• Title/Summary/Keyword: Storage Speed

Search Result 846, Processing Time 0.028 seconds

Masking-Based Block Cipher LEA Resistant to Side Channel Attacks (부채널 공격에 대응하는 마스킹 기반의 블록 암호 LEA)

  • Park, Eunsoo;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1023-1032
    • /
    • 2017
  • When a cryptographic device such as smart card performs an encryption for a plain text, an attacker can extract the secret key in it using side channel information. Especially, many researches found some weaknesses for side channel attack on the lightweight block cipher LEA designed to apply in IoT environments. In this paper, we survey several masking countermeasures to defeat the side channel attack and propose a novel masking conversion method. Even though the proposed Arithmetic-to-Boolean masking conversion method requires storage memory of 256 bytes, it can improve the LEA encryption speed up to 17 percentage compared to the case adopted the previous masking method.

Design of High Speed , Real-time , and Large Scale Data Storage System for Editing HDTV Data (HDTV 데이터 편집을 위한 고속 실시간 대규모 데이터 저장 시스템의 설계)

  • Lee, Chan-Su;Seong, Yeong-Rak;O, Ha-Ryeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.2
    • /
    • pp.223-235
    • /
    • 1999
  • 본 논문에서는 HDTV 데이터를 입출력할 수 있는 고속 실시간 데이터 저장 시스템을 제안한다. 이 시스템은 ⅰ) 방대한 크기를 HDTV 데이터를 고속으로 입출력할 수 있어야 한다. ⅱ)데이타를 연속적으로 입출력할 수 있는 것 외에 데이터를 비선형적으로 랜덤하게 억세스 할 수 있어야 한다. ⅲ)실시간으로 데이터를 재생하기 위해 일정하게 주어진 시스템 입출력 속도를 항상 만족할수 있어야 한다. 이러한 조건을 만족시키기 위해서 여러 개의 하드디스크를 병렬로 연결하고 데이터들을 각각의 하드디스크에 나누어 저장하였다. 하드디스크의 입출력 성능은 하드디스크 아암의 탐색 동작에 의해 크게 좌우되므로 탐색 동작을 효과적으로 제어할 수 있는 방법이 설계되었다. 제안된 시스템은 주제어부, 데이터 분배부, 종제어부로 나뉘며 각각의 하드디스크는 독립도니 종제어부에 의해 제어된다. 제안된 시스템이 주어진 요구사항을 만족하는지를 확인하기 위하여, 제안된 시스템을 DEVS 형식론을 이용하여 구현하고 시뮬레이션 하였다. DEVS 형식론은 이산사건 시스템을 계층적이고 모듈화된 형태로 기술한다. 시뮬레이션 과정에서 발생된 사건들을 분석하였다. 그 결과 제안된 시스템이 주어진 요구사항을 잘 만족함을 보았다.

MAHA-FS : A Distributed File System for High Performance Metadata Processing and Random IO (MAHA-FS : 고성능 메타데이터 처리 및 랜덤 입출력을 위한 분산 파일 시스템)

  • Kim, Young Chang;Kim, Dong Oh;Kim, Hong Yeon;Kim, Young Kyun;Choi, Wan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.91-96
    • /
    • 2013
  • The application field of supercomputing systems are changing to support into the field for both a large-volume data processing and high-performance computing at the same time such as bio-applications. These applications require high-performance distributed file system for storage management and efficient high-speed processing of large amounts of data that occurs. In this paper, we introduce MAHA-FS for supercomputing systems for processing large amounts of data and high-performance computing, providing excellent metadata operation performance and IO performance. It is shown through performance analysis that MAHA-FS provides excellent performance in terms of the metadata processing and random IO processing.

Implementation of Real-Time Monitoring System for Overhead Contact Wire in Electric Railway (전차선로 검측을 위한 실시간 화상처리 시스템 구현)

  • Park, Young;Cho, Young-Hyeon;Lee, Ki-Won;Kwon, Sam-Young;Park, Hyun-Jun;Jang, Dong-Uk
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.543-544
    • /
    • 2006
  • This paper describes a simple real-time monitoring system for use in measurement subsystem of contact wire and geometry of overhead contact wire in electric railway. The system has been consists of a high speed CMOS camera with resolution $1024\;{\times}\;1280$ pixels, line type laser source with a power equal to 300 mW, and PC-based image acquisition system with PCI Express slot. National instrument LabVIEW (8.0) and vision acquisition software have been used in application programming interface for image acquisition, display, and storage with a frequency of sampling of 500 acquisitions per second.

