• Title/Summary/Keyword: Lightweight Data

Search Result 389, Processing Time 0.03 seconds

Middleware Architecture for Open Control Systems in the Distributed Computing Environment

  • Lee, Wongoo;Park, Jaehyun
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.3 no.3
    • /
    • pp.190-195
    • /
    • 2001
  • The advance of computer, network, and Internet technology enables the control systems to process the massive data in the distributed computing environments. To implement and maintain the software in distributed environment, the component-based methodology is widely used. This paper proposes the middleware architecture for the distributed computer control system. With the proposed middleware services, it is relatively easy to maintain compatibility between products and to implement a portable control application. To achieve the compatibility between heterogeneous systems, the proposed architecture provides the communication protocols based on the XML with lightweight event-based service.

  • PDF

Micromechanical Models for the Evaluation of Elastic Moduli of Concretes (콘크리트 탄성계수 추정의 미시역학적 모델)

  • 조호진;송하원;변근주
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1997.04a
    • /
    • pp.383-391
    • /
    • 1997
  • The prediction of effective properties of heterogeneous material like concrete is of primary importance in design or analysis. This paper os about micromechanice-based evaluation of elastic moduli of concretes considering composite material behavior. In this study, micromechanixe-based schemes for the effective elastic modui of the lightweight foamed concrete and the normal concrete are proposed based on averaging techniques using a single-layered inclusion model and a multi-phase and multi-layered inclusion model. respectively, For the verification's sake, elastic moduli evaluated in this study are compared with experimental data and results by existing formula.

  • PDF

Location-based Support Multi-path Multi-rate Routing for Grid Mesh Networks

  • Hieu, Cao Trong;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1264-1266
    • /
    • 2009
  • We introduce a location-based routing model applied for grid backbone nodes in wireless mesh network. The number of paths with nearest distance between two nodes is calculated and used as key parameter to execute routing algorithm. Node will increase the transmission range that makes a trade off with data rate to reach its neighbors when node itself is isolated. The routing model is lightweight and oriented thanks to the simple but efficient routing algorithm.

A Design of PRESENT Crypto-Processor Supporting ECB/CBC/OFB/CTR Modes of Operation and Key Lengths of 80/128-bit (ECB/CBC/OFB/CTR 운영모드와 80/128-비트 키 길이를 지원하는 PRESENT 암호 프로세서 설계)

  • Kim, Ki-Bbeum;Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1163-1170
    • /
    • 2016
  • A hardware implementation of ultra-lightweight block cipher algorithm PRESENT which was specified as a standard for lightweight cryptography ISO/IEC 29192-2 is described. The PRESENT crypto-processor supports two key lengths of 80 and 128 bits, as well as four modes of operation including ECB, CBC, OFB, and CTR. The PRESENT crypto-processor has on-the-fly key scheduler with master key register, and it can process consecutive blocks of plaintext/ciphertext without reloading master key. In order to achieve a lightweight implementation, the key scheduler was optimized to share circuits for key lengths of 80 bits and 128 bits. The round block was designed with a data-path of 64 bits, so that one round transformation for encryption/decryption is processed in a clock cycle. The PRESENT crypto-processor was verified using Virtex5 FPGA device. The crypto-processor that was synthesized using a $0.18{\mu}m$ CMOS cell library has 8,100 gate equivalents(GE), and the estimated throughput is about 908 Mbps with a maximum operating clock frequency of 454 MHz.

Implementation of a TCP/IP Offload Engine Using Lightweight TCP/IP on an Embedded System (임베디드 시스템상에서 Lightweight TCP/IP를 이용한 TCP/IP Offload Engine의 구현)

  • Yoon In-Su;Chung Sang-Hwa;Choi Bong-Sik;Jun Yong-Tae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.7
    • /
    • pp.413-420
    • /
    • 2006
  • The speed of present-day network technology exceeds a gigabit and is developing rapidly. When using TCP/IP in these high-speed networks, a high load is incurred in processing TCP/IP protocol in a host CPU. To solve this problem, research has been carried out into TCP/IP Offload Engine (TOE). The TOE processes TCP/IP on a network adapter instead of using a host CPU; this reduces the processing burden on the host CPU. In this paper, we developed two software-based TOEs. One is the TOE implementation using an embedded Linux. The other is the TOE implementation using Lightweight TCP/IP (lwIP). The TOE using an embedded Linux did not have the bandwidth more than 62Mbps. To overcome the poor performance of the TOE using an embedded Linux, we ported the lwIP to the embedded system and enhanced the lwIP for the high performance. We eliminated the memory copy overhead of the lwIP. We added a delayed ACK and a TCP Segmentation Offload (TSO) features to the lwIP and modified the default parameters of the lwIP for large data transfer. With the aid of these modifications, the TOE using the modified lwIP shows a bandwidth of 194 Mbps.

