• Title/Summary/Keyword: Primitive-모듈

Search Result 18, Processing Time 0.02 seconds

EmXJ : A Framework of Configurable XML Processor for Flexible Embedding (EmXJ : 유연한 임베딩을 위한 XML 처리기 구성 프레임워크)

  • Chung, Won-Ho;Kang, Mi-Yeon
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.467-478
    • /
    • 2002
  • With the rapid development of wired or wireless Internet, various kinds of resource constrained mobile devices, such as cellular phone, PDA, homepad, smart phone, handhold PC, and so on, have been emerging into personal or commercial usages. Most software to be embedded into those devices has been forced to have the characteristic of flexibility rather than the fixedness which was an inherent property of embedded system. It means that recent technologies require the flexible embedding into the variety of resource constrained mobile devices. A document processor for XML which has been positioned as a standard mark-up language for information representation on the Web, is one of the essential software to be embedded into those devices for browsing the information. In this paper, a framework for configurable XML processor called EmXJ is designed and implemented for flexible embedding into various types of resource constrained mobile devices, and its advantages are compared to conventional XML processors.

An Implementation of an SHA-3 Hash Function Validation Program and Hash Algorithm on 16bit-UICC (SHA-3 해시 함수 검정 프로그램과 16bit-UICC 용 SHA-3 구현)

  • Lee, Hee-Woong;Hong, Dowon;Kim, Hyun-Il;Seo, ChangHo;Park, Kishik
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.885-891
    • /
    • 2014
  • A hash function is an essential cryptographic algorithm primitive that is used to provide integrity to many applications such as message authentication codes and digital signatures. In this paper, we introduce a concept and test method for a Cryptographic Algorithm Validation Program (CAVP). Also, we design an SHA-3 CAVP program and implement an SHA-3 algorithm in 16bit-UICC. Finally, we compare the efficiency of SHA-3 with SHA-2 and evaluate the exellence of the SHA-3 algorithm.

On the ${\kappa}$-Error Linear Complexity of $p^m$-Periodic Binary Sequences and Its Applications to Binary Cyclic Codes ($p^m$-주기 이진 수열의 ${\kappa}$-오류 선형복잡도와 이진 순환 부호에의 응용)

  • Han Yun-Kyoung;Yang Kyeong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9C
    • /
    • pp.846-852
    • /
    • 2006
  • The ${\kappa}$-error linear complexity is a ky measure of the stability of the sequences used in the areas of communication systems, stream ciphers in cryptology and so on. This paper introduces an efficient algorithm to determine the ${\kappa}$-error linear complexity and the corresponding error vectors of $p^m$-periodic binary sequences, where : is a prime and 2 is a primitive root modulo $p^2$. We also give a new sense about the ${\kappa}$-error linear complexity in viewpoint of coding theory instead of cryptographic results. We present an efficient algorithm for decoding binary cyclic codes of length $p^m$ and derive key properties of the minimum distance of these codes.

Design of the Multiplier in case of P=2 over the Finite Fields based on the Polynomial (다항식에 기초한 유한체상의 P=2인 경우의 곱셈기 설계)

  • Park, Chun-Myoung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.70-75
    • /
    • 2016
  • This paper proposes the constructing method of effective multiplier based on the finite fields in case of P=2. The proposed multiplier is constructed by polynomial arithmetic part, mod F(${\alpha}$) part and modular arithmetic part. Also, each arithmetic parts can extend according to m because of it have modular structure, and it is adopted VLSI because of use AND gate and XOR gate only. The proposed multiplier is more compact, regularity, normalization and extensibility compare with earlier multiplier. Also, it is able to apply several fields in recent hot issue IoT configuration.

On the Design of a New Briadband Personalized Multimedia Network for Future Requirements (미래의 환경에 맞는 새로운 개인 휴대 통신 서비스를 위한 광대역 멀티미디어 통신망의 설계)

  • 최진식;은종관
    • Information and Communications Magazine
    • /
    • v.12 no.10
    • /
    • pp.76-86
    • /
    • 1995
  • In this paper, we propose a new network architecture for the future broadband personalized multimedia network. We first consider the service and technical requirements for supporting future advanced services such as personalized and intelligent communication services. In addition, we consider the design and implementation of the future network. Considering these requirements. we propose a new network architecture and its control scheme that can efficiently support the future personalized and intelligent services as well as broadband multimedia services. The network provides only a relatively simple core set of functions such as basic end-to-end connectivity, integrated access, and primitive network intelligence of user location. More intelligent features (e.g., personalized calling, virtual private networking and so on) can be offered through the additional network facilities or computing devices through an intelligent network.

  • PDF

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

A Study on the Implementation of SQL Primitives for Decision Tree Classification (판단 트리 분류를 위한 SQL 기초 기능의 구현에 관한 연구)

  • An, Hyoung Geun;Koh, Jae Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.12
    • /
    • pp.855-864
    • /
    • 2013
  • Decision tree classification is one of the important problems in data mining fields and data minings have been important tasks in the fields of large database technologies. Therefore the coupling efforts of data mining systems and database systems have led the developments of database primitives supporting data mining functions such as decision tree classification. These primitives consist of the special database operations which support the SQL implementation of decision tree classification algorithms. These primitives have become the consisting modules of database systems for the implementations of the specific algorithms. There are two aspects in the developments of database primitives which support the data mining functions. The first is the identification of database common primitives which support data mining functions by analysis. The other is the provision of the extended mechanism for the implementations of these primitives as an interface of database systems. In data mining, some primitives want be stored in DBMS is one of the difficult problems. In this paper, to solve of the problem, we describe the database primitives which construct and apply the optimized decision tree classifiers. Then we identify the useful operations for various classification algorithms and discuss the implementations of these primitives on the commercial DBMS. We implement these primitives on the commercial DBMS and present experimental results demonstrating the performance comparisons.

Effect of Health status and Health Behavior on the Diabetes Mellitus Prevalence (성인의 건강상태, 건강행위가 당뇨병 유병률에 미치는 영향)

  • Hong, Ji-Yeon;Park, Jin-Ah
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.198-209
    • /
    • 2014
  • Diabetes Mellitus (DM) is well known for increasing morbidity and mortality, especially related to their complications. The purpose of this study was to investigate the factors affecting the prevalence rate of DM and provide a fundamental material to develop an intervention strategy to reduce the prevalence rate of DM. The study subjects were adults aged over 19 on the basis of the primitive data of "The Fifth Korean National Health and Nutrition Examination Survey, 2012". Therefore, the data of 5995 participants were analyzed. For data process, the complex sample analysis module of SPSS 18.0 program was employed to add weighting before analysis. According to the analysis, the prevalence rate of DM of the study subjects was 10.5%. Regarding the odds ratio of DM prevalence, the subjects who graduated from middle school had the odds ratio 2.51 times higher than those who graduated from college and more; those in subjective bad health condition 4.77 times higher than those in subjective good health condition; those in obesity 1.44 times higher; those with high blood pressure 2.57 times higher; those with hyperlipidemia 2.63 times higher; those who fail to control their weight 1.31 times higher; those going on a diet 2.75 times higher. This study revealed that a level of education, perceived health status, obesity, high blood pressure, hyperlipidemia, weight control, and dietary therapy were the predictable variables of the prevalence rate of DM, and thereby suggested the nursing direction and research direction to reduce the prevalence rate of DM.