• 제목/요약/키워드: key-code

검색결과 662건 처리시간 0.025초

Development of a Computer Code, CONPAS, for an Integrated Level 2 PSA

  • Ahn, Kwang-Il;Kim, See-Darl;Song, Yong-Mann;Jin, Young-Ho;Park, Chung K.
    • Nuclear Engineering and Technology
    • /
    • 제30권1호
    • /
    • pp.58-74
    • /
    • 1998
  • A PC window-based computer code, CONPAS (CONtainment Performance Analysis System), has been developed to integrate the numerical, graphical, and results-operation aspects of Level 2 probabilistic safety assessments (PSA) for nuclear power plants automatically. As a main logic for accident progression analysis, it employs a concept of the small containment phenomenological event tree (CPET) helpful to trace out visually individual accident progressions and of the detailed supporting event tree (DSET) for its detailed quantification. For the integrated analysis of Level 2 PSA, the code utilizes five distinct, but closely related modules. Its computational feasibility to real PSAs has been assessed through an application to the UCN 3&4 full scope Level 2 PSA. Compared with other existing computer codes for Level 2 PSA, the CONPAS code provides several advanced features: (1) systematic uncertainty analysis / importance analysis / sensitivity analysis, (2) table / graphical display & print, (3) employment of the recent Level 2 PSA technologies, and (4) highly effective user interface. The main purpose of this paper is to introduce the key features of CONPAS code and results of its feasibility study.

  • PDF

농산물 유통 정보화 촉진을 위한 KAN코드 사용 확대에 관한 연구 (A Study on KAN Code ID for Promoting Distribution Information or Agricultural Products)

  • 안승용;강경식
    • 대한안전경영과학회지
    • /
    • 제8권5호
    • /
    • pp.99-117
    • /
    • 2006
  • Consumers keep demanding for diversified high quality products, valuable services and safety. With this in mind, Distribution Industry is being updated rapidly to accomodate this demand. Meanwhile, Distribution Information Technology of agricultural products has been in slow progress with little in-depth studies. In this study, it has been analyzed the usage of Bar code which is the key element for agricultural Distribution Information Technology. The analysis was conducted through a survey utilizing questionnaire covering 5 Hypermarkets(Super-centers) including big 3 companies. Also, Japanese market trends have been studied to visit a Japan Government Organization concerned, GS1 Japan, an Agricultural Cooperative, an Agricultural Wholesale Market, and a Retail Company. If we could use KAN code for all agricultural products, we could collect and analyze the information of price and trade quantity of them. It opens a new era to understand the agricultural products supply and demand easily. This will certainly make a great contribution to the evolution of agricultural products distribution. From this research, it is suggested that collective efforts by suppliers, wholesalers, retailers and Government Officers are needed to make large scale mutual marketing Organizations, which specialize in sending out agricultural products. The Organization is recommended to standardize and pack every final agricultural products, to promote the use of KAN code.

Homomorphic Subspace MAC Scheme for Secure Network Coding

  • Liu, Guangjun;Wang, Xiao
    • ETRI Journal
    • /
    • 제35권1호
    • /
    • pp.173-176
    • /
    • 2013
  • Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r-1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node.

An Efficient Biometric Identity Based Signature Scheme

  • Yang, Yang;Hu, Yupu;Zhang, Leyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권8호
    • /
    • pp.2010-2026
    • /
    • 2013
  • The combination of biometrics and cryptography gains a lot of attention from both academic and industry community. The noisy biometric measurement makes traditional identity based cryptosystems unusable. Also the extraction of key from biometric information is difficult. In this paper, we propose an efficient biometric identity based signature scheme (Bio-IBS) that makes use of fuzzy extractor to generate the key from a biometric data of user. The component fuzzy extraction is based on error correction code. We also prove that the security of suggested scheme is reduced to computational Diffie-Hellman (CDH) assumption instead of other strong assumptions. Meanwhile, the comparison with existing schemes shows that efficiency of the system is enhanced.

컴퓨터 수치제어 자동차용 인사이드 키(Inside Key) 가공기 제어장치 개발 (A Development of the Control System of the Computer Numerical Controlled Milling Machine for the Automobile Inside Keys)

  • 임동진
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 하계학술대회 논문집 B
    • /
    • pp.672-674
    • /
    • 1998
  • Inside keys for the automobiles are the keys whose key teeth are engraved on the inside of the keys. These types of the keys are very effective in prohibiting making the copies of the keys for the criminal purposes and have excellent mechanical strenth comparing with the ordinary types of the keys. In this paper, a development of the control system for the milling machine which is used for cutting the teeth of the inside keys. This machine is controlled by a computer and the cutting is done automatically according to the key codes which are contained in the key code file. This work is presented to show an example of the industry-university cooperation.

