• Title/Summary/Keyword: Wireless Distribution System

Search Result 285, Processing Time 0.03 seconds

Performance of privacy Amplification in Quantum Key Distribution Systems (양자 키 분배 시스템에서 보안성 증폭의 성능 분석)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.111-116
    • /
    • 2018
  • This paper introduces the concept of a random universal hash function to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, the approach in terms of security amplification shows that phase error correction offers better security. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD(Quantum Key Distribution). Finally, we show that the BB84 protocol using random privacy amplification is safe at higher key rates than Mayers' performance at the same error rate.

Design and Implementation of Marketing Advisement System through the Concern Degree Analysis of Customers Based on Twitter (트위터 기반 고객의 관심도 분석을 통한 마케팅 조언 시스템의 설계 및 구현)

  • Lee, Ki-Young;Kim, Hye-Young;Kim, Aluem;Kim, Sung-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.185-190
    • /
    • 2014
  • With the fast increment of smart phone users and extension of wireless internet the number of SNS user is also increasing. Twitter among lots of SNS takes the lead in SNS market. Twiter users express their thinking and feelings. In this paper, by analyzing twitts near the distribution enterprise using opinion mining. And by analyzing concern degree using the number of twitts and positive, neutral, negative degree we deliver marketing message to marketer. As the result, we propose that marketing and management of this distribution enterprise can reflect the demand of customer who is near there.

Study on the Effect of the Usability and Usefulness of Mobile Application Programs on Buying Intention

  • Oh, Young-Sam
    • Journal of Distribution Science
    • /
    • v.11 no.11
    • /
    • pp.41-47
    • /
    • 2013
  • Purpose -This paper aims to understand how easy and convenient it is for consumers to use mobile services. A mobile service combines hardware and software with information technology. To specifically meet the needs of users of mobile applications, the context of usability was identified in consumer mobile services. Research Design, Data, and Methodology - For usability measurement and evaluation, appliances and software were the main target: this applied to an expanding range, such as a Personal Digital Assistant (PDA), mobile phones, and wired and wireless integrated services. This study extended the Technology Acceptance Model (TAM) by examining the roles of two characteristics of mobile applications'usage: usability and usefulness. Results - The study tested the research model using a structural equation modeling (SEM) technique. Results showed no significant differences between the two models. Usability comprised learnability, efficiency, memorability, errors, and satisfaction: the motivation for using a mobile application was understood as being the usefulness and easy-of-use of the mobile application. This empirical study validated the proposed research model and hypotheses, and found that the hypotheses could be supported. Finally, the phenomena derived from the causal relationships in usability were identified, and their implications considered.

A study on Protection Coordination Method for Electric Vehicle Charging Facility based on the Wireless Power Transmission (무선전력전송 전기충전설비용 전원공급장치의 최적운용방안에 관한 연구)

  • Ryu, Kyung-Sang;Kim, Byungki;Kim, Dae-Jin;Jang, Moon-Seok;Rho, Daeseok;Ko, Hee-Sang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.42-51
    • /
    • 2017
  • This paper deals with the power supply facility providing wireless power transmission for a type of electric vehicles called the on-line electric vehicle(OLEV) and proposes optimal protection coordination methods which analyze the faultsin the 60Hz and 20kHz bands using PSCAD/EMTDC, which is the typical commercial software for the distribution system. The simulation results show that the proposed methods can reduce the fault current by introducing an NGR (Neutral Ground Resistor) in the 60Hz band and prevent the malfunctioning of the protection device by installing a CT in the neutral wire in the 20kHz band when a ground fault occurs.

Design of a Realtime Interactive Authentication Method using PKI in the Wireless Network (무선 네트워크 기반에서 PKI 방식을 이용한 상호인증 프로토콜 설계)

  • Park, Jea-Seong;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.873-877
    • /
    • 2008
  • There were many exposed problems in previous authentication method on LAN. Especially Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about $802.1{\times}$ and user authentication method applying PKI. But certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. In this paper, I applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems.

