• Title/Summary/Keyword: digital device

Search Result 2,211, Processing Time 0.031 seconds

An Optimized Hardware Implementation of SHA-3 Hash Functions (SHA-3 해시 함수의 최적화된 하드웨어 구현)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.886-895
    • /
    • 2018
  • This paper describes a hardware design of the Secure Hash Algorithm-3 (SHA-3) hash functions that are the latest version of the SHA family of standards released by NIST, and an implementation of ARM Cortex-M0 interface for security SoC applications. To achieve an optimized design, the tradeoff between hardware complexity and performance was analyzed for five hardware architectures, and the datapath of round block was determined to be 1600-bit on the basis of the analysis results. In addition, the padder with a 64-bit interface to round block was implemented in hardware. A SoC prototype that integrates the SHA-3 hash processor, Cortex-M0 and AHB interface was implemented in Cyclone-V FPGA device, and the hardware/software co-verification was carried out. The SHA-3 hash processor uses 1,672 slices of Virtex-5 FPGA and has an estimated maximum clock frequency of 289 Mhz, achieving a throughput of 5.04 Gbps.

Still Image Improvement of Adaptative DWT(Discrete wavelet transform) Decomposition Level Through the Implementation of JPEG2000 Hardware (JPEG2000의 하드웨어 구현을 통한 최적 DWT 레벨의 정지영상 화질개선)

  • Lee, Cheol;Ryu, Jae-Jung;Lee, Jung-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1343-1352
    • /
    • 2018
  • This paper is designed for hardware to be applied to JPEG2000 standard in the fields of digital photography, remote sensing, aerial remote telemetry, medical imaging, high resolution, and high compression telemetry applications. The software implementation of the JPEG2000 standard for image compression has disadvantages that the processing speed is very slow compared to the conventional JPEG, also the degradation occurs when the DWT level of the JPEG2000 standard is improved. In order to solve this problem, we designed and applied JPEG2000 compression/decompressor. In this paper, the hardware of the JPEG 2000 compression/storage device shows optimal compression speed, faster processing speed, and the image quality for still images by changing the optimal DWT level.

On the Needs of Vertical and Horizontal Transportation Machines for Freight Transportation Standard Containers to Derive Design Requirements Optimized for the Urban Railway Platform Environment

  • Lee, Sang Min;Park, Jae Min;Kim, Young Min;Kim, Joo Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.112-120
    • /
    • 2021
  • Recently, the number of consumers using digital online distribution platforms is increasing. This caused the rapid growth of the e-commerce market and increased delivery volume in urban areas. The logistics system, designed ar006Fund the city center to handle the delivery volume, operates a delivery system from the outskirts of the city to the urban area using cargo trucks. This maintains an ecosystem of high-cost and inefficient structures that increase social costs such as road traffic congestion and environmental problems. To solve this problem, research is being conducted worldwide to establish a high-efficiency urban joint logistics system using urban railway facilities and underground space infrastructure existing in existing cities. The joint logistics system begins with linking unmanned delivery automation services that link terminal delivery such as cargo classification and stacking, infrastructure construction that performs cargo transfer function by separating from passengers such as using cargo platform. To this end, it is necessary to apply the device to the vertical and horizontal transportation machine supporting the vertical transfer in the flat space of the joint logistics terminal, which is the base technology for transporting cargo using the transfer robot to the destination designated as a freight-only urban railway vehicle. Therefore, this paper aims to derive holistic viewpoints needs for design requirements for vertical and vertical transportation machines and freight transportation standard containers, which are underground railway logistics transport devices to be constructed by urban logistics ecosystem changes.

Empirical Study of Determinants Influencing Intention to Recommend Contents Based on Information System Success Model (콘텐츠 추천의도에 영향을 미치는 요인에 관한 연구: 정보시스템 성공모형을 중심으로)

  • Kim, Sanghyun;Park, Hyunsun
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.175-193
    • /
    • 2020
  • With the proliferation of information technology communication and smart device, the environment where contents are produced and distributed is changing. People can use the contents quickly and easily, and the content industry is attracting attention and creating newly added value by converging with other industries. Accordingly, there is a need for content-related companies to understand the quality of content perceived by users in order to succeed in content, and to use it strategically. Therefore, this study aims to examine the relationship between content quality factors, user satisfaction, and recommendation intention through empirical analysis based on an IS success model. The analysis was conducted using smartPLS3.0 based on a total of 301 survey responses. As a result of the study, it was found that content usefulness, accessible system quality, convenient system quality, service provider trust, and interaction had a significant effect on user's satisfaction. Perceived privacy protection had a significant effect on user satisfaction and recommendation intention. Lastly, it was found that user satisfaction had a significant effect on recommendation intention. The results of this study are expected to provide useful information and therefore content companies can understand about the quality perceived by users.

Extremely High-Definition Computer Generated Hologram Calculation Algorithm with Concave Lens Function (오목 렌즈 함수를 이용한 초 고해상도 Computer generated hologram 생성 기법)

  • Lee, Chang-Joo;Choi, Woo-Young;Oh, Kwan-Jung;Hong, Keehoon;Choi, Kihong;Cheon, Sang-Hoon;Park, Joongki;Lee, Seung-Yeol
    • Journal of Broadcast Engineering
    • /
    • v.25 no.6
    • /
    • pp.836-844
    • /
    • 2020
  • A very large number of pixels is required to generate a computer generated hologram (CGH) with a large-size and wide viewing angle equivalent to that of an analog hologram, which incurs a very large amount of computation. For this reason, a high-performance computing device and long computation time were required to generate high-definition CGH. To solve these problems, in this paper, we propose a technique for generating high-definition CGH by arraying the pre-calculated low-definition CGH and multiplying the appropriately-shifted concave lens function. Using the proposed technique, 0.1 Gigapixel CGH recorded by the point cloud method can be used to calculate 2.5 Gigapixels CGH at a very high speed, and the recorded hologram image was successfully reconstructed through the experiment.

