• Title/Summary/Keyword: fast implementation

Search Result 1,098, Processing Time 0.024 seconds

A Platform Conception of Road Information Telecommunication System for Call & Response Service (Call & Response 서비스를 위한 도로정보통신 플랫폼 구상)

  • Yim, Choon-Sik;Lee, Ki-Young;Song, Pil-Yong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.5
    • /
    • pp.1-12
    • /
    • 2008
  • In this paper, we described about core technologies required for the seamless service implementation and the communication system structure conceiving required for call & response services in order that the real-time traffic information service is consecutively provided to the vehicle moving at high speed. The SMART highway service is the information communication environment build-up concept which the real-time C&R service is comprised of the vehicle moving with 160km/h above. It was possible in case of being the low speed car in the DSRC system structure. However, there is a limit in the high speed environment as the DSRC system like a convention. In this paper, we proposed the structure of fitting for the SMART highway environment using the hand-over technique compositing the base station and several repeaters of DSRC system.

  • PDF

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

A Web-GIS based on Object Location Information Monitoring System for Ubiquitous Environment (유비쿼터스 환경을 위한 Web-GIS 기반의 객체위치정보 모니터링 시스템)

  • Kim, Taek-Cheon;Kim, Seok-Hun;Kim, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1755-1763
    • /
    • 2007
  • Specially, location information can say that is important information in this ubiquitous environment and solutions of new GIS system to utilize this are required. Examine method to improve web geography information service system because this paper uses XML and presented specific implementation result. Through internet. it planed various geography information that offer in form of service that do not receive restriction of heterogeneous system environment. Also, did thing that is easy when request service about geography information that user need and deliver fast by purpose. Supplement and to improve open-ended and XML of form normalized use and developed existent web geography information service. So that can use map service in web browser without setup of application program that buy expensive GIS software or offer in each company design and implement.

Design and Implementation of Minutes Summary System Based on Word Frequency and Similarity Analysis (단어 빈도와 유사도 분석 기반의 회의록 요약 시스템 설계 및 구현)

  • Heo, Kanhgo;Yang, Jinwoo;Kim, Donghyun;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.620-629
    • /
    • 2019
  • An automated minutes summary system is required to objectively summarize and classify the contents of discussions or discussions for decision making. This paper designs and implements a minutes summary system using word2vec model to complement the existing minutes summary system. The proposed system is further implemented with word2vec model to remove index words during morpheme analysis and to extract representative sentences with common opinions from documents. The proposed system automatically classifies documents collected during the meeting process and extracts representative sentences representing the agenda among various opinions. The conference host can quickly identify and manage all the agendas discussed at the meeting through the proposal system. The proposed system analyzes various agendas of large-scale debates or discussions and summarizes sentences that can be representative opinions to support fast and accurate decision making.

Design and Implementation of Selective Data Management System (선택적 자료 관리 시스템 설계 및 구현)

  • Kweon, Dae-Gon;Choi, Shin-Hyeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.67-72
    • /
    • 2006
  • Because computer system is complex gradually from fast growth of the Internet and sudden increase of Internet user and scale is growing, and dependence for computer system is rising gradually, data damage by mistake or disaster is big enough to can not imagine. Usually is continuous if wish to inform through internet and must update data stably, we should manage so that precious data is not erased from sudden problem through periodic backup. Plan to protect data safely for this should be readied. This paper proposes system that can make effective backup environment because consider environment and achievement method in these data management side. That is, implements system that achieve data backup and restore selectively in internet. Backup and restore about data had stored through browser even if disconnect directly to server because it is possible connect in internet by advantage of proposing system are available. Also, This system can manage data stored to server more efficiently by using selectively both backup and restore two methods.

  • PDF

Implementation of Customer Behavior Evaluation System Using Real-time Web Log Stream Data (실시간 웹로그 스트림데이터를 이용한 고객행동평가시스템 구현)

  • Lee, Hanjoo;Park, Hongkyu;Lee, Wonsuk
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.12
    • /
    • pp.1-11
    • /
    • 2018
  • Recently, the volume of online shopping market continues to be fast-growing, that is important to provide customized service based on customer behavior evaluation analysis. The existing systems only provide analysis data on the profiles and behaviors of the consumers, and there is a limit to the processing in real time due to disk based mining. There are problems of accuracy and system performance problems to apply existing systems to web services that require real-time processing and analysis. Therefore, The system proposed in this paper analyzes the web click log streams generated in real time to calculate the concentration level of specific products and finds interested customers which are likely to purchase the products, and provides and intensive promotions to interested customers. And we verify the efficiency and accuracy of the proposed system.

