• Title/Summary/Keyword: S/key

Search Result 9,885, Processing Time 0.041 seconds

Comparison with Load Transfer Efficiency for Joint Types in Airport Concrete Pavements (줄눈형식에 따른 공항 콘크리트 포장 하중전달율 비교)

  • An, Ji-Hwan;Jeon, Sung-Il;Kwon, Soo-Ahn;Kim, Min-Woo
    • International Journal of Highway Engineering
    • /
    • v.16 no.3
    • /
    • pp.9-20
    • /
    • 2014
  • PURPOSES : This study is to compare load transfer efficiency of key joint and dowel joint for airport concrete pavement. METHODS : As AC150/5320-6D of FAA's [Advisory Circular] was changed into AC150/5320-6E, Key joint type of rigid pavement were excluded from Construction Joints. LTE(Load Transfer Efficiency) of dowel joint and key joint were compared by times and seasons through pavement temperature measurement, ocular investigation and HWD measurement. RESULTS : For the joint performance grade of No. 2(The second) runway of airport, 12% of poor rate was observed in key joint and 2% of poor rate in dowel joint. Poor rate of key joint was increased to 17%, if only No. 3~No. 6 slabs, which are mostly loaded from the airplanes, were applied for the study. In apron area, LTE poor rate of key joint was high in winter, and LTE poor rate of dowel joint was at least above 'Fair' grade. In summer, 'Fair' for key joint, 'Acceptable' for dowel joint appeared. CONCLUSIONS : As results, dowel joint was superior than key joint for LTE. Deviations of seasons and times were smaller in dowel joint's result. And LTE in winter was lower than LTE in summer.

An Implementation of Security Key Management System by LDAP (LDAP을 이용한 보안 키 관리 시스템 구현)

  • Yoon, Sung-Jung;Kim, Geon-Ung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.437-445
    • /
    • 2006
  • The security key management function is a key element to secure network environment, and many protocols include IPSec, HIP, etc. demand this function. There are two solutions to provide the key management function in the network layer, one is a method for storing security key material in the directory, and the other is a method for storing security key material in DNS. In this paper we present an implementation of key management system by LDAP. We deployed the open source solutions for directory service(OpenLDAP), cryptographic algorithm (FLINT/C), IPSec(FreeS/WAN), and verified the key management system by the encrypted message exchange and the interoperability test by un daemon.

Managing Key Accounts in the Readymade Garments Industry: To What Extent Bangladeshi Companies Perform

  • Ahmmed, Kawsar;Noor, Nor Azila Mohd.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.4
    • /
    • pp.57-65
    • /
    • 2018
  • With the paramount importance of key account management in business-to-business relationship, today companies are using this approach as a strategic weapon in their selling efforts targeted at the most important customers to solve their complex requirements with special treatment that eventually ensures both parties' financial and nonfinancial objectives. The aim of this paper is to investigate the level of key account management performance among the export-oriented readymade garments companies in Bangladesh with regards to company's experience in business, size of the company and key account serving capacity of the company. Using a questionnaire, data from 112 readymade garments companies in Bangladesh were collected and analyzed using descriptive analysis and ANOVA to test the level of key account management performance. Results show that the level of key account management performance by the garments companies did not vary by the company's experience in business and size of the company respectively. In contrast, the level of key account management performance was found to be different concerning high, medium, and low customer service capacity. Apparently, companies with big number of customers show better performance than companies with small number of customer. Implications for this study are discussed along with suggestions for future research avenues.

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

Pairwise Key Agreement Protocols Using Randomness Re-use Technique (난수 재사용 기법을 이용한 다중 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.949-958
    • /
    • 2005
  • In the paper we study key agreement schemes when a party needs to establish a session key with each of several parties, thus having multiple session keys. This situation can be represented by a graph, tailed a key graph, where a vertex represents a party and an edge represents a relation between two parties sharing a session key. graphs to establish all session keys corresponding to all edges in a key graph simultaneously in a single session. A key agreement protocol of a key graph is a natural extension of a two-party key agreement protocol. We propose a new key exchange model for key graphs which is an extension of a two-party key exchange model. using the so-called randomness re-use technique which re-uses random values to make session keys for different sessions, we suggest two efficient key agreement protocols for key graphs based on the decisional Diffie-Hellman assumption, and prove their securities in the key exchange model of key graphs. Our first scheme requires only a single round and provides key independence. Our second scheme requires two rounds and provides forward secrecy. Both are proven secure In the standard model. The suggested protocols are the first pairwise key agreement protocols and more efficient than a simple scheme which uses a two-party key exchange for each necessary key. Suppose that a user makes a session key with n other users, respectively. The simple scheme's computational cost and the length of the transmitted messages are increased by a factor of n. The suggested protocols's computational cost also depends on n, but the length of the transmitted messages are constant.

