• Title/Summary/Keyword: time-reuse

Search Result 544, Processing Time 0.022 seconds

Redesign of Stream Cipher Salsa20/8 (스트림 암호 Salsa20/8의 재설계)

  • Kim, Gil-Ho;Kim, Sung-Gi;Cho, Gyeong-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1904-1913
    • /
    • 2014
  • Was develop 256bit output stream cipher of improving for same key reuse prohibition and integrity. The developed stream cipher used Salsa20 round function was implemented to hardware of applying a 5-stage pipeline architecture, such as WSN and DMB for real-time processing can satisfy the speed and security requirements.

Development of the Design Guideline to Increase the Reusing Rate of Cellular Phone Parts (휴대폰부품의 재사용률 극대화를 위한 설계 지침 개발)

  • Kim Chan-Seok;Yi Hwa-Cho
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.23 no.8 s.185
    • /
    • pp.108-118
    • /
    • 2006
  • Reusing is one of the most environmentally friendly recycling methods. For the economical remanufacturing of used cellular phone, the cellular phones should be design for easy disassembly. In this paper, we analyzed the components and connecting elements of cellular phones and developed a guideline for the design of the cellular phones. A software for the disassembly assessment was also developed. Redesigned cellular phone by the developed guideline and its original phone was analyzed by the disassembly assessment software. Disassembly time could be reduced about 40% and reusing rate could be improved about 37%.

The Study of Framework Model for Software Productivity Enhancement in Object-Oriented Environment (객체지향 환경에서 소프트웨어 생산성 향상을 위한 프레임워크 모델 연구)

  • Heo, Kwae-Bum;Kim, Young-Gyu;Yang, Dong-Il
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.900-908
    • /
    • 2010
  • Recently, OOM(Object-Oriented Method) access method which begins to apply to software development is emphasizing development cost and time reduction through independent software reuse. But because of planning to the exclusion of the lack of knowledge and expansion or performance for development technology many problems are coming out. Therefore, this thesis suggests Effective Object-Oriented Modeling methods considering the plan for higher productivity enhancement of software in the software development life cycle. Effective Object-Oriented Modeling method includes, methods, Use Case modeling methods, Analysis Modeling methods, Design Modeling methods and others.

Semi-Automatic Ontology Construction from HTML Documents: A conversion of Text-formed Information into OWL 2

  • Im, Chan jong;Kim, Do wan
    • International Journal of Contents
    • /
    • v.12 no.2
    • /
    • pp.24-30
    • /
    • 2016
  • Ontology is known to be one of the most important technologies in achieving semantic web. It is critical as it represents the knowledge in a machine readable state. World Wide Web Consortium (W3C) has been contributing to the development of ontology for the last several years. However, the recommendation of W3C left out HTML despite the massive amount of information it contains. Also, it is difficult and time consuming to keep up with all the technologies especially in the case of constructing ontology. Thus, we propose a module and methods that reuse HTML documents, extract necessary information from HTML tags and mapping it to OWL 2. We will be combining two kinds of approaches which will be the structural refinement for making an ontology skeleton and linguistic approach for adding detailed information onto the skeleton.

COD removal from industrial wastewater plants using reverse osmosis membrane

  • Madaeni, S.S.;Samieirad, S.
    • Membrane and Water Treatment
    • /
    • v.1 no.4
    • /
    • pp.273-282
    • /
    • 2010
  • Treatment and reuse of industrial wastewater is becoming a major goal due to water scarcity. This may be carried out using membrane separation technology in general and reverse osmosis (RO) in particular. In the current study, polyamide (FT-30) membrane was employed for treatment of wastewater obtained from Faraman industrial zone based in Kermanshah (Iran). The effects of operating conditions such as transmembrane pressure, cross flow velocity, temperature and time on water flux and rejection of impurities including COD by the membrane were elucidated. The aim was an improvement in membrane performance. The results indicate that most of the chemical substances are removed from the wastewater. In particular COD removal was increased from 64 to around 100% as temperature increased from 15 to $45^{\circ}C$. The complete COD removal was obtained at transmembrane pressure of 20 bars and cross flow velocity of 1.5 m/s. The treated wastewater may be reused for various applications including makeup water for cooling towers.

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

Heat Treatment Effect on Anti-Tacking Properties of an Zn-stearate/TEA-stearate/Water Emulsion System

  • Qin, Pei;Lee, JinBae;Ha, KiRyong;Ahn, WonSool
    • Elastomers and Composites
    • /
    • v.54 no.3
    • /
    • pp.241-246
    • /
    • 2019
  • Carbon master batch (CMB) rubber sheets, which are stored in stacks, are difficult to separate during reuse because of the adhesion between sheets caused by the stacked weight over time. To solve this problem, in the actual rubber product manufacturing process, various anti-tacking agents (solid powder or liquid surfactants) are applied to the sheet surface. In this study, the emulsion samples of zinc (Zn)-stearate/triethanolamine (TEA)-stearate mixtures were prepared using TEA-stearate as a surfactant, prepared using an industrially manufactured Zn-stearate powder, and their basic anti-tacking properties were studied. During the process of manufacturing emulsion, a heat treatment process and an auxiliary surfactant were introduced to improve the dispersion stability. Results showed that the heat-treated sample exhibited a significant improvement in terms of sedimentation, storage stability, and anti-tacking characteristics since the Zn-stearate particles were reduced to a smaller size by the heat-treatment than that of the original Zn-stearate powder.

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

  • Choi, Seul-Ki;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1611-1625
    • /
    • 2019
  • The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.

A Framework for Human Motion Segmentation Based on Multiple Information of Motion Data

  • Zan, Xiaofei;Liu, Weibin;Xing, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4624-4644
    • /
    • 2019
  • With the development of films, games and animation industry, analysis and reuse of human motion capture data become more and more important. Human motion segmentation, which divides a long motion sequence into different types of fragments, is a key part of mocap-based techniques. However, most of the segmentation methods only take into account low-level physical information (motion characteristics) or high-level data information (statistical characteristics) of motion data. They cannot use the data information fully. In this paper, we propose an unsupervised framework using both low-level physical information and high-level data information of human motion data to solve the human segmentation problem. First, we introduce the algorithm of CFSFDP and optimize it to carry out initial segmentation and obtain a good result quickly. Second, we use the ACA method to perform optimized segmentation for improving the result of segmentation. The experiments demonstrate that our framework has an excellent performance.

Evaluation of long term shaft resistance of the reused driven pile in clay

  • Cui, Jifei;Rao, Pingping;Wu, Jian;Yang, Zhenkun
    • Geomechanics and Engineering
    • /
    • v.29 no.2
    • /
    • pp.171-182
    • /
    • 2022
  • Reusing the used pile has not yet been implemented due to the unpredictability of the bearing capacity evolution. This paper presents an analytic approach to estimate the sides shear setup after the dissipation of pore pressure. Long-term evolution of adjacent soil is simulated by viscoelastic-plastic constitutive model. Then, an innovative concept of quasi-overconsolidation is proposed to estimate the strength changes of surrounding soil. Total stress method (α method) is employed to evaluate the long term bearing capacity. Measured data of test piles in Louisiana and semi-logarithmic time function are cited to validate the effectiveness of the presented method. Comparisons illustrate that the presented approach gives a reasonably prediction of the side shear setup. Both the presented method and experiment show the shaft resistance increase by 30%-50%, and this highlight the potential benefit of piles reutilization.