• Title/Summary/Keyword: power electronic device.

Search Result 976, Processing Time 0.024 seconds

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

A study on the temperature inside clothing as fundamental data for development of the heat energy harvesting clothing (인체 전력에너지 수확의류 개발을 위한 의복내 온도 측정의 기초적 고찰)

  • Yang, Jin-Hee;Cho, Hyun-Seung;Park, Sun-Hyung;Lee, Joo-Hyeon
    • Science of Emotion and Sensibility
    • /
    • v.16 no.1
    • /
    • pp.125-132
    • /
    • 2013
  • Recently, the consciousness of energy crisis is rapidly growing and sustainable eco-friendly energy sources are becoming issue. Therefore the portable electronic device requires new energy sources for providing continuous power supply and the power energy harvesting system of the human body that enables the power-harvesting research requests anytime, anywhere. One of the sources for energy harvesting is heat energy, which is the difference in temperature of the body and the surrounding environment. We tried to analyze the temperature difference between the environmental temperature and the temperature inside clothing according to the structure of the closed portion. And we examined the temperature difference between the environmental temperature and the temperature inside clothing according to the material of the clothing. The analysis showed that we have been able to get different results at parts of the body in the temperature inside clothing according to the structure of clothing. In upper torso of the chest and back, the temperature inside clothing of 'closed structure' was higher than the temperature inside clothing of 'opened structure'. In the section of arm and leg, it was reduced the difference of temperature inside clothing between 'closed structure' and 'opened structure'. It was particularly noticeable in the section of leg. The results of analysis of the difference between the environmental temperature and the temperature inside clothing according to the material of the clothing, in both cases of the two materials, 'closed structure' was higher than the 'opened structure' in the difference value between the environmental temperature and the temperature inside clothing. There was a difference according to the material in the section of leg. In this study, we outlined the basic guidelines for developing heat energy harvesting clothing by exploring the structure and material of clothing suitable for the heat energy harvesting.

  • PDF

Development of Korean Green Business/IT Strategies Based on Priority Analysis (한국의 그린 비즈니스/IT 실태분석을 통한 추진전략 우선순위 도출에 관한 연구)

  • Kim, Jae-Kyeong;Choi, Ju-Choel;Choi, Il-Young
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.191-204
    • /
    • 2010
  • Recently, the CO2 emission and energy consumption have become critical global issues to decide the future of nations. Especially, the spread of IT products and the increased use of internet and web applications result in the energy consumption and CO2 emission of IT industry though information technologies drive global economic growth. EU, the United States, Japan and other developed countries are using IT related environmental regulations such as WEEE(Waste Electrical and Electronic Equipment), RoHS(Restriction of the use of Certain Hazardous Substance), REACH(Registration, Evaluation, Authorization and Restriction of CHemicals) and EuP(Energy using Product), and have established systematic green business/IT strategies to enhance the competitiveness of IT industry. For example, the Japan government proposed the "Green IT initiative" for being compatible with economic growth and environmental protection. Not only energy saving technologies but energy saving systems have been developed for accomplishing sustainable development. Korea's CO2 emission and energy consumption continuously have grown at comparatively high rates. They are related to its industrial structure depending on high energy-consuming industries such as iron and steel Industry, automotive industry, shipbuilding industry, semiconductor industry, and so on. In particular, export proportion of IT manufacturing is quite high in Korea. For example, the global market share of the semiconductor such as DRAM was about 80% in 2008. Accordingly, Korea needs to establish a systematic strategy to respond to the global environmental regulations and to maintain competitiveness in the IT industry. However, green competitiveness of Korea ranked 11th among 15 major countries and R&D budget for green technology is not large enough to develop energy-saving technologies for infrastructure and value chain of low-carbon society though that grows at high rates. Moreover, there are no concrete action plans in Korea. This research aims to deduce the priorities of the Korean green business/IT strategies to use multi attribute weighted average method. We selected a panel of 19 experts who work at the green business related firms such as HP, IBM, Fujitsu and so on, and selected six assessment indices such as the urgency of the technology development, the technology gap between Korea and the developed countries, the effect of import substitution, the spillover effect of technology, the market growth, and the export potential of the package or stand-alone products by existing literature review. We submitted questionnaires at approximately weekly intervals to them for priorities of the green business/IT strategies. The strategies broadly classify as follows. The first strategy which consists of the green business/IT policy and standardization, process and performance management and IT industry and legislative alignment relates to government's role in the green economy. The second strategy relates to IT to support environment sustainability such as the travel and ways of working management, printer output and recycling, intelligent building, printer rationalization and collaboration and connectivity. The last strategy relates to green IT systems, services and usage such as the data center consolidation and energy management, hardware recycle decommission, server and storage virtualization, device power management, and service supplier management. All the questionnaires were assessed via a five-point Likert scale ranging from "very little" to "very large." Our findings show that the IT to support environment sustainability is prior to the other strategies. In detail, the green business /IT policy and standardization is the most important in the government's role. The strategies of intelligent building and the travel and ways of working management are prior to the others for supporting environment sustainability. Finally, the strategies for the data center consolidation and energy management and server and storage virtualization have the huge influence for green IT systems, services and usage This research results the following implications. The amount of energy consumption and CO2 emissions of IT equipment including electrical business equipment will need to be clearly indicated in order to manage the effect of green business/IT strategy. And it is necessary to develop tools that measure the performance of green business/IT by each step. Additionally, intelligent building could grow up in energy-saving, growth of low carbon and related industries together. It is necessary to expand the affect of virtualization though adjusting and controlling the relationship between the management teams.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Recent Progress in Air Conditioning and Refrigeration Research - A Review of papers Published in the Korean Journal of Air-Conditioning and Refrigeration Engineering in 1998 and 1999 - (공기조화, 냉동 분야의 최근 연구 동향 - 1998년 1999년 학회지 논문에 대한 종합적 고찰 -)

