• 제목/요약/키워드: 기술적 요소

Search Result 9,639, Processing Time 0.044 seconds

Computational Analysis and Measurement for SDR-based Spectrum Sensing System Design on Single Board Computer (소프트웨어 정의 라디오 기반 스펙트럼 센싱 시스템 설계를 위한 단일 보드 컴퓨터 내 연산 분석 및 측정 연구)

  • Kim, Joon Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1650-1658
    • /
    • 2019
  • In recent years, IoT device and platform become widely popular and the computing performance and capabilities of IoT devices are also getting improved. However, the size and computing resources of IoT devices, especially small single board computer, are limited in a way that the design and implementation of the system should be carefully considered to operate on the devices. Recently, SDR technologies are adapting in IoT devices and can perform various radio systems. Thorough analysis and investigation of computer performances on small single board computer are necessary for its usage. In this paper, we present the results of computing resources measurement and analysis on small single-board computers. At first, we consider to design SDR based spectrum sensing for single board computer, investigate various key factors and propose a design procedure that can affect performance of the system with experiments.

Montgomery Multiplier Supporting Dual-Field Modular Multiplication (듀얼 필드 모듈러 곱셈을 지원하는 몽고메리 곱셈기)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.736-743
    • /
    • 2020
  • Modular multiplication is one of the most important arithmetic operations in public-key cryptography such as elliptic curve cryptography (ECC) and RSA, and the performance of modular multiplier is a key factor influencing the performance of public-key cryptographic hardware. An efficient hardware implementation of word-based Montgomery modular multiplication algorithm is described in this paper. Our modular multiplier was designed to support eleven field sizes for prime field GF(p) and binary field GF(2k) as defined by SEC2 standard for ECC, making it suitable for lightweight hardware implementations of ECC processors. The proposed architecture employs pipeline scheme between the partial product generation and addition operation and the modular reduction operation to reduce the clock cycles required to compute modular multiplication by 50%. The hardware operation of our modular multiplier was demonstrated by FPGA verification. When synthesized with a 65-nm CMOS cell library, it was realized with 33,635 gate equivalents, and the maximum operating clock frequency was estimated at 147 MHz.

A Proposal for the Practical and Secure Electronic Voting Protocol (실용적이고 안전한 전자투표 프로토콜에 관한 연구)

  • 김순석;이재신;김성권
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2000
  • We have seen a lot of developments on computer application areas with the wide spread use of computers and the rapid growth of communication network. It is necessary to use a cryptographic technique for electronic voting, but, at present, despite of its importance electronic voting protocols so far have many shortcomings. In this paper, with the assumption of a trustable voting centers we propose a large-scale and practical electronic voting protocol satisfying protocol requirements, such as secureness, fairness, privacy of voter and correctness. Voters are able to get a vote without revealing their voted information by using the blinding technique. We can find the injustice between a voter and the tallier by using undeniable challenge and responsible protocol. Also, we proposes a secure protocol that compensates a integrity of electronic voting and protects a privacy of voter from outer attacks as using a anonymity of voter.

Implementation of Digital Document Management DRM System with OMA Structure (OMA 구조를 이용한 안전한 전자문서 관리를 위한 DRM 시스템 구현)

  • Shin Young-Chan;Choi Hyo-Sik;Kim Yong-Goo;Choi Seoko-Jin;Ryou Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.45-54
    • /
    • 2006
  • As widespread of using digital documents in various fields, control the usage of digital document is needed. So, Digital Rights Management(DRM) will become a key component of digital document system, but absence of proper digital document DRM system, there is a real risk to lose important information when a hacker achieved intrusion in important system. This paper designs and implements digital document DRM system based on OMA(Open Mobile Alliance) DRM model and OpenOffice. We considered being a digital document DRM system to contain appropriate solution of security and document compatibility.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Optimization of Gear Webs for Rotorcraft Engine Reduction Gear Train (회전익기용 엔진 감속 기어열의 웹 형상 최적화)

  • Kim, Jaeseung;Kim, Suchul;Sohn, Jonghyeon;Moon, Sanggon;Lee, Geunho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.12
    • /
    • pp.953-960
    • /
    • 2020
  • This paper presents an optimization of gear web design used in a main gear train of an engine reduction gearbox for a rotorcraft. The optimization involves the minimization of a total weight, transmission error, misalignment, and face load distribution factor. In particular, three design variables such as a gear web thickness, location of rim-web connection, and location of shaft-web connection were set as design parameters. In the optimization process, web, rim and shaft of gears were converted from the 3D CAD geometry model to the finite element model, and then provided as input to the gear simulation program, MASTA. Lastly, NSGA-II optimization method was used to find the best combination of design parameters. As a result of the optimization, the total weight, transmission error, misalignment, face load distribution factor were all reduced, and the maximum stress was also shown to be a safe level, confirming that the overall gear performance was improved.

