• Title/Summary/Keyword: shared layer

Search Result 57, Processing Time 0.024 seconds

Cycle Extendability of Torus Sub-Graphs in the Enhanced Pyramid Network (개선된 피라미드 네트워크에서 토러스 부그래프의 사이클 확장성)

  • Chang, Jung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1183-1193
    • /
    • 2010
  • The pyramid graph is well known in parallel processing as a interconnection network topology based on regular square mesh and tree architectures. The enhanced pyramid graph is an alternative architecture by exchanging mesh into the corresponding torus on the base for upgrading performance than the pyramid. In this paper, we adopt a strategy of classification into two disjoint groups of edges in regular square torus as a basic sub-graph constituting of each layer in the enhanced pyramid graph. Edge set in the torus graph is considered as two disjoint sub-sets called NPC(represents candidate edge for neighbor-parent) and SPC(represents candidate edge for shared-parent) whether the parents vertices adjacent to two end vertices of the corresponding edge have a relation of neighbor or sharing in the upper layer of the enhanced pyramid graph. In addition, we also introduce a notion of shrink graph to focus only on the NPC-edges by hiding SPC-edges within the shrunk super-vertex on the resulting shrink graph. In this paper, we analyze that the lower and upper bounds on the number of NPC-edges in a Hamiltonian cycle constructed on $2^n{\times}2^n$ torus is $2^{2n-2}$ and $3{\cdot}2^{2n-2}$ respectively. By expanding this result into the enhanced pyramid graph, we also prove that the maximum number of NPC-edges containable in a Hamiltonian cycle is $4^{n-1}$-2n+1 in the n-dimensional enhanced pyramid.

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

Performance Analysis of Slave-Side Arbitration Schemes for the Multi-Layer AHB BusMatrix (ML-AHB 버스 매트릭스를 위한 슬레이브 중심 중재 방식의 성능 분석)

  • Hwang, Soo-Yun;Park, Hyeong-Jun;Jhang, Kyoung-Son
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.5_6
    • /
    • pp.257-266
    • /
    • 2007
  • In On-Chip bus, the arbitration scheme is one of the critical factors that decide the overall system performance. The arbitration scheme used in traditional shared bus is the master-side arbitration based on the request and grant signals between multiple masters and single arbiter. In the case of the master-side arbitration, only one master and one slave can transfer the data at a time. Therefore the throughput of total bus system and the utilization of resources are decreased in the master-side arbitration. However in the slave-side arbitration, there is an arbiter at each slave port and the master just starts a transaction and waits for the slave response to proceed to the next transfer. Thus, the unit of arbitration can be a transaction or a transfer. Besides the throughput of total bus system and the utilization of resources are increased since the multiple masters can simultaneously perform transfers with independent slaves. In this paper, we implement and analyze the arbitration schemes for the Multi-Layer AHB BusMatrix based on the slave-side arbitration. We implement the slave-side arbitration schemes based on fixed priority, round robin and dynamic priority and accomplish the performance simulation to compare and analyze the performance of each arbitration scheme according to the characteristics of the master and slave. With the performance simulation, we observed that when there are few masters on critical path in a bus system, the arbitration scheme based on dynamic priority shows the maximum performance and in other cases, the arbitration scheme based on round robin shows the highest performance. In addition, the arbitration scheme with transaction based multiplexing shows higher performance than the same arbitration scheme with single transfer based switching in an application with frequent accesses to the long latency devices or memories such as SDRAM. The improvements of the arbitration scheme with transaction based multiplexing are 26%, 42% and 51%, respectively when the latency times of SDRAM are 1, 2 and 3 clock cycles.

Ecological Changes of Insect-damaged Pinus densiflora Stands in the Southern Temperate Forest Zone of Korea (I) (솔잎혹파리 피해적송림(被害赤松林)의 생태학적(生態学的) 연구(研究) (I))