A study on the dynamic characteristics of the secondary loop in nuclear power plant

  • Zhang, J.;Yin, S.S.;Chen, L.;Ma, Y.C.;Wang, M.J.;Fu, H.;Wu, Y.W.;Tian, W.X.;Qiu, S.Z.;Su, G.H.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.5
    • /
    • pp.1436-1445
    • /
    • 2021
  • To obtain the dynamic characteristics of reactor secondary circuit under transient conditions, the system analysis program was developed in this study, where dynamic models of secondary circuit were established. The heat transfer process and the mechanical energy transfer process are modularized. Models of main equipment were built, including main turbine, condenser, steam pipe and feedwater system. The established models were verified by design value. The simulation of the secondary circuit system was conducted based on the verified models. The system response and characteristics were investigated based on the parameter transients under emergency shutdown and overload. Various operating conditions like turbine emergency shutdown and overspeed, condenser high water level, ejector failures were studied. The secondary circuit system ensures sufficient design margin to withstand the pressure and flow fluctuations. The adjustment of exhaust valve group could maintain the system pressure within a safe range, at the expense of steam quality. The condenser could rapidly take out most heat to avoid overpressure.

Two New Flavonoids from Dragon's Blood of Dracaena cambodiana

  • Mei, Wen-Li;Luo, Ying;Wang, Hui;Shen, Hai-Yan;Zeng, Yan-Bo;Dai, Hao-Fu
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.6
    • /
    • pp.1791-1794
    • /
    • 2013
  • Phytochemical investigation on dragon's blood of Dracaena cambodiana led to the discovery of two new flavonoid derivatives, cambodianin G (1) and cambodianin H (2). Their structures were elucidated on the basis of detailed spectroscopic analysis, including 1D and 2D NMR techniques and chemical methods. The two compounds were observed to exhibit antibacterial activities against Staphylococcus aureus, and compound 1 showed cytotoxicities against K562 and SGC-7901 cell lines.

디자인 중심 신제품 개발 전략의 성공 요인에 관한 연구 - 초콜릿 폰 개발 사례를 중심으로 -

  • Jang, Seong-Geun;Ryu, Seong-Il;Kim, Jin-U
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.545-559
    • /
    • 2006
  • The function of product design has been an important part for success on new product development We deeply studied 'Chocolate-Phone' case which is considered as a representative of adopting design-oriented new product development strategy. According to this study, we found three contextual factors and nine key success factors for design-oriented new product development. The contextual factors consist of the strong needs for innovative product development, customer's needs for the emotional value, competitive situation for the new product launching. The key success factors consist of design, development marketing, overall sides. The key success factors of design side are to select talented designers and take an insight for market and communication skill. The key success factors of development side are to possess high technological abilities, to do divergence with removing or giving up some function management's strong support. The key success factors of marketing side are to bring core marketers from outside, capacity to gather ideas from outside. The key success factors of overall side are to share design-oriented principle with other parts and to change member's mind from engineer-oriented to market-oriented.

  • PDF

Two New Species of Placolecis (Lichenized Ascomycota) from China

  • Yin, An Cheng;Wang, Xin Yu;Liu, Dong;Zhang, Yan Yun;Yang, Mei Xia;Li, Li Juan;Wang, Li Song
    • Mycobiology
    • /
    • v.47 no.4
    • /
    • pp.401-407
    • /
    • 2019
  • Two new species of the lichen genus Placolecis are discovered in China, namely P. kunmingensis An. C. Yin & Li S. Wang and P. sublaevis An. C. Yin & Li S. Wang. The new combination P. loekoesiana (S.Y. Kondr., Farkas, J.J. Woo & Hur) An. C. Yin is proposed. Placolecis kunmingensis is characterized by having simple, spherical or ellipsoid, hyaline spores, and pear-shaped pycnidia; while P. sublaevis can be distinguished by its thallus forming larger aggregations with slightly flattened lobes at the thallus margin, and urn-shaped pycnidia. Descriptions, a phylogenetic tree and a key are provided for all the known Placolecis species in China.