• Title/Summary/Keyword: non-format

Search Result 188, Processing Time 0.026 seconds

A GF(2163) scalar multiplier for elliptic curve cryptography (타원곡선 암호를 위한 GF(2163) 스칼라 곱셈기)

  • Jeong, Sang-Hyeok;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.686-689
    • /
    • 2009
  • This paper describes a scalar multiplier for Elliptic curve cryptography. The scalar multiplier has 163-bits key size which supports the specifications of smart card standard. To reduce the computational complexity of scalar multiplication on finite field $GF(2^{163})$, the Non-Adjacent-Format (NAF) conversion algorithm based on complementary recoding is adopted. The scalar multiplier core synthesized with a $0.35-{\mu}m$ CMOS cell library has 32,768 gates and can operate up to 150-MHz@3.3-V. It can be used in hardware design of Elliptic curve cryptography processor for smart card security.

  • PDF

Real-time Video Playback Method for N-Screen Service Based on Windows Azure (Windows Azure 기반의 N-스크린 서비스를 위한 실시간 동영상 재생 기법)

  • Lee, Won-Joo;Lim, Heon-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.1-10
    • /
    • 2014
  • In this paper, we propose a real-time video playback scheme for the N-Screen service based on Windows Azure. This scheme creates several playback blocks based on the performance of each node by non-uniform splitting of the original video. To reduce transcoding-time, it allocates the playback blocks to a corresponding node by transcoding the playback blocks. Through the simulation, we show that it is more effective to use real-time video playback for the N-screen service than the previous method. The proposed scheme splits an AVI format 300MB source video with non-uniform playback blocks. It allocates the playback blocks to the heterogeneous node of Windows Azure, the commercial cloud system and measures of transcoding-time by transcoding non-uniform playback blocks to mp4 and Flv format. As a result, the proposed scheme improves the performance of the N-screen service based on Windows Azure compared to the previous uniform split strategy.

A study of the color De-interlacing ASIC Chip design adopted the improved interpolation Algorithm for improving the picture quality using color space converter. (ADI 보간 알고리듬을 적용한 Color Space Converter 칩 설계에 관한 연구)

  • 이치우;박노경;진현준;박상봉
    • Proceedings of the IEEK Conference
    • /
    • 2001.06d
    • /
    • pp.199-202
    • /
    • 2001
  • A current TV-OUT format is quite different from that of HDTY or PC monitor in encoding techniques. In other words, a conventional analog TV uses interlaced display while HDTV or PC monitor uses Non-interlaced / Progressive-scanned display. In order to encode image signals coming from devices that takes interlaced display format for progressive scanned display, a hardware logic in which scanning and interpolation algorithms are implemented is necessary. The ELA (Edge-Based Line Average) algorithm have been widely used because it provided good characteristics. In this study, the ADI(Adaptive De-interlacing Interpolation) algorithm using to improve the algorithm which shows low quality in vertical edge detections and low efficiency of horizontal edge lines. With the De-interlacing ASIC chip that converts the interlaced Digital YUV to De-interlaced Digital RGB is designed. The VHDL is used for chip design.

  • PDF

The Design and Implementation of Secure-ReXpis System with Internet Environment (인터넷 환경 하에서의 Secure-ReXpis 시스템 설계 및 구현)

  • 안경림;박상필;백혜경;임병찬;박준홍;고대식
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.101-113
    • /
    • 2001
  • Security is very important in EC(Electronic Commerce) environment because exchanged information(that is transaction details, private data, charges data(card-no, accounts), etc) is various and is very sensitive. So, In this paper, we propose Secure-ReXpis(Reliable St excellent Xh3 Processing Infrastructure) System that transfer message and support Message Level Security(Encryption/Decryption and Digital Signature). And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services. This system support XML message format and EDI message, WEB Data and Private Format Data, etc.

  • PDF

Study on an Establishment of an Online Union Catalog System through a MARC Conversion - Focusing on the Project of KIEP Northeast Asia - (MARC 변환을 통한 온라인종합목록 시스템구축에 관한 연구 - KIEP 동북아 Project를 중심으로 -)

  • Kim, Yun-Sil
    • Journal of Information Management
    • /
    • v.28 no.1
    • /
    • pp.1-33
    • /
    • 1997
  • Led by KIEP, this project to establish an Online Union Catalog System on Northeast Asia is the first such attempt to create a collaboration between social science libraries in Korea. This Online Union Catalog System is seen as a problem solving mechanism, as it helps to maximize efficiency in utilizing labor, finance, and data, by sharing library resources. This study focuses on the process of converting databases in a non-MARC format to a MARC format.