Reserch On The Fundamental Technology To Utilization Of Platform To Providing Mobile Underground Geospatial Infomation Map (모바일용 지하공간통합지도 제공 플랫폼 활용을 위한 기반 기술 연구)

  • LEE, Tae-Hyung;KIM, Hyun-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.23 no.4
    • /
    • pp.173-183
    • /
    • 2020
  • In the midst of the aging of underground facilities in urban areas and anxiety about road excavation safety accidents, the Ministry of Land, Infrastructure and Transport began to build Underground Geospatial Infomation Map from 2015 as part of the 「ground subsidence prevention measures」 and efficient use of underground spaces. So, the scope is spreading every year. The current Underground Geospatial Infomation Map information is web-based and is operated in a desktop environment, so it is true that there are some limitations in its use in a field environment such as an excavation construction site. The Underground Geospatial Infomation Map, built and operated in a web-based environment, is a large-scale 3D data. Therefore, in order to service by transmitting data to the field without delay, it is necessary to lighten the Underground Geospatial Infomation Map data. In addition, the current Underground Geospatial Infomation Map is not unified in data formats such as 3DS and COLLADA, and the coordinate system method is also different in relative coordinates and absolute coordinates. In this study, by analyzing domestic and overseas prior research and technical use cases, a mobile Underground Geospatial Infomation Map data format and a lightweight method were presented, and a technology development was conducted to create a mobile underground space integration map in the presented format. In addition, the weight reduction rate was tested by applying 3D data compression technology so that data can be transmitted quickly in the field, and technology was developed that can be used by decompressing 3D data compressed in the field. finally, it aims to supplement the technology experimentally developed in this study and conduct additional research to produce it as software that can be used in the excavation site and use it.

Conference System for CAD Based on Product Data Standard (제품 데이터 표준에 기반한 원격회의 지원 시스템)

  • Choi, Young;Yang, Sang-Wook
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.3
    • /
    • pp.200-209
    • /
    • 1999
  • This paper presents a 3D-conferencing system as a prototype implementation of concurrent and distributed engineering environment using CORBA-Java and SDAI-Java. The system consists of some client and server objects that communicate with each other via ORB. The server objects use lightweight version of current working draft of SDAI-Java to access STEP product data models, and the client objects provide user-friendly graphical interface. The proposed system can be used for communicating with 3D CAD data between remote designers, manufactures and customers regardless of he H/W or S/W platforms they use.

  • PDF

Design and Implementation of CoAP based Cloud-IoT Architecture (CoAP 기반 클라우드 환경 IoT 구조 설계 및 구현)

  • Park, Young-Ki;Yang, Hyun-Sik;Kim, Young-Han
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.3
    • /
    • pp.119-127
    • /
    • 2015
  • In the IoT(Internet of Things) environment, methods that user can access sensor node directly to collect sensing data or manage sensor in a gateway have a limitations. To solve this problem, cloud based sensor network architectures are proposed. In this paper, we proposed CoAP based IoT architecture that a lightweight gateway is used for data gathering instead of using a heavy traditional one and users can request sensing data through IoT applications running in the cloud environment and analyze signaling message cost. By doing so, our system can reduce message cost compared to the traditional gateway based system.

Blockchain-based IoT Authentication techniques for DDoS Attacks

  • Choi, Wonseok;Kim, Sungsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.87-91
    • /
    • 2019
  • In the IoT(Internet of Things) environment, various devices are utilized and applied for different sites. But attackers can access easy to IoT systems, and try to operate DDoS(Distributed Denial-of-Service) attacks. In this paper, Sensor nodes, Cluster heads, and Gateways operates lightweight mutual authentication each others. Since authenticated sensor nodes and cluster heads only send transactions to Gateways, proposed techniques prevent DDoS attacks. In addition, the blockchain system contains secure keys to decrypt data from sensor nodes. Therefore, attackers can not decrypt the data even if the data is eavesdropped.

A Study on Multi-level Attack Detection Technique based on Profile Table (프로파일 기반 다단계 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.89-96
    • /
    • 2014
  • MANET has been applied to a wide variety of areas because it has advantages which can build a network quickly in a difficult situation to build a network. However, it is become a victim of malicious nodes because of characteristics such as mobility of nodes consisting MANET, limited resources, and the wireless network. Therefore, it is required to lightweight attack detection technique which can accurately detect attack without causing a large burden to the mobile node. In this paper, we propose a multistage attack detection techniques that attack detection takes place in routing phase and data transfer phase in order to increase the accuracy of attack detection. The proposed attack detection technique is composed of four modules at each stage in order to perform accurate attack detection. Flooding attack and packet discard or modify attacks is detected in the routing phase, and whether the attack by modification of data is detected in the data transfer phase. We assume that nodes have a public key and a private key in pairs in this paper.