• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.024 seconds

Comparison on Nano-particle Number Measurement Characteristics for Different Particle Generators between Spray type and Soot Type (Spray type과 Soot type 입자발생기별 나노입자 개수농도분포 측정특성 비교)

  • Kim, M.S.;Kwon, J.W.;Chung, M.C.;Lee, J.W.
    • Journal of ILASS-Korea
    • /
    • v.17 no.4
    • /
    • pp.185-191
    • /
    • 2012
  • Particulate matters (PM) that is generated by most diesel engine is regulated by the mass concentration measured by the conventional method it had been. Recently, Europe PMP (Particle Measurement Program) decided to start the regulation of vehicle's nano-sized particle number (PN) from the year of 2011 because of nano-particle's higher degree of harm to the human body. So firstly, the standard level of PN emission is introduced in the Euro 5/6 emissions regulation with a limit of $6{\times}10^{11}$ per km for light duty vehicle. Also KPMP(Korea Particle Measurement Program) was organized to copy quickly international technical trend. In this paper, it was investigated the nano-sized PN measurement characteristics for different particle generators between spray type and soot type. And the difference ratio between particle generators, the characteristic of PN concentration, counting efficiency and linearity was analyzed. Then, we make conclusions as followed. When particle diameter is increased, counting efficiency of two generators is decreased. Also Secondary calibration method is more higher 3% than Primary calibration method. Finally, SOF which is included in soot particles is not totally removed so it have great influence on test result of counting efficiency and linearity.

Security Analysis based on Differential Entropy m 3D Model Hashing (3D 모델 해싱의 미분 엔트로피 기반 보안성 분석)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12C
    • /
    • pp.995-1003
    • /
    • 2010
  • The content-based hashing for authentication and copy protection of image, video and 3D model has to satisfy the robustness and the security. For the security analysis of the hash value, the modelling method based on differential entropy had been presented. But this modelling can be only applied to the image hashing. This paper presents the modelling for the security analysis of the hash feature value in 3D model hashing based on differential entropy. The proposed security analysis modeling design the feature extracting methods of two types and then analyze the security of two feature values by using differential entropy modelling. In our experiment, we evaluated the security of feature extracting methods of two types and discussed about the trade-off relation of the security and the robustness of hash value.

Development of effective management strategy for geographical database based on the concept of intellectual property rights (지리정보DB의 효율적 유통관리 방안 연구 - 지적재산권 설정을 중심으로 -)

  • 양광식;이종열;이영대
    • Spatial Information Research
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2003
  • Geographical data sets are expensive to create and are very easy to copy because the intellectual property rights for the distribution should be protected. The main object of copyright law is to encourage expression of ideas in tangible form and it extend only to original works, it is limited to control the balance of interests between data producers and user. Because the development of a useful legal framework for both private and public activity in this field is an important issue. This paper presents an intial attempt at such a the effective management strategy intended to support continuing research into the legal protection of geographical information.

  • PDF

Distributed Security for Web Application Contents Protection (웹 어플리케이션 콘텐츠 보호를 위한 분산 보안)

  • Heo, Jin-Kyoung
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.125-130
    • /
    • 2008
  • User web service is increasing by development of internet technology. Quantity of encrypted data that transmitted through the network are increasing by development of encipherment technology. We have many problems; it is caused by technical development and service increase of user requests. It is like that, we have reliability of contents and illegality copy problem of internet contents in web application system. It is contents protection skills in web that encipherment technology, authentication and digital signature. We need message encoding and secret key for solve vulnerability of encipherment in web application system. In this paper, we propose a distributed secure system that can data confidentiality and user authentication. It prevent performance degradation from bottle neck in encipherment server, and improve service quality.

  • PDF

Quality Evaluation Model for Security of DRM Software (DRM 소프트웨어의 보안성 품질평가 모델)

  • Lee, Ha-Young;Kim, Jung-Gyu
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.1-11
    • /
    • 2013
  • To make the DRM technology protect adequately the copy right of digital contents, DRM software should have high quality and no defects when DRM is added to digital contents. It can be a basis for the effective protection of the copyright of digital contents to develop a quality evaluation model of DRM SW. First of all, the security of DRM SW is the most critical quality characteristic that DRM software must have. In this paper, we conducted research on how to measure the quality of security of DRM SW.

Side-Channel Attack against Secure Data Deduplication over Encrypted Data in Cloud Storage (암호화된 클라우드 데이터의 중복제거 기법에 대한 부채널 공격)

  • Shin, Hyungjune;Koo, Dongyoung;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.971-980
    • /
    • 2017
  • Data deduplication can be utilized to reduce storage space in cloud storage services by storing only a single copy of data rather than all duplicated copies. Users who are concerned the confidentiality of their outsourced data can use secure encryption algorithms, but it makes data deduplication ineffective. In order to reconcile data deduplication with encryption, Liu et al. proposed a new server-side cross-user deduplication scheme by exploiting password authenticated key exchange (PAKE) protocol in 2015. In this paper, we demonstrate that this scheme has side channel which causes insecurity against the confirmation-of-file (CoF), or duplicate identification attack.

