• Title/Summary/Keyword: 모듈순서

Search Result 99, Processing Time 0.019 seconds

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

Low Performance Electronics Evolved into Smart Appliances (스마트 가전으로 진화된 저사양 생활가전)

  • Back, Jonghui;Kim, Kyosun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.107-115
    • /
    • 2013
  • Smart appliances with multi-media and telecommunication equipments provide users complicated convenience functions. On the contrary, 8-bit controller-based low performance electronics still cannot afford such multimedia and telecommunication. If we find a way to have low-end electronics connected and provide complicated functions, they can be also made "smart". Fortunately, 8-bit controllers used in low-end appliances have UART, which can be connected to any of BlueTooth, Wi-Fi and ZigBee communication modules which can, in turn, communicate with smart devices. Any communication module can be attached to the low-end electronics due to the variety of smart devices' connectivity at the other side. Although the convenience functions seem complicated, they are actually macros in a script form composed of micro commands which implement the base functions of appliances. Since the kinds of the base functions are not that many, the low-end electronic appliances will become "smart" if their control program can be extended to execute sequentially the micro commands in any combination. Such simple innovation has not seen the world, until now due to the overhead of the additionally required hardware such as display devices and buttons. The high-quality display and touch screen functionalities of smart devices can replace the required hardware, and remove the overhead completely. In fact, the low-end appliances become smart as if an "evolution kit" is newly equipped.

A Context-Aware System for Reliable RFID-based Logistics Management (RFID 기반 물류관리의 신뢰성 향상을 위한 상황인지 시스템 개발)

  • Jin, Hee-Ju;Kim, Hoontae;Lee, Yong-Han
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.223-240
    • /
    • 2013
  • RFID(Radio Frequency Identification) is use of an RFID tag applied to object for the purpose of identification and tracking using radio waves. Recently, it is being actively researched and introduced in logistics and manufacturing. RFID portals in supply chains are meant to identify all the tags within a given interrogation zone. Hence the hardware and software mechanisms for RFID tag identification mostly focus on successful read of multiple tags simultaneously. Such mechanisms, however, are inefficient for determining moving direction of tags, sequence of consecutive tags, and validity of the tag reads from the viewpoint of workflow. These types of problems usually cause many difficulties in RFID portal implementation in manufacturing environment, there by having RFID-system developers waste a considerable amount of time. In this research, we designated an RFID portal system with SDO(Sequence, Direction, and Object-flow)-perception capability by using fundamental data supplied by ordinary RFID readers. Using our work, RFID system developers can save a great amount of time building RFID data-capturing applications in manufacturing environment.

Active Congestion Control Using Active Router′s Feedback Mechanism (액티브 라우터의 피드백 메커니즘을 이용한 혼잡제어 기법)

  • Choe, Gi-Hyeon;Jang, Gyeong-Su;Sin, Ho-Jin;Sin, Dong-Ryeol
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.513-522
    • /
    • 2002
  • Current end-to-end congestion control depends only on the information of end points (using three duplicate ACK packets) and generally responds slowly to the network congestion. This mechanism can't avoid TCP global synchronization which TCP congestion window size is fluctuated during congestion occurred and if RTT (Round Trip Time) is increased, three duplicate ACK packets is not a correct congestion signal because congestion maybe already disappeared and the host may send more packets until receive the three duplicate ACK packets. Recently there is increasing interest in solving end-to-end congestion control using active network frameworks to improve the performance of TCP protocols. ACC (Active congestion control) is a variation of TCP-based congestion control with queue management In addition traffic modifications nay begin at the congested router (active router) so that ACC will respond more quickly to congestion than TCP variants. The advantage of this method is that the host uses the information provided by the active routers as well as the end points in order to relieve congestion and improve throughput. In this paper, we model enhanced ACC, provide its algorithm which control the congestion by using information in core networks and communications between active routers, and finally demonstrate enhanced performance by simulation.

NOVEL CNC GRINDING PROCESS CONTROL FOR NANOMETRIC SURFACE ROUGHNESS FOR ASPHERIC SPACE OPTICAL SURFACES (우주망원경용 비구면 반사경 표면조도 향상을 위한 진화형 수치제어 연삭공정 모델)

  • 한정열;김석환;김건희;김대욱;김주환
    • Journal of Astronomy and Space Sciences
    • /
    • v.21 no.2
    • /
    • pp.141-152
    • /
    • 2004
  • Optics fabrication process for precision space optical parts includes bound abrasive grinding, loose abrasive lapping and polishing. The traditional bound abrasive grinding with bronze bond cupped diamond wheel leaves the machine marks of about $20{mu}m$ rms in height and the subsurface damage of about 1 ${mu}m$ rms in height to be removed by subsequent loose abrasive lapping. We explored an efficient quantitative control of precision CNC grinding. The machining parameters such as grain size, work-piece rotation speed and feed rate were altered while grinding the work-piece surfaces of 20-100 mm in diameter. The input grinding variables and the resulting surface quality data were used to build grinding prediction models using empirical and multi-variable regression analysis. The effectiveness of such grinding prediction models was then examined by running a series of precision CNC grinding operation with a set of controlled input variables and predicted output surface quality indicators. The experiment achieved the predictability down to ${pm}20$ nm in height and the surface roughness down to 36 nm in height. This study contributed to improvement of the process efficiency reaching directly the polishing and figuring process without the need for the loose abrasive lapping stage.

