• Title/Summary/Keyword: Random Key Division

Search Result 40, Processing Time 0.028 seconds

Analysis and Modelling of Vibration Performance for Multi-layered Corrugated Structure

  • Kim, Jin Nyul;Sim, Jae Min;Park, Min Jung;Kim, Ghi Seok;Kim, Jongsoon;Park, Jong Min
    • Journal of Biosystems Engineering
    • /
    • v.38 no.4
    • /
    • pp.327-334
    • /
    • 2013
  • Purpose: The purpose of this study was to analyze for resonant frequency, vibration transmissibility and damping ratio of multi-layered corrugated structures using a random vibration test. Methods: The random vibration test was performed by the ASTM D4728 specifications using two paperboards (S120, K180) and two types of flutes (A/F, B/F). Damping ratio of the multi-layered corrugated structures was estimated using a theoretical equation derived from the measured resonant frequency and transmissibility. Results: The resonant frequency and vibration transmissibility of the multi-layered corrugated structures of K180 and B-flute were higher than those of S120 and A-flute, respectively; however, the damping ratio of each sample had the opposite tendency. The resonant frequency was inversely proportional to the sample thickness and static stress; vibration transmissibility and damping ratio were not correlated with sample thickness and static stress. In addition, we developed a mathematical model of the resonant frequency with variables of sample thickness and static stress. Conclusions: Results of this study can be useful for environment-friendly and optimal packaging design since vibration has been a key factor in cushioning packaging design.

Optimum Superimposed Training for Mobile OFDM Systems

  • Yang, Qinghai;Kwak, Kyung-Sup
    • Journal of Communications and Networks
    • /
    • v.11 no.1
    • /
    • pp.42-46
    • /
    • 2009
  • Superimposed training (SIT) design for estimating of time-varying multipath channels is investigated for mobile orthogonal frequency division multiplexing (OFDM) systems. The design of optimum SIT consists of two parts: The optimal SIT sequence is derived by minimizing the channel estimates' mean square error (MSE); the optimal power allocation between training and information data is developed by maximizing the averaged signal to interference plus noise ratio (SINR) under the condition of equal powered paths. The theoretical analysis is verified by simulations. For the metric of the averaged SINR against signal to noise ratio (SNR), the theoretical result matches the simulation result perfectly. In contrast to an interpolated frequency-multiplexing training (FMT) scheme or an SIT scheme with random pilot sequence, the SIT scheme with proposed optimal sequence achieves higher SINR. The analytical solution of the optimal power allocation is demonstrated by the simulation as well.

The Effect of the LOHAS Tendency on the Attitude and Purchase Intention for Environmental-Friendly Food Materials: From the Perspective of New Seniors (뉴시니어 소비자의 로하스(LOHAS) 성향이 친환경 식자재 태도 및 구매에 미치는 영향 연구)

  • Kim, Younghee;Youn, Hyewon
    • The Korean Journal of Food And Nutrition
    • /
    • v.27 no.3
    • /
    • pp.393-399
    • /
    • 2014
  • The purpose of this study is to analyze the LOHAS tendency of new seniors' and its effects on the attitude and purchase intention for environmental-friendly food materials. Data were collected through a questionnaire survey from random sample of 162 senior customers in Seoul and Kyunggi area. The LOHAS tendency of new seniors can be divided into three factors; environmental-friendly, sustainability and sociality. Environmental problems affected the environmental-friendly factor the most while manufacturing techniques for sustainable products and recycling habits were key variables for the sustainability factor. The idea of companies sharing their value system of LOHAS tendency was the most significant for the sociality factor. Each of these LOHAS tendency factors influenced the purchase intention of the new seniors.

