• Title/Summary/Keyword: Shared use

Search Result 685, Processing Time 0.027 seconds

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.

Development of a Virtual Simulation on Window 98/NT Environment (Window98 환경 내에서 가상 시뮬레이션 개발)

  • 김석하;김영호;이만형
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.373-376
    • /
    • 2001
  • In this paper to cope with the reduction of products life-cycle as the variety of products along with the various demands of consumers, a virtual simulator is developed to make the changeover of manufacturing line efficient to embody a virtual simulation similar to a real manufacturing line. The developed virtual simulator can design a layout of a factory and make the time scheduling. Every factory has one simulator so that one product can be manufactured in the factories to use them as virtual factories. We suggest a scheme that heightens the ability to the diversity of manufacturing models by making the information of manufacturing lines and products models to be shared. The developed system embodies a virtual manufacturing line on the simulation using various manipulators and work cells as manufacturing components. we develop a virtual simulator system on Window 98/NT environment of Microsoft, operating system using of the greater part of PC user. Window program have a merit making GUI environment that programmer can use without the expert knowledge about hardware. A suer with the simulator can utilize an interface that makes one to manage the separate task process for each manufacturing module, change operator components and work cells, and easily teach tasks of each task module.

  • PDF

Development of Diagnosis System for Intelligent High-Speed Micro-Machining and Evaluation of Micro-Machining Characteristics (고속.지능형 마이크로머시닝을 위한 진단시스템 및 특성평가)

  • 김흥배;이우영;최성주
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.993-998
    • /
    • 1997
  • The advanced technology of micro-machining is starting to penetrate our lives. This technology, with which it is possible to make micro-structures by means of processing on the order of nm (micrometer = 1/1,000 mm) or less, is realizing machines that were only part of our wildest imagination. However, the fact is that many issues remain in the quest for a variety of applications. With the advent of computing technologies, information technologies, and telecommunications technologies, we foresee the need for new approaches in design, process, and the use of materials, technologies, and people in a globalized manufacturing enterprise. A new thinking paradigm is needed to focus on quality of service on the products we design and manufacture. Factories in different regions need to be co-ordinated through use of the state-of-the-art information on productivity, diagnostics, and service evaluation of manufacturing systems could be shared among different locations and partners. In this research, We develope the internet based Diagnosis system for micro machining and evaluate its characteristics by using mechatronic sensor like Dynamometer, acoustic emission, Acceleration sensor, micro phone, vision, infra-red thermometer.

  • PDF

Types of Possessive Meanings: Semantic Differences between Korean and English Possessives (소유의 의미유형 : 한.영 소유구문의 의미차이)

  • Yoon, Jae-Hak
    • Language and Information
    • /
    • v.13 no.1
    • /
    • pp.93-125
    • /
    • 2009
  • We examine attributive possessive constructions in Korean in examples like wuli manwula 'my wife' and wuli nala 'my country', where an apparently plural pronoun wuli 'our' is used to convey the singular meaning of 'my.' An example like wuli manwula has been a frequent topic of joke, because it clearly contains the literal sense of 'shared wife.' This type of use and the frequent use of wuli in an exclusive my context led many to claim that these are products of Korean culture which emphasizes groups and group solidarity over individuality, the example wuli manwula being the extreme case. Drawing on the work of Taylor (1989; 1996), Croft (2001; 2003), Haspelmath (1997; 2003), and 윤재학 (2003), we compare the meanings of Korean and English possessive constructions and seek a more linguistically based account for the data. In particular, it is shown that (i) wuli in question is not really the plural form of nay 'my', (ii) the possessive constructions in Korean are more conservative and limited in possible relations than the English counterparts are, and that (iii) these two facts interact to produce the afore-mentioned uses.

  • PDF

AHP 기법을 이용한 안티바이러스 소프트웨어 평가 요인 분석

  • Kim, Jong-Ki;Hwang, Suk-Yeon;Lee, Dong-Ho
    • The Journal of Information Systems
    • /
    • v.14 no.1
    • /
    • pp.19-40
    • /
    • 2005
  • The history of computer virus comes along with that of computer. Computer virus han surfaced as a serious problem in information age. The advent of open network and widespread use of Internet made the problem even more urgent. As a method of defense for computer virus most companies use anti-virus software. Selecting appropriate anti-virus software involves various criteria and thus it is a multiple-attribute decision making problem. The purpose of this study is to prioritize anti-virus software evaluation factors. To do that, first of all, important evaluation factors are selected based on previous research on anti-virus software as well as general software evaluation models. Then, a questionnaire survey was conducted on end-users, system administrators and anti-virus software developers. The survey result was analyzed with ExpertChoice 2000 which is based on Analytic hierarchy Process technique. This study found that there are clear differences among three survey groups regarding the relative importance of overall evaluation factors. End-user group ranked "cost" first, but it was the least important factor to developer group. Developers pointed out "operational support" ad the most important factor. There were also obvious differences in the relative importance of detail evaluation items. Both end-users and system administrators shared 7 common items among top 10 most important items. Moreover, neither of the two groups ranked any of the items in the "operational support" factor in top 10, whereas all 4 items in the factor were included in top 10 by developer group.

