• Title/Summary/Keyword: Key derivation

Search Result 96, Processing Time 0.03 seconds

Derivation of Key Evaluation Indicators for Improving the Quality of Daycare Centers: Using the DEMATEL Technique (어린이집 품질 제고를 위한 핵심 평가지표 도출: DEMATEL 기법을 이용하여)

  • Park, Youngsun
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.4
    • /
    • pp.767-781
    • /
    • 2019
  • Purpose: The purpose of this study is to derive key evaluation indicators to improve the quality of daycare centers by identifying the relationships among the 18 evaluation indicators of the daycare evaluation system using the DEMATEL technique. Methods: In this study, the questionnaires are completed by 17 daycare center directors who have received accreditation of daycare center. They are requested to consider the level of direct influence between two evaluation indicators. A DEMATEL analysis was conducted based on the survey results. Results: The result of the study shows that the most important indicators of daycare center quality are directors leadership, institutional operations and professionalism of staff. Among evaluation areas, educational childcare curriculum & interactions is affected by all areas, and staff area affect all areas. Conclusion: The evaluation areas and indicators of the daycare center are judged to be well-balanced. It is expected that the findings of the key evaluation indicators that should be prioritized among the evaluation indicators will be helpful to those preparing for the evaluation of the daycare center.

High Step-Down Multiple-Output LED Driver with the Current Auto-Balance Characteristic

  • Luo, Quanming;Zhu, Binxin;Lu, Weiguo;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • v.12 no.4
    • /
    • pp.519-527
    • /
    • 2012
  • A high step-down multiple-output LED driver is proposed in this paper. Firstly, the derivation of the driver with dual-output is presented and its operation principle and steady state performance are analyzed in detail. Secondly, a high step-down N-channel LED driver is proposed and its current auto-balance characteristic and step-down ratio are analyzed. Finally, an experimental prototype is built and the experimental results are given. The theoretical analysis and experimental results show that the proposed driver has the following virtues: First, if load balancing is achieved, the voltage gain is 1/N that of a Buck driver, where N is the number of channels. Second, each output automatically has an equal output current, without requiring more current close-loop control circuits than a Buck driver. Last, the voltage stresses of the switches and diodes are lower than those of a Buck driver, meaning that lower voltage switches and diodes can be used, and a higher efficiency can be expected.

An Active Clamp High Step-Up Boost Converter with a Coupled Inductor

  • Luo, Quanming;Zhang, Yang;Sun, Pengju;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • v.15 no.1
    • /
    • pp.86-95
    • /
    • 2015
  • An active clamp high step-up boost converter with a coupled inductor is proposed in this paper. In the proposed strategy, a coupled inductor is adopted to achieve a high voltage gain. The clamp circuit is included to achieve the zero-voltage-switching (ZVS) condition for both the main and clamp switches. A rectifier composed of a capacitor and a diode is added to reduce the voltage stress of the output rectifier diode. As a result, diodes with a low reverse-recovery time and forward voltage-drop can be utilized. Since the voltage stresses of the main and clamp switches are far below the output voltage, low-voltage-rated MOSFETs can be adopted to reduce conduction losses. Moreover, the reverse-recovery losses of the diodes are reduced due to the inherent leakage inductance of the coupled inductor. Therefore, high efficiency can be expected. Firstly, the derivation of the proposed converter is given and the operation analysis is described. Then, a steady-state performance analysis of the proposed converter is analyzed in detail. Finally, a 250 W prototype is built to verify the analysis. The measured maximum efficiency of the prototype is 95%.

Improved Trigger System for the Suppression of Harmonics and EMI Derived from the Reverse-Recovery Characteristics of a Thyristor

  • Wei, Tianliu;Wang, Qiuyuan;Mao, Chengxiong;Lu, Jiming;Wang, Dan
    • Journal of Power Electronics
    • /
    • v.17 no.6
    • /
    • pp.1683-1693
    • /
    • 2017
  • This paper analyses the harmonic pollution to power grids caused by thyristor-controlled devices. It also formulates a mathematic derivation for the voltage spikes in thyristor-controlled branches to explain the harmonic and EMI derived from the reverse-recovery characteristics of the thyristor. With an equivalent nonlinear time-varying voltage source, a detailed simulation model is established, and the periodic dynamic switching characteristic of the thyristor can be explicitly implied. The simulation results are consistent with the probed results from on-site measurements. An improved trigger system with gate-shorted circuit structure is proposed to reduce the voltage spikes that cause EMI. The experimental results indicate that a prototype with the improved trigger system can effectively suppress the voltage spikes.

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V;Reddy, K Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.354-362
    • /
    • 2021
  • The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.