  • PDF

A Study on the Effect of Addition of Dietary Fibers on Quality of Julpyun (식이섬유 첨가가 절편의 특성에 미치는 영향에 관한 연구)

  • Lee, Ji-Young;Koo, Sung-Ja
    • Korean journal of food and cookery science
    • /
    • v.10 no.3
    • /
    • pp.267-276
    • /
    • 1994
  • Recent epidemological observations suggested beneficial effects of dietary fiber on man's health. With the increased emphasis placed on the requirement for dietary fiber in the diet, there has been greater interest in successfully incorporating dietary fiber into food products. Hence, in this study, several dietary fibers such as cellulose, pectin, rice bran, barley bran and job's tears bran were incorporated into julpyun to determine their effects on some physical properties and sensory characteristics. Difference of water binding capacity(WBC) was found among dietary fiber sources. The WBC of pectin was highest and that of job's tears bran was lowest. The moisture contents of julpyun were increased as WBC of added dietary fiber sources was higher. In the rheometer measurement for julpyun added with dietary fiber, hardness of julpyuns added with cellulose and pectin was low. But, hardness of julpyun added cellulose was increased rapidly during storage at 4$^{\circ}C$. Springiness and gumminess wereshowed similar aspects to hardness. In the retrogradation speed by Avrami equation, the rate constant of julpyun added barley bran was low ao retrogradation occurred slowly. The results of sensory evaluation, julpyun added no dietary fiber showed good overall preference. Overall preference in sensory evaluation showed positive correlation with the after-swallowing and color.

  • PDF

Economical Gas Chamber for In-situ Gas Measurement and Analysis of Gas Response Characteristics according to Sensor Voltage (인시투 가스 측정이 가능한 경제적 가스 챔버 구현 및 센서 전압에 따른 가스 응답 특성 분석)

  • Choi, Yun-Suk;Lee, In Hwan
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2019
  • Breath analysis using a portable device is better than the classical breath analysis system in terms of installation and operation. There is an increasing need to develop cost-effective equipment for testing gas sensors from the viewpoint of functionalities that can be applied applicable to portable devices. In the present study, an economical gas chamber for in-situ gas measurement is implemented with a single gas chamber without using expensive gas storage and control equipment; the gas response characteristics are analyzed using the above-described chamber. The main features of the implemented gas chamber are simple injection procedure, improved gas diffusion, easy measurement and cleaning, support for low-power mode measurement function for portable devices, and open source platform. Moreover, an analysis of gas response characteristics based on changes in sensor voltage show that the sensitivity and 90% response time are affected by the sensor voltage. Furthermore, the sensitivity graph has an inflection point in a specific range. The gas sensor applied in this study showed fast response speed and high sensitivity for sensor voltages of 3.0-3.5 V, regardless of the concentration of acetone gas, the target gas used in this study.

Urban Waterway System and Construction Method for Runoff Reduction (유출저감을 위한 도시형 수로 시스템 및 시공방법)

  • Oh, Yungtak;Han, Seungwan
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2021
  • This technology is to let rainwater flow into a waterway that is located side gutter of a street with blocking garbage including cigarette butts at the same time. The first waterway is located beside the sidewalk and it enhances the water circulation in a city. This waterway is filled with aggregates and filter media, which removes fine dust that is washed out of the street and let water flow down to the earth. The second waterway is located beside the street and it retains rainwater temporarily with decreasing its flow speed. The second waterway shall reduce flooding damages by avoiding bottleneck situation in the street inlets and storm water pipelines which is the main causation of flooding in a city.

Mobile Sink Path Planning in Heterogeneous IoT Sensors: a Salp Swarm Algorithm Scheme

  • Hamidouche, Ranida;Aliouat, Zibouda;Ari, Ado Adamou Abba;Gueroui, Abdelhak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2225-2239
    • /
    • 2021
  • To assist in data collection, the use of a mobile sink has been widely suggested in the literature. Due to the limited sensor node's storage capacity, this manner to collect data induces huge latencies and drop packets. Their buffers will be overloaded and lead to network congestion. Recently, a new bio-inspired optimization algorithm appeared. Researchers were inspired by the swarming mechanism of salps and thus creating what is called the Salp Swarm Algorithm (SSA). This paper improves the sink mobility to enhance energy dissipation, throughput, and convergence speed by imitating the salp's movement. The new approach, named the Mobile Sink based on Modified Salp Swarm Algorithm (MSSA), is approved in a heterogeneous Wireless Sensor Network (WSN) data collection. The performance of the MSSA protocol is assessed using several iterations. Results demonstrate that our proposal surpass other literature algorithms in terms of lifespan and throughput.

Development of Big-data Management Platform Considering Docker Based Real Time Data Connecting and Processing Environments (도커 기반의 실시간 데이터 연계 및 처리 환경을 고려한 빅데이터 관리 플랫폼 개발)

  • Kim, Dong Gil;Park, Yong-Soon;Chung, Tae-Yun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.4
    • /
    • pp.153-161
    • /
    • 2021
  • Real-time access is required to handle continuous and unstructured data and should be flexible in management under dynamic state. Platform can be built to allow data collection, storage, and processing from local-server or multi-server. Although the former centralize method is easy to control, it creates an overload problem because it proceeds all the processing in one unit, and the latter distributed method performs parallel processing, so it is fast to respond and can easily scale system capacity, but the design is complex. This paper provides data collection and processing on one platform to derive significant insights from various data held by an enterprise or agency in the latter manner, which is intuitively available on dashboards and utilizes Spark to improve distributed processing performance. All service utilize dockers to distribute and management. The data used in this study was 100% collected from Kafka, showing that when the file size is 4.4 gigabytes, the data processing speed in spark cluster mode is 2 minute 15 seconds, about 3 minutes 19 seconds faster than the local mode.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.