• Title/Summary/Keyword: SystemC infrastructure

Search Result 202, Processing Time 0.026 seconds

A New Certificate Validation Method Allowing CAs to Participate the Certificate Path Validation Processing (CA를 인증 경로 처리 작업에 참여시키는 새로운 인증서 검증 방안)

  • Choi, Yeon-Hee;Park, Mi-Og;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.21-30
    • /
    • 2004
  • Most applications using the PKI allows a user to execute the certificate validation processing. The efficiency of user system can be declined by the user-side processing resulting the overhead and low speed of the validation processing. Therefore, in this paper, we propose a new certificate validation processing method can decrease the overhead on user by allowing CAs of the hierarchical PKI to participate in the validation processing. Therefore, our proposed scheme can not only reduce the considerable overhead caused by the user-side whole processing without a new implementation of the delegated server but also improve the time spent for the processing by the reduction of the validation processing job on user.

A Study on the Global e-Port's Strategy of Gwangyang Port (광양항의 Global e-Port화 전략에 관한 연구)

  • Chang, Heung-Hoon
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.193-216
    • /
    • 2004
  • The management strategies of each company has been changed fundamentally owing to the emergence of digital economics by using internet. Therefore the efficient management of global e-port causes the main issues not only effect the survival and growth of ports but also exert new opportunities and fatal threats on them. Under the circumstances of these change, the Kwangyang port have to introduce e-biz for the purpose of increasing the level of their competition. The focus of this article is to suggest some strategies on the implementation of Kwangyang Global e-port in Korea. To analyse the e-port realities, I first reviewed the trends of e-marketing and e-biz. I chose and analysed website of four ports like Hongkong, Singapore, Antwerp and Hamburg as successful global e-port models. This article is focused to suggest the theoretical background by analysing the strategic points of Kwangyang global e-port which are divided in 6C: Contents, Communities, Connection, Commerce, Communication and Customization. This paper analyses many problems of Gwangyang port and presents various develpment ways to activate Gwangyang port. In order to be a global e-port, first of all Gwangyang port must improve global web-site by 6C. And also Gwangyang port have to constitute logistics hub site, create infrastructure needed to run electronic business more easily over the internet, establish nationwide network of industries, build up marine and port logistics information system.

  • PDF

Cut off of Smartcard Forgery and Alteration Based on Holographic Security Encryption (홀로그래픽 암호화 기법을 적용한 스마트카드 위.변조 차단)

  • Jang, Hong-Jong;Lee, Seong-Eun;Lee, Jeong-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.173-180
    • /
    • 2002
  • Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This Paper makes cut off of Smartcard forgery and alteration that use angular multiplexing and private key multiplexing hologram on holographic security Encryption, and proposes system capable verfication of forgery and alteration impossible on existing smartrard by adopting smartcard chip and holographic memory chip.

Optimizing slow pyrolysis of banana peels wastes using response surface methodology

  • Omulo, Godfrey;Banadda, Noble;Kabenge, Isa;Seay, Jeffrey
    • Environmental Engineering Research
    • /
    • v.24 no.2
    • /
    • pp.354-361
    • /
    • 2019
  • Renewable energy from biomass and biodegradable wastes can significantly supplement the global energy demand if properly harnessed. Pyrolysis is the most profound modern technique that has proved effective and efficient in the energy conversion of biomass to yield various products like bio-oil, biochar, and syngas. This study focuses on optimization of slow pyrolysis of banana peels waste to yield banana peels vinegar, tar and biochar as bio-infrastructure products. Response surface methodology using central composite design was used to determine the optimum conditions for the banana wastes using a batch reactor pyrolysis system. Three factors namely heating temperature ($350-550^{\circ}C$), sample mass (200-800 g) and residence time (45-90 min) were varied with a total of 20 individual experiments. The optimal conditions for wood vinegar yield (48.01%) were $362.6^{\circ}C$, 989.9 g and 104.2 min for peels and biochar yield (30.10%) were $585.9^{\circ}C$, 989.9 g and 104.2 min. The slow pyrolysis showed significant energy conversion efficiencies of about 90% at p-value ${\leq}0.05$. These research findings are of primary importance to Uganda considering the abundant banana wastes amounting to 17.5 million tonnes generated annually, thus using them as pyrolysis feedstock can boost the country's energy status.

An original device for train bogie energy harvesting: a real application scenario

  • Amoroso, Francesco;Pecora, Rosario;Ciminello, Monica;Concilio, Antonio
    • Smart Structures and Systems
    • /
    • v.16 no.3
    • /
    • pp.383-399
    • /
    • 2015
  • Today, as railways increase their capacity and speeds, it is more important than ever to be completely aware of the state of vehicles fleet's condition to ensure the highest quality and safety standards, as well as being able to maintain the costs as low as possible. Operation of a modern, dynamic and efficient railway demands a real time, accurate and reliable evaluation of the infrastructure assets, including signal networks and diagnostic systems able to acquire functional parameters. In the conventional system, measurement data are reliably collected using coaxial wires for communication between sensors and the repository. As sensors grow in size, the cost of the monitoring system can grow. Recently, auto-powered wireless sensor has been considered as an alternative tool for economical and accurate realization of structural health monitoring system, being provided by the following essential features: on-board micro-processor, sensing capability, wireless communication, auto-powered battery, and low cost. In this work, an original harvester device is designed to supply wireless sensor system battery using train bogie energy. Piezoelectric materials have in here considered due to their established ability to directly convert applied strain energy into usable electric energy and their relatively simple modelling into an integrated system. The mechanical and electrical properties of the system are studied according to the project specifications. The numerical formulation is implemented with in-house code using commercial software tool and then experimentally validated through a proof of concept setup using an excitation signal by a real application scenario.

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks (퍼지 멤버쉽 함수와 신경망을 이용한 이상 침입 탐지)

  • Cha, Byung-Rae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.595-604
    • /
    • 2004
  • By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.

Implementation Plan and Requirements Analysis of Access Control for Cyber Security of Nuclear Power Plants (원전 사이버보안을 위한 접근제어 요건분석 및 구현방안)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • The Nuclear Power Plants(: NPP) are being protected as national infrastructure, and instrumentation and control(: I&C) systems are one of the principle facilities of the NPP, which perform the protection, control, and monitoring function. The I&C systems are being evolved into digitalization based on computer and network technology from analog system. In addition, the I&C systems are mostly employ the specialized logic controllers which are dedicated for the NPP, but the usage of generalized IT resources are steadily increased. The cyber security issues for the NPP are being emerged due to cyber incidents by Stuxnet and various accidents in the NPP. In this paper, hybrid access control model is proposed which are applicable to I&C system by analyzing the access control requirements specified in regulatory guides. The safety of in-service and under construction of NPP are effectively increased by applying proposed hybrid model.

Large-Memory Data Processing on a Remote Memory System using Commodity Hardware (대용량 메모리 데이타 처리를 위한 범용 하드웨어 기반의 원격 메모리 시스템)

  • Jung, Hyung-Soo;Han, Hyuck;Yeom, Heon-Y.
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.9
    • /
    • pp.445-458
    • /
    • 2007
  • This article presents a novel infrastructure for large-memory database processing using commodity hardware with operating system support. We exploit inexpensive PCs and a high-speed network capable of Remote Direct Memory Access (RDMA) operations to build a new memory hierarchy between fast volatile memory and slow disk storage. The new memory hierarchy guarantees a reasonable response time, and its storage size enables us to run large-memory database systems with little performance degradation. The proposed architecture has two main components: (1) a remote memory system inside the Linux kernel to manage other computers' memory pages efficiently and (2) a remote memory pager responsible for manipulating remote read/write operations on remote memory pages. We insist that the proposed architecture is practical enough to support the rigorous demands of commercial in-memory database systems by demonstrating the performance of publicly available main-memory databases (e.g., MySQL) on our prototyped system. The experimental results show very interesting results from the TPC-C benchmark.

Indoor Position Technology in Geo-Magnetic Field (지구 자기장 기반의 Fingerprint 실내 위치추정 방법 연구)

  • Hur, Soojung;Song, Junyeol;Park, Yongwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.131-140
    • /
    • 2013
  • Due to the limitations of the existing indoor positioning system depending on the radio wave, at present, it is required to introduce a new method in order to improve the accuracy in indoor environment. Recently, bio-inspired technology has become the future core technology. Thus, this study examined the accurate positioning method applying the abilities that animals with homing instinct measure their position by searching geomagnetic field with the use of their biomagnets. In order to confirm the applicability of geomagnetic field, a new source for indoor positioning, this study separated the constituent materials and building structure and designed the structures that can carry the actual magnetic field sensor and the data collection module. Subsequently, this study investigated the applicability of geomagnetic field as a positioning source by establishing the positioning system of Fingerprint method. In performance evaluation of the positioning system, the geomagnetic strength-based positioning system was similar to or approximately 20 percent higher than the wireless LAN-based positioning system in the buildings with the existing wireless LAN. Thus, in the environment without infrastructure for indoor positioning, the geomagnetic, an independent earth resource, can make it possible to realize the indoor positioning.

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.