• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

New Parity-Preserving Reversible Logic Gate (새로운 패리티 보존형 가역 논리게이트)

  • Kim, Sung-Kyoung;Kim, Tae-Hyun;Han, Dong-Guk;Hong, Seok-Hie
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.1
    • /
    • pp.29-34
    • /
    • 2010
  • This paper proposes a new parity-preserving reversible logic gate. It is a parity-preserving reversible logic gate, that is, the party of the outputs matches that of the inputs. In recent year, reversible logic gate has emerged as one of the important approaches for power optimization with its application in low CMOS design, quantum computing and nono-technology. We show that our proposed parity-preserving reversible logic gate is much better in terms of number of reversible logic gates, number of garbage-outputs and hardware complexity with compared ti the exiting counterpart.

Design of modified Feistel structure for high-capacity and high speed achievement (대용량 고속화 수행을 위한 변형된 Feistel 구조 설계에 관한 연구)

  • Lee Seon-Keun;Jung Woo-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.183-188
    • /
    • 2005
  • Parallel processing in block cryptographic algorithm is difficult, because Feistel structure that is basis structure of block cryptographic algorithm is sequential processing structure. Therefore this paper changes these sequential processing structure and Feistel structure made parallel processing to be possible. This paper that apply this modified structure designed DES that have parallel Feistel structure. Proposed parallel Feistel structure could prove greatly block cryptographic algorithm's performance such as DES and so on that could not but have trade-off relation the data processing speed and data security interval because block cryptographic algorithm can not use pipeline method because of itself structural problem. Therefore, modified Feistel structure is going to display more superior security function and processing ability of high speed than now in case apply way that is proposed to SEED, AES's Rijndael, Twofish etc. that apply Feistel structure.

  • PDF

Design and Implementation of Integrated Ethernet Communication System for FA (FA를 위한 통합형 이더넷 통신 시스템 설계 및 구현)

  • Kim, Bae-Hyun;Moon, Tae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.1-8
    • /
    • 2007
  • Currently, the needs of open standard and integrated network, and also applications of Ethernet network based system are increasing. By applying and expanding TCP/IP based network technology from high to low control level, factory automation application has been implemented, and thus integrated factory automation system has been accomplished, which is directly interoperable between high level management program and DB system. This paper proposes a communication control device which is based on Ethernet/IP standard system for factory automation. The proposed system is workable in the environment of a network system, which is based on CIP standard interface technology. The proposed system can also contribute to improve data communication characteristics.

  • PDF

Design and Implementation of an Efficient Instruction and Student Management System based on the Web (웹 기반의 학습 및 학생관리 시스템 설계 및 구현)

  • Kim, Nam-Hee;Lee, Jong-Chan
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • In present, an education paradigm of new info-age is consisting by using the Internet in education field, and as that practical use of internet in education is in increasing trend and various education method is showed. Also, as using the web by teacher and student, teacher can achieve efficiently instruction and student management and students can handle various kinds item about studies efficiently. But much of the existent systems were drived on instruction management, systems of student management are very few. Therefore, in this paper, we designed and implemented system that can efficiently manage instruction and student in web. Implemented system was designed by dividing teacher module and student module and various function for instruction management and student management were included in teacher module and in student module include various functions with related to as class, report and result record.

  • PDF

A Study on Global Scheduler for Computing Resources and Network Resources Management (컴퓨팅 자원 및 네트워크 자원의 관리를 위한 티켓 기반 글로벌 스케줄러에 관한 연구)

  • Lim, Chang-Sun;Ahn, Seong-Jin;Chung, Jin-Wook;Park, Jin-Sub
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.13-19
    • /
    • 2009
  • In this paper, the integrated management of grid resources for conducting research on the global scheduler, the proposed plan is designed for. Research on the global scheduler and the grid system as a global scheduler for the system to understand the concept of a global scheduler configuration was necessary to check conditions. And other global scheduler, global positioning system and the differentiation of a ticket-based system was introduced to the concept. Finally, this paper proposed by the global scheduler for the system design, through prototyping to determine the actual effect can be used to determine whether is was.

