• Title/Summary/Keyword: Key Management Mechanism

Search Result 231, Processing Time 0.024 seconds

Present Situation and Prospects of Sericulture in China

  • Shen, Xing-Jia;Ye, Xia-Yu;Guo, Xi-Jie
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.13 no.2
    • /
    • pp.51-55
    • /
    • 2006
  • Since 1970, China has become the biggest cocoon producer in the world, and made the highest historical record of cocoon output for 759,800 tons in 1995. However, in 1996 cocoon production reduced sharply to 470,900 tons. After a ten-year adjustment and reform, sericultural areas have shifted from developed regions to developing regions and from the east to the west. From 2000, the cocoon output has started to increase restoringly. By 2004 it recovered to 547,091 tons. With the development of market economy, sericulture management has been changed, including mulberry fields concentrated to the specializated households and cooperatives, cocoons produced in larger scale instead of individuals, Silkworm egg producing enterprises gradually changed into non-governmental joint-stock ones. The mechanism of market cocoon price has been gradually established. The management model of combination of trade, industry and agriculture is pushing and improving. It is the fruit of modern science and technology, especially sericultural basic research, that provides China's sericulture with the opportunity and vital force. China's sericulture, therefore, will continue to develop steadily in future.

The Exploration of Logic Model for After-school Programs focused on the Special Ability Aptitude Education in the Elementary Schools (방과후학교 프로그램 논리모형에 대한 탐색: 초등학교 특기적성교육을 중심으로)

  • KIM, Hye-Sook
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.2
    • /
    • pp.336-349
    • /
    • 2016
  • The evaluation of the after-school program depends on whether it achieves its objectives or not so far which makes that it is not easy to figure out which mechanism is attributed to the consequences of the program. This study aims at developing the logic model of the after-school program and follows the processes such as literature review, opinion survey by specialists and in-depth interview with stakeholders. The target program of the study was focused on the special ability aptitude education in the elementary schools. The initial developed theory model was validated and finalized through being reviewed by specialists and teachers in charge of target schools. Based on the framework of logic model, the models are composed of context, components, activities, output/short term outcomes, and long term outcomes. As the key factors of the after-school program, amicable communication between the stakeholders, quality of the program in itself, follow-up management, counseling and guidance for students, instructors' expertise, and quality management of the program were drawn.

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF

Generation and Distribution of Symmetric/Asymmetric Secret Keys for Secure Communications in Koinonia High-rate WPAN (Koinonia 고속 WPAN에서 보안을 위한 대칭/비대칭 비밀 키 교환 방법)

  • Yim Soon-Bin;Jung Ssang-Bong;Lee Tae-Jin;June Sun-Do;Lee Hyeon-Seok;Kwon Tai-Gil;Cho Jin-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6B
    • /
    • pp.551-560
    • /
    • 2006
  • Security in WPAN is one of the most fundamental issues to overcome the barrier of wireless environment. Although piconet security mechanisms have been defined in the WPAN standards, many remains open and are left for implementation. Koinonia is a high-rate Wireless Personal Area Network (WPAN) technology, and is developed for multimedia traffic transmission in personal area. In Koinonia WPAN, a piconet consists of one master and more than one slave, and piconet security mechanisms is not defined at all. Therefore, we propose a robust piconet security mechanism for secure communications between slaves in a piconet. Based on security requirements analysis, our proposed protocols are shown to meet the security needs for Koinonia high-rate WPAN.

Implementation and Evaluation of Secure VoIP Conference System (DTLS 기반의 안전한 VoIP 컨퍼런스 시스템 구현 및 평가)

  • Kang, Seong-Ku;Kim, Kyou-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.45-57
    • /
    • 2009
  • In this paper, we implemented the conference system based on DTLS for saving securely the VoIP, which is served sprightly in the latest, securely and tested (and also analyzed) the system. As VoIP technology development, demand of conference system is increased and the related technologies are growed. But Security protocol to protect conference service is getting late than conference technology. In this paper, we studied based on DTLS protocol that can provide function of signaling, channel security, media channel security and application of group key and apply to VoIP conference system based UDP unchanged. In this paper, we searched suggested security protocols based on DTLS can apply to conference system and implement and apply the protocol to conference system. And we tested (and also alayzed) overhead of encryption and key management mechanism.

Management of Neuropathic Pain (신경병성 통증의 치료)

  • Kim, Yeong-In
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.7 no.2
    • /
    • pp.274-280
    • /
    • 1999
  • A variety of mechanism may generate pain resulting from injury to the central and peripheral nervous system. None of these mechanism is disease-specific, and several different pain mechanism may be simultaneously present in anyone patient, independent of diagnosis. Diagnosis of neuropathic pain is often easily made from information gathered on neurologic examination and from patient history. Although treatment of neuropathic pain may be difficult, optimum treatment can be achieved if the neurologist has a complete understanding of therapeutic options, the mainstay of which is pharmacotherapy. Selection of an appropriate rharmacologic agent is by trial and error since individual responses to different agents, doses, and serum levels are highly variable. An adequate trial for each agent tried is key to pharmacologic treatment of neuropathic pain. Tricyclic antidepressants are first-line agents, although other drugs, including anticonvulsants, local anesthetic antiarrhythmics, clonidine, opiates, and certain topical agents, also offer pain relief in some patient populations. The novel antidepressants venlafaxine and nefazodone are potentially useful new drugs that are better tolerated than tricyclic antidepressants. Also Gabapentine seems an interesting and promising drug for the treatment of neuropathic pain.