  • PDF

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제12권1호
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

공개키를 이용한 커버로스 기반의 강력한 인증 메커니즘 설계 (Design of a Strong Authentication Mechanism using Public-Key based on Kerberos)

  • 김은환;전문석
    • 정보보호학회논문지
    • /
    • 제12권4호
    • /
    • pp.67-76
    • /
    • 2002
  • 분산 네트워크 환경에서 커버로스는 사용자와 응용 서버 사이에 인증을 위해서 대칭키를 사용하고 있으며 다른 영역의 시스템을 신뢰할 것을 가정하고 있다. 본 논문에서는 기존의 커버로스에 공개키/개인키를 적용하여 효율적이고 강력한 인증 메커니즘을 설계하였다. 제안하고 있는 메커니즘에서는 사용자 인증을 위해 미리 정해진 long-term 키와 공개키를 통해 교환한 랜덤 수에 MAC 알고리즘을 적용하여 암호화에 사용하는 세션키 값을 매번 바꾸어주기 때문에 안전성을 높였다. 또한, 영역간의 신뢰성을 높이기 위해 전자 서명 기반의 시도-응답(challenge-response) 기법을 통한 상호 인증 방법을 사용하고 있으며, 인증 절차를 간소화하여 사용하는 키의 수를 줄였다.

AN IDENTITY BETWEEN THE m-SPOTTY ROSENBLOOM-TSFASMAN WEIGHT ENUMERATORS OVER FINITE COMMUTATIVE FROBENIUS RINGS

  • Ozen, Mehmet;Shi, Minjia;Siap, Vedat
    • 대한수학회보
    • /
    • 제52권3호
    • /
    • pp.809-823
    • /
    • 2015
  • This paper is devoted to presenting a MacWilliams type identity for m-spotty RT weight enumerators of byte error control codes over finite commutative Frobenius rings, which can be used to determine the error-detecting and error-correcting capabilities of a code. This provides the relation between the m-spotty RT weight enumerator of the code and that of the dual code. We conclude the paper by giving three illustrations of the results.

입자 유동 해석(PFC)을 통한 근접터널의 거동에 관한 연구 (A Study on the Behavior of a Closely-spaced Tunnel by Using Particle Flow Code)

  • 서병욱;조선아;정선아;이석원
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2008년도 춘계 학술발표회 초청강연 및 논문집
    • /
    • pp.159-169
    • /
    • 2008
  • In general, it is considered that a pillar between closely-spaced tunnel is sensitive for stress concentration. Stability of a pillar is key factor for excavation of closely-spaced tunnel. In this paper, the study is focused on tracing the behaviors, displacement and plotting damages around tunnels that is modelled with Particle Flow Code, $PFC^{2D}$. Parametric study was performed with changing distance between center of tunnels and coefficient of earth pressure(K). Scaled-model tests were also carried out to validate a numerical analysis model. It was found that $PFC^{2D}$ could show dynamic visualized result in quite good agreement with the experimental test.

  • PDF

PFM APPLICATION FOR THE PWSCC INTEGRITY OF Ni-BASE ALLOY WELDS-DEVELOPMENT AND APPLICATION OF PINEP-PWSCC

  • Hong, Jong-Dae;Jang, Changheui;Kim, Tae Soon
    • Nuclear Engineering and Technology
    • /
    • 제44권8호
    • /
    • pp.961-970
    • /
    • 2012
  • Often, probabilistic fracture mechanics (PFM) approaches have been adopted to quantify the failure probabilities of Ni-base alloy components, especially due to primary water stress corrosion cracking (PWSCC), in a primary piping system of pressurized water reactors. In this paper, the key features of an advanced PFM code, PINEP-PWSCC (Probabilistic INtegrity Evaluation for nuclear Piping-PWSCC) for such purpose, are described. In developing the code, we adopted most recent research results and advanced models in calculation modules such as PWSCC crack initiation and growth models, a performance-based probability of detection (POD) model for Ni-base alloy welds, and so on. To verify the code, the failure probabilities for various Alloy 182 welds locations were evaluated and compared with field experience and other PFM codes. Finally, the effects of pre-existing crack, weld repair, and POD models on failure probability were evaluated to demonstrate the applicability of PINEP-PWSCC.