  • PDF

Compensation Characteristics Dependence on Variation of Fiber Dispersion in WDM Systems with Optical Phase Conjugator (광 위상 공액기가 적용된 WDM 시스템에서 광섬유 분산 계수 변동에 따른 보상 특성)

  • 이성렬;박경호;정명래
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.5
    • /
    • pp.517-524
    • /
    • 2004
  • In this paper, we investigated the compensation characteristics of distorted NRZ format and RZ format signal dependence on dispersion variation of each transmission section in 8-channel WDM system. The WDM system have two transmission sections of unequal length with respect to optical phase conjugator(OPC) position. We select highly-nonlinear dispersion shifted fiber(HNL-DSF) as a nonlinear medium of OPC in order to convert wideband signal waves to conjugated waves. First, we confirmed that RZ is better than NRZ as a modulation format for maintenance or stable performance, when total dispersion or both sections in WDM system is different each other. Also, we confirmed that total dispersion of the short length section must be smaller than that of the long length section in order to excellently compensate for NRZ format signal.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

Field studies of wind induced internal pressure in a warehouse with a dominant opening

  • Guha, T.K.;Sharma, R.N.;Richards, P.J.
    • Wind and Structures
    • /
    • v.16 no.1
    • /
    • pp.117-136
    • /
    • 2013
  • A field study of wind-induced internal pressures in a flexible and porous industrial warehouse with a single dominant opening, of various sizes for a range of moderate wind speeds and directions, is reported in this paper. Comparatively weak resonance of internal pressure for oblique windward opening situations, and hardly discernible at other wind directions, is attributed to the inherent leakage and flexibility in the envelope of the building in addition to the moderate wind speeds encountered during the tests. The measured internal pressures agree well with the theoretical predictions obtained by numerically simulating the analytical model of internal pressure for a porous and flexible building with a dominant opening. Ratios of the RMS and peak internal to opening external pressures obtained in the study are presented in a non-dimensional format along with other published full scale measurements and compared with the non-dimensional design equation proposed in recent literature.

A Study on Verification of Equivalence and Effectiveness of Non-Pharmacologic Dementia Prevention and Early Detection Contents : Non-Randomly Equivalent Design

  • Jeong, Hyun-Seok;Kim, Oh-Lyong;Koo, Bon-Hoon;Kim, Ki-Hyun;Kim, Gi-Hwan;Bai, Dai-Seg;Kim, Ji-Yean;Chang, Mun-Seon;Kim, Hye-Geum
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.2
    • /
    • pp.315-324
    • /
    • 2022
  • Objective : The aim of this study was to verify the equivalence and effectiveness of the tablet-administered Korean Repeatable Battery for the Assessment of Neuropsychological Status (K-RBANS) for the prevention and early detection of dementia. Methods : Data from 88 psychiatry and neurology patient samples were examined to evaluate the equivalence between tablet and paper administrations of the K-RBANS using a non-randomly equivalent group design. We calculated the prediction scores of the tablet-administered K-RBANS based on demographics and covariate-test scores for focal tests using norm samples and tested format effects. In addition, we compared the receiver operating characteristic curves to confirm the effectiveness of the K-RBANS for preventing and detecting dementia. Results : In the analysis of raw scores, line orientation showed a significant difference (t=-2.94, p<0.001), and subtests showed small to large effect sizes (0.04-0.86) between paper- and tablet-administered K-RBANS. To investigate the format effect, we compared the predicted scaled scores of the tablet sample to the scaled scores of the norm sample. Consequently, a small effect size (d≤0.20) was observed in most of the subtests, except word list and story recall, which showed a medium effect size (d=0.21), while picture naming and subtests of delayed memory showed significant differences in the one-sample t-test. In addition, the area under the curve of the total scale index (TSI) (0.827; 95% confidence interval, 0.738-0.916) was higher than that of the five indices, ranging from 0.688 to 0.820. The sensitivity and specificity of TSI were 80% and 76%, respectively. Conclusion : The overall results of this study suggest that the tablet-administered K-RBANS showed significant equivalence to the norm sample, although some subtests showed format effects, and it may be used as a valid tool for the brief screening of patients with neuropsychological disorders in Korea.

Design of Elliptic Curve Cryptographic Coprocessor over binary fields for the IC card (IC 카드를 위한 polynomial 기반의 타원곡선 암호시스템 연산기 설계)

  • 최용제;김호원;김무섭;박영수
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.305-308
    • /
    • 2001
  • This paper describes the design of elliptic curve cryptographic (ECC) coprocessor over binary fields for the If card. This coprocessor is implemented by the shift-and-add algorithm for the field multiplication algorithm. And the modified almost inverse algorithm(MAIA) is selected for the inverse multiplication algorithm. These two algorithms is merged to minimize the hardware size. Scalar multiplication is performed by the binary Non Adjacent Format(NAF) method. The ECC we have implemented is defined over the field GF(2$^{163}$), which is a SEC-2 recommendation[7]..

  • PDF