• Title/Summary/Keyword: Operation Scheme

Search Result 1,993, Processing Time 0.031 seconds

An Efficient Operation Scheme for the Material Procurement System in Construction Firms (대형 건설업체 자재수급관리시스템 효율적 운영방안)

  • Kim Tae-Gyum;Park Jong-Hyouk;Park Chan-Sik
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.299-302
    • /
    • 2003
  • Recently the timely delivery and the appropriate management for construction materials are of great significance in that the buildings are getting complicated and more various materials need to be handled. However, these systems have some problems, and do not seem to work effectively yet. The reason is that the lack of operation scheme for systematic management in project. In this study the efficient scheme for the .material procurement system in construction firms to manage the construction materials efficiently was discussed.

  • PDF

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

Hybrid Control and Protection Scheme for Inverter Dominated Microgrids

  • Xu, Xiaotong;Wen, Huiqing;Jiang, Lin;Hu, Yihua
    • Journal of Power Electronics
    • /
    • v.17 no.3
    • /
    • pp.744-755
    • /
    • 2017
  • With the high penetration of various sustainable energy sources, the control and protection of Microgrids has become a challenging problem considering the inherent current limitation feature of inverter-based Distributed Generators (DGs) and the bidirectional power flow in Microgrids. In this paper, a hybrid control and protection scheme is proposed, which combines the traditional inverse-time overcurrent protection with the biased differential protection for different feeders with different kinds of loads. It naturally accommodates various control strategies such as P-Q control and V-f control. The parameter settings of the protection scheme are analyzed and calculated through a fast Fourier transform algorithm, and the stability of the control strategy is discussed by building a small signal model in MATLAB. Different operation modes such as the grid-connected mode, the islanding mode, and the transitions between these two modes are ensured. A Microgrid model is established in PSCAD and the analysis results show that a Microgrid system can be effectively protected against different faults such as the single phase to ground and the three phase faults in both the grid-connected and islanded operation modes.

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing

  • Zhu, Hong;Wu, Bin;Xie, Meiyi;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5171-5189
    • /
    • 2016
  • With the popularity of cloud computing, many data owners outsource their graph data to the cloud for cost savings. The cloud server is not fully trusted and always wants to learn the owners' contents. To protect the information hiding, the graph data have to be encrypted before outsourcing to the cloud. The adjacent vertex search is a very common operation, many other operations can be built based on the adjacent vertex search. A boolean adjacent vertex search is an important basic operation, a query user can get the boolean search results. Due to the graph data being encrypted on the cloud server, a boolean adjacent vertex search is a quite difficult task. In this paper, we propose a solution to perform the boolean adjacent vertex search over encrypted graph data in cloud computing (BASG), which maintains the query tokens and search results privacy. We use the Gram-Schmidt algorithm and achieve the boolean expression search in our paper. We formally analyze the security of our scheme, and the query user can handily get the boolean search results by this scheme. The experiment results with a real graph data set demonstrate the efficiency of our scheme.

A 0.9-V human body communication receiver using a dummy electrode and clock phase inversion scheme

  • Oh, Kwang-Il;Kim, Sung-Eun;Kang, Taewook;Kim, Hyuk;Lim, In-Gi;Park, Mi-Jeong;Lee, Jae-Jin;Park, Hyung-Il
    • ETRI Journal
    • /
    • v.44 no.5
    • /
    • pp.859-874
    • /
    • 2022
  • This paper presents a low-power and lightweight human body communication (HBC) receiver with an embedded dummy electrode for improved signal acquisition. The clock data recovery (CDR) circuit in the receiver operates with a low supply voltage and utilizes a clock phase inversion scheme. The receiver is equipped with a main electrode and dummy electrode that strengthen the capacitive-coupled signal at the receiver frontend. The receiver CDR circuit exploits a clock inversion scheme to allow 0.9-V operation while achieving a shorter lock time than at 3.3-V operation. In experiments, a receiver chip fabricated using 130-nm complementary metal-oxide-semiconductor technology was demonstrated to successfully receive the transmitted signal when the transmitter and receiver are placed separately on each hand of the user while consuming only 4.98 mW at a 0.9-V supply voltage.

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

Study on Classification Scheme for Multilateral and Hierarchical Traffic Identification (다각적이고 계층적인 트래픽 분석을 위한 트래픽 분류 체계에 관한 연구)

  • Yoon, Sung-Ho;An, Hyun-Min;Kim, Myung-Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.47-56
    • /
    • 2014
  • Internet traffic has rapidly increased due to the supplying wireless devices and the appearance of various applications and services. By increasing internet traffic rapidly, the need of Internet traffic classification becomes important for the effective use of network resource. However, the traffic classification scheme is not much studied comparing to the study for classification method. This paper proposes novel classification scheme for multilateral and hierarchical traffic identification. The proposed scheme can support multilateral identification with 4 classification criteria such as service, application, protocol, and function. In addition, the proposed scheme can support hierarchical analysis based on roll-up and drill-down operation. We prove the applicability and advantages of the proposed scheme by applying it to real campus network traffic.

Novel Zero-Voltage-Transition Synchronous Buck Converter for Portable System (휴대용 시스템을 위한 새로운 영전압 천이형 싱크로너스 벅 컨버터)

  • Kim, Nak-Yoon;Choi, Hyun-Chil
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.17 no.4
    • /
    • pp.330-336
    • /
    • 2012
  • In this paper, novel zero-voltage-transition(ZVT) synchronous buck converter of pulse-width-modulation(PWM) method is proposed to utilize auxiliary circuit. In this proposed scheme, designed to operate low output voltage for portable system and applied synchronous scheme to improve efficiency. Also proposed circuit is designed to do soft-switching operation in every switch. In this paper, the circuit operation is explained and analysed, and design guidelines are presented. To verify the availability of the proposed circuit, experiment and simulation is carried out.

Instantaneous Torque Control of IPMSM for maximum Torque Drive in Torque and Current Plane (토크와 전류 평면에서 최대토크 운전을 위한 IPMSM의 순시 토크제어)

  • Lee, Hong-Gyun;Lee, Jung-Chul;Chung, Dong-Hwa
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.52 no.1
    • /
    • pp.1-8
    • /
    • 2003
  • The paper proposes instantaneous torque control of IPMSM for maximum torque drive of torque and current plane. The control scheme is based on the mathematical model of the motor and is applicable to the constant torque and field weakening operations. The scheme allows the motor to be driven with maximum torque per ampere(MTPA) characteristic below base speed and it maintains the maximum voltage limit of the motor wide field weakening and the motor current limit under all conditions of operation accurately. For each control mode, a condition that determines the optimal d-axis current $^id$ for maximum torque operation is derived. The proposed control algorithm is applied to IPMSM drive system for drive of wide speed range, the operating characteristics controlled that maximum torque control are examined in detail by simulation.