• Title/Summary/Keyword: discrete curve

Search Result 138, Processing Time 0.021 seconds

Wireless PKI for Reducing Certificate Acquisition Time According to Authentication Path

  • Choi Seung-Kwon;Cho Yong-Hwan;Shin Seung-Soo;Jang Yoon-Sik
    • International Journal of Contents
    • /
    • v.1 no.1
    • /
    • pp.29-34
    • /
    • 2005
  • In this paper, we proposed an advanced authentication structure for reducing the certificate acquisition time which is one of the factors that should be improved in a conventional wireless PKI. A conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. We simulated and compared the authentication structure proposed by Sufatrio, K. Lam[4] and proposed authentication structure in terms of the authentication time. Simulation results show that the proposed method reduces the authentication time compared to the conventional wireless PKI authentication method.

  • PDF

Blocking Probability for Wireless PKI (무선 PKI에서의 블러킹 확률)

  • Shin, Seung-Soo;Choi, Seung Kwon;Cho, Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.220-227
    • /
    • 2004
  • In this paper, we made out blocking probability analysis for a new authentication structure for reducing the certificate acquisition time which is one of the factors that should be improved in a conventional wireless PKI. A conventional key exchange method simply performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Besides, we proposed advanced handover method and blocking probability analysis for wireless PKI.

  • PDF

Meromorphic functions, divisors, and proective curves: an introductory survey

  • Yang, Ko-Choon
    • Journal of the Korean Mathematical Society
    • /
    • v.31 no.4
    • /
    • pp.569-608
    • /
    • 1994
  • The subject matter of this survey has to do with holomorphic maps from a compact Riemann surface to projective space, which are also called algebrac curves; the theory we survey lies at the crossroads of function theory, projective geometry, and commutative algebra (although we should mention that the present survey de-emphasizes the algebraic aspect). Algebraic curves have been vigorously and continuously investigated since the time of Riemann. The reasons for the preoccupation with algebraic curves amongst mathematicians perhaps have to do with-other than the usual usual reason, namely, the herd mentality prompting us to follow the leads of a few great pioneering methematicians in the field-the fact that algebraic curves possess a certain simple unity together with a rich and complex structure. From a differential-topological standpoint algebraic curves are quite simple as they are neatly parameterized by a single discrete invariant, the genus. Even the possible complex structures of a fixed genus curve afford a fairly complete description. Yet there are a multitude of diverse perspectives (algebraic, function theoretic, and geometric) often coalescing to yield a spectacular result.

  • PDF

A Computerized Design System of the Axial Fan Considering Performance and Noise Characteristics (성능 및 소음특성을 고려한 축류 팬 설계의 전산 체계)

  • Lee, Chan;Kil, Hyun-Gwon
    • The KSFM Journal of Fluid Machinery
    • /
    • v.13 no.2
    • /
    • pp.48-53
    • /
    • 2010
  • A computerized design system of axial fan is developed for constructing 3-D blade geometry and predicting both aerodynamic performance and noise. The aerodynamic blading design of fan is conducted by blade angle distribution, camber line determination, airfoil thickness distribution and blade element stacking along spanwise distance. The internal flow and the aerodynamic performance of designed fan are predicted by the through-flow modeling technique with flow deviation and pressure loss correlations. Based on the predicted internal flow field and performance data, fan noise is predicted by two models for discrete frequency and broadband noise sources. The present predictions of the flow distribution, the performance and the noise level of actual fans are well agreed with measurement results.

Analysis for Authentication waiting time in Hand-over using Queueing Model (큐잉 모델을 이용한 핸드오버 시 인증 대기시간 분석)

  • Shin Seung-Soo;Kim Duck-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.123-132
    • /
    • 2005
  • In this paper, a conventional key exchange method simply Performs the key exchange setup step based on discrete algebraic subjects. But the mutual-authentication procedure of wireless PKI for reducing authentication time uses an elliptical curve for a key exchange setup step. Proposed hand-over method shows reduced hand-over processing time than conventional method since it can reduce CRL retrieval time. Also, we compared proposed authentication structure and conventional algorithm, and simulation results show that proposed authentication method outperforms conventional algorithm in authentication waiting time.