Adaptive Cross-Layer Packet Scheduling Method for Multimedia Services in Wireless Personal Area Networks

  • Kim Sung-Won;Kim Byung-Seo
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.297-305
    • /
    • 2006
  • High-rate wireless personal area network (HR-WPAN) has been standardized by the IEEE 802.15.3 task group (TG). To support multimedia services, the IEEE 802.15.3 TG adopts a time-slotted medium access control (MAC) protocol controlled by a central device. In the time division multiple access (TDMA)-based wireless packet networks, the packet scheduling algorithm plays a key role in quality of service (QoS) provisioning for multimedia services. In this paper, we propose an adaptive cross-layer packet scheduling method for the TDMA-based HR-WPAN. Physical channel conditions, MAC protocol, link layer status, random traffic arrival, and QoS requirement are taken into consideration by the proposed packet scheduling method. Performance evaluations are carried out through extensive simulations and significant performance enhancements are observed. Furthermore, the performance of the proposed scheme remains stable regardless of the variable system parameters such as the number of devices (DEVs) and delay bound.

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Efficient Optical Watermark Using Multiple Phase Wrapping and Real-Valued Functions (다중위상래핑과 실수값 함수를 이용한 효율적인 광 워터마킹)

  • Cho, Kyu-Bo;Seo, Dong-Hoan;Lee, Seung-Hee;Hong, Jae-Keun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.3
    • /
    • pp.10-19
    • /
    • 2009
  • In this paper, an efficient optical watermark method using multiple phase wrapping and real-valued decoding key is proposed. In the embedding process, two zero-padded original images placed in two quadrants on input plane are multiplied with two statistically independent random phase patterns and are Fourier transformed, respectively. Two encoded images are obtained by taking the real-valued data from these Fourier transformed images. And then two phase-encoded patterns, used as a hidden image and a decoding key, are generated by the use of multiple phase wrapping from each of the encoded images. A transmitted image is made from the linear superposition of the weighted hidden images and a cover image. In reconstruction process, the mirror reconstructed images can be obtained at all quadrants by the inverse-Fourier transform of the product of the transmitted image and the decoding key. Computer simulation and optical experiment are demonstrated in order to confirm the proposed method.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

Image Watermark Method Using Multiple Decoding Keys (다중 복호화 키들을 이용한 영상 워터마크 방법)

  • Lee, Hyung-Seok;Seo, Dong-Hoan;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2008
  • In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

Theoretical Insights into Oxygen Vacancies in Reduced Bulk TiO2: A Mini Review (벌크 TiO2 산소 공공 결함에 대한 이론적 이해)

  • Jaehyuk Choi;Junho Lee;Taehun Lee
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.37 no.3
    • /
    • pp.231-240
    • /
    • 2024
  • Titanium dioxide (TiO2) holds significant scientific and technological relevance as a key photocatalyst and resistive random-access memory, demonstrating unique physicochemical properties and serving as an n-type semiconductor. Understanding the density and arrangement of oxygen vacancies (VOs) is crucial for tailoring TiO2's properties to diverse technological needs, driving increased interest in exploring oxygen vacancy complexes and superstructures. In this mini review, we summarize the recent understandings of the fundamental properties of oxygen vacancies in bulk rutile (R-TiO2) and anatase (A-TiO2) based on DFT and beyond method. We specifically focus on the excess electrons and their spatial arrangement of disordered single VO in bulk R and A-TiO2, aligned with the experimental findings. We also highlight the theoretical works on investigating the geometries and stabilities of ordered VOs complexes in bulk TiO2. This comprehensive review provides insights into the fundamental properties of excess electrons in reduced TiO2, offering valuable perspectives for future research and technological advancements in TiO2-based devices.

The Impact on the Performance by Airport Policy and Leadership (공항정책과 리더십이 성과에 미치는 영향 : 공기업 경영평가 수행도의 매개효과)

  • Beak, Jeong-Sun;Lee, Yun-Cheol;Lee, Yung-Kil
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.1
    • /
    • pp.20-35
    • /
    • 2019
  • In this article, we verified to influence on the performance through performance management system and public enterprise management evaluation implementation degree by the airport policy and leadership. Data collected from 533 employees of Incheon International Airport Corporation and Korea Airports Corporation. Sample extracted with a simple random sampling. Data analysis adopted structural equation modeling. The results of this research found that airport policy and leadership are the key variables influencing airport performance. This research verified a significant mediation effect on the public enterprise management evaluation implementation degree. Thus, this research assert that positive proposals for airport policy and insightful leadership must be taken. This paper explores new view in the public enterprise management evaluation research and offers practical help to researchers and practitioners in providing a direction for airport performance.