A Wireless Sensor Network Systems to Identify User and Detect Location Transition for Smart Home (지능형 주택을 위한 구성원 식별 및 위치 이동 감지 센서 네트워크 시스템)

  • Lee, Seon-Woo;Yang, Seung-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.396-402
    • /
    • 2010
  • The tracking of current location of residents is an essential requirement for context-aware service of smart houses. This paper presents a wireless sensor network system which could detect location transition such as entrance and exit to a room and also identify the user who passed the room, without duty of wearing any sort of tag. We designed new sensor node to solve the problem of short operation lifetime of previous work[1] which has two pyroelectric infrared (PIR) sensors and an ultrasonic sensor, as well as a 2.4 GHz radio frequency wireless transceiver. The proposed user identification method is to discriminate a person based on his/her height by using an ultrasonic sensor. The detection idea of entering/exiting behavior is based on order of triggering of two PIR sensors. The topology of the developed wireless sensor network system is simple star structure in which each sensor node is connected to one sink node directly. We evaluated the proposed sensing system with a set of experiments for three subjects in a model house. The experimental result shows that the averaged recognition rate of user identification is 81.3% for three persons. and perfect entering/exiting behavior detection performance.

Hardware Design of High Performance HEVC Deblocking Filter for UHD Videos (UHD 영상을 위한 고성능 HEVC 디블록킹 필터 설계)

  • Park, Jaeha;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.178-184
    • /
    • 2015
  • This paper proposes a hardware architecture for high performance Deblocking filter(DBF) in High Efficiency Video Coding for UHD(Ultra High Definition) videos. This proposed hardware architecture which has less processing time has a 4-stage pipelined architecture with two filters and parallel boundary strength module. Also, the proposed filter can be used in low-voltage design by using clock gating architecture in 4-stage pipeline. The segmented memory architecture solves the hazard issue that arises when single port SRAM is accessed. The proposed order of filtering shortens the delay time that arises when storing data into the single port SRAM at the pre-processing stage. The DBF hardware proposed in this paper was designed with Verilog HDL, and was implemented with 22k logic gates as a result of synthesis using TSMC 0.18um CMOS standard cell library. Furthermore, the dynamic frequency can process UHD 8k($7680{\times}4320$) samples@60fps using a frequency of 150MHz with an 8K resolution and maximum dynamic frequency is 285MHz. Result from analysis shows that the proposed DBF hardware architecture operation cycle for one process coding unit has improved by 32% over the previous one.

Metamorphic Malware Detection using Subgraph Matching (행위 그래프 기반의 변종 악성코드 탐지)

  • Kwon, Jong-Hoon;Lee, Je-Hyun;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.37-47
    • /
    • 2011
  • In the recent years, malicious codes called malware are having shown significant increase due to the code obfuscation to evade detection mechanisms. When the code obfuscation technique is applied to malwares, they can change their instruction sequence and also even their signature. These malwares which have same functionality and different appearance are able to evade signature-based AV products. Thus, AV venders paid large amount of cost to analyze and classify malware for generating the new signature. In this paper, we propose a novel approach for detecting metamorphic malwares. The proposed mechanism first converts malware's API call sequences to call graph through dynamic analysis. After that, the callgraph is converted to semantic signature using 128 abstract nodes. Finally, we extract all subgraphs and analyze how similar two malware's behaviors are through subgraph similarity. To validate proposed mechanism, we use 273 real-world malwares include obfuscated malware and analyze 10,100 comparison results. In the evaluation, all metamorphic malwares are classified correctly, and similar module behaviors among different malwares are also discovered.

An Exploratory Study for Metaverse Governance in the Public Sector (공공 메타버스 거버넌스에 대한 탐색적 연구)

  • Haejung Yun;Jaeyoung An;Sang Cheol Park
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.353-376
    • /
    • 2023
  • The global pandemic and the development of virtual and augmented reality technologies have led a metaverse boom that enables a lot of interactions in virtual worlds, and is being utilized in various fields such as business, government, and education etc. Despite the growing interest in the metaverse, its scope and definition are still unclear and the concept is still evolving, making it challenging to establish its governance. Governmental entities are also investing intensively in public metaverses to make public value and promote social welfare, but they are underutilized due to lack of systematic governance. Therefore, in this study, we propose a public metaverse governance framework and identify the relative importance of the factors. Furthermore, since a public metaverse should be accessible to anyone who wants to use, we explore the factors of shadow work and examine the ways to minimize it. Based on the socio-technical system theory, we derived public metaverse governance factors from previous literature and topic modeling and then generate a framework with 23 factors through expert interviews. We then tested relative priority of the factors using the analytic hierarchical process (AHP) from the experts. As a result, the top five overall rankings are: 'roles and responsibilities', 'standardization/modularization', 'collaboration and communication', 'law and policies', and 'availability/accessibility'. The academic implications of this study are that it provides a comprehensive framework for public metaverse governance, and then the practical implications include suggesting prioritized considerations for metaverse operations in the public sector.