• Title/Summary/Keyword: protocol conversion

Search Result 131, Processing Time 0.028 seconds

Low-costBacksheet Materials with Excellent Resistance to Chemical Degradation for Photovoltaic Modules (태양전지모듈용 고내구성 저가형 백시트)

  • Pyo, Se Youn;Lee, Chang Hyun
    • Membrane Journal
    • /
    • v.25 no.3
    • /
    • pp.287-294
    • /
    • 2015
  • Photovoltaic (PV) modules are environmentally friendly energy-conversion devices to generate electricity via the photovoltaic effect of semiconductors on solar energy. One of key elements in PV modules is "Backsheet," a multi-layered film to protect the devices from a variety of chemicals including water vapor. A representative Backsheet is composed of polyvinyl fluoride (PVF) and poly(ethylene terephthalate) (PET). PVF is relatively expensive, while showing excellent resistance to chemical attacks. Thus, it is necessary to develop alternatives which can lower its high production cost and guarantee lifetime applicable to practical PV modules at the same time. In this study, PET films with certain levels of crystallinity were utilized instead of PVF. Since it is well known that PET is suffering from trans-esterification and hydrolysis under a wide pH range, it is needed to understand decomposition behavior of the PET films under PV operation conditions. To evaluate their chemical decomposition behavior within a short period of times, accelerated decomposition test protocol is developed. Moreover, electrochemical long-term performances of the PV module employing the PET-based Backsheet are investigated to prove the efficacy of the proposed concept.

The Biometric based Convertible Undeniable Multi-Signature Scheme (바이오정보 기반 전환 부인봉쇄 다중서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1670-1676
    • /
    • 2010
  • It is easy to reproduce and manipulate the digital contents. It's difficult to distinguish the original contents with a pirate one. A digital signature scheme is used to protect the contents author's ownership and to provide secure contents distribution. Generally, the digital contents is completed with many authors' help. It's necessary to apply a cryptographic method for protecting co-authors' rights and interests. In this paper, the biometric based convertible undeniable multi-signature scheme is proposed. In the proposed scheme, keys are generated by using a signer's biometric data. Consigning the private key to another signer is infeasible. Signers must participate in signature generation and verification stages. Our scheme also provides signature conversion protocol in which the undeniable signature is converted to the ordinary one. For applications, we show how the proposed scheme is used to protect co-authors' rights and to distribute the contents securely.

A study on RFID Middleware protocol for management of sensor node and network implementation in Ubiquitous environment (유비쿼터스 환경에서 센서 노드의 관리와 망 구성을 위한 RFID 미들웨어 프로토콜에 관한 연구)

  • Choi, Yong-Sik;Kim, Sung-Sun;Shin, Seung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.155-163
    • /
    • 2007
  • In this paper, Though sensors of Ubiquitous Middle-ware System based on RFID/USN can usually be reacted from six mouths to two years, they can be exhausted their power of storage battery only one day by communication rates and ranges. That is, the lifetime of sensor node is depended on how much spending power under wireless communication that can communicate its sensing data to its destination. Therefore, it is necessary that each sensor should be designed the Routing path to its destination, in order to remote collecting data. But, in order to improve lifetime of sensor node and modify inner setting, it is opposite to simple searching path method of sensor node by entering external commands. accordingly, 1:n sensor arrangement of n form command and data send-receive that is possible simulation do without interference other sensors and research to different sensor data analysis and conversion ways to convert Sensing data that accept from sensors to actuality information.

  • PDF

Plant regeneration of Korean wild ginseng (Panax ginseng Meyer) mutant lines induced by ${\gamma}$-irradiation ($^{60}Co$) of adventitious roots

  • Zhang, Jun-Ying;Sun, Hyeon-Jin;Song, In-Ja;Bae, Tae-Woong;Kang, Hong-Gyu;Ko, Suk-Min;Kwon, Yong-Ik;Kim, Il-Woung;Lee, Jaechun;Park, Shin-Young;Lim, Pyung-Ok;Kim, Yong Hwan;Lee, Hyo-Yeon
    • Journal of Ginseng Research
    • /
    • v.38 no.3
    • /
    • pp.220-225
    • /
    • 2014
  • An efficient in vitro protocol has been established for somatic embryogenesis and plantlet conversion of Korean wild ginseng (Panax ginseng Meyer). Wild-type and mutant adventitious roots derived from the ginseng produced calluses on Murashige and Skoog (MS) medium supplemented with 0.5 mg/L 2,4-dichlorophenoxyacetic acid and 0.3 mg/L kinetin; 53.3% of the explants formed callus. Embryogenic callus proliferation and somatic embryo induction occurred on MS medium containing 0.5 mg/L 2,4-dichlorophenoxyacetic acid. The induced somatic embryos further developed to maturity on MS medium with 5 mg/L gibberellic acid, and 85% of them germinated. The germinated embryos were developed to shoots and elongated on MS medium with 5 mg/L gibberellic acid. The shoots developed into plants with well-developed taproots on one-third strength Schenk and Hildebrandt basal medium supplemented with 0.25 mg/L 1-naphthaleneacetic acid. When the plants were transferred to soil, about 30% of the regenerated plants developed into normal plants.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

