• Title/Summary/Keyword: 코드 전송

Search Result 761, Processing Time 0.037 seconds

Array Localization for Multithreaded Code Generation (다중스레드 코드 생성을 위한 배열 지역화)

  • Yang, Chang-Mo;Yu, Won-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1407-1417
    • /
    • 1996
  • In recent researches on thread partitioning algorithms break a thread at the long latency operation and merge threads to get the longer threads under the given constraints. Due to this limitation, even a program with little parallelism is partitioned into small-sized threads and context-swithings occur frequently. In the paper, we propose another method array localization about the array name, dependence distance(the difference of accessed element index from loop index), and the element usage that indicates whether element is used or defined. Using this information we can allocate array elements to the node where the corresponding loop activation is executed. By array localization, remote accesses to array elements can be replaced with local accesses to localized array elements. As a resuit,the boundaries of some threads are removed, programs can be partitioned into the larger threads and the number of context switchings reduced.

  • PDF

Prevention Scheme of DDoS Attack in Mobile WiMAX Networks Using Shared Authentication Information (Mobile WiMAX 네트워크에서 공유 인증 정보를 이용한 분산 서비스 거부 공격 방어)

  • Kim, Young-Wook;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.162-169
    • /
    • 2009
  • Message Authentication Code (MAC) assures integrity of messages. In Mobile WiMAX, 128-bit Cipher-based MAC (CMAC) is calculated for management messages but only the least significant half is actually used truncating the most significant 64 bits. Naming these unused most significant 64bits Shared Authentication Information (SAI), we suggest that SAI can be applied to protect the network from DDoS attack which exploits idle mode vulnerabilities. Since SAI is the unused half of CMAC, it is as secure as 64bits of CMAC and no additional calculations are needed to obtain it. Moreover, SAI doesn't have to be exchanged through air interface and shared only among MS, BS, and ASN Gateway. With these good properties, SAI can efficiently reduce the overheads of BS and ASN GW under the DDoS attack.

The SSN and Crosstalk Noise Reduction I/O Interface Scheme Using the P/N-CTR Code (P/N-CTR 코드를 사용한 SSN과 누화 잡음 감소 I/O 인터페이스 방식)

  • Kim, Jun-Bae;Gwon, O-Gyeong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.4
    • /
    • pp.302-312
    • /
    • 2001
  • As the data transfer rate between chips gets higher, both crosstalk and SSN (Simultaneous Switching Noise) deteriorate seriously the performance of a system. The proposed interface scheme uses P-CTR and N-CTR(Positive/Negative Constant Transition Rate) which encodes data at both falling and rising edges, where the transition directions of N-CTR and P-CTR are opposite. And the proposed bus system places two P-CTR drivers and two N-CTR drivers alternatively. In the proposed P/N-CTR interface scheme, the signals of neighboring interconnection lines at both sides of a bus will not switch simultaneously in the same direction, which leads to reduction in the maximum crosstalk and SSN compared to conventional interfaces. For verification of noise reduction of the proposed interface scheme, the scheme is applied to several kinds of bit-wide buses with various interconnection structures, and HSPICE simulation was performed with 0.35 ${\mu}{\textrm}{m}$ SPICE parameters. The simulation results show that in the 32-bit or less wide bus, the maximum SSN and crosstalk are reduced to at least 26.78% and 50%, respectively in comparison with the conventional interface scheme.

  • PDF

Study on signal processing techniques for low power and low complexity IR-UWB communication system using high speed digital sampler (고속 디지털 샘플러 기술을 이용한 저전력, 저복잡도의 초광대역 임펄스 무선 통신시스템 신호처리부 연구)

  • Lee, Soon-Woo;Park, Young-Jin;Kim, Kwan-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.9-15
    • /
    • 2006
  • In this paper, signal processing techniques for noncoherent impulse-radio-based UWB (IR-UWB) communication system are proposed to provide system implementation of low power consumption and low complexity. The proposed system adopts a simple modulation technique of OOK (on-oft-keying) and noncoherent signal detection based on signal amplitude. In particular, a technique of a novel high speed digital sampler using a stable, lower reference clock is developed to detect nano-second pulses and recover digital signals from the pulses. Also, a 32 bits Turyn code for data frame synchronization and a convolution code as FEC are applied, respectively. To verify the proposed signal processing techniques for low power, low complexity noncoherent IR-UWB system, the proposed signal processing technique is implemented in FPGA and then a short-range communication system for wireless transmission of high quality MP3 data is designed and tested.

A Study on Smishing Block of Android Platform Environment (안드로이드 플랫폼 환경에서의 스미싱 차단에 관한 연구)

  • Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.975-985
    • /
    • 2014
  • As financial transactions with a smartphone has become increasing, a myriad of security threats have emerged against smartphones. Among the many types of security threats, Smishing has evolved to be more sophisticated and diverse in design. Therefore, financial institutions have recommended that users doesn't install applications with setting of "Unknown sources" in the system settings menu and install application which detects Smishing. Unfortunately, these kind of methods come with their own limitations and they have not been very effective in handling Smishing. In this paper, we propose a systematic method to detect Smishing, in which the RIL(Radio Interface Layer) collects a text message received and then, checks if message databases stores text message in order to determine whether Smishing malware has been installed on the system. If found, a system call (also known as a hook) is used to block the outgoing text message generated by the malware. This scheme was found to be effective in preventing Smishing as found in our implementation.