  • Yim, Kyong Bin;Lee, Kyong Jae;Kim, Yong Shik
    • Journal of Korean Society of Forest Science
    • /
    • v.52 no.1
    • /
    • pp.58-71
    • /
    • 1981
  • Thecodiplosis japonesis is sweeping the Pinus densiflora forests from south-west to north-east direction, destroying almost all the aged large trees as well as even the young ones. The front line of infestation is moving slowly but ceaselessly norhwards as a long bottle front. Estimation is that more than 40 percent of the area of P. densiflora forest has been damaged already, however some individuals could escapes from the damage and contribute to restore the site to the previous vegetation composition. When the stands were attacked by this insect, the drastic openings of the upper story of tree canopy formed by exclusively P. densiflora are usually resulted and some environmental factors such as light, temperature, litter accumulation, soil moisture and offers were naturally modified. With these changes after insect invasion, as the time passes, phytosociologic changes of the vegetation are gradually proceeding. If we select the forest according to four categories concerning the history of the insect outbreak, namely, non-attacked (healthy forest), recently damaged (the outbreak occured about 1-2 years ago), severely damaged (occured 5-6 years ago), damage prolonged (occured 10 years ago) and restored (occured about 20 years ago), any directional changes of vegetation composition could be traced these in line with four progressive stages. To elucidate these changes, three survey districts; (1) "Gongju" where the damage was severe and it was outbroken in 1977, (2) "Buyeo" where damage prolonged and (3) "Gochang" as restored, were set, (See Tab. 1). All these were located in the south temperate forest zone which was delimited mainly due to the temporature factor and generally accepted without any opposition at present. In view of temperature, the amount and distribution of precipitation and various soil factor, the overall homogeneity of environmental conditions between survey districts might be accepted. However this did not mean that small changes of edaphic and topographic conditions and microclimates can induce any alteration of vegetation patterns. Again four survey plots were set in each district and inter plot distance was 3 to 4 km. And again four subplots were set within a survey plot. The size of a subplot was $10m{\times}10m$ for woody vegetation and $5m{\times}5m$ for ground cover vegetation which was less than 2 m high. The nested quadrat method was adopted. In sampling survey plots, the followings were taken into account: (1) Natural growth having more than 80 percent of crown density of upper canopy and more than 5 hectares of area. (2) Was not affected by both natural and artificial disturbances such as fire and thinning operation for the past three decades. (3) Lower than 500 m of altitude (4) Less than 20 degrees of slope, and (5) Northerly sited aspect. An intensive vegetation survey was undertaken during the summer of 1980. The vegetation was devided into 3 categories for sampling; the upper layer (dominated mainly by the pine trees), the middle layer composed by oak species and other broad-leaved trees as well as the pine, and the ground layer or the lower layer (shrubby form of woody plants). In this study our survey was concentrated on woody species only. For the vegetation analysis, calculated were values of intensity, frequency, covers, relative importance, species diversity, dominance and similarity and dissimilasity index when importance values were calculated, different relative weights as score were arbitrarily given to each layer, i.e., 3 points for the upper layer, 2 for the middle layer and 1 for the ground layer. Then the formula becomes as follows; $$R.I.V.=\frac{3(IV\;upper\;L.)+2(IV.\;middle\;L.)+1(IV.\;ground\;L.)}{6}$$ The values of Similarity Index were calculated on the basis of the Relative Importance Value of trees (sum of relative density, frequency and cover). The formula used is; $$S.I.=\frac{2C}{S_1+S_2}{\times}100=\frac{2C}{100+100}{\times}100=C(%)$$ Where: C = The sum of the lower of the two quantitative values for species shared by the two communities. $S_1$ = The sum of all values for the first community. $S_2$ = The sum of all values for the second community. In Tab. 3, the species composition of each plot by layer and by district is presented. Without exception, the species formed the upper layer of stands was Pinus densiflora. As seen from the table, the relative cover (%), density (number of tree per $500m^2$), the range of height and diameter at brest height and cone bearing tendency were given. For the middle layer, Quercus spp. (Q. aliena, serrata, mongolica, accutissina and variabilis) and Pinus densiflora were dominating ones. Genus Rhodedendron and Lespedeza were abundant in ground vegetation, but some oaks were involved also. (1) Gongju district The total of woody species appeared in this district was 26 and relative importance value of Pinus densiflora for the upper layer was 79.1%, but in the middle layer, the R.I.V. for Quercus acctissima, Pinus densiflora, and Quercus aliena, were 22.8%, 18.7% and 10.0%, respectively, and in ground vegetation Q. mongolica 17.0%, Q. serrata 16.8% Corylus heterophylla 11.8%, and Q. dentata 11.3% in order. (2) Buyeo district. The number of species enumerated in this district was 36 and