Data Interworking Model Between DLMS and LwM2M Protocol (DLMS와 LwM2M 프로토콜 간 데이터 연동 모델 연구)

  • Myoung, Nogil;Park, Myunghye;Kim, Younghyun;Kang, Donghoon;Eun, Changsoo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.1
    • /
    • pp.29-33
    • /
    • 2020
  • Despite the same system architecture and operation principle, Advanced Metering Infrastructure (AMI) and Internet of Things (IoT) are recognized as a heterogeneous system. This is due to the different object modeling and communication protocols used in smart meters and sensors. However, data interworking between AMI and IoT is expected to be inevitable in the future. In this paper, we propose Device Language Message Specification (DLMS) to Lightweight Machine to Machine (LwM2M) conversion model. The proposed interworking model can reduce the packet size by 46.5% compared to that of the encapsulation method.

A Design and Implementation of Framework for Interworking between Heterogeneous Vehicle Networks for Intelligent Transportation System (지능형 교통시스템을 위한 이기종 차량 네트워크의 연동 프레임워크 설계 및 구현)

  • Yun, Sang-Du;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.901-908
    • /
    • 2010
  • There are many kinds of networks in vehicle for their purposes. In-vehicle networks, however, are not unified to single network. The networks are composed of several local networks because of communication speed, cost and efficiency. Because the complexity of network design for communication increases, local networks need a framework for interworking between heterogeneous networks. In this paper, a framework interworking between in-vehicle networks for ITS(Intelligent Transportation System) is proposed and implemented. The proposed framework consists of a compatible protocol, message conversion module, message transceiver module and message analysis module. The results obtained by implementation show that the framework efficiently supports the communication of information between heterogeneous in-vehicle networks.

Research on Service-Level Integration of ETSI M2M Platform with Heterogeneous Web Applications based on WSDL 2.0 (WSDL 2.0을 이용한 ETSI 표준 M2M 플랫폼과 이종의 웹 애플리케이션 간의 서비스 차원의 통합 방안 연구)

  • Park, Yunjung;Min, Dugki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1842-1850
    • /
    • 2013
  • ETSI M2M Platforms provide general infra services for machine-to-machine communication. In this paper, we propose a service-level integration methodology which can integrate a ETSI M2M platform with heterogeneous web applications based on WSDL 2.0. Considered heterogeneous web applications are the ones that use SOAP, HTTP and CoAP protocols for inter-communication. The proposed WSDL 2.0-based service-level integration methodology includes the followings; (1) We present a method of how to describe standardized M2M platform service interfaces into a WSDL 2.0 document. (2) A proposed web client generator is used to generates SOAP, HTTP and CoAP client codes from the WDSL 2.0 document. (3) We propose protocol conversion proxies which translate protocols into other protocols in web service run-time.

Design and Implementation of EDI Document Exchange system based on XML (XML에 기반한 EDI 문서교환 시스템 설계 및 구현)

  • Im, Young-Tae;Han, Woo-Yong;Jung, Hoe-Kyung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3603-3612
    • /
    • 2000
  • This paper presents is for the design and implementation of EDI document exchange system based on XML To create a customized document of the users' choice, it designed and created the transaction processor and the template manager, and to make it accessable with the original EDI, a converter function is included, Also, on this system, this protocol stores EDI message structure that needed to exchange as XML format and controls it as DOM API for user can use previous system, And provides interface for user can create template files with converter and transfer necessary elements that can be chosen by user. For this purpose, This system proposes a shows structure information and document converting mechanism solution of EDI documents based on by using XML which does not show proper document conversion mechanism solution in other system so far.

  • PDF

Implementation of Data Integrity Module in Wireless Internet Terminal for Mobile Customer Relationship Management(m-CRM) (m-CRM을 위한 무선인터넷단말기의 데이터무결성 모듈의 구현)

  • Park, Hyun-Cheol;Kim, Dong-Gyu
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.485-494
    • /
    • 2004
  • Recently, the wireless internet terminals like mobile phones or PDAs prevail in the management of customers. With such terminals, businessmen can get business data and information of customers in real time, in connection with mobile group wares. By the wireless terminals, customers can conveniently get information of goods, search purchase sites, and give orders and do settlement. This paper aims to present the safe data integrity modules of the wireless internet terminal, for service providing correct real-time promotion information, by using users' disposition, situation, Purchase information. This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction