• Title/Summary/Keyword: Pseudo-symmetric

Search Result 70, Processing Time 0.036 seconds

A Study on the Disintegration and Spreading Behavior of Fuel-spray Emanating from a Liquid-thruster Injector by Pseudo-3D Spatial Distribution Measurement (준3차원적 공간분포 계측에 의한 액체추력기 인젝터 연료분무의 분열 및 확산 거동에 관한 연구)

  • Kim, Jin-Seok;Kim, Jeong-Soo
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.12 no.5
    • /
    • pp.9-17
    • /
    • 2008
  • Pseudo-3D spatial distribution of spray droplets is investigated by using Dual-mode Phase Doppler Anemometry (DPDA) in order to examine the disintegration and spreading behavior of spray exiting from liquid-propellant thruster injector. Spray injected from nozzle orifice with length-to-diameter ratio ($L/d_o$) of 1.67 and under the injection pressure of 27.6 bar is aligned to the vertical. Vertical and horizontal mean velocities of droplets, Sauter Mean Diameter (SMD), and volumetric flux decrease as droplets travel from center/upstream toward outer region/downstream of spray. Although the distribution of spray characteristic parameters is symmetric against the geometric axis of nozzle orifice, their absolute values are asymmetric.

The Implementation of the Index Search System in a Encrypted Data-base (암호화된 데이터베이스에서 인덱스 검색 시스템 구현)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1653-1660
    • /
    • 2010
  • The user information stored in database have been leaked frequently. To protect information against malevolent manager on the inside or outside aggressor, it is one of the most efficient way to encrypt information and store to database. It is better to destruct information than not to use encrypted information stored in database. The encrypted database search system is developed variously, and used widely in many fields. In this paper, we implemented the scheme that can search encrypted document without exposing user's information to the untrusted server in mobile device. We compared and analyzed the result embodied with DES, AES, and ARIA based on symmetric key by searching time.

Seismic Traveltime Tomography in Inhomogeneous Anisotropic Media (불균질 이방성 매질에서의 탄성파 주시 토모그래피)

  • Jeong, Chang-Ho;Suh, Jung-Hee
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.209-214
    • /
    • 2007
  • In Korean geology that crystalline rock is dominant, the properties of subsurface including the anisotropy are distributed complexly and changed abruptly. Because of such geological environments, cross-hole seismic traveltime tomography is widely used to obtain the high resolution image of the subsurface for the engineering purposes in the geotechnical sites. However, because the cross-hole tomography has a wide propagation angle coverage relatively, its data tend to include the seismic velocity anisotropy comparing with the surface seismic methods. It can cause the misinterpretation that the cross-hole seismic data including the anisotropic effects are analyzed and treated with the general processing techniques assuming the isotropy. Therefore, we need to consider the seismic anisotropy in cross-hole seismic traveltime tomography. The seismic anisotropic tomography algorithm, which is developed for evaluation of the velocity anisotropy, includes several inversion schemes in order to make the inversion process stable and robust. First of all, the set of the inversion parameters is limited to one slowness, two ratios of slowness and one direction of the anisotropy symmetric axis. The ranges of the inversion parameters are localized by the pseudo-beta transform to obtain the reasonable inversion results and the inversion constraints are controlled efficiently by ACB(Active Constraint Balancing) method. Especially, the inversion using the Fresnel volume is applied to the anisotropic tomography and it can make the anisotropic tomography more stable than ray tomography as it widens the propagation angle coverage.

  • PDF

A Multilevel Key Distribution using Pseudo - random Permutations (의사 랜덤치환을 이용한 다중레벨 키분배)

  • Kim, Ju-Seog;Shin, Weon;Lee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2493-2500
    • /
    • 1997
  • We propose a new key management scheme for multiuser group which is classified as hierarchical structure (sometimes it is called a multilevel security hierarchy) in the symmetric key cryptosystem. The proposed scheme is based on the trapdoor one-way permutations which are generated by the pseudo-random permutation algorithm, and it is avaliable for multilevel hierarchical structure composed of a totally ordered set and a partially ordered set, since it has advantage for time and storage from an implemental point of view. Moreover, we obtain a performance analysis by comparing with the other scheme, and show that the proposed scheme is very efficient for computing time of key generation and memory size of key storage.

  • PDF

Synthesis and Molecular Structure of p-tert-butylcalix[4]arene Hexanoate

  • Park, Young-Ja;Kwanghyun No;Cho, Sun-Hee
    • Korean Journal of Crystallography
    • /
    • v.10 no.1
    • /
    • pp.1-8
    • /
    • 1999
  • Two conformational isomers of p-tert-butylcalix[4]arene hexanoate were prepared from the reaction of-p-tert-butylcalix[4]arene and hexanoly chloride in the presence of AlCl3 in CH2Cl2 and their structures were determined by NMR spectra and X-ray diffraction as a cone and a 1,3-alternate conformer, respectively. The crystal of cone conformer (C68H96O8·(CH3)2CO) is triclinic, P, a=15.066(1) , b=16.063(1) , c=16.365(1) , α=79.75(2)o, β=109.95(2)o, γ=80.32(0)o, V=3602.7(4) 3, Z=2. The intensity data were collected on Simens SMART diffractometer/CCD area detector. The structure was solved by direct method and refined by least-squares calculations to a final R value of 0.144 for 4638 observed reflections. The molecular conformation is distorted symmetric cone with the flattening A and D phenyl rings. The crystal of 1,3-alternate conformer (C68H96O8·2CHCl3) is orthorhombic, Pca21, a=34.586(5) , b=10.207(3) , c=20.394(4) , V=7199(3) 3, Z=4. The intensity data were collected on an Enraf-Noninus CAD-4 Diffractometer with a graphite monochromated Mo-K radiation. The structure was solved by direct method and refined by least-squares calculations to a final R value of 0.152 for 2241 observed reflections. The molecule has a pseudo mirror symmetric 1,3-alternate conformation.