Optimization to Control Buckling Temperature and Mode Shape through Continuous Thickness Variation of Composite Material (복합소재의 연속 두께 변화를 통한 좌굴온도 및 모드형상 최적화)

  • Lee, Kang Kuk;Lee, Hoo Min;Yoon, Gil Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.6
    • /
    • pp.347-353
    • /
    • 2021
  • In this study, we presented a novel size optimization framework to control the linear buckling temperature and several buckling modes of plates, by optimizing thickness values of composite structures for practical engineering applications. Predicting the buckling temperature and mode shape of structures is a vital research topic in engineering to achieve structural stability. However, optimizing designs of engineering structures through engineering intuition is challenging. To address this limitation, we proposed a method that combines finite element simulation and size optimization. Based on the idea that the structural buckling temperature and mode shape of a plate are affected by the thickness of the structure, the thickness values of the nodes of the target structure were set as the design variables in this optimization method; and the buckling temperature values, and buckling mode shapes were set as the objective functions. This size optimization method enabled the determination of optimal thickness distributions, to induce the desired buckling temperature values and mode shapes. The validity of the proposed method was verified in terms of their buckling temperature values and buckling mode shapes, using several numerical examples of rectangular composite structures.

A Study on the Development of Low-Altitude and Long-Endurance Solar-Powered UAV from Korea Aerospace University (2) - Flight Control and Guidance of Solar Powered UAV - (한국항공대학교 저고도 장기체공 태양광 무인기 개발에 관한 연구 (2) - 태양광 무인기 비행제어 및 유도항법 -)

  • Kim, Taerim;Kim, Doyoung;Jeong, Jaebaek;Moon, Seokmin;Kim, Yongrae;Bae, Jae-Sung;Park, Sanghyuk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.7
    • /
    • pp.479-487
    • /
    • 2022
  • This paper presents the control and guidance algorithm of a KAU-SPUAV(Korea Aerospace University - Solar Powered Unmanned Aerial Vehicle) which is designed and developed in Korea Aerospace University. Aerodynamic coefficients are calculated using the vortex-lattice method and applied to the aircraft's six degrees of freedom equation. In addition, the thrust and torque coefficients of the propeller are calculated using the blade element theory. An altitude controller using thrust was used for longitudinal control of KAU-SPUAV to glide efficiently when it comes across the upwind. Also describes wind estimation technic for considering wind effect during flight. Finally, introduce some guidance laws for endurance, mission and coping with strong headwinds and autonomous landing.

Numerical Stability Evaluation of Underground Semi-Spherical Cavity (반구형 지중공동의 수치해석적 안정성 평가)

  • Lee, Taegeon;Ryu, Dong-Woo;Youn, Heejung
    • Tunnel and Underground Space
    • /
    • v.32 no.1
    • /
    • pp.20-29
    • /
    • 2022
  • The existence of underground cavity should be considered in the assessment of georisk such as ground subsidence. Even if the shear strength of the ground around the cavity is known, it is difficult to accurately analyze the safety around the cavity due to the uncertainties related to geometric conditions such as the cavity size. In this paper, stability chart representing dimensionless stability constants was proposed based on the ground strength and geometric conditions. Numerical analysis had been carried out accounting for the stability constants such as the ground strength, the adhesion and friction angles, and the size and depth of the underground cavity. The proposed charts can help estimating the stability of ground with underground circular cavity.

Study of IoT Module Package Design Optimization for Drop Testing by Drone (IoT 모듈 패키지 디자인 최적화 및 드론에서의 낙하해석 연구)

  • Jo, Eunsol;Kim, Gu-Sung
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.28 no.4
    • /
    • pp.63-67
    • /
    • 2021
  • In order to detect fires that may not be visible to the naked eye, an IoT module that uses changes in Carbon dioxide (CO2) levels and temperature to effectively identify ambers (dying flames) was developed. Finite element analysis was then used to optimize the packaging for this module. Given the nature of ambers, the low power long range LoRa (Long Range) technology was used in the development of this module. To protect the module, a number of packages were designed, and comparative analysis performed on the stress generated when they fall. The results of which show that Model C showed the lowest stress. In addition, unlike other models in which stress concentration was predicted in the module mounting part of the package, in this model the stress concentration phenomenon was predicted in the wing part. It was therefore determined that this approach is ideal for protecting the internal module, and a package to which this was applied was manufactured.