• Title/Summary/Keyword: Source key

Search Result 1,106, Processing Time 0.034 seconds

A Study on Analyzing the relationship of formulae with Comparing the components of formulae (처방 구성요소 비교를 통한 처방 관계 분석 고찰)

  • Jang, Heewon;Song, Jichung;Eom, Dongmyung
    • Journal of Korean Medical classics
    • /
    • v.28 no.2
    • /
    • pp.163-181
    • /
    • 2015
  • Objectives : In order to select the key factors of formulae and to identify the relationship of formulae with comparing these factors. Methods : We selected the five key factors that the source, the name of formula, the efficacy, the constituent herbs, and the capacity of herbs. When we compared between two formulae with five key factors, there was 32 cases. So we investigated the example which is corresponded to each cases and analyzed the relationship of formulae. Results : Among the 32 cases, analyzed two formulae was same in 8 cases, altered from same formula in different ways in 14 cases, and different with each other in 20 cases. Conclusions : These five key factors play a decisive role to comparing formulae and analyzing the relationship of them. So these factors and the relationship of formulae would be considerated to construct formula ontology.

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET (MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.

A Novel Bio-inspired Trusted Routing Protocol for Mobile Wireless Sensor Networks

  • Zhang, Mingchuan;Xu, Changqiao;Guan, Jianfeng;Zheng, Ruijuan;Wu, Qingtao;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.74-90
    • /
    • 2014
  • Routing in mobile wireless sensor networks (MWSNs) is an extremely challenging issue due to the features of MWSNs. In this paper, we present a novel bio-inspired trusted routing protocol (B-iTRP) based on artificial immune system (AIS), ant colony optimization (ACO) and Physarum optimization (PO). For trust mechanism, B-iTRP monitors neighbors' behavior in real time and then assesses neighbors' trusts based on AIS. For routing strategy, each node proactively finds routes to the Sink based on ACO. When a backward ant is on the way to return source, it senses the energy residual and trust value of each node on the discovered route, and calculates the link trust and link energy of the route. Moreover, B-iTRP also assesses the availability of route based on PO to maintain the route table. Simulation results show how B-iTRP can achieve the effective performance compared to existing state-of-the-art algorithms.

Improved Trigger System for the Suppression of Harmonics and EMI Derived from the Reverse-Recovery Characteristics of a Thyristor

  • Wei, Tianliu;Wang, Qiuyuan;Mao, Chengxiong;Lu, Jiming;Wang, Dan
    • Journal of Power Electronics
    • /
    • v.17 no.6
    • /
    • pp.1683-1693
    • /
    • 2017
  • This paper analyses the harmonic pollution to power grids caused by thyristor-controlled devices. It also formulates a mathematic derivation for the voltage spikes in thyristor-controlled branches to explain the harmonic and EMI derived from the reverse-recovery characteristics of the thyristor. With an equivalent nonlinear time-varying voltage source, a detailed simulation model is established, and the periodic dynamic switching characteristic of the thyristor can be explicitly implied. The simulation results are consistent with the probed results from on-site measurements. An improved trigger system with gate-shorted circuit structure is proposed to reduce the voltage spikes that cause EMI. The experimental results indicate that a prototype with the improved trigger system can effectively suppress the voltage spikes.

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

  • Mi-Kyung Oh;Sangjae Lee;Yousung Kang;Dooho Choi
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.346-357
    • /
    • 2023
  • Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.

Study on the neutron imaging detector with high spatial resolution at China spallation neutron source

  • Jiang, Xingfen;Xiu, Qinglei;Zhou, Jianrong;Yang, Jianqing;Tan, Jinhao;Yang, Wenqin;Zhang, Lianjun;Xia, Yuanguang;Zhou, Xiaojuan;Zhou, Jianjin;Zhu, Lin;Teng, Haiyun;Yang, Gui-an;Song, Yushou;Sun, Zhijia;Chen, Yuanbo
    • Nuclear Engineering and Technology
    • /
    • v.53 no.6
    • /
    • pp.1942-1946
    • /
    • 2021
  • Gadolinium oxysulfide (GOS) is regarded as a novel scintillator for the realization of ultra-high spatial resolution in neutron imaging. Monte Carlo simulations of GOS scintillator show that the capability of its spatial resolution is towards the micron level. Through the time-of-flight method, the light output of a GOS scintillator was measured to be 217 photons per captured neutron, ~100 times lower than that of a ZnS/LiF:Ag scintillator. A detector prototype has been developed to evaluate the imaging solution with the GOS scintillator by neutron beam tests. The measured spatial resolution is ~36 ㎛ (28 line pairs/mm) at the modulation transfer function (MTF) of 10%, mainly limited by the low experimental collimation ratio of the beamline. The weak light output of the GOS scintillator requires an enormous increase in the neutron flux to reduce the exposure time for practical applications.

Secure Routing with Time-Space Cryptography for Mobile Ad-Hoc Networks (이동 애드혹 망을 위한 시공간 방식의 보안 라우팅 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.11-16
    • /
    • 2007
  • This paper describes the design and performance of a secure routing protocol with time-space cryptography for mobile ad-hoc networks. The proposed time-space scheme works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. For data authentication, it relies on the symmetric key cryptography due to high efficiency and a secret key is distributed using a time difference from the source to the destination. Also, a one-way hash chain is formed on a hop-by-hop basis to prevent a compromised node or an intruder from manipulating the routing information. In order to evaluate the performance of our routing protocol, we compare it with the existing AODV protocol by simulation under the same conditions. The proposed protocol has been validated using the ns-2 network simulator with wireless and mobility extensions.

