• Title/Summary/Keyword: Extension block

Search Result 168, Processing Time 0.031 seconds

High Performance HIGHT Design with Extended 128-bit Data Block Length for WSN (WSN을 위한 128비트 확장된 데이터 블록을 갖는 고성능 HIGHT 설계)

  • Kim, Seong-Youl;Lee, Je-Hoon
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.124-130
    • /
    • 2015
  • This paper presents a high performance HIGHT processor that can be applicable for CCM mode. In fact, HIGHT algorithm is a 64-bit block cipher. However, the proposed HIGHT extends the basic block length to 128-bit. The proposed HIGHT is operated as 128-bit block cipher and it can treat 128-bit block at once. Thus, it can be applicable for the various WSN applications that need fast and ultralight 128-bit block cipher, in particular, to be operated in CCM mode. In addition, the proposed HIGHT processor shares the common logics such as 128-bit key scheduler and control logics during encryption and decryption to reduce the area overhead caused by the extension of data block length. From the simulation results, the circuit area and power consumption of the proposed HIGHT are increases as 40% and 64% compared to the conventional 64-bit counterpart. However, the throughput of the proposed HIGHT can be up to two times as fast. Consequently, the proposed HIGHT is useful for USN and handheld devices based on battery as well as RFID tag the size of circuit is less than 5,000 gates.

How to Detect and Block Ransomware with File Extension Management in MacOS (MacOS에서 파일확장자 관리를 통한 랜섬웨어 탐지 및 차단 방법)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.251-258
    • /
    • 2017
  • Most malware, including Ransomware, is built for the Windows operating system. This is because it is more harmful to target an operating system with a high share. But in recent years, MacOS's operating system share has steadily increased. As people become more and more used, the number of malicious code running on the MacOS operating system is increasing. Ransomware has been known to Korea since 2015, and damage cases are gradually increasing. MacOS is no longer free from Ransomware, as Ransomware for MacOS was discovered in March 2016. In order to cope with future Ransomware, this paper used Ransomware's modified file extension to detect Ransomware. We have studied how to detect and block Ransomware processes by distinguishing between extensions changed by the user and extensions changed by the Ransomware process.

Geologic Structure of the Anatolian Peninsula: Tectonic Growth of Collisional Continental Margins (아나톨리아 반도의 지질구조: 대륙 충돌에 따른 구조적 성장)

  • Ryu, In-Chang
    • Economic and Environmental Geology
    • /
    • v.45 no.4
    • /
    • pp.465-476
    • /
    • 2012
  • The Anatolia peninsula consists of several continental fragments that include the Pontide Block in north and the Anatolide-Touride Block in south as well as the Arabian Platform in southeast. These continental blocks were joined together into a single landmass in the late Tertiary. During most of the Phanerozoic these continental blocks were separated by paleo-oceans, such as Paleo-Tethys and Neo-Tethys. The Pontide Block in north show Laurasian affinities, and was only slightly affected by the Alpide orogeny; they preserve evidence for the Variscan and Cimmeride orogenies. The Pontic Block is composed of the Strandja, Istanbul and Sakarya zones that were amalgamated into a single terrane by the mid Cretaceous times. The Anatolide-Tauride Block in south shows Gondwana affinities but was separated from Gondwana in the Triassic and formed an extensive carbonate platform during the Mesozoic. The Anatolide-Tauride Block was intensely deformed and partly metamorphosed during the Alpide orogeny; this leads to the subdivision of the Anatolide-Tauride Block into several zones on the basis of the type and age of metamorphism and deformation. The Arabian Platform in southeast forms the northernmost extension of the Arabian Plate that shows a stratigraphy similar to the Anatolide-Tauride Block with a clastic-carbonate dominated Palaeozoic and a carbonate dominated Mesozoic succession. A new tectonic era started in Anatolia Peninsula in the Oligocene-Miocene after the final amalgamation of these continental blocks and plate. This neotectonic phase is characterized by extension, and strike-slip faulting, continental sedimentation, and widespread calcalkaline magmatism, which played a very important role in producing beautiful landscapes of the Anatolia Peninsula today.

An Effect of Number of Passes in Wire-Cut Electric Discharge Machining on Fine Blanking Dies and Products (와이어 컷 방전가공에서 방전가공횟수가 파인 블랭킹 금형과 제품에 미치는 영향)

  • 유헌일;김세환;최계광
    • Transactions of Materials Processing
    • /
    • v.6 no.3
    • /
    • pp.192-202
    • /
    • 1997
  • This study presents an effect of number of passes in wire-cut electric discharge machining on fine blanking dies and products. Three part fine blanking dies were produced by the difference of numbers of passes discharge machining. Brake pad was produced, through the die produced like that, the objective of this study is the improvement in surface roughness of die block and punch, life extension of die block, the decrease of second fracture dimensions, the rise of productive.