A Study of Performance Evaluation Standard for Scanned Cartoon Book Identification Technology (스캔 만화 식별 기술 성능평가 기준에 관한 연구)

  • Yoon, Hee-Don;Kim, Tae-Hyun;Kang, Ho-Gab;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.29-35
    • /
    • 2015
  • In order to identify scanned cartoon books which are illegally distributed, the copyright project granted from the Korea Copyright Commission (Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books) secured basic solutions for scanned cartoon books. The purpose of this paper is to propose a performance evaluation standard with essential items required for developing technology to identify whether a comic book is illegally scanned and distributed. For this purpose, types of scanned comic books which are illegally distributed through webhard sites are analysed, the transformed factors are classified and major detail items of the factors are identified.

Pulse Density Modulation Controlled Series Load Resonant Zero Current Soft Switching High Frequency Inverter for Induction-Heated Fixing Roller

  • Sugimura, Hisayuki;Kang, Ju-Sung;Saha, Bishwajit;Lee, Hyun-Woo;Nakaoka, Mutsuo
    • Proceedings of the KIEE Conference
    • /
    • 2006.04b
    • /
    • pp.226-228
    • /
    • 2006
  • This paper presents the two lossless auxiliary inducors-assisted voltage source type half bridge(single ended push pull:SEPP) series resonant high frequency inverter for induction heated fixing roller in copy and printing machines. The simple high-frequency inverter treated here can completely achieve stable zero current soft switching (ZCS) commutation forwide its output power regulation ranges and load variations under constant high frequency pulse density modulation (PDM) scheme. Its transient and steady state operatprinciple is originally described and discussed for a constant high-frequency PDM control strategy under a stable ZCS operation commutation, together with its output effective power regulation charactertics-based on the high frequency PDM strategy. The experimenoperating performances of this voltage source SEPP ZCS-PDM series resonant high frequency inverter using IGBTs are illustrated as compared with computer simulation results and experimenones. Its power losses analysis and actual efficiency are evaluated and discussed on the basis of simulation and experimental results. The feasible effectiveness of this high frequency inverter appliimplemented here is proved from the practical point of view.

  • PDF

A Study on the Costumes of the Envoys from the Three Kingdoms painted in Wanghoido(王會圖) and Bungekipjodo(蕃客入朝圖) ("王會圖"와 "蕃客入朝圖"에 묘사된 三國使臣의 복식 연구)

  • 이진민;남윤자;조우현
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.3
    • /
    • pp.155-170
    • /
    • 2001
  • This study is about investigation of the historical value of Wanghoido(王會圖) and Bungekipjodo(蕃客入朝圖) and examination of the costumes of the Envoys from the Three Kingdoms drawn in the paintings above. Wanghoido(王會圖) is presumed to be painted around early 7th century. This is a colored picture on silk on which twenty-six Envoys from twenty-four Kingdoms are painted. Bungekipjodo(蕃客入朝圖) is presumed to be painted in the early 10th century. This is drawn on paper with only black brush line, no color. There are thirty-five Envoys from thirty-one Kingdoms in the painting. Wanghoido(王會圖) and Bungekipjodo(蕃客入朝圖) are the important materials which are useful to understand the original Liangjlkgongdo(梁職貢圖). From the records about interchange of the Envoys in the early 6th century, the characters and costumes painted in Wanghoido(王會圖) and Bungekipjodo(蕃客入朝圖), the copy of the original Liangjikgongdo(梁職貢圖), get the reality. The Envoys from Koguryo(高句麗), Paekche(百濟), and Shilla(新羅) painted in the two paintings above are all wearing Jangyu or Yu(장유 or 유; an upper garment), Go(袴:trousers), Kwanmo(冠帽:headdress), Dae(帶뿔:belt), and Hwa(靴:shoes). But they differ in some aspects. For example, the shape of the Kwanmo(冠帽), hair style and patterns on the costumes, etc.

  • PDF

A Balanced and Unbalanced Analysis of the DNA Matrix Code of The Taegeuk Pattern (태극 패턴 DNA 행렬 코드의 평형과 불평형 해석)

  • Kim, Jeong Su;Lee, Moon Ho
    • Journal of Engineering Education Research
    • /
    • v.21 no.1
    • /
    • pp.77-89
    • /
    • 2018
  • The chromosomes of all the world are the same in all 24 pairs, but the key, skin color and appearance are different. Also, it is the resistance of adult disease, diabetes, cancer. In 1953, Watson, Crick of Cambridge University experimentally discovered a DNA double helix structure, and in 1962, They laureates the Nobel Prize. In 1964, Temin, University of Wisconsin, USA, experimentally identified the ability to copy gene information from RNA to DNA and received the Nobel Prize in 1975. In this paper, we analyzed 24 pairs of DNA chromosomes using mathematical matrices based on the combination order sequence of four groups, and designed the Taegeuk pattern genetic code for the first time in the world. In the case of normal persons, the middle Yin-Yang taegeuk is designed as a block circulant Jacket matrix in DNA, and the left-right and upper-lower pairs of east-west and north-south rulings are designed as pair complementary matrices. If (C U: A G) chromosomes are unbalanced, that is, people with disease or inheritance become squashed squirming patterns. In 2017, Professor Michel Young was awarded a Nobel by presenting a biological clock and experimentally explained the bio-imbalance through a yellow fruit fly experiment.This study proved mathematical matrices for balanced and unbalanced RNA.