  • 이재헌;김광우;김병주;이재효;김우승;조형희;김민수
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.12 no.12
    • /
    • pp.1098-1125
    • /
    • 2000
  • A review on the papers published in the Korean Journal of Air-Conditioning and Refrigerating Engineering in 1998 and 1999 has been done. Focus has been put on current status of research in the aspect of heating, cooling, ventilation, sanitation and building environment. The conclusions are as follows. 1) A review of the recent studies on fluid flow, turbomachinery and pipe-network shows that many experimental investigations are conducted in applications of impingement jets. Researches on turbulent flows, pipe flows, pipe-networks are focused on analyses of practical systems and prediction of system performance. The results of noise reduction in the turbomachinery are also reported. 2) A review of the recent studies on heat transfer analysis and heat exchanger shows that there were many papers on the channel flow with the application to the design of heat exchanger in the heat transfer analysis. Various experimental and numerical papers on heat exchanger were also published, however, there were few papers available for the analysis of whole system including heat exchanger. 3) A review of the recent studies on heat pump system have focused on the multi-type system and the heat pump cycle to utilize treated sewage as the heat source. The defrosting and the frosting behaviors in the fin-tube heat exchanger is experimentally examined by several authors. Several papers on the ice storage cooling system are presented to show the dynamic simulation program and optimal operation conditions. The study on the micro heat pipes for the cooling of high power electronic components is carried out to examine the characteristics of heat and mass transfer processed. In addition to these, new type of separate thermosyphon is studied experimentally. 4) The recent studies on refrigeration/air conditioning system have focused on the system performance and efficiency for new alternative refrigerants. New systems operating with natural refrigerants are drawing lots of attention. In addition to these, evaporation and condensation heat transfer characteristics of traditional and new refrigerants are investigated for plain tubes and also for microfin tubes. Capillary tubes and orifice are main topics of research as expansion devices and studies on thermophysical properties of new refrigerants and refrigerant/oil mixtures are widely carried out. 5) A review of the recent studies on absorption cooling system shows that numerous experimental and analytical studies on the improvement of absorber performance have been presented. Dynamic analysis of compressor have been performed to understand its vibration characteristics. However research works on tow-phase flow and heat transfer, which could be encountered in the refrigeration system and various phase-change heat exchanger, were seemed to be insufficient. 6) A review of recent studies on duct system shows that the methods for circuit analysis, and flow balancing have been presented. Researches on ventilation are focused on the measurement of ventilation efficiency, and variation of ventilation efficiency with ventilation methods by numerous experimental and numerical studies. Furthermore, many studies have been conducted in real building in order to estimate indoor thermal environments. Many research works to get some information for cooling tower design have been performed but are insufficient. 7) A review on the recent studies on architectural thermal environment and building mechanical systems design shows that thermal comfort analysis is sitting environment, thermal performance analysis of Korean traditional building structures., and evaluation of building environmental load have been performed. However research works to improve the performance of mechanical system design and construction technology were seemed to be insufficient.

  • PDF

Contactless Data Society and Reterritorialization of the Archive (비접촉 데이터 사회와 아카이브 재영토화)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.5-32
    • /
    • 2024
  • The Korean government ranked 3rd among 193 UN member countries in the UN's 2022 e-Government Development Index. Korea, which has consistently been evaluated as a top country, can clearly be said to be a leading country in the world of e-government. The lubricant of e-government is data. Data itself is neither information nor a record, but it is a source of information and records and a resource of knowledge. Since administrative actions through electronic systems have become widespread, the production and technology of data-based records have naturally expanded and evolved. Technology may seem value-neutral, but in fact, technology itself reflects a specific worldview. The digital order of new technologies, armed with hyper-connectivity and super-intelligence, not only has a profound influence on traditional power structures, but also has an a similar influence on existing information and knowledge transmission media. Moreover, new technologies and media, including data-based generative artificial intelligence, are by far the hot topic. It can be seen that the all-round growth and spread of digital technology has led to the augmentation of human capabilities and the outsourcing of thinking. This also involves a variety of problems, ranging from deep fakes and other fake images, auto profiling, AI lies hallucination that creates them as if they were real, and copyright infringement of machine learning data. Moreover, radical connectivity capabilities enable the instantaneous sharing of vast amounts of data and rely on the technological unconscious to generate actions without awareness. Another irony of the digital world and online network, which is based on immaterial distribution and logical existence, is that access and contact can only be made through physical tools. Digital information is a logical object, but digital resources cannot be read or utilized without some type of device to relay it. In that respect, machines in today's technological society have gone beyond the level of simple assistance, and there are points at which it is difficult to say that the entry of machines into human society is a natural change pattern due to advanced technological development. This is because perspectives on machines will change over time. Important is the social and cultural implications of changes in the way records are produced as a result of communication and actions through machines. Even in the archive field, what problems will a data-based archive society face due to technological changes toward a hyper-intelligence and hyper-connected society, and who will prove the continuous activity of records and data and what will be the main drivers of media change? It is time to research whether this will happen. This study began with the need to recognize that archives are not only records that are the result of actions, but also data as strategic assets. Through this, author considered how to expand traditional boundaries and achieves reterritorialization in a data-driven society.