• Title/Summary/Keyword: high-speed Internet

Search Result 829, Processing Time 0.024 seconds

TCP Congestion Control Algorithm using TimeStamp (TimeStamp를 이용한 TCP 혼잡제어 알고리즘)

  • 김노환
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.126-131
    • /
    • 2000
  • Through many users employ TCP of which the performance has been proved in Internet, but many papers Proposed to improve TCP performance according to varying network architecture. In Particular, BWDP(bandwidth-delay Product) grew larger because of the increasing delay in satellite link and the network's speed-up. To consider these increased bandwidth-delay product, it is suggested that TCP options include Window Scale option. TimeStamp option, and PAWS. Because TCP window size should be commonly high in the network with these increased bandwidth-delay product, the multiple decrease and linear increase scheme of current TCP would cause underflow and instability within network. Then TCP performance is reduced as a result. Thus, to improve TCP congestion control algorithm in the network which has large sized window, this paper proposes the congestion control scheme that controls window size by using TimeStamp option.

  • PDF

A Study on Copyright and License for Mobile App Development (모바일 앱 개발을 위한 저작권 및 라이선스에 관한 연구)

  • Bae, Yu-Mi;Jung, Sung-Jae;Bae, Jung-Min;Jang, Rae-Young;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.668-671
    • /
    • 2014
  • Wiress high-speed internet network and Mobile devices such as smartphones and tablets are popular, production and consumption of information is changing from the PC environment to mobile environment. Thus, the development of related programs in the development of mobile applications than PC is dramatically increasing. In particular, A tool that is very easy to manufacture mobile app are emergence, Professionals, as well as increasing the public's interest. In this paper, when create a moblie apps, copyright and software license to be considered are examined.

  • PDF

The Study on the Review of Domestic Laws for Utilizing Health and Medical Data and of Mediation for Medical Disputes (보건의료데이터 활용을 위한 국내 법률검토 및 의료분쟁에 대한 조정 제도 고찰)

  • Byeon, Seung Hyeok
    • Journal of Arbitration Studies
    • /
    • v.31 no.2
    • /
    • pp.119-135
    • /
    • 2021
  • South Korea has the most advanced technology in the Fourth Industrial Revolution era because of its high-speed Internet commercialization. However, the industry is shrinking due to its various regulations in building and its utilization of personal information as big data. Currently, South Korea's personal data utilization business is in its early stages. In the era of the 4th Industrial Revolution, it is difficult for startups to use data. There are various causes here. Above all, legal regulations to protect personal information are emphasized. This study confirms that transactions of personal medical records through My Data can be made. Moreover, it confirms that there is a need for a mediating role between stakeholders. This study lacks statistical access in the process of performing stakeholder roles. However, personal medical records will be traded safely in the future, and new subjects will enter the market. Furthermore, the domestic bio-industry will develop. Through this study, various problems were derived in establishing Medical MyData in Korea. Moreover, it looks forward to continuing various studies in the health care sector in the future.

Optimal Implementation of Lightweight Block Cipher PIPO on CUDA GPGPU (CUDA GPGPU 상에서 경량 블록 암호 PIPO의 최적 구현)

  • Kim, Hyun-Jun;Eum, Si-Woo;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1035-1043
    • /
    • 2022
  • With the spread of the Internet of Things (IoT), cloud computing, and big data, the need for high-speed encryption for applications is emerging. GPU optimization can be used to validate cryptographic analysis results or reduced versions theoretically obtained by the GPU in a reasonable time. In this paper, PIPO lightweight encryption implemented in various environments was implemented on GPU. Optimally implemented considering the brute force attack on PIPO. In particular, the optimization implementation applying the bit slicing technique and the GPU elements were used as much as possible. As a result, the implementation of the proposed method showed a throughput of about 19.5 billion per second in the RTX 3060 environment, achieving a throughput of about 122 times higher than that of the previous study.

Design and Implementation of Multi-mode Sensor Signal Processor on FPGA Device (다중모드 센서 신호 처리 프로세서의 FPGA 기반 설계 및 구현)

  • Soongyu Kang;Yunho Jung
    • Journal of Sensor Science and Technology
    • /
    • v.32 no.4
    • /
    • pp.246-251
    • /
    • 2023
  • Internet of Things (IoT) systems process signals from various sensors using signal processing algorithms suitable for the signal characteristics. To analyze complex signals, these systems usually use signal processing algorithms in the frequency domain, such as fast Fourier transform (FFT), filtering, and short-time Fourier transform (STFT). In this study, we propose a multi-mode sensor signal processor (SSP) accelerator with an FFT-based hardware design. The FFT processor in the proposed SSP is designed with a radix-2 single-path delay feedback (R2SDF) pipeline architecture for high-speed operation. Moreover, based on this FFT processor, the proposed SSP can perform filtering and STFT operation. The proposed SSP is implemented on a field-programmable gate array (FPGA). By sharing the FFT processor for each algorithm, the required hardware resources are significantly reduced. The proposed SSP is implemented and verified on Xilinxh's Zynq Ultrascale+ MPSoC ZCU104 with 53,591 look-up tables (LUTs), 71,451 flip-flops (FFs), and 44 digital signal processors (DSPs). The FFT, filtering, and STFT algorithm implementations on the proposed SSP achieve 185x average acceleration.