A Study on the Performance of the Various Multiple Access for the Mobile Computer Network (이동 컴퓨터 통신망용 다중 엑세스 방식의 성능 연구)

  • 백지현;조동호;이영웅
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.7
    • /
    • pp.641-655
    • /
    • 1992
  • In this paper, the performance of the various multiple accesstechniques for the mobile computer network has been studied in the consideration of the characteristics. Of the mobile communication channel. In the case of the hidden node occurring, it could be seen that the performance of the code division multiple access(CDMA) technique. With simultaneous access function is better than that of the other packet access methods such as carrier sensed multiple access(CAMA). Busy tone mulitiple access(BTMA)and idle signal muitiple access(ISMA) in the view of the throuhtput and mean delay time. Also it has been shown that the performance of the CDMA method is superior to that of other packet access techniques such as multiple access(CSMA).etc when the fading effect or impulsive noise exists in the mobile channel. Especially in the case of the distributed mobile network. It has been shown that the receiver-transmitter based CDMA method using the characteristics of CDMA effectively has better throughput and less mean delay time than the commontransmitter based CDMA technique.

  • PDF

Secrecy Performance Analysis of One-Bit Feedback-Based OSTBC in Cross-Polarized MIMO Channels (교차 편파를 이용한 MIMO 채널에서 1-비트 피드백 기반 OSTBC의 물리계층 보안 성능 분석)

  • Lee, Sangjun;Lee, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.301-307
    • /
    • 2015
  • In this paper, we consider wiretap channels in the presence of an eavesdropper assuming spatially correlated MIMO(multiple-input multiple-output) channels, where we analyze a physical layer security performance of orthogonal space-time block code(OSTBC) using one-bit feedback assuming cross polarized antennas at each node. In this paper, we present a method to select a transmit-antenna group for OSTBC using one-bit feedback(O-OSTBC) and compare secrecy outage probabilities of various transmit-antenna grouping methods. Especially, we propose an efficient transmit-antenna grouping method by comparing secrecy outage probabilities of O-OSTBC and conventional OSTBC in highly correlated MIMO channels.

Constant Time RMESH Algorithm for Linear Translation of Linear Quadtrees (선형 사진트리의 선형이동을 위한 상수시간 RMESH 알고리즘)

  • Kim, Kyung-Hoon;Woo, Jin-Woon
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.207-214
    • /
    • 2003
  • Quadtree, which is a hierarchical data structure, is a very important data structure to represent binary images. The linear quadtree representation as a way to store a quadtree is efficient to save space compared with other representations. Therefore, it has been widely studied to develop efficient algorithms to execute operations related with quadtrees. The linear translation is one of important operations in image processing, which moves the image by a given distance. In this paper, we present an algorithm to perform the linear translation of binary images represented by quadtrees, using three-dimensional $n{\times}n{\times}n$ processors on RMESH (Reconfigurable MESH). This algorithm has constant-time complexity by using efficient basic operations to route the locational codes of quardtree on the hierarchical structure of n${\times}$n${\times}$n RMESH.

Context-Aware System for Status Monitoring of Industrial Automation Equipment (산업 자동화 장비의 상태감시를 위한 상황인지 시스템)

  • Kim, Kyung-Nam;Jeon, Min-Ho;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.552-555
    • /
    • 2010
  • In this paper, we propose a context-aware system using wireless multi sensor module to monitor the state for industrial factory environment. Wireless multi sensor module combines sensing values which are collected from each acceleration, pressure, temperature and gas sensors. Moreover, it delivers this data to server after being encoded by RS code. Thereafter, RS decoder decodes the values that are received from wireless multi sensor module and fixes errors which occur in wireless communication. Based on decoded data, context-aware algorithm sets critical range and compares it to the sensing values, if the sensing values are out of the range, an event occurs by the algorithm. At the same time, if there is another sensing value which is out of the range for standby time T seconds, the algorithm orders 3 steps-alarm to occur depending on each situation. Through this system, it becomes eventually possible to monitor machines' condition effectively. From the simulation, we confirm that this system is efficient to status monitoring of industrial automation equipment.

  • PDF

User Visit Certification System using Inaudible Frequency

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.57-64
    • /
    • 2021
  • In this paper, we propose and test the efficacy of an easy-to-use user location certification system for public places that relies on frequencies outside the audible range for humans. The inaudible frequencies come in signal frequency between 18-20 kHz and are generated by general audio speaker. After an individual's smart device detects the signal frequency, it sends the frequency value, user's personal ID, and user's location to a system server that certifies the user's visit location currently. The system server then saves a user visit record and categorizes it by individual. To show the usefulness of this proposed system, we developed a user visit certification application for smart devices linked to a system server. We then conducted a user visit certification experiment using the proposed system, with the result showing 99.6% accuracy. For a comparison, we then held a user visit certification experiment using a QR code, which confirmed that our proposed system performs better than QR code location certification. This proposed system can thus provide restaurants and other facilities reliable user contact tracing and electronic visitor access lists in the age of COVID-19.