Analysis of Detection Method for the Weather Change in a Local Weather Radar (국지적 기상 레이다에서의 기상 변화 탐지 방법 분석)

  • Lee, Jonggil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1345-1352
    • /
    • 2021
  • Most of weather radar systems are used to monitor the whole weather situation for the very wide and medium-to-long range area. However, as the likelihood of occurrence of the local weather hazards is increased in recent days, it is very important to detect these wether phenomena with a local weather radar. For this purpose, it is necessary to detect the fast varying low altitude weather conditions and the effect of the ground surface clutter is more evident. Therefore, in this paper, the newly suggested method is explained and analyzed for detection of weather hazards such as the gust and wind shear using the fluctuation of wind velocities and the gradient of wind velocities among range cells. It is shown that the suggested method can be used efficiently in the future for faster detection of weather change through the simple algorithm implementation and also the effect of the ground clutter can be minimized in the detection procedure.

Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard (3GPP2 C.S0024-A v.2.0 표준을 적용한 CDMA2000 1x EV-DO 보안 계층 설계 및 구현)

  • Yang, Jong-Won;Cho, Jin-Man;Lee, Tae-Hoon;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • In security layer in the CDMA2000 1x EV-DO, a standard - C.S0024-a v2.0 is being accomplished under the project of 3GPP2(3rd Generation Partnership Project2). Therefore, a security device is needed to implement the security layer which is defined on the standard document for data transfer security between AT(Access Terminal) and AN(Access Network) on CDMA2000 1x EV-DO environment. This paper realizes the security layer system that can make safe and fast transfer of data between AT and AN. It could be applied to various platform environments by designing and implementing the Security Layer in the CDMA2000 1x EV-DO Security Layer to which applies C.S0024-A v2.0 of 3GPP2.

Implementation of FPGA Verification System with Slave FIFO Interface and FX3 USB 3 Bridge Chip (FX3 USB 3 브릿지 칩과 slave FIFO 인터페이스를 사용하는 FPGA 검증 시스템 구현)

  • Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.259-266
    • /
    • 2021
  • USB bus not only works with convenience but also transmits data fast and becomes a standard peripheral interface between FPGA development board and personal computer. In this paper FPGA verification system with slave FIFO interface for Cypress FX3 USB 3 bridge chip was implemented. The designed slave FIFO interface consists of host interface module based on FIFO structure, master bus controller and command decoder and supports streaming communication interface for FX3 bridge chip and memory-mapped input and output interface for user design circuit. The ZestSC3 board with Cypress FX3 USB 3 bridge chip and Xilinx Artix FPGA(XC7A35T-1C5G3241) was used to implement FPGA verification system. It was verified that the FPGA verification system for user design circuit operated correctly under various clock frequencies using GUI software developed by visual C# and C++ DLL. The designed slave FIFO interface for FPGA verification system has modular structure and can be applicable to the different user designs with memory-mapped I/O interface.

A High-Performance ECC Processor Supporting NIST P-521 Elliptic Curve (NIST P-521 타원곡선을 지원하는 고성능 ECC 프로세서)

  • Yang, Hyeon-Jun;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.548-555
    • /
    • 2022
  • This paper describes the hardware implementation of elliptic curve cryptography (ECC) used as a core operation in elliptic curve digital signature algorithm (ECDSA). The ECC processor supports eight operation modes (four point operations, four modular operations) on the NIST P-521 curve. In order to minimize computation complexity required for point scalar multiplication (PSM), the radix-4 Booth encoding scheme and modified Jacobian coordinate system were adopted, which was based on the complexity analysis for five PSM algorithms and four different coordinate systems. Modular multiplication was implemented using a modified 3-Way Toom-Cook multiplication and a modified fast reduction algorithm. The ECC processor was implemented on xczu7ev FPGA device to verify hardware operation. Hardware resources of 101,921 LUTs, 18,357 flip-flops and 101 DSP blocks were used, and it was evaluated that about 370 PSM operations per second were achieved at a maximum operation clock frequency of 45 MHz.