The research regarding the WBI application for a discretionary activity improvement (재량활동 개선을 위한 WBI 활용에 관한 연구)

  • Wi Seon-Jung;Jung Kyu-Cheol;Lee Jin-Kwan;Jang Hae-Suk;Park Ki-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.668-671
    • /
    • 2006
  • High speed internet and web was rapid grow up. There was much influence our society and education field. The growth which the superhigh speed internet is quick leads in the education which is the possibility of confront in information society the educational reform it propels. It is included in the 7th curriculum which emphasizes the ability cultivation it will can dispose in the information society and information education and education information it dos the many enterprise from national dimension. But with the clear vision which is accurate against information education the education contents against hereupon is not presented from the elementary school not to be, the computer education is become accomplished at one part of discretionary activity and the level star education of the resonable information education relation teaching materials and the elementary students does not become accomplished net to be and well information education which becomes does not become accomplished is the actual condition. This research which it use teach - studying of home page base and the student studies self lead and oneself it provides the chance it will be able to evaluate the result regarding studying and also it will provide the paradigm which is the possibility of doing level star studying, it does.

  • PDF

A Performance Comparison of CCA and RMMA Algorithm for Blind Adaptive Equalization (블라인드 적응 등화를 위한 CCA와 RMMA 알고리즘의 성능 비교)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.51-56
    • /
    • 2019
  • This paper related with the performance comparison of CCA and RMMA blind adaptive equalization in order to reduce the intersymbol interference which is occurred in channel when transmitting the 16-QAM signal, high spectrum efficiencies of nonconstant modulus characteristic. The CCA possible to improve the misadustment and initial convergence by compacting the every signal constellation of 16 by using the sliced symbol of the decision device output, namely statistical symbol, but incresing the computational cost. The RMMA possible to minimize the fast convergence speed and misadjustment and channel tracking capability without increasing the computational cost by obtain the error signal after transform to 4 constant modulus signal based on the region of signal constellation located. In this paper, these algorithm were implemented in the same channel, and the blind adaptive equalization performance were compared using the equalizer output signal constellation, residual isi, MSE, SER. As a result of simulation, the RMMA has better performance in output signal constellation, residual isi and MSE compared to the CCA, but has slow convergence speed about 1.3 times. And the SER performance presenting the robustness to the noise signal, the CCA has more beeter in less SNR, but the RMMA has better in greater than 6dB in SNR.

Variable Switching Duty Control of Switched Reluctance Motor using Low-Cost Analog Drive (저가형 아날로그 구동장치를 이용한 Switched Reluctance Motor의 스위칭 Duty 가변제어)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.123-128
    • /
    • 2021
  • For accurate speed and current control in industrial applications, SRM (Switched Reluctance Motor) is very important to synchronize the stator phase excitation and rotor position in the drive due to its nature. In general, position sensors such as encoder and resolver are used to generate rotational force by exciting the stator winding according to the rotor position and to control the motor by using speed and position information. However, for these sensors, 1) the cost of the sensors is quite large in terms of price, so the proportion of the motor system to the total system cost is high. 2) In terms of mechanical, position sensors such as encoders and resolvers are attached to the stator to increase the size and weight. In conclusion, in order to drive the SRM, control based on the rotor position information should be basically performed, and it is important to design the SRM driving system according to the environment in consideration of the application field. Therefore, in this paper, we intend to study the driving and control characteristics of SRM through variable switching duty control by designing a low-cost analog driving device, deviating from the general control system using the conventional encoder and resolver.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

Design and Implementation of the Menu Navigation using Social Network Analysis among the Menus of Management Information System (사회연결망분석을 이용한 경영정보시스템 화면들의 메뉴 네비게이션 설계 및 구현)

  • Lee, Min-Jung;Kim, Jun-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.151-160
    • /
    • 2014
  • Recently enterprises, which posses high-speed internet and high-performance computers, have tried to use MIS(management information systems) to deal with whole task efficiently. This study considers design of menu navigation using SNA(social network analysis) to be able to move between menus of MIS efficiently. We extracted the important menu lists through the high SNA measures such as degree centrality, betweenness centrality and closeness centrality, developed web-pages and investigated its application. The findings will be used for design of web menu navigation and guide of strategic planning for MIS.