• Title/Summary/Keyword: exchanges

Search Result 996, Processing Time 0.022 seconds

A Study on the Space Plan for Complex of Elementary School and Elderly Welfare Facilities by Case Study in Japan (일본의 사례조사를 통한 초등학교와 재가노인복지시설의 복합화 시 공간계획에 관한 연구)

  • Kim, Jae-Young;Lee, Jong-Kuk
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.10 no.3
    • /
    • pp.9-16
    • /
    • 2011
  • As a result of rapid aging speed in our society, many problems related to elderly people have happened in many parts of our society. Among them, supply for elderly facilities is one of the biggest problems. In downtown areas, despit of the high demand for elderly facilities, there is not enough supplement of them due to the lack of real estates. Considering the situations above, this study proposes multi generation complex which combining the school and elderly welfare facility. This combination not only brings financial benefits but also has positive effects on cultural exchanges between generations.

Development of KOMPSAT-2 Vehicle Dynamic Simulator for Attitude Control Subsystem Functional Verification (인공위성 자세제어 부시스템 기능시험을 위한 KOMPSAT-2 동체 시뮬레이터 개발)

  • 석병석
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.10
    • /
    • pp.956-960
    • /
    • 2004
  • The Vehicle Dynamic Simulator(VDS) is a key equipment of the performance verification of attitude control subsystem and it simulates the real dynamic environment that spacecraft undergoes during mission operation. All the software models and hardware interfaces necessary for the closed-loop simulation of the spacecraft dynamics are implemented. Using VDS, KOMPAT-2 attitude control logic functions and performance was verified. In this paper, the hardware and software configurations of KOMPSAT-2 VDS was described briefly and the information flow and exchanges between software models and actual hardwares during close loop simulation was described in the systematic point of view.

A Study on the Block Lookup and Replacement in Global Memory (전역적 메모리에서의 블록 룩업과 재배치에 관한 연구)

  • 이영섭;김은경;정병수
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.51-54
    • /
    • 2000
  • Due to the emerging of high-speed network, lots of interests of access to remote data have increased. Those interests motivate using of Cooperative Caching that uses remote cache like local cache by sharing other clients' cache. The conventional algorithm like GMS(Global Memory Service) has some disadvantages that occurred bottleneck and decreasing performance because of exchanges of many messages to server or manager. On the other hand, Hint-based algorithm resolves a GMS's server bottleneck as each client has hint information of all blocks. But Hint-based algorithm also causes some problems such as inaccurate information in it, if it has too old hint information. In this paper, we offer the policy that supplement bottleneck and inaccuracy; by using file identifier that can search for the lookup table and by exchanging oldest block information between each client periodically.

  • PDF

A Study on the Optimum Design of Plate-Fin Compact Sensible Heat Exchanger for the Heat Recovery of Exhaust Gas (배기열(排氣熱) 회수용(回收用) 평판(平板) - 휜형(形) 밀집형(密集形) 현열(顯熱) 열교환기(熱交換器)의 최적설계(最適設計)에 관한 연구(硏究))

  • Choi, Y.D.;Park, S.D.;Woo, J.S.;Tae, C.S.
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.2 no.2
    • /
    • pp.85-98
    • /
    • 1990
  • Method of optimum design of a compact sensible plate-fin heat exchanger for the heat recovery of exhaust gas from the air conditioning space was developed in consideration of the econamics of investment cost and profit according to the installation of heat exchanges. In the counterflow heat exchanger, the frontal area was fixed and the length of heat exchanger was optimized in order to maximize the net gain according to the setting of the heat exchanger. In the cross flow heat exchanger, the size of the exchanger was also optimized to maximize the net gain.

  • PDF

Experimental Study of the Relationship between Weight Variation and Thermal Conductivity in Polyurethane Foam (단열재의 무게변화와 열전도도와의 상관관계에 관한 실험적 연구)

  • Lee, Hyo-Jin
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.27 no.5
    • /
    • pp.241-246
    • /
    • 2015
  • Cellular foamed insulation such as polyurethane foam ages and degrades the thermal conductivity. Aging of foam is a result from the diffusion of gases, initially consisting of $CO_2$ but eventually replaced by air from the environment. The variation of the cell gas content with time is primarily influenced by the increase of thermal conductivity of the cellular foam. The weight of foam also changes as the gas diffuses and exchanges. In this study, a weight measurement method has been proposed to evaluate the effective diffusion coefficients of $CO_2$ and Air, $D_{CO2}=7.08504E-11$ and $D_{air}=4.86086E-12$, respectively and are compared with the gas analysis method.

