• Title/Summary/Keyword: Key size

Search Result 1,814, Processing Time 0.027 seconds

Batch Sizing Heuristic for Batch Processing Workstations in Semiconductor Manufacturing (반도체 생산 배취공정에서의 배취 크기의 결정)

  • Chun, Kil-Woong;Hong, Yu-Shin
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.22 no.2
    • /
    • pp.231-245
    • /
    • 1996
  • Semiconductor manufacturing line includes several batch processes which are to be controlled effectively to enhance the productivity of the line. The key problem in batch processes is a dynamic batch sizing problem which determines number of lots processed simultaneously in a single botch. The batch sizing problem in semiconductor manufacturing has to consider delay of lots, setup cost of the process, machine utilization and so on. However, an optimal solution cannot be attainable due to dynamic arrival pattern of lots, and difficulties in forecasting future arrival times of lots of the process. This paper proposes an efficient batch sizing heuristic, which considers delay cost, setup cost, and effect of the forecast errors in determining the botch size dynamically. Extensive numerical experiments through simulation are carried out to investigate the effectiveness of the proposed heuristic in four key performance criteria: average delay, variance of delay, overage lot size and total cost. The results show that the proposed heuristic works effectively and efficiently.

  • PDF

Backplane Technologies for Flexible Display (플렉시블 디스플레이 백플레인 기술)

  • Lee, Yong Uk
    • Vacuum Magazine
    • /
    • v.1 no.2
    • /
    • pp.24-29
    • /
    • 2014
  • Display is a key component in electronic devices. OLED is growing very fast recently due to the explosion of the smart phone market although still LCD is the dominating display technology in the display market at the moment. Also needs for the large area and high resolution TVs and flexible displays are increasing these days. Especially flexible display is expected to be one of the key technologies in mobile devices requiring small device size and large display size. Contrary to the conventional displays, flexible display requires organic materials for the substrate, the active driving element and also for the display element. Plastic film as a substrate, organic semiconductor as an active component of the transistor and organic light emitting materials or electronic paper as a display element are studied actively. In this article, mainly backplane technologies such as substrates and the transistor materials for flexible display will be introduced.

Quantitative solution of size and dosage of capsules for self-healing of cracks in cementitious composites

  • Yuan, Haifeng;Chen, Huisu
    • Computers and Concrete
    • /
    • v.11 no.3
    • /
    • pp.223-236
    • /
    • 2013
  • Self-healing (SH) technology of cracking is becoming a promising solution to improve the durability of cement based composites. However, little formula are available in the literature on determining the size and dosage of the self-healing capsules. Supposed that SH capsules will be broken and activated when they met cracks, a theoretical solution is developed to calculate the appropriate length of SH capsules based on Buffon's needle model. Afterwards, a method to calculate the dosage of capsules was proposed in terms of stereological theory. The reliability of the above mentioned theoretical methods was verified by computer simulation. An experiment of self-healing in mortar was performed as well, by which the theoretical models were verified.

Prediction model of service life for tunnel structures in carbonation environments by genetic programming

  • Gao, Wei;Chen, Dongliang
    • Geomechanics and Engineering
    • /
    • v.18 no.4
    • /
    • pp.373-389
    • /
    • 2019
  • It is important to study the problem of durability for tunnel structures. As a main influence on the durability of tunnel structures, carbonation-induced corrosion is studied. For the complicated environment of tunnel structures, based on the data samples from real engineering examples, the intelligent method (genetic programming) is used to construct the service life prediction model of tunnel structures. Based on the model, the prediction of service life for tunnel structures in carbonation environments is studied. Using the data samples from some tunnel engineering examples in China under carbonation environment, the proposed method is verified. In addition, the performance of the proposed prediction model is compared with that of the artificial neural network method. Finally, the effect of two main controlling parameters, the population size and sample size, on the performance of the prediction model by genetic programming is analyzed in detail.

Performance Analysis for Reducing Authentication Time in Hand-over (핸드오버시 인증 대기시간 단축을 위한 성능 분석)

  • Shin Seung-Soo;Seo Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.163-169
    • /
    • 2004
  • In this paper, a conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Proposed handover method shows reduced handover processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm. and simulation results show that proposed authentication method outperforms conventional algorithm in all environment regardless of call arrival rate. queue service rate. queue size.

  • PDF

MATHEMATICAL ANALYSIS FOR A DYNAMIC CIPHER

  • JUNG YOON-TAE;CHOI EUN-HEE;RIM KWANG-CHEOL
    • The Pure and Applied Mathematics
    • /
    • v.12 no.2 s.28
    • /
    • pp.143-152
    • /
    • 2005
  • We present a new block cipher called DyC. It consists of four sets (procedures) having the different $2^2,\;2^2,\;2^4$, and $2^8$ one-to-one correspondence functions as the elements. The round key is used to determine exactly one composite function from the possible $2^{16}$ composite functions. DyC supports 8 $\times$ n bit key size, 16 $\times$ m bit block length, and n rounds. We have confirmed that DyC offers security against other well-known advanced cryptanalytic attacks including the slide attacks and interpolation attacks. In this paper, we show several properties of the key schedule of DyC by mathematical analysis.

  • PDF

A Study on a Group Key Agreement using a Hash Function (해쉬 함수를 이용한 그룹키 합의에 관한 연구)

  • Lee, Jun;Kim, In-Taek;Park, Jong-Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.4
    • /
    • pp.627-634
    • /
    • 2010
  • In this paper we suggest a group key agreement protocol among a group consisting more than 3 PKIs. From an 128 bit message, we produce a group key to any length size using a hash function. With a computer experiment we found that PKI's encryption/decryption time is the most dominant part of this procedure and an 160 bit ECC PKI is the most efficient system for distributing an 128 bit message in practical level. We implement this procedure over an unsecure multi user chatting system which is an open software. And we also show that this suggestion could be practically used in military business without a hardware implementation.

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

Synthesis of Double Mesoporous Silica Nanoparticles and Control of Their Pore Size (이중 다공성 실리카 나노입자 합성 및 공극 크기 조절)

  • Park, Dae Keun;Ahn, Jung Hwan
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.1
    • /
    • pp.167-169
    • /
    • 2021
  • In this study, monodispersive silica nanoparticles with double mesoporous shells were synthesized, and the pore size of synthetic mesoporous silica nanoparticles was controlled. Cetyltrimethylammonium chloride (CTAC), N, N-dimethylbenzene, and decane were used as soft template and induced to form outer mesoporous shell. The resultant double mesoporous silica nanoparticles were consisted of two layers of shells having different pore sizes, and it has been confirmed that outer shells with larger pores (Mean pore size > 2.5 nm) are formed directly on the surface of the smaller pore sized shell (Mean pore size < 2.5 nm). It was confirmed that the regulation of the molar ratio of pore expansion agents plays a key role in determining the pore size of double mesoporous shells.