  • PDF

Low Power Diaper Urination Alarm Technology with Bluetooth v4.0 (블루투스 v4.0을 활용한 저(低)전력형 기저귀 배뇨 발생 알람 기술)

  • Paik, Jung Hoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.27-32
    • /
    • 2013
  • In this paper, technologies applied to design urination detection device on diaper that issues an alarm signal to guardian within 10~20m are introduced. It features power saving that uses both low power bluetooth v4.0 chip and low-power program scheme that makes sensor and mirco-controller to be sleep mode while data is not receiving from sensor. Urination detection algorithm that utilizes the difference between previous sensing data and current values is used to improve the degree of the detection precision level. The device designed with the suggested technologies shows the performance that is 100ml of the minimum urine amount for detection, more than 90% of urination detection degree, and 100% of wireless communication success rate.

Distribute Parallel Crawler Design and Implementation (분산형 병렬 크롤러 설계 및 구현)

  • Jang, Hyun Ho;jeon, kyung-sik;Lee, HooKi
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.21-28
    • /
    • 2019
  • As the number of websites managed by organizations or organizations increases, so does the number of web application servers and containers. In checking the status of the web service of the web application server and the container, it is very difficult for the person to check the status of the web service after accessing the physical server at the remote site through the terminal or using other accessible software It. Previous research on crawler-related research is hard to find any reference to the processing of data from crawling. Data loss occurs when the crawler accesses the database and stores the data. In this paper, we propose a method to store the inspection data according to crawl - based web application server management without losing data.

Asymptotically Optimal Cooperative Jamming for Physical Layer Security

  • Yang, Jun;Salari, Soheil;Kim, Il-Min;Kim, Dong In;Kim, Seokki;Lim, Kwangae
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.84-94
    • /
    • 2016
  • Design of effective cooperative jamming (CJ) algorithm is studied in this paper to maximize the achievable secrecy rate when the total transmit power of the source and multiple trusted terminals is constrained. Recently, the same problem was studied in [1] and an optimal algorithm was proposed involving a one-dimensional exhaustive searching.However, the computational complexity of such exhaustive searching could be very high, which may limit the practical use of the optimal algorithm. We propose an asymptotically optimal algorithm, involving only a fast line searching, which can guarantee to achieve the global optimality when the total transmit power goes to infinity. Numerical results demonstrate that the proposed asymptotically optimal algorithm essentially gives the same performance as the algorithm in [1, (44)] but with much lower computational complexity.

Light-weight System Design & Implementation for Wireless Intrusion Detection System (무선랜 침입탐지를 위한 경량 시스템 설계 및 구현)

  • Kim, Han-Kil;Kim, Su-Jin;Lee, Hwan-Kyu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.602-608
    • /
    • 2014
  • Smartphones have become commonplace to use smart, BYOD (Bring Your Own Device) spread the trend of domestic WLAN use is intensifying as a result, the security threat will be greatly increased. Even though WLAN vendors such as Cisco Systems Inc,. Aruba networks released WIPS, MDM, DLP etc, however, these solutions can not be easily introduced for small business due to high cost or administrative reasons. In this paper, without the introduction of expensive H/W equipment, in WLAN environments, packet analysis, AP, Station management, security vulnerabilities can be analyzed by the proposed intrusion detection system.

Design and Implementation of a Node Power Scheduler in Virtual Computing Lab Environment (가상 컴퓨팅 랩 환경에서 노드 전원관리 스케줄러 설계 및 구현)

  • Seo, Kyung-Seok;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1827-1834
    • /
    • 2013
  • The existing PC-based desktop environment is being changed to a server-based virtual desktop environment due to various advantages such as security, mobility, and upgrade cost reduction. In this paper, a virtual computing lab service system which is applicable to the existing computer lab is designed and implemented using both an open source-based cloud computing platform and hypervisor. In addition, a node power scheduler is proposed in order to reduce power consumption in a server farm. The experimental results show that the power scheduler reduces power consumption considerably over the server farm without the power scheduler.