Forward Anonymity-Preserving Secure Remote Authentication Scheme

  • Lee, Hanwook;Nam, Junghyun;Kim, Moonseong;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1289-1310
    • /
    • 2016
  • Dynamic ID-based authentication solves the ID-theft problem by changing the ID in each session instead of using a fixed ID while performing authenticated key exchanges between communicating parties. User anonymity is expected to be maintained and the exchanged key kept secret even if one of the long-term keys is compromised in the future. However, in the conventional dynamic ID-based authentication scheme, if the server's long-term key is compromised, user anonymity can be broken or the identities of the users can be traced. In addition, these schemes are vulnerable to replay attacks, in which any adversary who captures the authentication message can retransmit it, and eventually cause the legitimate user to be denied service. This paper proposes a novel dynamic ID-based authentication scheme that preserves forward anonymity as well as forward secrecy and obviates replay attacks.

A Study on Direction of the Korea Furniture Industry through the Shanghai International Furniture Fair (상해 국제 가구 박람회를 통해 본 국내가구산업의 방향성 고찰)

  • Cheon, Hye Sun
    • Journal of the Korea Furniture Society
    • /
    • v.26 no.4
    • /
    • pp.445-455
    • /
    • 2015
  • Korea furniture industry is the difficulty of producing manpower supply and demand together with rising raw material and are facing severe difficulties as a diversification of consumer needs. It located so close through the International Furniture Fair in China and to identify the status of the domestic furniture industry. It also overlooks want to move forward in the direction. China International Furniture Fair was the head of the leading exchanges for furniture production worldwide. Market demand as households, yet the center is fully equipped with the chance to cooperate with the furniture production. The Shanghai International Furniture Fair was responsible for, such as providing ideas and partners for product development and production paths excavation of korea furniture manufacturers itgetda which can have a significant driving force in overcoming the recession and evaluated through this.

Writing World History: Which World?

  • Salles, Jean-Francois
    • Asian review of World Histories
    • /
    • v.3 no.1
    • /
    • pp.11-35
    • /
    • 2015
  • Far from being a recent world, the concept of "a [one] world" did slowly emerged in a post-prehistoric Antiquity. The actual knowledge of the world increased through millennia leaving aside large continents (Americas, part of Africa, Australia, etc.-most areas without written history), and writing history in Antiquity cannot be a synchronal presentation of the most ancient times of these areas. Through a few case studies dealing with texts, archaeology and history itself mostly in BCE times, the paper will try to perceive the slow building-up of a physical awareness and 'moral' consciousness of the known world by people of the Middle East (e.g. the Bible, Gilgamesh) and the Mediterranean (mainly Greeks).

Quantitative Risk Assessment in Major Smartphone Operating Systems in Asian Countries

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1494-1502
    • /
    • 2014
  • Since smartphones are utilized in the ranges from personal usages to governmental data exchanges, known but not patched vulnerabilities in smartphone operating systems are considered as major threats to the public. To minimize potential security breaches on smartphones, it is necessary to estimate possible security threats. So far, there have been numerous studies conducted to evaluate the security risks caused by mobile devices qualitatively, but there are few quantitative manners. For a large scale risk evaluation, a qualitative assessment is a never ending task. In this paper, we try to calculate relative risk levels triggered by software vulnerabilities from unsecured smartphone operating systems (Android and iOS) among 51 Asian countries. The proposed method combines widely accepted risk representation in both theory and industrial fields. When policy makers need to make a strategic decision on mobile security related agendas, they might find the presented approach useful.

A Study of a Secure Channel Implementation on the Military Computer Network (국방망 보안채널 구현에 관한 연구)

  • Lee, Jun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.3
    • /
    • pp.106-114
    • /
    • 2008
  • In this paper we suggest a protocol and an algorithm which connect a secure channel between a server and a client over a TCP layer. To make key exchange time the most quickly, the protocol adopts ECC Diffie Hellman(ECCDH) algorithm. And the protocol does not use Hello message for key exchanges and state changes. We also implement this protocol over an open TCP/IP program and check the secure channel connecting time over the military computer network. The suggested protocol could be practically used on the military computer network without a hardware implementation.