• Title/Summary/Keyword: Key Point

Search Result 1,839, Processing Time 0.03 seconds

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang;Yi, Mu;Hui, Li
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.464-468
    • /
    • 2013
  • The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.

Active Voltage-balancing Control Methods for the Floating Capacitors and DC-link Capacitors of Five-level Active Neutral-Point-Clamped Converter

  • Li, Junjie;Jiang, Jianguo
    • Journal of Power Electronics
    • /
    • v.17 no.3
    • /
    • pp.653-663
    • /
    • 2017
  • Multilevel active neutral-point-clamped (ANPC) converter combines the advantages of three-level ANPC converter and multilevel flying capacitor (FC) converter. However, multilevel ANPC converter often suffers from capacitor voltage balancing problems. In order to solve the capacitor voltage balancing problems for five-level ANPC converter, phase-shifted pulse width modulation (PS-PWM) is used, which generally provides natural voltage balancing ability. However, the natural voltage balancing ability depends on the load conditions and converter parameters. In order to eliminate voltage deviations under steady-state and dynamic conditions, the active voltage-balancing control (AVBC) methods of floating capacitors and dc-link capacitors based on PS-PWM are proposed. First, the neutral-point current is regulated to balance the neutral-point voltage by injecting zero-sequence voltage. After that, the duty cycles of the redundant switch combinations are adjusted to balance the floating-capacitor voltages by introducing moderating variables for each of the phases. Finally, the effectiveness of the proposed AVBC methods is verified by experimental results.

Dual-Algorithm Maximum Power Point Tracking Control Method for Photovoltaic Systems based on Grey Wolf Optimization and Golden-Section Optimization

  • Shi, Ji-Ying;Zhang, Deng-Yu;Ling, Le-Tao;Xue, Fei;Li, Ya-Jing;Qin, Zi-Jian;Yang, Ting
    • Journal of Power Electronics
    • /
    • v.18 no.3
    • /
    • pp.841-852
    • /
    • 2018
  • This paper presents a dual-algorithm search method (GWO-GSO) combining grey wolf optimization (GWO) and golden-section optimization (GSO) to realize maximum power point tracking (MPPT) for photovoltaic (PV) systems. First, a modified grey wolf optimization (MGWO) is activated for the global search. In conventional GWO, wolf leaders possess the same impact on decision-making. In this paper, the decision weights of wolf leaders are automatically adjusted with hunting progression, which is conducive to accelerating hunting. At the later stage, the algorithm is switched to GSO for the local search, which play a critical role in avoiding unnecessary search and reducing the tracking time. Additionally, a novel restart judgment based on the quasi-slope of the power-voltage curve is introduced to enhance the reliability of MPPT systems. Simulation and experiment results demonstrate that the proposed algorithm can track the global maximum power point (MPP) swiftly and reliably with higher accuracy under various conditions.

An Empirical Study on the Relationship between the Key Success Factors and the Usage Effect of the e-Sports Business (e스포츠 비즈니스의 주요 성공요인과 이용효과와의 관계에 관한 실증연구)

  • Lee, Kyung-Jin;Kim, Chang-Su
    • The Journal of Information Systems
    • /
    • v.20 no.2
    • /
    • pp.109-134
    • /
    • 2011
  • The purpose of this paper is to present an overview of the characteristics of the e-sports business at a crucial point in the era of information and knowledge. That is, an investigation was conducted surrounding the key success factors of e-sports as a newly growing industry, and the relationship between the key success factors and the usage effect. In order to do this, the key success factors were extracted from interviews with e-sports experts in conjunction with a survey that was conducted to gather empirical data. The key points of the statistical analysis of the survey are as follows. First, the success factors of a policy do not have a significant effect on the usage. Second, some administrative success factors of the e-sports business include the distribution of e-sports in the form of franchise chain, the establishment of policies to prevent the excellent members of e-sports from seceding, making a good impression as a high-class sport, the frequent notice of the break-even point, and educating people on how to use the e-sports machine. Third, the development and distribution of excellent e-sports software was analyzed as a technical success factor of the e-sports business. Finally, there is no doubt that results of this study can be used to facilitate the growth of the e-sports business as a new industry related to the IT industry.

A Non-Periodic Synchronization Algorithm using Address Field of Point-to-Point Protocol in CDMA Mobile Network (CDMA이동망에서 점대점 프로토콜의 주소영역을 이용한 비주기적 동기 알고리즘)

