• Title/Summary/Keyword: address system

Search Result 2,413, Processing Time 0.034 seconds

Fast Anti-Collision Algorithm Using Pre-distributed Random Address (미리 분배된 난수를 이용하는 빠른 충돌방지 알고리즘)

  • Kang Jeon il;Park Ju sung;Nyang Dae hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.184-194
    • /
    • 2005
  • One of the most important factors that decide the overall performance of RFID system is anti-collision algorithm. By enhancing the anti-collision algorithm, we can increase the number of RFID tags that can be processed in unit time. Two anti-collision algorithms are most widely prevailed: one is ALOHA-based protocol and the other is a binary tree walking method, but these are still under research. In this paper, we suggest an anti-collision algorithm named AAC(Address Allocating and Calling) using pre-distributed random address, which is much faster and more efficient than existing ones. Finally, we evaluate our scheme using mathematical analysis and computer simulation.

A Design of Power-saving PC System Using the IP Address Restriction (IP 주소 제한을 이용한 PC 절전 시스템의 설계)

  • Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.89-97
    • /
    • 2013
  • The green IT technology is being introduced in diverse sectors, especially in the data center and green computer sectors. Rack-type PCs, which have been developed by improving the computer hardware, are effective for data centers and large businesses, but they are not usually introduced in small organizations such as small and medium businesses and schools because they require high initial costs. Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. In this paper, a technique wherein the server has a restriction in providing the IP address to the computers that has no power-saving software is proposed, so that users will cooperate in the PC power-saving system to avoid inconvenience. In order to provide restricted IP address periodically, the server makes a request of power-saving software installation check for user's PC. Proposed technique is more effective ways to save computer energy, because it does not depend on specific systems or organizations.

Accelerating Memory Access with Address Phase Skipping in LPDDR2-NVM

  • Park, Jaehyun;Shin, Donghwa;Chang, Naehyuck;Lee, Hyung Gyu
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.6
    • /
    • pp.741-749
    • /
    • 2014
  • Low power double data rate 2 non-volatile memory (LPDDR2-NVM) has been deemed the standard interface to connect non-volatile memory devices such as phase-change memory (PCM) directly to the main memory bus. However, most of the previous literature does not consider or overlook this standard interface. In this paper, we propose address phase skipping by reforming the way of interfacing with LPDDR2-NVM. To verify effectiveness and functionality, we also develop a system-level prototype that includes our customized LPDDR2-NVM controller and commercial PCM devices. Extensive simulations and measurements demonstrate up to a 3.6% memory access time reduction for commercial PCM devices and a 31.7% reduction with optimistic parameters of the PCM research prototypes in industries.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Destination Address Block Location on Machine-printed and Handwritten Korean Mail Piece Images (인쇄 및 필기 한글 우편영상에서의 수취인 주소 영역 추출 방법)

  • 정선화;장승익;임길택;남윤석
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.8-19
    • /
    • 2004
  • In this paper, we propose an efficient method for locating destination address block on both of machine-Printed and handwritten Korean mail piece images. The proposed method extracts connected components from the binary mail piece image, generates text lines by merging them, and then groups the text fines into nine clusters. The destination address block is determined by selecting some clusters. Considering the geometric characteristics of address information on Korean mail piece, we split a mail piece image into nine areas with an equal size. The nine clusters are initialized with the center coordinate of each area. A modified Manhattan distance function is used to compute the distance between text lines and clusters. We modified the distance function on which the aspect ratio of mail piece could be reflected. The experiment done with live Korean mail piece images has demonstrated the superiority of the Proposed method. The success rate for 1, 988 testing images was about 93.56%.

Why abandon Randomized MAC-Address : An Analysis of Wi-Fi Probe Request for Crowd Counting (Why abandon Randomized MAC-Address : Wi-Fi Probe Request 기반 유동인구 분석 방법)

  • Oppokhonov, Shokirkhon;Lee, Jae-Hyun;Moon, Jun-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.24-34
    • /
    • 2021
  • Estimation of the presence of people in real time is extremely useful for businesses in providing better services. Many companies and researchers have attempted various researches in order to count the number of floating population in specific space. Recently, as part of smart cities and digital twins, commercialization of measuring floating populations using Wi-Fi signals has become active in the public and private sectors. This paper explains the floating population measuring system from the perspective of general consumers(non-experts) who uses current population data. Specifically, it presents a method of estimating the floating population based on MAC-address values collected from smartphones. By distinguishing Real MAC-address and Random MAC-address values, we compare the estimated number of smartphone devices and the actual number of people caught on CCTV screens to evaluate the accuracy of the proposed method. And it appeared to have a similar correlation between the two datas. As a result, we present a method of estimating the floating population based on analyzing Wi-Fi Probe Requests

  • PDF

Hangul Segmentation and Word Verification System for Automatic Address Processing (문자 가분할과 Support Vector Machine을 이용한 필기 한글 단어 고속 검증기)

  • 이충식;김인중;신종탁;김진형
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.37-40
    • /
    • 2000
  • A fast method of Hangul address word verification is presented in this Paper. Pre-segmentation and recognition by DP matching is adopted in this paper. An address line image is over-segmented by analyzing the topology of connected components and the projection profile. A fast individual Hangul character verifier was developed by applying SVM (Support Vector Machine). The segmentation hypothesis was represented by lattice structure, and a best path search by dynamic programming generates the most probable segmentation path and the final verification score. The word verifier was tested on 310 address image DB, and it show the possibility of improvements of this method.

  • PDF

The Three-Dimensional Temporal Behavior Measurement of Light Emitted From Plasma Display Panel

  • Choi, Hoon-Young;Kwon, Hyung-Seok;Lee, Seok-Hyun;Lee, Seung-Gol
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.598-600
    • /
    • 2002
  • To improve the luminance and efficiency of AC PDP, the effects of a square pulse applied to the address electrode during a sustain-period is investigated. Through this experiment, we confirmed the improvement of luminance and efficiency. We performed the temporal behavior measurement for the light emitted from AC PDP at floating state of the address electrode and at various auxiliary voltages (including ground state) applied to the address electrode using the scanned point detecting system. In the case of using an auxiliary voltage pulse, emission starts at the inner edges of the anode and cathode simultaneously. Also, we obtained the larger two discharge volumes compared with the normal sustain discharge where address electrode is floated.

  • PDF

Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication (그룹 통신을 위한 안전 MAC 주소 기반 X.509 인증서에 관한 연구)

  • Hong, Sung-Hyuck
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.69-77
    • /
    • 2008
  • I propose adding users’Media Access Control (MAC) addresses to standard X.509 certificates to provide more secure authentication. The MAC address can be added by the issuing Certification Authority (CA) to the "extensions" section of the X.509 certificate. I demonstrate that when two users with MAC address information on their digital certificates communicate, the MAC address on the first user’s certificate can be easily verified by the second user. In this way, security can be improved without markedly degrading system performance and the level of initial trust between participants in virtual communities will be improved.

  • PDF

Wireless Internet Local Broadcasting System using IP Address Translation (IP 주소변환기능을 이용한 무선 인터넷 지역방송 시스템)

  • Oh, Jong-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.3B
    • /
    • pp.217-223
    • /
    • 2003
  • In spite of widely deploying information broadcasting services based on Internet, there are some limitations to use them due to the bound of Internet protocol. In this paper, a new Internet broadcasting technology for access network is proposed by employing IP address translation function in base station. There are some advantages such as; no need to allocate IP address to receiver, no need to know web site address, and reduction of traffic for server and network. Especially, this technology is very proper to wireless Internet local information broadcasting.