Microbial conversion of major ginsenosides in ginseng total saponins by Platycodon grandiflorum endophytes

  • Cui, Lei;Wu, Song-quan;Zhao, Cheng-ai;Yin, Cheng-ri
    • Journal of Ginseng Research
    • /
    • v.40 no.4
    • /
    • pp.366-374
    • /
    • 2016
  • Background: In this study, we screened and identified an endophyte JG09 having strong biocatalytic activity for ginsenosides from Platycodon grandiflorum, converted ginseng total saponins and ginsenoside monomers, determined the source of minor ginsenosides and the transformation pathways, and calculated the maximum production of minor ginsenosides for the conversion of ginsenoside Rb1 to assess the transformation activity of endophyte JG09. Methods: The transformation of ginseng total saponins and ginsenoside monomers Rb1, Rb2, Rc, Rd, Rg1 into minor ginsenosides F2, C-K and Rh1 using endophyte JG09 isolated by an organizational separation method and Esculin-R2A agar assay, as well as the identification of transformed products via TLC and HPLC, were evaluated. Endophyte JG09 was identified through DNA sequencing and phylogenetic analysis. Results: A total of 32 ${\beta}$-glucosidase-producing endophytes were screened out among the isolated 69 endophytes from P. grandiflorum. An endophyte bacteria JG09 identified as Luteibacter sp. effectively converted protopanaxadiol-type ginsenosides Rb1, Rb2, Rc, Rd into minor ginsenosides F2 and C-K, and converted protopanaxatriol-type ginsenoside Rg1 into minor ginsenoside Rh1. The transformation pathways of major ginsenosides by endophyte JG09 were as follows: $Rb1{\rightarrow}Rd{\rightarrow}F2{\rightarrow}C-K$; $Rb2{\rightarrow}C-O{\rightarrow}C-Y{\rightarrow}C-K$; $Rc{\rightarrow}C-Mc1{\rightarrow}C-Mc{\rightarrow}C-K$; $Rg1{\rightarrow}Rh1$. The maximum production rate of ginsenosides F2 and C-K reached 94.53% and 66.34%, respectively. Conclusion: This is the first report about conversion of major ginsenosides into minor ginsenosides by fermentation with P. grandiflorum endophytes. The results of the study indicate endophyte JG09 would be a potential microbial source for obtaining minor ginsenosides.

Projecting Performance of a Daylighting Source Based on Its Architectura Applications in the Open-Top Surface Structure (고심도 공간의 건축적 특성에 따른 자연집광 시스템의 조명원적 성능분석)

  • Kim, Gon;Kim, Jeong Tai
    • KIEAE Journal
    • /
    • v.9 no.1
    • /
    • pp.23-30
    • /
    • 2009
  • A lightcourt design is typically used to address issues concerning aesthetics, feeling, and mood. From the view point of environmental aspect, as an ecological shaft space, it plays a key role in controlling inner quality. In particularly, the lightcourt concept allows the exploitation of daylighting by bring natural light into the center of the building, thus eliminating dark deep spaces. Additionally, the lightcourt shades the inner space in summer. The amount of light available at the base of the lightcourt depends on a number of factors; translucency of the top, reflectance and the geometry of the space. In this paper is to exemplify a lightcourt configuration with a sloped wall. It promises the maximized a sense of freedom and daylighting availability. It is a matter of course that the lightcourt with open-top plays a role as a light source for the adjacent space to the lightcourt. A series of lighting simulation provides performance data of daylighting with changing photometric factors. For the case that a skylight is not available, an electric lighting design with metal halide lamps has been established to create luminous ceiling. As expected, a sloped lightcourt with open-top exposes its superiority of daylighting source. Ancillary considerations to enhance of daylighting potential for the adjacent space have been issued with performance data.

A Study of Comparative Economic Evaluation for the System of Ground Source Heat Pump and District Heating and Cooling:Focusing on the Analysis of Operation Case (지열히트펌프와 지역냉난방 시스템의 운영사례를 중심으로 경제성 비교분석 연구)

  • Lee, Key Chang;Hong, Jun Hee;Kong, Hyoung Jin
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.28 no.3
    • /
    • pp.103-109
    • /
    • 2016
  • The purpose of this study is to perform comparative economic evaluation for the systems of ground source heat pump (GSHP) and district heating and cooling (DHC) by focusing on the analysis of operation case of GSHP. The adapted research object is a public office building located in Seoul. The capacity of ground source pump is about 3,900 kW. Ground heat exchanger is closed loop type. The analysis period for life cycle cost is 30 years. Economic evaluation is assessed from the viewpoints of the following four parts: initial cost, energy cost, maintenance and replacement cost, and environment cost. The total life cycle cost of GSHP is approximately 8,447 million won. The cost of the DHC System is approximately 3,793 million won. The cost of the DHC is approximately 46% lower than GSHP system under the condition of current rate for GSHP and DHC.