Catálogo de publicaciones - libros
Computational Science and Its Applications: ICCSA 2007: International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II
Osvaldo Gervasi ; Marina L. Gavrilova (eds.)
En conferencia: 7º International Conference on Computational Science and Its Applications (ICCSA) . Kuala Lumpur, Malaysia . August 26, 2007 - August 29, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-74475-7
ISBN electrónico
978-3-540-74477-1
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Cobertura temática
Tabla de contenidos
On the Ink Transfer Process in Gravure Printing
Suhong Ahn; Yang Na
The flow simulating ink transfer process of gravure printing applications was investigated numerically using a finite difference approach. The flow was assumed to be described by the Reynolds equation and the Oldroyd B model. In this simple situation, it turns out that the velocity and pressure fields are the same as in the Newtonian case. However, two non-zero components of non-Newtonian stress tensor survive and they are likely to change the characteristics of ink transfer mechanism compared with that of the Newtonian case. In this preliminary study, the behavior of the non-Newtonian stress tensor was investigated at several representative streamwise locations.
- Workshop on e-Printing CAE Technology (E-PCAET 07) | Pp. 907-918
A Study on the Optimal Taper Tension Control in a Roll to Roll Machine
Changwoo Lee; Jangwon Lee; Keehyun Shin
Winding is an integral operation in almost every web handling process and center-wound rolls are suitable and general scheme in winding system. However, the internal stresses within center-wound rolls can cause damage such as buckling, spoking, cinching, etc. Wound roll quality and performance are known to be related to distribution of in-roll stresses. It is therefore necessary to analyze the relationship between taper tension in winding section and internal stress distribution within center-wound roll to prevent winding failure. In this study, a new taper tension control method for producing high quality wound roll was developed. The new method was induced from analyzing the winding mechanism by using the stress model in center-wound rolls, nip induced tension model, taper tension profile-telescoping relationship, and taper tension type-internal stresses relationship, etc. Auto taper tension profile making method for avoiding the damage (telescoping, buckling, cinching, etc.) is presented. Simulation results show that the proposed method is very useful.
- Workshop on e-Printing CAE Technology (E-PCAET 07) | Pp. 919-930
On-Line Measurement of Wrinkle Using Machine Vision
Hoang Minh To; Dong Keun Shin; Sung Lim Ko
Roll to roll (R2R) manufacturing, also known as ’web processing’, is the process of creating electronic devices on a roll of flexible plastic or metal foil. With the need for increased performance and productivity in the R2R industry, effective control and on-line supervision for web quality is essential. In this paper, we presents a system for on-line measurement of wrinkles, a defect inccurring due to compressive stresses developed in the web . This machine vision system, based on structured light ranging and multi-threaded processing is able to measure wrinkle height on a transparent web.
- Workshop on e-Printing CAE Technology (E-PCAET 07) | Pp. 931-940
An Effective Visualization and Analysis Method for Edge Measurement
Andrey Toropov
The terminology burr defines undesirable result of plastic deformation formed in machining process causing degradation of the accuracy and functionality of the product and its assemblies. To supervise the quality of the machined part, effective edge measurement and analysis are necessary. In this paper, we presented a laser-based measurement system including softwares for control and characterisation of burr parameters. Experiments were carried out showing that micro burr around 10 m and burr formed on a curved surface was successfully measured and analyzed.
- Workshop on e-Printing CAE Technology (E-PCAET 07) | Pp. 941-950
The Analysis of Film Flow Around Rotating Roller Partially Immersed Ink
Seung-Hwan Yu; Soojin Kang; Kwan-Soo Lee; Sukkee Um
This study is intended to analyze the effect of thin ink-film thickness around rotating printing roll on the printing quality in the gravure printing process which is used for making electronics circuit like a RFID tag with a conductive ink. The present work numerically estimates the film thickness around rotating roller partially immersed in ink, in which the volume of fluid (VOF) method was adopted to figure out the film formation process around rotating roller. Parameter studies were performed to compare the effect of ink viscosity, surface tension, roller rotating speed and immersed angle on the film thickness. The result indicates that the film thickness has a strong dependency on the fluid viscosity, while the surface tension effect becomes negligible.