  • PDF

Electric Power Charging of Silicon Solar Cells using a Laser (레이저 조사에 따른 실리콘 솔라셀의 출력 특성)

  • Lee, Hu-Seung;Bae, Han-Sung;Kim, Seongbeom;Joo, Yun-Jae;Kim, Jung-Oh;Noh, Ji-Hwan
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.25 no.5
    • /
    • pp.362-367
    • /
    • 2016
  • Recently, wireless charging systems have expanded their applications from household electrical appliances to outdoor activity devices. In wireless charging systems, solar cells have versatile advantages, such as abundant raw materials within the earth, reasonable prices of products, and highest power conversion efficiency. In this study, the photovoltaic effect between a silicon solar cell and a photon of infrared wavelength was simulated using a Shockley diode equation. A solar cell power charging system was then set up to: 1) clarify mechanisms of the charging interaction based on the photovoltaic effect with a laser source, and 2) verify interdependency of the parameters: laser settings and geometrical position between a solar cell and the laser. As was observed, the solar cell generates more power when the photon was irradiated uniformly, intensively, and vertically on the surface of the solar cell.

Authentication Protocol for RFID using Bivariate Polynomials over a Finite Field (유한체 위의 이변수다항식을 이용한 RFID 인증 프로토콜)

  • Jung, Seok Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.3
    • /
    • pp.137-141
    • /
    • 2014
  • RFID system is applied to various industry such as process control, distribution management, access control, environment sensing, entity identification, etc. Since RFID system uses wireless communication, it has more weak points for security. In this paper, an authentication protocol is suggested between tags and a reader, which is basic property for security. A suggested protocol use a bivariate polynomial over a finite field and is secure against snooping, replay attack, position tracking and traffic analysis.

LED transceivers with beehive-shaped reflector for visible light communication

  • Sohn, Kyung-Rak;Kim, Min-Soo
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.2
    • /
    • pp.169-174
    • /
    • 2014
  • This paper proposes a novel beehive-shaped reflector for application to light-emitting diode (LED) transceivers for illumination and bi-directional visible light communication (VLC). By using a diffuse propagation model extended to line-of-sight and direct signals, the distribution of illuminance and the path loss of the transceiver are investigated to evaluate the performance of the beehive-shaped reflector. To verify bi-directional communication, a VLC-based image capture system, comprising a complementary metal-oxide semiconductor (CMOS) image sensor and video processor unit, is demonstrated. Real-time images captured by the CMOS camera are successfully transmitted to the monitoring system via a free-space channel at a rate of 115.2 kbps.

RFID BASED INTRA SUPPLY CHAIN MANAGEMENT SYSTEM IN TEXTILE INDUSTRY

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Bashir, Salman
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.166-177
    • /
    • 2019
  • Radio Frequency Identification (RFID) skill is becoming a technology that might deliver a response to manual glitches. The use of tags, receiver and wireless surfs to join with each other would mean that RFID in combination with the EPC would speech these pain opinions and offer many welfares in different sectors such as production, distribution, trade, logistics, and security. Potential benefits include increased visibility rising supply chain, enlarged proficiency and cost savings through improved data harmonization, better responsiveness to actual prominence change. Trendy the case of the textile or industrial applications, recent systems used by the industry to control the supply chain in addition strength discernibility are being studied, besides improvements in the overall perceptibility of assets are anticipated through labels, readers, drivers, POEs, etc. this model will be developed with new situations and a lively construction industry. It will be focused on Cost, Hardware compatibility, security and maintenance issues.

Performance Analysis of Call Admission Control Mechanism for Intelligent Information Processing of Non-Uniform Traffic Distribution in CDMA Environment (CDMA 환경에서 비균일 트래픽 특성의 지능정보 처리를 위한 호 수락제어 기법의 성능분석)

  • Lee, Dong-Myung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1387-1394
    • /
    • 2005
  • In this paper, we propose and the call admission control mechanism that can improve the capacity of the wireless system for the non-uniform traffic load distribution based intelligent information in multiple cellular CDMA environment. The number of mobile stations that can be served simultaneously in a base station is limited by the amount of total interference received in CDMA system. Further, the average number of mobile stations in each cell may not be uniformly distributed. In this paper, considering this factors, the call admission control mechanism using the effective bandwidth concept is adapted to improve the system capacity of non-uniform traffic load distribution based intelligent information. Thus, the bandwidth for a new call can be varied dynamically for reducing the blocking rate of new calls and the dropping rate of handoff calls. The suggested call admission control mechanism is experimented through simulation by dynamically assigning the bandwidth to new and handoff calls. The simulation results show that the proposed call admission control mechanism can accommodate more mobile stations than the other methods in multiple cellular CDMA environment.