alternatively, keystroke dynamics helps the user to solve the problem. Keystroke dynamics is the information of timing details when a user presses a key or releases a key. A machine can learn a user typing behavior from the information integrate with a proper machine learning algorithm. In this paper, we have proposed mini-batch ensemble (MIBE) method which does the preprocessing on the original dataset and then produces multiple mini batches in the end. The mini batches are then trained by a machine learning algorithm. From the experimental result, we have shown the improvement of the performance for each base algorithm.

Optimization of drag reduction effect of air lubrication for a tanker model

  • Park, Seong Hyeon;Lee, Inwon
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.10 no.4
    • /
    • pp.427-438
    • /
    • 2018
  • The reduction of $CO_2$ emissions has been a key target in the marine industry since the IMO's MEPC published its findings in 2009. Air lubrication method is one of the mature technologies for commercialization to reduce the frictional resistance and enhance fuel efficiency of ships. Air layer is formed by the coalescence of the injected air bubbles beyond a certain air flow rate. In this study, a model ship (${\lambda}=33.33$) of a 50,000 ton medium range tanker is equipped with an air lubrication system. The experiments were conducted in the 100 m long towing tank facility at the Pusan National University. By selecting optimal air injector configuration and distribution ratio between two injectors, the total resistance of model $R_{TM}$ was able to be reduced down to 18.1% in the model scale. Key issue was found to suppress the sideway leakage of injected air by appropriate injection parameters.

High field HTS insert coils : Status and key technical issue

  • Schwartz, Justin
    • 한국초전도학회:학술대회논문집
    • /
    • v.10
    • /
    • pp.22-22
    • /
    • 2000
  • The discoveries of high temperature superconductors received great attention due to their high critical temperatures. These materials also exhibit extremely high critical magnetic fields and high critical current density at low temperature, high magnetic field. Thus, they are the most promising materials for superconducting magnets above 20 T. In this talk, progress in the development of HTS materials and insert coils at the National High Magnetic Field Laboratory will be reviewed. In 1999, a Bi-2212 stack of double pancakes generated 3 T in a 19 T background field. These results will be reviewed in terms of implications for future systems. Individual double pancakes of Bi-2223 have also been tested and their performance will also be discused. The present goal of a 57 system will be presented and the key technical requirements for larger, higher field systems will be addressed. It will be shown that in addition to increased critical current density, improved mechanical performance (stain resistanced) is necessary for high field systems. Furthemore, improvements in the conductor n-value will improve prospects for operational systems.

  • PDF

An Information Strategy for Activating the Electronic Commerce of Regional Small and Medium-sized Business Organizations (지역 중소기업의 전자상거래 활성화를 위한 정보화 전략)

  • 주재훈
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.2
    • /
    • pp.1-15
    • /
    • 1998
  • A major effect of electronic commerce on the Internet is that it reduces transaction costs and creates an efficient market. Thus, an information strategy for developing of regional economy must be changed toward 21st century of electronic commerce era. In this paper, we present an information strategy for activating the electronic commerce of regional small and medium-sized business organizations. The paper stresses creation of a network organization comprising local government, regional business organizations, universities, research institutes, and citizens' coalitions as groups of organizational actors. Necessary conditions of a successful network organization in electronic commerce are to build the public key infrastructure for developing the trust of transactions among partners, and to create an information center to manage a web of partners. In the network organization, the information center must play critical roles as a creator of value and the certification authority in order to issue and manage participants' electronic certificates.

  • PDF

Chord System Algorithm Based on the mobility in the mobile environment (모바일 환경에서 이동성을 고려한 Chord 시스템 알고리즘)

  • Hong, Rok Ji;Moon, Il Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.75-81
    • /
    • 2010
  • Due to the increasing use of smart phones, using Wifi, Wibro of mobile devices spread. Accordingly, Need of using peer-to-peer file sharing between mobile devices is growing. However, common Peer-to-Peer(P2P) system is too complex and is not suitable to be applied to mobile devices. Thus, the need of research has shown to improve way in a mobile environment that has a constraints as mobility and the scope of communication. Among them, there is a Chord as contents look up algorithm. Chord is the issue. Chord as the DHT-based P2P protocol shares files, index-key and distributed key across the network. However, exist Chord doesn't consider the mobility. So, It has a lot of problems in the mobile environment. Thus, in this paper, I will try to explore an appropriate way of Chord in a mobile environment.

Building Green Entrepreneurship: A Journey of Environmental Awareness to Green Entrepreneurs in Thailand

  • Tesprasit, Kornthong;Aksharanandana, Pakatip;Kanchanavibhu, Athikom
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.5
    • /
    • pp.35-47
    • /
    • 2020
  • Global waste has become a global issue and we can see the new trend of discovery businesses established to focus on solving the waste problem using new renewable energy technology and the circular economy business model. This paper aims to study factors that impact green entrepreneurship in Thailand, such as environmental concern, organizational environment, founder demographics, education background, entrepreneurship awareness, as well as external factors of a business. The study analyzes the data from three qualitative in-depth interviews with green entrepreneur founders who started the businesses in polymer up-cycling, waste management, and renewable energy. The study finds overseas educational background to be one of the key main drivers for the entrepreneurial courage to decide to pursue a new business venture. By having the exposure toward the different culture, three entrepreneurs hands-on experiential learning through three key drivers who are composed of the can-do attitude, the willingness to be self-employed, and the way of seeking for the freedom to express their passions.

State of the Art of Human Factors Technologies for Ships and Ocean Engineering (선박해양공학 분야에서 인간공학기술의 활용현황 및 전망)

  • Kim, Hong-Tae;Lee, Jong-Gap;Lee, Dong-Gon;Park, Jin-Hyeong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.20 no.2
    • /
    • pp.99-111
    • /
    • 2001
  • Human factors is a key issue in the maritime industry including ship design and navigation safety. Human factors for ship design is to optimize safety and convenience of crews and passengers. And human factors for navigation safety is to minimize marine accident occurrence by human and organizational error. There are several technical requirements to incorporate human factors and marine system Risk analysis. human behaviour analysis and human M&S(modeling and simulation) are examples of technical requirements. This paper provides the key issues and technologies of human factors for ship design and navigation safety.

  • PDF