• Title/Summary/Keyword: Implementation Table

Search Result 411, Processing Time 0.025 seconds

Design and Implementation of Digital Photo Kiosk System with Auto Color Correction Module (자동 컬러 보정 모듈을 가진 디지털 포토 키오스크 시스템의 설계 및 구현)

  • Park Tae-Yong;Lee Myong-Young;Park Kee-Hyon;Ha Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.48-56
    • /
    • 2006
  • This paper introduces design and implementation of digital photo kiosk system, digital photo printing system, with auto color correction module that considers gamut between touch screen and output device, digital photo printer, to provide user-preferred media. This module performs media correction function to service high quality contents for image captured by digital camera and mobile phone camera. Since it is implemented as LUT for real-time processing, the system offers one-touch interface to user. As a result of implementation, this kiosk system provides user-favorite photo because of black and white mode, sepia mode, and brightness and contrast adjustment. Also it can gives smooth tone transition and photos of similar color to captured image due to auto color correction module.

A design and implementation of DIDL mapping system preserving semantic constraints (의미적 제약조건을 보존하는 DIDL 매핑 시스템의 설계 및 구현)

  • 송정석;김우생
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5B
    • /
    • pp.482-490
    • /
    • 2004
  • Recently, XML has been emerging as a standard for storing and exchanging of data for various distributed applications based on the Internet. Since there are increasing demands to store and manage XML documents, a lot of research works are going on this area to develop new took and techniques based on the XHL. However, most of the researches are concentrated on mapping techniques based on instance or DTD, and the main focus is on structural transformation. Current trend of research is toward the usage of XML documents based on XML schema, and demands not only conversion of structure but also preservation of the semantic constraints. This paper sets up the using of DIDL standing on the basis of XML schema from MPEG-21 as an application domain, and proposes the mapping model that can preserve semantic constraints in addition. We expand previous research techniques in the preprocessing step for the specific domain, and then, apply various new mapping methods in the postprocessing step. We present and discuss the system architecture for implementation, and introduce the algorithms and present implementation environment and semantic extension methodology in detail. Finally we show actual table and query processing based on our proposal.

A Study on the Development of Emergency Medical Dispatch Information System using ASP (응급통신관리 정보시스템 구축과 ASP 활용에 관한 연구)

  • Choi, Keun-Myung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.27-37
    • /
    • 2002
  • The health and medical service attracts more public attention as the economy of Korea is rapidly growing up and the standard of living is elevated. Especially, the interest and demand on the prehospital emergency medical service that consists of the important part of primary medical service that is directly related to the life of patients are gradually increased. However, as compared with other advanced countries such as America in this area, Korea actually fell behind in the utilization of IT (Information Technology) to maximize the efficiency of emergency service system as well as has a problem in the general service system. This study suggested the necessity to introduce EMD (Emergency Medical Dispatch) system that takes a great role as the core part in the prehospital emergency medical service that is not systemized in Korea yet. In addition, this study proposed the implementation model of EMD ASP system using ASP (Application Service Provider) in EMD system to flexibly deal with the change of IT and efficient implementation and integration of information system as well as to significantly reduce cost through wire/wireless high speed Internet network that is politically promoted in Korea on the basis of EMD. The system analysis and design was executed by HIPO (Hierarchy Plus Input Process Output) analysis that was the conceptual design technology for EMD information system modeling based on ASP and DFD (Data Flow Diagram). This study proposed DB table configuration and data schema to implement the application of web browser interface in EMD system through ERD(ER-Diagram) of EMD ASP system. Finally, this study described how to implement and utilize EMD information system. This study aims to facilitate the qualitative development of emergency medical service in the future as suggesting the concrete models for the implementation of high value-added prehospital emergency medical information system as applying ASP concept to EMD system of prehospital emergency medical service area.

  • PDF

A Design and Implementation of IRDS-based Repository on Distributed Object Environment (분삭객체 환경에서의 IRDS 기반 정보저장소 설계 및 구현)

  • Yeom, Tai-Jin;Park, Jae-Hyoung;Li, Zi;Kim, Ki-Bong;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.6
    • /
    • pp.1433-1446
    • /
    • 1999
  • A repository s a system for management not only simple information using database but also complex and various information resources. a standard for implementation of a repository is now IRDS, but is does not support distributed-object environment. Therefore, in this paper, we design and implement IRDS-based repository on distributed-object environment. For implementation, we use ISO IRDS as a repository supporting object-oriented concepts, and choice the CORBA to support the distributed-object technology. Implemented contents are metadata table and service interface based on core functionality to be proposes at IRDS, and window-based user interface to use them, Also, we apply it to the workflow management system and test its practical usefulness.

  • PDF

Hardware Design of SNR Estimator for Adaptive Satellite Transmission System (적응형 위성 전송 시스템을 위한 신호 대 잡음비 추정 회로 구현)

  • Lee, Jae-Ung;Kim, Soo-Seong;Park, Eun-Woo;Im, Chae-Yong;Yeo, Sung-Moon;Kim, Soo-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2A
    • /
    • pp.148-158
    • /
    • 2008
  • This paper proposes an efficient signal to noise ratio (SNR) estimation algorithm and its hardware implementation for adaptive transmission system using M-ary modulation scheme. In this paper, we present the implementation results of the proposed algorithm for the second generation digital video broadcasting via satellite (DVB-S2) system, and the proposed algorithm can be tailored to the other communication systems using adaptive transmissions. We built a look-up table (LUT) using the theoretical background of the received signal distribution, and by using this LUT we need just two comparators and a counter for the hardware implementation. For this reason, the hardware of the proposed scheme produces accurate estimation results even with extremely low complexity. The simulation results investigated in this paper reveal that the proposed method can produce estimation results within the specified SNR range in the DVB-S2 system, and it requires a few hundreds of samples for average estimation error of about 1 dB.