  • PDF

Storage System Performance Enhancement Using Duplicated Data Management Scheme (중복 데이터 관리 기법을 통한 저장 시스템 성능 개선)

  • Jung, Ho-Min;Ko, Young-Woong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.8-18
    • /
    • 2010
  • Traditional storage server suffers from duplicated data blocks which cause an waste of storage space and network bandwidth. To address this problem, various de-duplication mechanisms are proposed. Especially, lots of works are limited to backup server that exploits Contents-Defined Chunking (CDC). In backup server, duplicated blocks can be easily traced by using Anchor, therefore CDC scheme is widely used for backup server. In this paper, we propose a new de-duplication mechanism for improving a storage system. We focus on efficient algorithm for supporting general purpose de-duplication server including backup server, P2P server, and FTP server. The key idea is to adapt stride scheme on traditional fixed block duplication checking mechanism. Experimental result shows that the proposed mechanism can minimize computation time for detecting duplicated region of blocks and efficiently manage storage systems.

Signature-based Broadcast Authentication for Wireless Sensor Networks (무선센서네트워크 환경에서 서명 기반 브로드캐스트 인증)

  • Koo, Woo-Kwon;Lee, Hwa-Seong;Kim, Yong-Ho;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.139-144
    • /
    • 2007
  • A broadcast authentication is important and fundamental consideration for security in wireless sensor networks. Perigg et al suggests ${\mu}-TESLA$ used a key chain. But it is unavoidable the delay of time to authenticate packets. so it is hard to meet the property that most application of sensor are performed in real-time. To cope with these problems we propose an efficient broadcast authentication scheme which has no delay of time and provides re-keying mechanism. we also describe an analysis of security and efficiency for this scheme.

Deformation and permeability evolution of coal during axial stress cyclic loading and unloading: An experimental study

  • Wang, Kai;Guo, Yangyang;Xu, Hao;Dong, Huzi;Du, Feng;Huang, Qiming
    • Geomechanics and Engineering
    • /
    • v.24 no.6
    • /
    • pp.519-529
    • /
    • 2021
  • In coal mining activities, the abutment stress of the coal has to undergo cyclic loading and unloading, affecting the strength and seepage characteristics of coal; additionally, it can cause dynamic disasters, posing a major challenge for the safety of coal mine production. To improve the understanding of the dynamic disaster mechanism of gas outburst and rock burst coupling, triaxial devices are applied to axial pressure cyclic loading-unloading tests under different axial stress peaks and different pore pressures. The existing empirical formula is use to perform a non-linear regression fitting on the relationship between stress and permeability, and the damage rate of permeability is introduced to analyze the change in permeability. The results show that the permeability curve obtained had "memory", and the peak stress was lower than the conventional loading path. The permeability curve and the volume strain curve show a clear symmetrical relationship, being the former in the form of a negative power function. Owing to the influence of irreversible deformation, the permeability difference and the damage of permeability mainly occur in the initial stage of loading-unloading, and both decrease as the number of cycles of loading-unloading increase. At the end of the first cycle and the second cycle, the permeability decreased in the range of 5.777 - 8.421 % and 4.311-8.713 %, respectively. The permeability decreases with an increase in the axial stress peak, and the damage rate shows the opposite trend. Under the same conditions, the permeability of methane is always lower than that of helium, and it shows a V-shape change trend with increasing methane pressures, and the permeability of the specimen was 3 MPa > 1 MPa > 2 MPa.

ESTABLISHMENT OF CDM PROJECT ADDITIONALITY THROUGH ECONOMIC INDICATORS

  • Kai. Li.;Robert Tiong L. K.;Maria Balatbat ;David Carmichael
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.272-275
    • /
    • 2009
  • Carbon finance is the investment in Greenhouse Gas (GHG) emission reduction projects in developing countries and countries with economies in transition within the framework of the Kyoto Protocol's Clean Development Mechanism (CDM) or Joint Implementation (JI) and with creation of financial instruments, i.e., carbon credits, which are tradable in carbon market. The additional revenue generated from carbon credits will increase the bankability of projects by reducing the risks of commercial lending or grant finance. Meantime, it has also demonstrated numerous opportunities for collaborating across sectors, and has served as a catalyst in bringing climate issues to bear in projects relating to rural electrification, renewable energy, energy efficiency, urban infrastructure, waste management, pollution abatement, forestry, and water resource management. Establishing additionality is essential for successful CDM project development. One of the key steps is the investment analysis. As guided by UNFCCC, financial indicators such as IRR, NPV, DSCR etc are most commonly used in both Option II & Option III. However, economic indicator such as Economic Internal Rate of Return(EIRR) are often overlooked in Option III even it might be more suitable for the project. This could be due to the difficulties in economic analysis. Although Asian Development Bank(ADB) has given guidelines in evaluating EIRR, there are still large amount of works have to be carried out in estimating the economic, financial, social and environmental benefits in the host country. This paper will present a case study of a CDM development of a 18 MW hydro power plant with carbon finance option in central Vietnam. The estimation of respective factors in EIRR, such as Willingness to Pay(WTP), shadow price etc, will be addressed with the adjustment to Vietnam local provincial factors. The significance of carbon finance to Vietnam renewable energy development will also be addressed.

  • PDF