- Workshop on e-Printing CAE Technology (E-PCAET 07) | Pp. 951-960
An Automated Design System of Press Die Components Using 3-D CAD Library
C. W. Kim; C. H. Park; S. S. Lee
Standard components usage in a press die is recognized as a way for a cost reduction and a short lead time. It also provides a way for a quick maintenance of a dieunder repair. It is expected to contribute to integration of CAD/CAM system for manufacturing dies in the future. This paper presents a 3D CAD library which is constructed using the standard components and is used for designing a press die. This 3D CAD library is generated by a database system made of Microsoft Access for standard components and by CATIA V5 R10 API for geometric features. The library is implemented using Visual Basic 6.0 utility of CATIA API function in the Windows NT environment. It creates a 3D model of the standard components of press die easily when a die designer inputs numerical values of geometric features and the BOM of the completely assembled parts. It also generates automatically the assembly drawing of die set by using variables for standard values of die parts. Therefore users can save the cost of time to design the press die components, and even a beginner can use this program with ease. The test results of the 3D CAD library for designing shearing and bending dies verify its usefulness and feasibility.
- Workshop on e-Printing CAE Technology (E-PCAET 07) | Pp. 961-974
Security Analysis of TORA Routing Protocol
Vee Liem Chee; Wei Chuen Yau
In this paper, we present security analysis on Temporally-Ordered Routing Algorithm (TORA) routing protocol. We first identify three attack goals, namely route disruption, route invasion and resource consumption. Then, we study on how to achieve these attack goals through misuses of routing messages. The analysis shows that three misuse actions on the routing messages, including drop, modify and forward, and active forge, enable the malicious attacker to conduct real time attacks on TORA protocol. We demonstrate the attacks using NS-2 software and then analyze the simulation results. The simulation results verify our analysis and we observe that through certain misuses, an inside attacker can degrade the network performance, disrupting the route creation process and consume scarce network resource.
- Workshop on Advanced Security Services (ASS 07) | Pp. 975-986
A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy
Daeyoung Kim; Younggang Cui; Sangjin Kim; Heekuck Oh
In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA (Authentication and Key Agreement) is used to securely authenticate an MS (Mobile Station). However, the UMTS AKA has several drawbacks such as network bandwidth consumption and synchronization problem. In this paper, we propose a new authentication protocol for UMTS that overcomes these problems. Moreover, our protocol enhances the security of the protocol by providing better privacy and also provides perfect forward secrecy. Furthermore, our protocol also provides mutual authentication between an MS and its HN (Home Network) and between an MS and the SN (Serving Network).
- Workshop on Advanced Security Services (ASS 07) | Pp. 987-995
Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification
Seokhyang Cho; Kiwon Song; Dongsub Cho; Dongho Won
Recently, the bilinear pairings such as the Weil and the Tate pairings defined on algebraic curves over a finite field have found applications in the design of cryptographic protocols. One useful application in mobile environments is for secure group communication over a public network. The members in the group need to establish a common group key that will be used to encrypt messages to be broadcast to the group. Furthermore, it is important to update the group key with low computational costs when the members join and leave the group. In this paper, we propose a pairing-based key exchange protocol for dynamic groups. The proposed protocol achieves low communication complexity and provides some computational savings by the batch verification of signatures. We show that the security of our scheme is guaranteed against an active adversary in the random oracle model under the bilinear Diffie-Hellman (BDH) assumption.
- Workshop on Advanced Security Services (ASS 07) | Pp. 996-1007
An Enhanced ID-Based Deniable Authentication Protocol on Pairings
Meng-Hui Lim; Sanggon Lee; Youngho Park; Hoonjae Lee
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based deniable authentication protocol after proving the vulnerability to Key-Compromise Impersonation (KCI) attack in Cao et al.’s protocol. In addition, they claimed that their protocol is not only secure, but also able to achieve both authenticity and deniability properties. However, in this paper, we demonstrate that Chou et al.’s protocol is not flawless as it remains insecure due to its susceptibility to the KCI attack. Based on this, we propose an enhanced scheme which will in fact preserves the authenticity, the deniability and the resistance against the KCI attack.
- Workshop on Advanced Security Services (ASS 07) | Pp. 1008-1017