Implementation of Security Plan from .NET Remoting Environment (닷넷 리모팅 환경에서의 보안 방안 구현)

  • Kim, Young-Sear
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.256-261
    • /
    • 2009
  • While .NET and J2EE bisects recent distributed environment, .NET displays "Remoting" as a technology to call remote object. Remoting is frequently used as a protocol in OLTP's WEB program development in form of RPC that exchange data in XML form under HTTP environment. Purpose of this research is to draw problems when applying security to .NET remoting technology that is recently used in web programming, and to find effective application plan by implementing. The main discussion is following. First, network layer security should be replaced to application layer security for better performance and flexibility. Second, the serialization procedure that is repeated in both remoting and encryption module should take place once. Lastly, implementation of "Surrogate" and "Compress" will be discussed that enables to eliminate unnecessary data(table relations, keys, etc) that is used in dataset object of .NET in order to reduce the size of data. It is possible to achieve improvement in speed by two times through immediate implementation in these cases. In order for easier use, component based framework should be supplied hereafter.

  • PDF

Speed-optimized Implementation of HIGHT Block Cipher Algorithm (HIGHT 블록 암호 알고리즘의 고속화 구현)

  • Baek, Eun-Tae;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.495-504
    • /
    • 2012
  • This paper presents various speed optimization techniques for software implementation of the HIGHT block cipher on CPUs and GPUs. We considered 32-bit and 64-bit operating systems for CPU implementations. After we applied the bit-slicing and byte-slicing techniques to HIGHT, the encryption speed recorded 1.48Gbps over the intel core i7 920 CPU with a 64-bit operating system, which is up to 2.4 times faster than the previous implementation. We also implemented HIGHT on an NVIDIA GPU equipped with CUDA, and applied various optimization techniques, such as storing most frequently used data like subkeys and the F lookup table in the shared memory; and using coalesced access when reading data from the global memory. To our knowledge, this is the first result that implements and optimizes HIGHT on a GPU. We verified that the byte-slicing technique guarantees a speed-up of more than 20%, resulting a speed which is 31 times faster than that on a CPU.

Implementation of Fixslicing AES-CTR Speed Optimized Using Pre-Computed on 32-Bit RISC-V (32-bit RISC-V 상에서의 사전 연산을 활용한 Fixslicing AES-CTR 속도 최적화 구현)

  • Eum, Si-Woo;Kim, Hyun-Jun;Sim, Min-Joo;Song, Gyeong-Ju;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Fixslicing AES is a technique that omits the Shiftrows step to minimize the cost of the linear layer of Bitsliced AES, showing a 30% performance over the Bitsliced technique. However, the amount of code increases to compensate for the omitted shiftrows. Therefore, it is proposed to be divided into Semi-Fixsliced in which only half of shiftrows are omitted and Fully-Fixsliced in which Shiftrows are omitted completely. In this paper, we propose a CTR mode implementation of Fixslicing AES on RISC-V using the pre-computed table technique. By utilizing the characteristics of the CTR mode, it is possible to perform fast encryption by omitting up to the second round SubBytes from the encryption process through pre-computed up to the second round SubBytes operation. Using this technique, it was confirmed that Semi-Fixsliced has a performance of 1,345 cycles per block and a performance improvement of 7% compared to the previous performance result, and Fully-Fixsliced has a performance of 1,283 cycles per block and a performance of 9% compared to the previous performance result on 32-bit RISC-V.

A White Box Implementation of Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 화이트박스 구현 기법)

  • Ham, Eunji;Lee, Youngdo;Yoon, Kisoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.751-763
    • /
    • 2022
  • With the recent increase in spending growth in the IoT sector worldwide, the importance of lightweight block ciphers to encrypt them is also increasing. The lightweight block cipher PIPO algorithm proposed in ICISC 2020 is an SPN-structured cipher using an unbalanced bridge structure. The white box attack model refers to a state in which an attacker may know the intermediate value of the encryption operation. As a technique to cope with this, Chow et al. proposed a white box implementation technique and applied it to DES and AES in 2002. In this paper, we propose a white box PIPO applying a white box implementation to a lightweight block cipher PIPO algorithm. In the white box PIPO, the size of the table decreased by about 5.8 times and the calculation time decreased by about 17 times compared to the white box AES proposed by Chow and others. In addition, white box PIPO was used for mobile security products, and experimental results for each test case according to the scope of application are presented.

A Study on the Development Strategy of Animal Resources Industry in Chungnam Province (충청남도의 동물자원화사업 발전전략에 관한 연구)

  • Choe, Pyeong-Ik;Kim, Gye-Woong;Kim, Seok-Eun
    • Journal of Agricultural Extension & Community Development
    • /
    • v.11 no.2
    • /
    • pp.267-277
    • /
    • 2004
  • This study was carried out to set up the effective development strategy for resources industry of Chungnam Province. Data were gathered from relevant organizations and several times of brain storming was conducted by specialists in the field of animal science. The results obtained were as follows; 1) It was found by SWOT analysis that pig, cow, poultry, pets and selected fishes were desirable items as promising animal resources(Table 9). 2) According to the road map of animal resources industry for Chungnam Province, the principles and strategies were needed for the implementation of the industry(Fig. 3). 3) It was recommended that each city and county should develop their major animal resources industry(Fig. 4). 4) For synergy effect of development strategy as animal resources industry, networking among universities, industries, and government organizations, etc. is needed.

  • PDF