  • Hong, Jin-Geun;Yun, Jeong-O;Yun, Jang-Heung;Hwang, Chan-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.918-929
    • /
    • 1999
  • 동기식 스트림 암호통신 방식을 사용하는 암호통신에서는 암/복호화 과정 수행시 암호통신 과정에서 발생하는 사이클슬립으로 인해 키수열의 동기이탈 현상이 발생되고 이로 인해 오복호된 데이타를 얻게된다. 이러한 위험성을 감소하기 위한 방안으로 현재까지 암호문에 동기신호와 세션키를 주기적으로 삽입하여 동기를 이루는 주기적인 동기암호 통신방식을 사용하여 왔다. 본 논문에서는 CDMA(Cellular Division Multiple Access) 이동망에서 데이타서비스를 제공할 때 사용되는 점대점 프로토콜의 주소영역의 특성을 이용하여 단위 측정시간 동안 측정된 주소비트 정보와 플래그 패턴의 수신률을 이용하여 문턱 값보다 작은경우 동기신호와 세션키를 전송하는 비주기적인 동기방식을 사용하므로써 종래의 주기적인 동기방식으로 인한 전송효율성 저하와 주기적인 상이한 세션키 발생 및 다음 주기까지의 동기이탈 상태의 지속으로 인한 오류확산 등의 단점을 해결하였다. 제안된 알고리즘을 링크계층의 점대점 프로토콜(Point to Point Protocol)을 사용하는 CDMA 이동망에서 동기식 스트림 암호 통신방식에 적용시 동기이탈율 10-7의 환경에서 주기가 1sec인 주기적인 동기방식에서 요구되는 6.45x107비트에 비해 3.84x105비트가 소요됨으로써 전송율측면에서의 성능향상과 오복호율과 오복호 데이타 비트측면에서 성능향상을 얻었다. Abstract In the cipher system using the synchronous stream cipher system, encryption / decryption cause the synchronization loss (of key arrangement) by cycle slip, then it makes incorrect decrypted data. To lessen the risk, we have used a periodic synchronous cipher system which achieve synchronization at fixed timesteps by inserting synchronization signal and session key. In this paper, we solved the problem(fault) like the transfer efficiency drops by a periodic synchronous method, the periodic generations of different session key, and the incorrectness increases by continuing synchronization loss in next time step. They are achieved by the transfer of a non-periodic synchronous signal which carries synchronous signal and session key when it is less than the threshold value, analyzing the address field of point-to-point protocol, using the receiving rate of address bits information and flag patterns in the decision duration, in providing data services by CDMA mobile network. When the proposed algorithm is applied to the synchronous stream cipher system using point-to-point protocol, which is used data link level in CDMA mobile network, it has advanced the result in Rerror and Derror and in transmission rate, by the use of 3.84$\times$105bits, not 6.45$\times$107bits required in periodic synchronous method, having lsec time step, in slip rate 10-7.

A novel ID-based multi-domain handover protocol for mesh points in WMNs

  • Zhang, Xue;Li, Guangsong;Han, Wenbao;Ji, Huifang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2512-2529
    • /
    • 2015
  • Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

A study on the analysis of production-related key performance indicator affecting business positioning of machinery manufacturers (중소기계제조업의 사업포지셔닝에 영향을 미치는 생산관련 핵심성과지표에 관한 연구)

  • Cheong, Hae-Sock;Yoo, Woo-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.2
    • /
    • pp.221-228
    • /
    • 2012
  • This paper analyzed twenty-six production-related KPI(Key Performance indicator) factors of business diagnosis, such as personnel, equipment, materials, operations and quality affecting company business competition to 186 small machinery manufacturers in 2010. Also, we explained the concept of Business Positioning and divided research subjects into four Business Positioning Groups formed break-even point ratio & fixed cost ratio to sales and then we compared between the 4 groups using Logistic Regression analysis by SAS statistical software package. The objective of this study is two-fold. The first is to find out production-related KPI factor of superior Business Positioning Group. The second is to suggest improvement ways for small manufacturers in order to get better profitable Business Positioning.

Skeleton Model-Based Unsafe Behaviors Detection at a Construction Site Scaffold

  • Nguyen, Truong Linh;Tran, Si Van-Tien;Bao, Quy Lan;Lee, Doyeob;Oh, Myoungho;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.361-369
    • /
    • 2022
  • Unsafe actions and behaviors of workers cause most accidents at construction sites. Nowadays, occupational safety is a top priority at construction sites. However, this problem often requires money and effort from investors or construction owners. Therefore, decreasing the accidents rates of workers and saving monitoring costs for contractors is necessary at construction sites. This study proposes an unsafe behavior detection method based on a skeleton model to classify three common unsafe behaviors on the scaffold: climbing, jumping, and running. First, the OpenPose method is used to obtain the workers' key points. Second, all skeleton datasets are aggregated from the temporary size. Third, the key point dataset becomes the input of the action classification model. The method is effective, with an accuracy rate of 89.6% precision and 90.5% recall of unsafe actions correctly detected in the experiment.

  • PDF

Flexural performance of double skin composite beams at the Arctic low temperature

  • Yan, Jia-Bao;Dong, Xin;Wang, Tao
    • Steel and Composite Structures
    • /
    • v.37 no.4
    • /
    • pp.431-446
    • /
    • 2020
  • This paper presents the flexural performance of double skin composite beams (DSCBs) at different Arctic low temperatures. 12 DSCBs were prepared and tested under two-point loading at different Arctic low temperatures of 20, -30, -50, and -70℃. The studied parameters include low-temperature level (T), steel-faceplate thickness (t), shear span ratio (λ), and spacing of headed studs (S). The experimental investigations under two-point loading tests showed that flexural failure occurred to all DSCBs, even including the specimen designed with the small λ ratio of 2.9. The ultimate strength behaviours of DSCBs were improved due to the improved mechanical properties of constructional materials and the confinement on shear connectors. The DSCB subjected to two-point loading and low temperatures exhibits a five-stage working mechanism. The stiffness and strength indexes of DSCBs increase linearly with temperature and t value increasing, while decreasing as shear span ratio boosts. In the contrast, the change of S value from 150 to 200 mm has little effect on the ultimate strength behavior of DSCB.