• Title/Summary/Keyword: Lightweight Data

Search Result 389, Processing Time 0.03 seconds

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

The Influence of the Interval of Polka Dots on the Image of Clothes - Focused on One-Piece Dress - (물방울무늬의 간격이 의복이미지에 미치는 영향 - 원피스드레스를 중심으로 -)

  • Choi, Hye-Won;Ryoo, Sook-Hee
    • Fashion & Textile Research Journal
    • /
    • v.9 no.3
    • /
    • pp.278-285
    • /
    • 2007
  • The purpose of this study is the image of clothing according to the change of the dots' interval was analyzed and its influence on the formation of the image of polka dots clothing was investigated. White waterdrop patterns were designed on the 12 kinds of black texture using Photoshop and CAD program in regular arrangement of diamond figure, composed of white waterdrop(0.5 cm, 1.0 cm, 1.5 cm and 2 cm in diameter) and interval(diameter : interval - 1 : 1, 1 : 2, 1 : 4). Applying above specification, the photograph stimulus of 12 kinds of X-line one-piece dress with wide square neckline and without sleeve or detailed ornament was presented on a screen in the same size as when putting it on. The image of polka dots clothes was investigated by questionnaire survey. The object of the study was 320 females aged between 16 and 29. Factor analysis, one-way ANOVA, Scheff$\acute{e}$ verication and two-way ANOVA using SPSS 10.0 were carried out for data analysis. The research finding are as follows. First, the image of polka dots clothing consists of 4 factors as aesthetics, brevity, dynamism and lightweight. Secondly, the interval of the dot has a great influence on the formation of the image of polka dots clothing. Lastly, the evaluations of the image of polka dots clothing were different depending on the age and physical image, the personal characteristics of the object of investigation.

Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm (OTP와 일회성 난수를 사용한 AES 알고리즘 기반의 개선된 RFID 상호 인증 프로토콜)

  • Yun, Tae-Jin;Oh, Se-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.163-171
    • /
    • 2011
  • Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh's Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.

A prediction of Ring Frame Composite Properties Using Discretization Method (이산화 기법을 이용한 링프레임 복합재의 기계적 물성 예측)

  • Jeon, Yong Un;Kim, Yong Ha;Kim, Pyung Hwa;Kim, Hwi yeop;Park, Jung Sun
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2017.05a
    • /
    • pp.939-941
    • /
    • 2017
  • The use of composites is increasing for lightweight aerospace structures. Among these structures, the ring frame and the parts of the projectile body are mainly made of a fiber reinforced composite material which is less susceptible such as delamination to structural damage. As the use of fiber reinforced composites increases, interest in modeling efficient methods of stiffness and strength is increasing. This paper predict the mechanical strength according to the repeating unit cell(RUC) of the 2-D triaxial braided composites of fiber reinforced composites. Yarn slice definition, incremental approach and stiffness reduction model were used as strength prediction. Finally, the results of strength prediction are verified by comparing with experimental data of 2-D triaxial braided composites specimens.

  • PDF

An Approach to Constructing an Efficient Entropy Source on Multicore Processor (멀티코어 환경에서 효율적인 엔트로피 원의 설계 기법)

  • Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.61-71
    • /
    • 2018
  • In the Internet of Things, in which plenty of devices have connection to each other, cryptographically secure Random Number Generators (RNGs) are essential. Particularly, entropy source, which is the only one non-deterministic part in generating random numbers, has to equip with an unpredictable noise source(or more) for the required security strength. This might cause an requirement of additional hardware extracting noise source. Although additional hardware resources has better performance, it is needed to make the best use of existing resources in order to avoid extra costs, such as area, power consumption. In this paper, we suggest an entropy source which uses a multi-threaded program without any additional hardware. As a result, it reduces the difficulty when implementing on lightweight, low-power devices. Additionally, according to NIST's entropy estimation test suite, the suggested entropy source is tested to be secure enough for source of entropy input.

An Analysis of Thermal Conductivity of Ceramic Fibrous Insulator by Modeling & Simulation Method I (모델링/시뮬레이션 기법을 이용한 세라믹 섬유 단열재의 열전도도 해석 I)

  • Kang, Hyung;Baek, Yong-Kee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.5 no.1
    • /
    • pp.83-95
    • /
    • 2002
  • Thermal conductivity of ceramic fibrous insulator was analysed and predicted by using the modeling/simulation technique. Ceramic fibrous insulators are widely used as high temperature insulator on account of their lightweight mass and heat resisting properties. Especially it is suitable to protect the high speed aircraft and missiles from severe aero-thermodynamic heating. Thermal conductivity of ceramic fibrous insulator could be determined from the conductive heat transfer and the radiative heat transfer through the insulator. In order to estimate conductive thermal conductivity, homogenization technique was applied, while radiative thermal conductivity was computed by means of random number and radiation probability. Particularly radiation probability can make it possible to estimate the conductivity of fibrous insulator without any experimental constant. The calculated conductivity predicted in the present study have a reasonable accuracy with an average error of 7 percent to experimental data.

