• Title/Summary/Keyword: 연산 효율

Search Result 2,610, Processing Time 0.029 seconds

Security and Privacy Mechanism using TCG/TPM to various WSN (다양한 무선네트워크 하에서 TCG/TPM을 이용한 정보보호 및 프라이버시 매커니즘)

  • Lee, Ki-Man;Cho, Nae-Hyun;Kwon, Hwan-Woo;Seo, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.195-202
    • /
    • 2008
  • In this paper, To improve the effectiveness of security enforcement, the first contribution in this work is that we present a clustered heterogeneous WSN(Wareless Sensor Network) architecture, composed of not only resource constrained sensor nodes, but also a number of more powerful high-end devices acting as cluster heads. Compared to sensor nodes, a high-end cluster head has higher computation capability, larger storage, longer power supply, and longer radio transmission range, and it thus does not suffer from the resource scarceness problem as much as a sensor node does. A distinct feature of our heterogeneous architecture is that cluster heads are equipped with TC(trusted computing) technology, and in particular a TCG(Trusted Computing Group) compliant TPM (Trusted Platform Module) is embedded into each cluster head. According the TCG specifications, TPM is a tamper-resistant, self-contained secure coprocessor, capable of performing cryptographic functions. A TPM attached to a host establishes a trusted computing platform that provides sealed storage, and measures and reports the integrity state of the platform.

  • PDF

Numerical Integration-based Performance Analysis of Amplitude-Comparison Monopulse System (진폭비교 모노펄스시스템의 수치적분 기반 성능분석)

  • Ham, Hyeong-Woo;Lim, Hee-Yun;Lee, Joon-Ho
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.339-345
    • /
    • 2021
  • In this paper, estimation angle performance analysis of amplitude-comparison monopulse radar under additive noise effect is dealt with. When uncorrelated white noises are added to the squinted beams, the angle estimation performance is analyzed through the mean square error(MSE). The numerical integration-based mean square error result completely overlaps the Monte Carlo-based mean square error result, which corresponds to 99.8% of the Monte Carlo-based mean square error result. In addition, the mean square error analysis method based on numerical integration has a much faster operation time than the mean square error method based on Monte Carlo. the angle estimation performance of the amplitude comparison monopulse radar can be efficiently analyzed in various noise environments through the proposed numerical integration-based mean square error method.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

Analysis of Tensor Processing Unit and Simulation Using Python (텐서 처리부의 분석 및 파이썬을 이용한 모의실행)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.165-171
    • /
    • 2019
  • The study of the computer architecture has shown that major improvements in price-to-energy performance stems from domain-specific hardware development. This paper analyzes the tensor processing unit (TPU) ASIC which can accelerate the reasoning of the artificial neural network (NN). The core device of the TPU is a MAC matrix multiplier capable of high-speed operation and software-managed on-chip memory. The execution model of the TPU can meet the reaction time requirements of the artificial neural network better than the existing CPU and the GPU execution models, with the small area and the low power consumption even though it has many MAC and large memory. Utilizing the TPU for the tensor flow benchmark framework, it can achieve higher performance and better power efficiency than the CPU or CPU. In this paper, we analyze TPU, simulate the Python modeled OpenTPU, and synthesize the matrix multiplication unit, which is the key hardware.

Optimal Design of a Hybrid Structural Control System using a Self-Adaptive Harmony Search Algorithm (자가적응 화음탐색 알고리즘을 이용한 복합형 최적 구조제어 시스템 설계)

  • Park, Wonsuk
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.31 no.6
    • /
    • pp.301-308
    • /
    • 2018
  • This paper presents an optimal design method of a hybrid structural control system considering multi-hazard. Unlike a typical structural control system in which one system is designed for one specific type of hazard, a simultaneous optimal design method for both active and passive control systems is proposed for the mitigation of seismic and wind induced vibration responses of structures. As a numerical example, an optimal design problem is illustrated for a hybrid mass damper(HMD) and 30 viscous dampers which are installed on a 30 story building structure. In order to solve the optimization problem, a self-adaptive Harmony Search(HS) algorithm is adopted. Harmony Search algorithm is one of the meta-heuristic evolutionary methods for the global optimization, which mimics the human player's tuning process of musical instruments. A self-adaptive, dynamic parameter adjustment algorithm is also utilized for the purpose of broad search and fast convergence. The optimization results shows that the performance and effectiveness of the proposed system is superior with respect to a reference hybrid system in which the active and passive systems are independently optimized.