Research on Mac OS X Physical Memory Analysis (Mac OS X 물리 메모리 분석에 관한 연구)

  • Lee, Kyeong-Sik;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.89-100
    • /
    • 2011
  • Physical memory analysis has been an issue on a field of live forensic analysis in digital forensics until now. It is very useful to make the result of analysis more reliable, because record of user behavior and data can be founded on physical memory although process is hided. But most memory analysis focuses on windows based system. Because the diversity of target system to be analyzed rises up, it is very important to analyze physical memory based on other OS, not Windows. Mac OS X, has second market share in Operating System, is operated by loading kernel image to physical memory area. In this paper, We propose a methodology for physical memory analysis on Mac OS X using symbol information in kernel image, and acquire a process information, mounted device information, kernel information, kernel extensions(eg. KEXT) and system call entry for detecting system call hooking. In additional to the methodology, we prove that physical memory analysis is very useful though experimental study.

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.

Evaluating Accuracy according to the Evaluator and Equipment Using Electronic Apex Locators

  • Yu, Beom-Young;Son, Keunbada;Lee, Kyu-Bok
    • Journal of Korean Dental Science
    • /
    • v.13 no.2
    • /
    • pp.52-58
    • /
    • 2020
  • Purpose: Using two types of electronic apex locators, this study aimed to investigate the differences in accuracy according to the evaluator and equipment. Materials and Methods: Artificial teeth of the lower first premolars and two mandibular acrylic models (A and B) were used in this study. In the artificial teeth, the pulp chamber was opened and the access cavity was prepared. Using calibrated digital Vernier calipers, the distance from the top of the cavity and the root apex was measured to assess the actual distance between two artificial teeth. The evaluation was conducted by 20 dentists, and each evaluator repeated measurements for each electronic apex locator five times. The difference between the actual distance from the top of the cavity to the root apex and the distance measured using electronic measuring equipment was compared. For statistical analysis, the Friedman test the Mann-Whitney U-test were conducted and the differences between groups were analyzed (α=0.05). Result: As for the accuracy of measurement according to the two types of electronic apex locators, the value of the measurement error was 0.4753 mm in Dentaport ZX and 0.3321 mm in E-Cube Plus. Moreover, electronic apex locators Dentaport ZX and E-Cube Plus showed statistically significant differences (P<0.05). As for the difference in the accuracy of the two types of electronic apex locators according to the evaluator, the resulting values differed depending on the evaluator and showed a statistically significant difference (P<0.001). Conclusion: Electronic apex locator E-Cube Plus showed higher accuracy than did Dentaport ZX. Nevertheless, both types of electronic apex locators showed 100% accuracy in finding the region within root apex ±0.5 mm zone. Furthermore, according to the evaluator, the two electronic apex locators showed different resulting values.

Camera Model Identification Using Modified DenseNet and HPF (변형된 DenseNet과 HPF를 이용한 카메라 모델 판별 알고리즘)

  • Lee, Soo-Hyeon;Kim, Dong-Hyun;Lee, Hae-Yeoun
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.8
    • /
    • pp.11-19
    • /
    • 2019
  • Against advanced image-related crimes, a high level of digital forensic methods is required. However, feature-based methods are difficult to respond to new device features by utilizing human-designed features, and deep learning-based methods should improve accuracy. This paper proposes a deep learning model to identify camera models based on DenseNet, the recent technology in the deep learning model field. To extract camera sensor features, a HPF feature extraction filter was applied. For camera model identification, we modified the number of hierarchical iterations and eliminated the Bottleneck layer and compression processing used to reduce computation. The proposed model was analyzed using the Dresden database and achieved an accuracy of 99.65% for 14 camera models. We achieved higher accuracy than previous studies and overcome their disadvantages with low accuracy for the same manufacturer.

An Exploratory Study on the Establishment and Provision of Universal Literacy for Sustainable Development in the Era of Fake News (가짜뉴스의 시대, 지속가능한 발전을 위한 보편적 리터러시의 구축 및 제공에 대한 실험적 연구)

  • Lee, Jeong-Mee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.85-106
    • /
    • 2021
  • The purpose of this study is to examine the concept and definition of fake news focusing on misinformation/false information and is to examine the ways in which our society can respond to the distortion of social reality and damage to democracy caused by information distortion such as fake news. To do this, the concept of fake news was examined based on the level of facticity and intention to device, and our social environment in which fake news was created and spread was examined from the perspective of datafication. In this environment, the library community, which plays a pivotal role in human access to and use of information, argued that it should strive to establish and provide universal literacy education in order to realize the Sustainable Development Goals of the UN 2030 agenda. The core of universal literacy education is to understand the society by investigating and analyzing data communication types according to the degree of datafication and the political, economic, social, and cultural background of society. For this reason, it was concluded that universal literacy should be implemented flexibly according to the degree of datafiation and users of each society.