• Title/Summary/Keyword: Key Point

Search Result 1,839, Processing Time 0.035 seconds

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

Molecular characterization and inhibition analysis of the acetylcholinesterase gene from the silkworm maggot, Exorista sorbillans

  • Lang, Guo-Jun;Zhang, Ming-Yan;Li, Bao-Ling;Yu, Lin-Lin;Lu, Xing-Meng;Zhang, Chuan-Xi
    • BMB Reports
    • /
    • v.43 no.8
    • /
    • pp.573-578
    • /
    • 2010
  • Several organophosphorus (OP) insecticides can selectively kill the silkworm maggot, Exorista sorbillans (Es) (Diptera: Tachinidae), while not obviously affecting the host (Bombyx mori) larvae, but the mechanism is not yet clear. In this study, the cDNA encoding an acetylcholinesterase (AChE) from the field Es was isolated. One point mutation (Gly353Ala) was identified. The Es-353G AChE and Es-353A AChE were expressed in baculovirus-insect cell system, respectively. The inhibition results showed that for eserine and Chlorpyrifos, Es-353A AChE was significantly less sensitive than Es-353G AChE. Meanwhile, comparison of the I50 values of eserine, dichlorvos, Chlorpyrifos and omethoate of recombinant Es AChEs with its host (Bombyx mori) AChEs indicated that, both Es AChEs are more sensitive than B. mori AChEs. The results give an insight of the mechanism that some OP insecticides can selectively kills Es while without distinct effect on its host, B. mori.

Capabilities of stochastic response surface method and response surface method in reliability analysis

  • Jiang, Shui-Hua;Li, Dian-Qing;Zhou, Chuang-Bing;Zhang, Li-Min
    • Structural Engineering and Mechanics
    • /
    • v.49 no.1
    • /
    • pp.111-128
    • /
    • 2014
  • The stochastic response surface method (SRSM) and the response surface method (RSM) are often used for structural reliability analysis, especially for reliability problems with implicit performance functions. This paper aims to compare these two methods in terms of fitting the performance function, accuracy and efficiency in estimating probability of failure as well as statistical moments of system output response. The computational procedures of two response surface methods are briefly introduced first. Then their capabilities are demonstrated and compared in detail through two examples. The results indicate that the probability of failure mainly reflects the accuracy of the response surface function (RSF) fitting the performance function in the vicinity of the design point, while the statistical moments of system output response reflect the accuracy of the RSF fitting the performance function in the entire space. In addition, the performance function can be well fitted by the SRSM with an optimal order polynomial chaos expansion both in the entire physical and in the independent standard normal spaces. However, it can be only well fitted by the RSM in the vicinity of the design point. For reliability problems involving random variables with approximate normal distributions, such as normal, lognormal, and Gumbel Max distributions, both the probability of failure and statistical moments of system output response can be accurately estimated by the SRSM, whereas the RSM can only produce the probability of failure with a reasonable accuracy.

Formulation of the Scope and Key Questions of the Guideline Recommendations for Immunosuppressive Treatment in Kidney Transplantation (신장이식 면역억제요법 가이드라인 개발을 위한 권고안 적용 범위 및 핵심질문 선정)

  • Huh, Seungyeon;Han, Nayoung;Sohn, Minji;Ryu, Junghwa;Yang, Jaeseok;Oh, Jung Mi
    • Korean Journal of Clinical Pharmacy
    • /
    • v.29 no.1
    • /
    • pp.18-24
    • /
    • 2019
  • Background: Although a growing number of guidelines and clinical researches are available for immunosuppressive treatment of post-transplantation, there is no clinical practice guideline for the care of kidney transplant recipients in Korea. Selection of a researchable question is the most important step in conducting qualified guideline development. Thus, we aimed to formulate key questions for Korean guideline to aid clinical decision-making for immunosuppressive treatment. Methods: Based on previous published guidelines review, a first survey was constructed with 29 questions in the range of immunosuppressive treatments. The experts were asked to rate the clinical importance of the question using a 5-point Likert scale. The questions reached 60% or more from the first survey and additional new questions were included in the second survey. In analyzing the responses to items rated on the 9-point scale, consensus agreement on each question was defined as 75% or more of experts rating 7 to 9. Results: In the first survey, 50 experts were included. Among the 29 questions, 27 were derived to get 60% or more importance and 3 new questions were additionally identified. Through the second survey, 9 questions were selected that experts reached consensus on 75% and over of the options. Finally, we developed key questions using PICO (patient, intervention, comparison, and outcome) methodology. Conclusion: The experts reached a high level of consensus on many of key questions in the survey. Final key questions provide direction for developing clinical practice guideline in the immunosuppressive treatment of transplantation.

QUALITATIVE ANALYSIS OF ABR-FRACTIONAL VOLTERRA-FREDHOLM SYSTEM

  • Shakir M. Atshan;Ahmed A. Hamoud
    • Nonlinear Functional Analysis and Applications
    • /
    • v.29 no.1
    • /
    • pp.113-130
    • /
    • 2024
  • In this work, we explore the existence and uniqueness results for a class of boundary value issues for implicit Volterra-Fredholm nonlinear integro-differential equations (IDEs) with Atangana-Baleanu-Riemann fractional (ABR-fractional) that have non-instantaneous multi-point fractional boundary conditions. The findings are supported by Krasnoselskii's fixed point theorem, Gronwall-Bellman inequality, and the Banach contraction principle. Finally, a demonstrative example is provided to support our key findings.