IDMMAC: Interference Aware Distributed Multi-Channel MAC Protocol for WSAN

  • Kakarla, Jagadeesh;Majhi, Banshidhar;Battula, Ramesh Babu
    • Journal of Information Processing Systems
    • /
    • v.13 no.5
    • /
    • pp.1229-1242
    • /
    • 2017
  • In this paper, an interference aware distributed multi-channel MAC (IDMMAC) protocol is proposed for wireless sensor and actor networks (WSANs). The WSAN consists of a huge number of sensors and ample amount of actors. Hence, in the IDMMAC protocol a lightweight channel selection mechanism is proposed to enhance the sensor's lifetime. The IDMMAC protocol divides the beacon interval into two phases (i.e., the ad-hoc traffic indication message (ATIM) window phase and data transmission phase). When a sensor wants to transmit event information to the actor, it negotiates the maximum packet reception ratio (PRR) and the capacity channel in the ATIM window with its 1-hop sensors. The channel negotiation takes place via a control channel. To improve the packet delivery ratio of the IDMMAC protocol, each actor selects a backup cluster head (BCH) from its cluster members. The BCH is elected based on its residual energy and node degree. The BCH selection phase takes place whenever an actor wants to perform actions in the event area or it leaves the cluster to help a neighbor actor. Furthermore, an interference and throughput aware multi-channel MAC protocol is also proposed for actor-actor coordination. An actor selects a minimum interference and maximum throughput channel among the available channels to communicate with the destination actor. The performance of the proposed IDMMAC protocol is analyzed using standard network parameters, such as packet delivery ratio, end-to-end delay, and energy dissipation, in the network. The obtained simulation results indicate that the IDMMAC protocol performs well compared to the existing MAC protocols.

Study on the Characteristics of Western Rocker style In Early 20th Century (20세기 초기 서양 흔들의자의 양식적 특징)

  • Lim, Seung-Taek
    • Journal of agriculture & life science
    • /
    • v.45 no.6
    • /
    • pp.21-32
    • /
    • 2011
  • This research is intended to study literatures relating to western rocking chairs style in early 20th century in order to provide basic data of designs for rockers of today in Korea and investigate characteristics of rocking chair from academic, formative and pragmatic perspectives. During the first half of 20th century, western rocking chairs (1925~1945) embodied actively the simple functionalism concept that furniture design must follow functionality considerations. Therefore, bare wood rocking chairs were without any surface decoration and tubular steel frame rocking chairs often included black leather upholstery in a bold attempt to express exposed structure. And the fact that tubular steel produced such lightweight furniture was crucial importance. Many Modernist designer created curvaceous lines of new pattern changes in their furniture. The structure of Modern rocking chair became all-important, for stylistic as well as functional reasons. Designers equated exposed structure of tubular steel and wooden frame with integrity and rationality and create an equalitarian style of design. Especially, designers in the early 20th century did use various brilliantly colored upholstery and wooden frame with simple forms of modern characteristics.

Precedent survey for development of nursing home clothes according to aged society

  • Cha, Su-Joung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.87-96
    • /
    • 2018
  • The purpose of this study was to identify the preferred materials and design characteristics of nursing home clothes in order to collect the basic data necessary for the elderly nursing home clothes. It was to utilize the elderly nursing home clothes considering elderly body shape, hand function, illness. This study was conducted by questionnaire method and SPSS ver. 20.0 program was used. The preference for nursing home clothes material was high for cotton, and it was found that they prefer soft, stretch material, warm feeling material, and lightweight material. In the hygienic aspect, they favored sweat-absorbent materials, and preferred laundry- care-resistant materials with poor wrinkles and dirtiness. The nursing home clothes preferred a two piece form consisting of a round neckline, two pockets on both sides, a waistband of rubber band, long lengths, and a waistline pants. The most important function in the nursing home clothes was recognized as wearing comfort. Aesthetics, symbolism, color and print pattern were recognized as not important functions. Therefore, it is necessary to focus on the functional part such as wearing comfort in the design of the nursing home clothes. The material is also hygienic and comfortable to wear. In the case of the elderly, it is necessary to provide convenience for the wear of clothes through the development of stretchable material and detachment device since the movement range of muscles, arms, and legs is reduced. Based on this study, we will utilize it for the development of nursing home suit considering the characteristics of elderly person in the elderly society. It is to develop functional materials for the elderly in need of nursing home, to develop the pattern considering the elderly body shape, and to develop the desorption device considering the movement of the hand.

The Statistical Analysis of Differential Probability Using GPGPU Technology (GPGPU 기술을 활용한 차분 확률의 통계적 분석)

  • Jo, Eunji;Kim, Seong-Gyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.477-489
    • /
    • 2019
  • In this paper, we experimentally verify the expected differential probability under the markov cipher assumption and the distribution of the differential probability. Firstly, we validate the expected differential probability of 6round-PRESENT of the lightweight block cipher under the markov cipher assumption by analyzing the empirical differential probability. Secondly, we demonstrate that even though the expected differential probability under the markov cipher assumption seems valid, the empirical distribution does not follow the well-known distribution of the differential probability. The results was deduced from the 4round-GIFT. Finally, in order to analyze whether the key-schedule affects the mis-matching phenomenon, we collect the results while changing the XOR positions of round keys on GIFT. The results show that the key-schedule is not the only factor to affect the mis-matching phenomenon. Leveraging on GPGPU technology, the data collection process can be performed about 157 times faster than using CPU only.