  • PDF

Deflection Estimation of a PSC Railroad Girder using Long-gauge Fiber Optic Sensors (Long-gauge 광섬유 센서를 이용한 철도교 PSC 거더의 처짐유추)

  • Chung Won-Seok;Kim Sung-Il;Kim Nam-Sik;Lee Hee-Up
    • Journal of the Korean Society for Railway
    • /
    • v.9 no.4 s.35
    • /
    • pp.467-472
    • /
    • 2006
  • This paper deals with the applicability of long-gauge deformation fiber optic sensors (FOS) to prestressed concrete structures. A main motivation is the desire to monitor the deflection of the railway bridges without intervenes of the signal intensity fluctuations. A 25 m long, 1.8 m deep PSC girder was fabricated compositely with 22 cm thick reinforced concrete deck. Two pairs of 3 m long-gauge sensors are attached to the prestressed concrete girder with parallel topology. Using the relationship between curvature and vortical deflection and the quadratic regression of curvatures at the discrete point, it is possible to extrapolate the deflection curve of the girder. The estimated deflection based on the developed method is compared with the results using conventional strain gauges and LVDTS. It has been demonstrated that the proposed instrumentation technique is capable of estimating the vertical deflection and neutral axis position of the prestressed concrete girder up to weak nonlinear region.

Closed Form Expression of Cutting Forces and Tool Deflection in End Milling Using Fourier Series (푸리에 급수를 이용한 엔드밀링 절삭력 및 공구변형 표현)

  • Ryu, Shi-Hyoung
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.9 s.186
    • /
    • pp.76-83
    • /
    • 2006
  • Machining accuracy is closely related with tool deflection induced by cutting forces. In this research, cutting forces and tool deflection in end milling are expressed as a closed form of tool rotational angle and cutting conditions. The discrete cutting fores caused by periodic tool entry and exit are represented as a continuous function using the Fourier series expansion. Tool deflection is predicted by direct integration of the distributed loads on cutting edges. Cutting conditions, tool geometry, run-outs and the stiffness of tool clamping part are considered together far cutting forces and tool deflection estimation. Compared with numerical methods, the presented method has advantages in prediction time reduction and the effects of feeding and run-outs on cutting forces and tool deflection can be analyzed quantitatively. This research can be effectively used in real time machining error estimation and cutting condition selection for error minimization since the form accuracy is easily predicted from tool deflection curve.

Electron Beam Welding Diagnosis Using Wavelet Transform (웨이브렛 변환을 이용한 전자빔 용접 진단)

  • 윤충섭
    • Journal of Welding and Joining
    • /
    • v.21 no.6
    • /
    • pp.33-39
    • /
    • 2003
  • Wavelet transform analysis results show a spectrum energy distribution of CWT along scale factors distinguish the partial, full and over penetration in a electron beam welding by analyzing the curve of spectrum energy at small scale, middle and large scale range, respectively. Two types of signals collected by Ion collector and x-ray sensors and analyzed. The acquired signals from sensors are very complicated since these signals are very closely related the dynamics of keyhole which interact the very high density energy with materials during welding. The results show the wavelet transform is more effective to diagnosis than Fourier Transform, further for the general welding defects which are not a periodic based, but a transient, non-stationary and time-varying phenomena.

The Effective Temperature of the N Stars (탄소성(炭素星)(N성(星))의 유효온도)

  • Lee, Young-Bom
    • Journal of The Korean Astronomical Society
    • /
    • v.8 no.1
    • /
    • pp.11-14
    • /
    • 1975
  • Photoelectric observations were made of four N stars (HD 51208, HD 75021, V 1942 Sgr, and RU Vir) at careful1y chosen discrete wavelengths between $7000{\AA}\;and\;11000{\AA}$ with $30{\AA}$ bandpass width. Their effective temperatures have been derived by fitting the black-body radiation curve to the observed continuum intensities at $7800{\AA},\;9000{\AA}\;and\;10800{\AA}$. The resulting temperature ranges from $2500^{\circ}K\;to\;2900^{\circ}K.$. It is probable that almost all the N stars belong to this range of temperature. However, the temperatures of very red N stars can not be well determined due to large variability and redistribution of their radiation energy arising from the graphite shells around them.

  • PDF

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.3_4
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.