Development of IoT Device Management System Using Blockchain DPoS Consensus Algorithm (블록체인 DPoS 합의 알고리즘을 활용한 IoT 장치 관리 시스템 개발)

  • Kim, Mihui;Kim, Youngmin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.508-516
    • /
    • 2019
  • Smart home with various IoT devices provides convenient and efficient services. However, security is important because sensitive information such as private video and audio can be collected and processed, as well as shared over the Internet. To manage such smart home IoT devices, we use blockchain technology that provides data integrity and secure management. In this paper, we utilize a PoS(Proof of Stake) method that verifies the block through the accumulated stake in the network rather than the computation power, out of the PoW(Proof of Work) block chain, in which the computation for the existing verification must be continuously performed. Among them, we propose a blockchain based system with DPoS(Delegated Proof of Stake) method to actively solve the scalability part, for security that is suitable for smart home IoT environment. We implement the proposed system with DPoS based EOSIO to show realization, and we show performance improvement in terms of transaction processing speed.

Protection Technologies against Large-scale Computing Attacks in Blockchain (블록체인에서 대용량 컴퓨팅 공격 보호 기술)

  • Lee, Hakjun;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2019
  • The blockchain is a technique for managing transaction data in distributed computing manner without the involvement of central trust authority. The blockchain has been used in various area such as manufacturing, culture, and public as well as finance because of its advantage of the security, efficiency and applicability. In the blockchain, it was considered safe against 51% attack because the adversary could not have more than 50% hash power. However, there have been cases caused by large-scale computing attacks such as 51% and selfish mining attack, and the frequency of these attacks is increasing. In addition, since the development of quantum computers can hold exponentially more information than their classical computer, it faces a new type of threat using quantum algorithms. In this paper, we perform the security analysis of blockchain attacks composing the large computing capabilities including quantum computing attacks. Finally, we suggest the technologies and future direction of the blockchain development in order to be safe against large-scale computing attacks.

A Tag Response Loss Detection Scheme for RFID Group Proof (RFID 그룹증명을 위한 응답손실 감지기법)

  • Ham, Hyoungmin
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.637-645
    • /
    • 2019
  • The RFID group proof is an extension of the yoking proof proving that multiple tags are scanned by a reader simultaneously. Existing group proof schemes provide only delayed tag loss detection which detects loss of tag response in a verification phase. However, delayed tag loss detection is not suitable for real-time applications where tag loss must be detected immediately. In this study, I propose a tag response loss detection scheme which detects loss of tag response in the proof generation process quickly. In the proposed scheme, the tag responds with the sequence number assigned to the tag group, and the reader detects the loss of the tag response through the sequence number. Through an experiment for indistinguishability, I show that the sequence number is secure against an analyzing message attack to distinguish between specific tags and tag groups. In terms of efficiency, the proposed scheme requires fewer transmissions and database operations than existing techniques to determine which tags response is lost.

Site Selection Method by AHP-based Artificial Neural Network Model for Groundwater Artificial Recharge (AHP 기반의 인공신경망 모델을 활용한 지하수 인공함양 후보지 선정 방안)

  • Kim, Gyoo-Bum;Choi, Myoung-Rak;Seo, Min-Ho
    • The Journal of Engineering Geology
    • /
    • v.28 no.4
    • /
    • pp.741-753
    • /
    • 2018
  • Local drought in South Korea has recently increased interest in the efficient use of groundwater and then induces a growing need to introduce artificial recharge of groundwater that stores water in sedimentary layer. In order to evaluate the potential artificial recharge sites in the alluvial basins in Chungcheongnamdo province, an AHP (Analytical hierarchy process) model consisting of three primary and seven secondary factors was developed in this study. In the AHP model, adding candidate sites changes final evaluation score through a mathematical calculation process. By contrast ANN (Artificial neural network) model always provides an unchanged score for each candidate area. Therefore, the score can be used as a selection criterion for artificial recharge sites. It is concluded that the possibility of artificial recharge is relatively low if the score of the ANN model is less than about 1.5. Further studies and field surveys on the other regions in Korea will lead to draw out a more applicable ANN model.

A design of a Vehicle Analysis System using cloud and data mining (클라우드와 데이터 마이닝을 이용한 차량 분석 시스템 설계)

  • Jeong, Yi-Na;Son, Su-rak;Kim, Kyung-Deuk;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.238-241
    • /
    • 2019
  • In this paper, a "Vehicle Analysis System(VAS) using cloud and data mining" is proposed that store all the sensor data measured in the vehicle in the cloud, analyze the stored data using the classification model, and provide the analyzed data in real time to the driver's display. The VAS consists of two modules. First, Sensor Data Communication Module(SDCM) stores the sensor data measured in the vehicle in a table of the cloud server and transfers the stored data to the analysis module. Second, Sensor Data Analysis Module(SDAM) analyzes the received data using the genetic algorithm and provides analyzed result to the driver in real time. The VAS stores sensor data collected in the vehicle in the cloud server without accumulating it in the vehicle, and stored data is analyzed in the cloud server, so that the sensor data can be quickly and efficiently managed without overloading the vehicle. In addition, the information desired by the driver can be visualized on the display, thereby increasing the stability of the autonomous vehicle.

  • PDF