  • PDF

An Efficient Computation Method of Zernike Moments Using Symmetric Properties of the Basis Function (기저 함수의 대칭성을 이용한 저니키 모멘트의 효율적인 계산 방법)

  • 황선규;김회율
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.563-569
    • /
    • 2004
  • A set of Zernike moments has been successfully used for object recognition or content-based image retrieval systems. Real time applications using Zernike moments, however, have been limited due to its complicated definition. Conventional methods to compute Zernike moments fast have focused mainly on the radial components of the moments. In this paper, utilizing symmetric/anti-symmetric properties of Zernike basis functions, we propose a fast and efficient method for Zernike moments. By reducing the number of operations to one quarter of the conventional methods in the proposed method, the computation time to generate Zernike basis functions was reduced to about 20% compared with conventional methods. In addition, the amount of memory required for efficient computation of the moments is also reduced to a quarter. We also showed that the algorithm can be extended to compute the similar classes of rotational moments, such as pseudo-Zernike moments, and ART descriptors in same manner.

Security Improvement of Authentication Method Using Transfer Agent in USN

  • Cho, Do-Eun
    • International Journal of Contents
    • /
    • v.7 no.4
    • /
    • pp.35-43
    • /
    • 2011
  • USN is a technology to detect human external environment. It is an important factor in buildinga ubiquitous computing environment. In this thesis, an authentication method was proposed to allow the sensor nodes, which have weak computing operation capability, to safely communicate with each other in USN and guarantee the anonymity of users for their privacy. In the proposed authentication method that takes into account the characteristics of sensor network, sensor nodes based on a symmetric key algorithm do not transfer keys directly, instead, they mix the random numbers received from AS to generate keys necessary for communications, having a master key and a pseudo-random number generator.In addition, in this thesis, TA was adopted to minimize the leakage of users' information, and a scheme through which virtual IDs received from AS are delivered to sensor nodes was applied to improve anonymity.

Analysis of Three-Dimensional Mixed Convection Flow About Uniformly Distributed Heat-Generating Blocks on a Conductive Wall (기판 위에 분포된 발열블록 주위의 3차원 혼합대류 열전달 해석)

  • Yun, Byeong-Taek;Choi, Do Hyung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.1
    • /
    • pp.1-11
    • /
    • 1999
  • The three-dimensional laminar mixed convection flow between the conductive printed circuit boards. on which the heat generating rectangular blocks are uniformly distributed, has been examined in the present study. The flow and heat-transfer characteristics are assumed to be pseudo periodic in the streamwise direction and symmetric in the cross-stream direction. Using an algorithm of SIMPLER, the continuity equation. the Navier-Stokes equations and the energy equation are solved numerically in the three-dimensional domain Inside the channel. The convective derivative terms are discretized by the QUICK scheme to accurately capture the flow field. The flow and the heat transfer characteristics are thoroughly examined for various Re and Gr.

Reducing RFID Reader Load with the Meet-in-the-Middle Strategy

  • Cheon, Jung-Hee;Hong, Jeong-Dae;Tsudik, Gene
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.10-14
    • /
    • 2012
  • When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags without revealing their IDs. One approach for identification with lightweight tags is that each tag performs pseudo-random function with his unique embedded key. In this case, a reader (or a back-end server) needs to perform a brute-force search for each tag-reader interaction, whose cost gets larger when the number of tags increases. In this paper, we suggest a simple and efficient identification technique that reduces readers computation to $O$(${\sqrt{N}}$ log$N$) without increasing communication cost. Our technique is based on the well-known "meet-in-the-middle" strategy used in the past to attack symmetric ciphers.

Key Management Protocol for Information Security in Wireless Sensor Networks (무선 센서 네트워크에서 정보보호를 위한 키 관리 프로토콜)

  • 조정식;여상수;김순석;김성권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.430-432
    • /
    • 2004
  • 무선 센서 네트워크는 특정 관심 대상이나 환경으로부터 데이터를 수집하여 사용자에게 전달해 줌으로써 결정수단이나 연구를 목적으로 이용되어 지기 때문에 효과적인 보안이 요구되어 진다. 기존의 존재하는 많은 네트워크 보안은 센서 노드의 특성상 센서 네트워크에 적용될 수 없다 본 논문은 이런 센서 네트워크의 특성을 감안하여 대칭 키(symmetric key)를 기반으로 한 키(key) 관리 프로토콜을 제안한다. 제안 프로토콜은 키의 직접적인 이동 없이 마스터 키(Master Key), 의사 난수 생성기(Pseudo Random Number Generator:PRNG), 난수(Random Number:RN)의 조합을 통해 임의의 키를 생성함으로써 보안성을 강화함과 동시에, 다양한 통신 모델에서 사용되어지는 키들을 생성하고, 또한 통신 모델의 따라 프로토콜 축소와 확장이 가능하며, 다양한 네트워크 모델에 안도록 변형이 용이하게 설계되었다. 그리고 센서 노드의 에너지 소비를 감안하여 프로토콜 수행에 필요한 통신회수를 최소화하였다.

  • PDF