  • PDF

A development of the Process Capturing and Sharing System for an Effective Collaborative Design (협동설계 효율화를 위한 설계순서작성 및 공유시스템 개발)

  • Han, Jin-Teck;Lee, Soo-Hong;Park, Sam-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.10
    • /
    • pp.68-79
    • /
    • 1999
  • This paper describes an approach to collaborative design which focuses on the effects of individual activities on the overall design process. We utilize a new process modeling tool to define the process and then analyze and refine the process based on critical paths. This information is then shared over the Internet with all participants. The goal of this system is to detect critical errors at initial design stage and guide the designers to make better decisions based on the knowledge of the overall process. This system enables participating designers to publish his local process through an Internet bulletin board. Other members of the team can then provide feedback based on how the proposed process impacts their activities. The system provides a context-rich, persistent forum for collecting, preserving, and refining corporate expertise of the team. For example, designers can select any process from the bulletin board and use it as a template for his current project and then use it to maintain his own design history. This paper is based on the process modeling concepts of Design Roadamap and describe several key extensions in the area of CPM calculations and collaborative interfaces.

  • PDF

DEVELOPMENT OF A TOY INTERFEROMETER FOR EDUCATION AND OBSERVATION OF SUN AT 21 cm

  • Park, Yong-Sun;Kim, Chang-Hee;Choi, Sang-In;Lee, Joo-Young;Jang, Woo-Min;Kim, Woo-Yeon;Jeong, Dae-Heon
    • Journal of The Korean Astronomical Society
    • /
    • v.41 no.3
    • /
    • pp.77-81
    • /
    • 2008
  • As a continuation of a previous work by Park et al. (2006), we have developed a two-element radio interferometer that can measure both the phase and amplitude of a visibility function. Two small radio telescopes with diameters of 2.3 m are used as before, but this time an external reference oscillator is shared by the two telescopes so that the local oscillator frequencies are identical. We do not use a hardware correlator; instead we record signals from the two telescopes onto a PC and then perform software correlation. Complex visibilities are obtained toward the sun at ${\lambda}\;=\;21\;cm$, for 24 baselines with the use of the earth rotation and positional changes of one element, where the maximum baseline length projected onto UV plane is ${\sim}\;90{\lambda}$. As expected, the visibility amplitude decreases with the baseline length, while the phase is almost constant. The image obtained by the Fourier transformation of the visibility function nicely delineates the sun, which is barely resolved due to the limited baseline length. The experiment demonstrates that this system can be used as a "toy" interferometer at least for the education of (under)graduate students.

MICROBIOLOGICAL QUALITY OF BRAZILIAN LIPSTICKS AFTER NORMAL USE BY CONSUMERS

  • D.M.M. Pedroso;G.R. Dias;Gesztesi, J-L
    • Proceedings of the SCSK Conference
    • /
    • 2003.09b
    • /
    • pp.524-526
    • /
    • 2003
  • Lipsticks are cosmetics which do not contain water and are usually preserved with parabens. When submitted to the Challenge Test, theses products did not reach the CTFA criteria, which means that microbiological contamination could occur before the end of its shelf life. The aim of this study was to evaluate the contamination level of 130 lipsticks after its use. Microorganisms were isolated from 14,6 % of the samples. However, only in two samples (1,5%) the contamination level exceeded the 100 CFU/g level, which means that, although the preservative system was not efficient to eliminate bacteria, the lack of free water was enough to prevent the microbial development. Total bacteria and fungi were determined by conventional methodology, according to CTFA Microbiological Guidelines. The microbes were then isolated and characterized as normal skin flora microorganisms. This suggest that products were contaminated by the constant application of lipsticks by consumers. This could lead to cross contamination when the same product is shared by several people. Extra care should be taken into account when this type of products are available to be tested by several consumers in demonstration displays.

  • PDF

A Development of C-API Mechanism for Open Distributed Computing Systems (개방형 분산 컴퓨팅 시스템에서의 C-API 메타니즘 개발에 관한 연구)

  • 이상기;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.110-119
    • /
    • 1998
  • This paper describes a C-API (Cryptographic-Application program Interface) mechanism that can serve cryptographic service to one or more application programmers in an open distributed computing system. Generic cryptographic service, provides application Programmers with cryptographic algorithms and interfaces which can be shared so that the programmers can program distributed applications containing security services even though they have no detailed knowledge of cryptographic algorithms. Therefore, in this paper, a generic C-API mechanism is designed that can be used independently from various application environments and basic system structures so that programmers can use it commonly. This mechanism has the advantage that allows application programmers be able to use some cryptographic services and key management services not considering of the application program and operating system.

  • PDF

Inheritance of Cyst Nematode Resistance in a New Genetic Source, Glycine max PI 494182

  • Arelli, Prakash R.;Wang, Dechun
    • Journal of Crop Science and Biotechnology
    • /
    • v.11 no.3
    • /
    • pp.177-180
    • /
    • 2008
  • Worldwide, cyst nematode(Heterodera glycines Ichinohe) is the most destructive pathogen of cultivated soybean. In the USA, current annual yield losses are estimated to be nearly a billion dollars. Crop losses are primarily reduced by the use of resistant cultivars. Nematode populations are variable and have adapted to reproduce on resistant cultivars over time because resistance primarily traces to two soybean accessions. It is important to use diverse resistance sources to develop new nematode resistant cultivars. Soybean PI 494182 is a recent introduction from Japan and found to be resistant to multiple nematode populations. It is yellow seeded and maturity group 0. We have determined inheritance of resistance in PI 494182 using $F_{2:3}$ families derived from cross PI 494182 X cv. Skylla. Skylla is a susceptible parent. Three nematode populations, races 1, 3, and 5, corresponding to HG types 2.5.7, 0, and 2.5.7 were used to bioassay 162 $F_{2:3}$ families in greenhouse experiments. Based on Chi-square tests, a two-gene model is proposed for resistance to race 1 and a three-gene model is proposed for conditioning resistance to both races 3 and 5. Correlation coefficient analysis indicated that some genes conditioning resistance to races 1, 3, and 5 are shared or closely linked with each other. These results will be useful to soybean breeders for developing soybean cultivars for broad resistance to nematodes.

  • PDF