  • PDF

The Control of Instrument's Process based on eXtension Block Markup Language (XBML) (확장 블록 기반의 장비 프로세스 제어 연구)

  • 심민석;유대승;박성규;김종환;이명재
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.709-711
    • /
    • 2003
  • 본 논문은 확장 블록(extension Block) 개념을 사용하여 분산 장비들에 대한 중앙 집중적인 제어 모델을 제시한다. 이런 확장 블록은 OPC와 XML 기술을 사용하여 상위 레벨에서의 추상화를 기법을 사용하여 모델링 함으로써, OPC의 기반 기술인 COM(Common Object Model) 기술과 언어 중립적인 XML 기술이 가지는 이점을 충분히 활용할 수 있는 구조로 디자인 되었다.

  • PDF

Block-Based Predictive Watershed Transform for Parallel Video Segmentation

  • Jang, Jung-Whan;Lee, Hyuk-Jae
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.2
    • /
    • pp.175-185
    • /
    • 2012
  • Predictive watershed transform is a popular object segmentation algorithm which achieves a speed-up by identifying image regions that are different from the previous frame and performing object segmentation only for those regions. However, incorrect segmentation is often generated by the predictive watershed transform which uses only local information in merge-split decision on boundary regions. This paper improves the predictive watershed transform to increase the accuracy of segmentation results by using the additional information about the root of boundary regions. Furthermore, the proposed algorithm is processed in a block-based manner such that an image frame is decomposed into blocks and each block is processed independently of the other blocks. The block-based approach makes it easy to implement the algorithm in hardware and also permits an extension for parallel execution. Experimental results show that the proposed watershed transform produces more accurate segmentation results than the predictive watershed transform.

A Study on Sequential Digital Logic Systems and Computer Architecture based on Extension Logic (확장논리에 기초한 순차디지털논리시스템 및 컴퓨터구조에 관한 연구)

  • Park, Chun-Myoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.15-21
    • /
    • 2008
  • This paper discuss the sequential digital logic systems and arithmetic operation algorithms which is the important material in computer architecture using analysis and synthesis which is based on extension logic for binary logic over galois fields. In sequential digital logic systems, we construct the moore model without feedback sequential logic systems after we obtain the next state function and output function using building block T-gate. Also, we obtain each algorithms of the addition, subtraction, multiplication, division based on the finite fields mathematical properties. Especially, in case of P=2 over GF($P^m$), the proposed algorithm have a advantage which will be able to apply traditional binary logic directly.The proposed method can construct more efficiency digital logic systems because it can be extended traditional binary logic to extension logic.

  • PDF

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

A Zipper-based VDSL Modem with an Efficient Cyclic Extension (효율적 Cyclinc Extension을 갖는 Zipperqkdtlr의 VDSL 모뎀)

  • 위정욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10B
    • /
    • pp.1793-1802
    • /
    • 2000
  • In this paper we propose an efficient implementation technique for cyclic extension in VDSL(Very High bit-rate Digital Subscriber Line) systems using Zipper duplexing and analyze its performances under typical telephone channel environments. In Zipper-based VDSL systems each DTM(discrete-multitone) block is appended by both cyclic prefix(CP) and cyclic suffix(CS). The CP is inserte to prevent both intersymbol interference (ISI) and iterchannel interference (ICI) while the CS is appended to ensure orthogonality between the upstream and downstream carriers thus preventing near-end crosstalk (NEXT). However in order to implement the CP in the transmitter side of the VDSL system an additional hardware is required to append the latter part of each DMT symbol to the beginning of the DMT symbol. In this paper we propose a VDSL system with Zipper duplexing using only CS to reduce hardware complexity (memory and processing delay) required for implementation of CP. It is shown by computer simulation that the proposed approach has the same capacity under typical channel environments as the previous Zipper-based VDSL system using both CP and CS. even with a significantly lower hardware complexity.

  • PDF

Nonparametric method using placement in a randomized complete block design (랜덤화 블록 계획법에서 위치를 이용한 비모수 검정법)

  • Sim, Sujin;Kim, Dongjae
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1401-1408
    • /
    • 2013
  • Kim and Kim (1992) proposed typical nonparametric method for umbrella alternative in randomized block design with replications. In this paper, We consider a test procedure for umbrella alternatives in a randomized block design using extension of the two sample placement tests described in Orban and Wolfe (1982) and treatment tests described in Kim (1999). We perform a Monte Carlo study to compare the empirical powers of the test statistics for underlying distributions.