Derivation and Implications of Digitalizing Key Construction Supervision Work: Focusing on the Construction Supervision Work of the Domestic Construction Sites

  • Chan Hyuk Park;Seong Mi Kang
    • Architectural research
    • /
    • v.25 no.1
    • /
    • pp.11-17
    • /
    • 2023
  • This study aims to derive key construction supervision work that can be digitalized among construction supervision work. The scope of the study includes domestic construction sites to which the Building Act of South Korea is applied. First, the construction supervision process was identified through extensive consultation of construction expert witnesses. Afterwards, the key construction supervision works for digitization were derived through survey results construction expert witnesses. Among the 24 supervision works throughout the pre-construction, construction, and post-construction stages, the proportion of supervision work manpower or cost, the type of data generated by supervision work and the urgency of introducing digital technology, and the impact on productivity and safety of supervision work were evaluated on a 5-point scale from "very low" to "very high" was investigated. The survey was conducted by t-test analysis, and as a result, it was possible to derive that the level of digitization was higher than average in "quality management," "safety management," and "collection and cooperation of maintenance instructions." It can be interpreted that digitization has been introduced on a pilot testing basis or has already been completed according to the needs of the site. On the other hand, it can be interpreted that the work that are obtained below the average score are considered to be realistically constrained at the construction site and that it is inevitable for the supervisor to proceed manually. Future studies include analyzing the quantitative impact of the key construction supervision work once digitalization is fully applied.

A Study on the Derivation of Key Management Elements by Defect Type in the Work Stage of Window Construction (창호공사 작업단계의 하자유형별 핵심관리요소도출에 관한 연구)

  • Jung, Dae-Gyou;Lee, Han-Young;Kim, Hyoung-Woo;Lee, Dong-Yeop;Park, Hyun-Young;Kim, Dae-Young
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.05a
    • /
    • pp.337-338
    • /
    • 2023
  • As the number of defects in apartments has increased recently, lawsuits and disputes related to defects have also increased. As a result, the loss of time and money is enormous. Therefore, fundamental measures are needed to reduce the occurrence of defects. Therefore, the purpose of this study is to propose a plan to reduce defects, focusing on window construction. To this end, existing studies were reviewed, and data from domestic construction companies were collected and classified to organize the types of defects. Based on the classified data, eight types with a high incidence of window glass were analyzed according to the time of occurrence, and the cause and causal relationship of the defect were schematized. It aims to identify the degree of possibility of recurrence of defects for each of the eight defect types for experts and derive key management elements using the RII method. Therefore, the goal is to select key management elements of window construction that actively reflect the characteristics of the construction stage.

  • PDF

A Secure and Efficient Roaming Mechanism for Centralized WLAN Environment (중앙집중식 WLAN 환경에서의 안전하고 효율적인 로밍 메커니즘)

  • Park, Chang-Seop;Woo, Byung-Duk;Lim, Jeong-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.81-92
    • /
    • 2009
  • Recently, there is a drastic increase in users interested in real-time multimedia services in the WLAN environment, as the demand of IEEE 802.11 WLAN-based services increases. However, the handoff delay based on 802.11i security policy is not acceptable for the seamless real-time multimedia services provided to MS frequently moving in the WLAN environment, and there is a possibility of DoS attacks against session key derivation process and handoff mechanism. In this paper, a secure and efficient handoff mechanism in the centralized WLAN environment is introduced to solve the security problems. The 4-way Handshake for both mutual authentication and session key derivation is replaced by the 2-way Reassociation process.

Disparity Vector Derivation Method for Texture-Video-First-Coding Modes of 3D Video Coding Standards (3차원 동영상 압축 표준의 텍스쳐 비디오 우선 부호화 방식을 위한 변위 벡터 추정 기법)

  • Kang, Je-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.2080-2089
    • /
    • 2015
  • In 3D video compression, a disparity vector (DV) pointing a corresponding block position in an adjacent view is a key coding tool to exploit statistical correlation in multi-view videos. In this paper, neighboring block-based disparity vector (NBDV) is shown with detail algorithm descriptions and coding performance analysis. The proposed method derives a DV from disparity motion vector information, obtained from spatially and temporally neighboring blocks, and provides a significant coding gain about 20% BD-rate saving in a texture-video-first-coding scheme. The proposed DV derivation method is adopted into the recent 3D video coding standards such as 3D-AVC and 3D-HEVC as the state-of-the-art DV derivation method.

The Case Study on the Application of the Standard Method for the Estimation of Range and Degree of Fisheries Damages Caused by Warm Water Drained by Generating Plants (발전소 온배수에 의한 어업피해범위와 정도 및 어업처분을 결정하는 표준화 방안의 적용사례분석)

  • Kang Yong-Joo;Kim Ki-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.37 no.1 s.70
    • /
    • pp.73-93
    • /
    • 2006
  • This paper tries to apply the standard method for the estimation of range and degree of fisheries damages caused by warm water drained by generating plants to a real situation. The theoretic foundation of the study has been shown in the article published on the journal of fisheries business administration of last year. The paper tries to examine the degree of external appicability of the theoretic model through empirical study. The results of the study are as follows. The model has been found a successful device for the estimation of fisheries damages caused by warm water drained by generating plants. It also shows a possibility to work in any other fisheries damage cases caused by several kinds of public undertaking on coastal areas. The key of the model is the successful derivation of the quantity amount of the critical variation of environmental factors for example, in this case, water thermal variation. Therefore the countinous and appropriate collection of law data on the environmental factors under a viewpoint of statistics is essential to the usefulness of the model.

  • PDF