the R.I.V. of Pinus densiflora for the uppper layer was 100%. In the middle layer, the R.I.V. of Q. variabilis and Q. serrata were 8.6% and 8.5% respectively. In the ground vegetative 24 species were counted which had no more than 5% of R.I.V. The mean R.I.V. of P.densiflora ( totaling three layers ) and averaging four plots was 57.7% in contrast to 46.9% for Gongju district. (3) Gochang-district The total number of woody species was 23 and the mean R.I.V. of Pinus densiflora was 66.0% showing greater value than those for two former districts. The next high value was 6.5% for Q. serrata. As the time passes since insect outbreak, the mean R.I.V. of P. densiflora increased as the following order, 46.9%, 57.7% and 66%. This implies that P. densiflora was getting back to its original dominat state again. The pooled importance of Genus Quercus was decreasing with the increase of that for Pinus densiflora. This trend was contradict to the facts which were surveyed at Kyonggi-do area (the central temperate forest zone) reported previously (Yim et al, 1980). Among Genus Quercus, Quercus acutissina, warm-loving species, was more abundant in the southern temperature zone to which the present research is concerned than the central temperate zone. But vice-versa was true with Q. mongolica, a cold-loving one. The species which are not common between the present survey and the previous report are Corpinus cordata, Beltala davurica, Wisturia floribunda, Weigela subsessilis, Gleditsia japonica var. koraiensis, Acer pseudosieboldianum, Euonymus japonica var. macrophylla, Ribes mandshuricum, Pyrus calleryana var. faruiei, Tilia amurensis and Pyrus pyrifolia. In Figure 4 and Table 5, Maximum species diversity (maximum H'), Species diversity (H') and Eveness (J') were presented. The Similarity indices between districts were shown in Tab. 5. Seeing Fig. 6, showing two-dimensional ordination of polts on the basis of X and Y coordinates, Ai plots aggregate at the left site, Bi plots at lower site, and Ci plots at upper-right site. The increasing and decreasing patterns as to Relative Density and Relative Importance Value by genus or species were given in Fig. 7. Some of the patterns presented here are not consistent with the previously reported ones (Yim, et al, 1980). The present authors would like to attribute this fact that two distinct types of the insect attack, one is the short war type occuring in the south temperate forest zone, which means that insect attack went for a few years only, the other one is a long-drawn was type observed at the temperate forest zone in which the insect damage went on continuously for several years. These different behaviours of infestation might have resulted the different ways of vegetational change. Analysing the similarity indices between districts, the very convincing results come out that the value of dissimilarity index between A and B was 30%, 27% between B and C and 35% between A and C (Table 6). The range of similarity index was obtained from the calculation of every possible combinations of plots between two districts. Longer time isolation between communities has brought the higher value of dissimilarity index. The main components of ground vegetation, 10 to 20 years after insect outbreak, become to be consisted of mainly Genus Lespedeza and Rhododendron. Genus Quercus which relate to the top dorminant state for a while after insect attack was giving its place to Pinus densiflora. It was implied that, provided that the soil fertility, soil moisture and soil depth were good enough, Genus Quercuss had never been so easily taken ever by the resistant speeies like Pinus densiflora which forms the edaphic climax at vast areas of forest land. Usually they refer Quercus to the representative component of the undisturbed natural forest in the central part of this country.

  • PDF

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

Study on Gamer Participation 2.0- Focus on Gamers' Communication Mediation (O-S-O-R) Model and Gamers' Communicative Ecology (게이머 참여 2.0 메커니즘 연구-게이머 커뮤니케이션 매개 O-S-O-R 모델과 게이머 커뮤니케이션 생태를 중심으로)

  • Jung, Chang Won
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.95-103
    • /
    • 2022
  • This study aims to understand a gamer participatory mechanism by comparing Gamer Participation 1.0(Bartz Liberation War) and Gamer Participation 2.0(Truck Demonstration). The process of gamers' political participation is analyzed by applying the communication-mediated O-S-O-R model with the case of gamers' truck protests caused by probability items' issue. This study found out that changes in the social, technological, and discursive layers that constitute the gamer's communication ecology led to diversification of communication channels and changes in the perception of games. Gamers utilized the technological layer of the media environment that presupposes immediate mutual communication, expressed opinions on issues in the mobilization process, and shared the necessity of participation to derive collective mobilization. Through communication, gamers were able to participate in socio-political issues with high participation thresholds. This study is significant in that it discussed the gamers' democratic citizenship and role as issue publics. The study suggests that the need for theoretical and methodological expansion to analyze various participatory cases.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.