Security Architecture for T4 Class Common Data Link

  • Lee, Sang-Gon;Lee, Hoon-Jae;Kim, Hyeong-Rag;Ryu, Young-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.63-72
    • /
    • 2017
  • In this paper, we propose a security architecture for HDLC-based T4 class common data link. The common data links are composed of point-to-point, multi-to-point, and point-to-multi mode. For multi-to-point mode, one node has a bundle of point-to-point links with different end-point on the other side of the links. Thus multi-to-point mode can be considered as a bundle of point-to-point mode. Point-to-multi mode is broadcasting link. For point-to-point mode we adopted robust security network scheme to establish a secure data link, and for multi-to-point mode we use broadcast encryption scheme based on ID-based cryptography to distribute encryption key for broadcasting message encryption. We also included MACsec technology for point-to-point data link security. Computational and communicational complexity analysis on the broadcast encryption have been done.

Research on Liquefaction Characteristics of SF6 Substitute Gases

  • Yuan, Zhikang;Tu, Youping;Wang, Cong;Qin, Sichen;Chen, Geng
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2545-2552
    • /
    • 2018
  • $SF_6$ has been widely used in high voltage power equipment, such as gas insulated switchgear (GIS) and gas insulated transmission line (GIL), because of its excellent insulation and arc extinguishing performance. However, $SF_6$ faces two environmental problems: greenhouse effect and high liquefaction temperature. Therefore, to find the $SF_6$ substitute gases has become a research hotspot in recent years. In this paper, the liquefaction characteristics of $SF_6$ substitute gases were studied. Peng-Robinson equation of state with the van der Waals mixing rule (PR-vdW model) was used to calculate the dew point temperature of the binary gas mixtures, with $SF_6$, $C_3F_8$, $c-C_4F_8$, $CF_3I$ or $C_4F_7N$ as the insulating gas and $N_2$ or $CO_2$ as the buffer gas. The sequence of the dew point temperatures of the binary gas mixtures under the same pressure and composition ratio was obtained. $SF_6/N_2$ < $SF_6/CO_2$ < $C_3F_8/N_2$ < $C_3F_8/CO_2$ < $CF_3I/N_2$ < $CF_3I/CO_2$ < $c-C_4F_8/N_2$ < $C_4F_7N/N_2$ < $c-C_4F_8/CO_2$ < $C_4F_7N/CO_2$. $SF_6/N_2$ gas mixture showed the best temperature adaptability and $C_4F_7N/CO_2$ gas mixture showed the worst temperature adaptability. Furthermore, the dew point temperatures of the $SF_6$ substitute gases at different pressures and the upper limits of the insulating gas mole fraction at $-30^{\circ}C$, $-20^{\circ}C$ and $-10^{\circ}C$ were obtained. The results would supply sufficient data support for GIS/GIL operators and researchers.

Inelastic response of wide flange steel beams curved by symmetrical weak axis bending using two-point loads

  • Gergess, Antoine N.;Sen, Rajan
    • Steel and Composite Structures
    • /
    • v.17 no.6
    • /
    • pp.951-965
    • /
    • 2014
  • Point bending is commonly used for cambering and curving steel girders to large radii. In this system, a hydraulic ram or press is used to apply concentrated loads at selected points to obtain the required vertical (cambering) or horizontal (curving) curved profile from induced permanent deformations. This paper derives closed form solutions that relate loads to permanent deformations for horizontally curving wide flange steel beams based on their post-yield response. These solutions are presented in a parametric form to identify the relationship between key variables and their impact on the accuracy of the curving operation. It is shown that point bending could yield parabolic curved profiles that are within 1% of a desired circular curve if the span length to radius of curvature ratio (L / R) is less than 1.5 and the point loads are spaced at one third the beam length. Safe limits are then established on loads, strains and curvatures to avoid damaging the steel section. This leads to optimization of the point bending operation for inducing a circular profile in wide flange steel beams of any size.

A Study on Generating Process of Regional Balance Point Temperature for Heating Degree-days in Korea (국내 난방도일의 지역별 균형점온도 산정 과정에 관한 연구)

  • Park, So Min;Song, Doo Sam
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.29 no.9
    • /
    • pp.482-495
    • /
    • 2017
  • Degree-days are practically used as a tool to estimate energy consumption for heating and cooling. Degree-days are calculated by summing differences of balance point temperature and outside temperature for the analyzed period. Determining balance point temperature is a key point in calculating accurate degree-days. However, ASHRAE standards are used for balance point temperature in Korea because balance point temperature considering climate conditions and building thermal performance is not proposed in Korea. This study proposes the process to generate balance point temperature for heating degree-days considering Korean climate and building conditions. Also, a new balance point temperature for three regions in Korea will be suggested in this study. Balance point temperature of Seoul is approximately $15.0^{\circ}C$, lower than the current standard of $18.3^{\circ}C$. Balance point temperature of Seoul considering climate conditions and building performance can be different from the ASHRAE suggested value ($18.3^{\circ}C$). Results revealed the current standard for balance point temperature should be changed considering climate and building conditions in Korea.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.