• Title/Summary/Keyword: 국가코드

Search Result 207, Processing Time 0.024 seconds

Performance Evaluation of A Molecular Dynamics Code on Multi-core Systems (멀티 코어 시스템에서의 분자 동역학 코드 성능 분석)

  • Cha, Kwangho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.111-113
    • /
    • 2013
  • 멀티 코어 시스템의 보급으로 일반 시스템에서도 프로그램의 병렬 실행이 가능해지고 있다. 본 연구에서는 멀티 코어를 사용하는 단일 시스템에서 분자 동역학 코드인 LAMMPS를 대상으로 병렬 수행 성능을 확인하고 분석하여 효과적인 실행 조건을 살펴보았다. LAMMPS의 구조적인 특징과 공간 분할 방식의 사용으로 인하여 단일 시스템에서도 메시지 전달 방식에 의한 병렬 수행이 보다 효율적임을 확인할 수 있었다.

KpqC에 제출된 코드기반 암호의 소개 및 분석

  • Ji-Hoon Hong;Byung-Sun Won;Jon-Lark Kim
    • Review of KIISC
    • /
    • v.33 no.3
    • /
    • pp.49-57
    • /
    • 2023
  • Shor 알고리즘의 영향으로 RSA 등 기존 잘 알려진 암호 알고리즘들은 양자컴퓨터가 등장하면 안전성에 대한 위험을 받게 된다. NIST에서는 양자컴퓨터 환경으로부터 보안성이 유지되는 암호를 선정하기 위한 양자내성암호 공모전을 개최하였다. 또한, 국내에서도 양자내성암호 분야의 경쟁력 향상과 기술 저변 확대를 위해 양자내성암호 국가공모전(KpqC 공모전)을 개최하였다. 본 논문은 KpqC 공모전 1라운드에 제출된 4개의 코드 기반 양자내성암호 알고리즘에 대한 소개, 퍼포먼스 및 안전성에 관하여 살펴볼 것이다.

Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response (이미지 및 코드분석을 활용한 보안관제 지향적 웹사이트 위·변조 탐지 시스템)

  • Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.871-883
    • /
    • 2014
  • New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit or national confusion are being emerged and evolved. In addition, in case of 'drive by download' attack, if a host just visits the compromised websites, then the host is infected by a malware. Website falsification detection system is one of the most powerful solutions to cope with such cyber threats that try to attack the websites. Many domestic CERTs including NCSC (National Cyber Security Center) that carry out security monitoring and response service deploy it into the target organizations. However, the existing techniques for the website falsification detection system have practical problems in that their time complexity is high and the detection accuracy is not high. In this paper, we propose website falsification detection system based on image and code analysis for improving the performance of the security monitoring and response service in CERTs. The proposed system focuses on improvement of the accuracy as well as the rapidity in detecting falsification of the target websites.

A Study on Data Sharing Codes Definition of Chinese in CAI Application Programs (CAI 응용프로그램 작성시 자료공유를 위한 한자 코드 체계 정의에 관한 연구)

  • Kho, Dae-Ghon
    • Journal of The Korean Association of Information Education
    • /
    • v.2 no.2
    • /
    • pp.162-173
    • /
    • 1998
  • Writing a CAI program containing Chinese characters requires a common Chinese character code to share information for educational purposes. A Chinese character code setting needs to allow a mixed use of both vowel and stroke order, to represent Chinese characters in simplified Chinese as well as in Japanese version, and to have a conversion process for data exchange among different sets of Chinese codes. Waste in code area is expected when vowel order is used because heteronyms are recognized as different. However, using stroke order facilitates in data recovery preventing duplicate code generation, though it does not comply with the phonetic rule. We claim that the first and second level Chinese code area needs to be expanded as much as academic and industrial circles have demanded. Also, we assert that Unicode can be a temporary measure for an educational code system due to its interoperability, expandability, and expressivity of character sets.

  • PDF

RFID Code System for Traceability of Medical Herb (한약재 이력 정보 추적을 위한 RFID 코드체계)

  • Kim, Chul;Kim, Sang-Kyun;Kim, Jin-Hyun;Song, Mi-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.973-977
    • /
    • 2009
  • The tracing system means that the system can follows, traces, and records every steps of production and delivery of goods and its ingredient. Specially, Koreans have big concern about food tracing system which is influential for health directly. We were more interested in medical herb using in oriental medicine than any other things. We proposed the process and design of tracing system for medical herb based on RFID(Radio Frequency IDentification) technology in this research. This study shows current medical herb tracing ways and RFID code system by using for world standard. Firstly, We designed the new process of traceability of medical herb with various preceding references based on RFID technology. Secondly we suggest that RFID code configuration using the international standard code(ISO code) and korean agricultural and marine products code for the proposed process. RFID code system is very important because this plays a means of identification for tracing about medical herb. The proposed code system have the elements as Issuing Agency Code, Issuer Number, inspection information, inheritance flag, area code, modified agricultural and marine products code, serial number in 96 Bit length. Lastly We defined the code-generation process in the tracing system.

A Study on Experimental Test and Analysis of Japanese DGPS Data (For 3 Japanese DGPS Stations near the South-East Coast of Korea) (일본 DGPS Data 측정 실험 및 분석 (한반도 남동해안 인접 3개 DGPS 기준국을 중심으로))

  • 고광섭;심재관;정세모
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.82-89
    • /
    • 1999
  • 미국의 전파항법정책(FRP Federal Radionavigation Plan)은 여전히 SA정책(미국방성에서 GPS 위성 궤도에 오차를 실어 전파발사를 하는 정책)을 유지하고 있고, P(Y)코드 접속에 의한 고정밀 위치정보 사용 역시 미군 및 NATO군 등 미 국방성에서 인가한 사용자에게만 허용되고 있는 관계로 그 외의 사용자는 3차원 고정밀 위치정보가 요구되는 항공기 이착륙 유도시스템, 해ㆍ육상 정밀 구조/탐색 및 육ㆍ해ㆍ공 특수목적 등에 군사용 P(Y)코드대신 DGPS를 사용하고 있다. 본 연구는 한반도 남해안 및 동해안 일부까지를 유효거리로 하고 있는 일본 Marine Radiobeaeon/DGPS 시스템에 대한 한반도 연근해에서의 위치정보 사용 가능성을 확인하기 위해 한반도 남해안에서 측정 가능한 일본 DGPS국을 선택 모델로 하여 DGPS Data 측정실험 및 위치정보 정밀도 분석을 하였다. 연구결과 군사용 P(Y) 코드수준의 정밀도를 유지하고 있어 곧 구축 예정인 한국형 DGPS 국가망과 함께 선택적으로 사용할 수 있음을 확인하였다.

  • PDF

A Study on Safe Identification Card Using Fingerprint Recognition and Encrypted QR (지문인식기술과 암호화된 QR코드를 이용한 안전한 신분증 연구)

  • Song, Chung-Geon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.317-323
    • /
    • 2014
  • The registration cards that are currently used to identify the people of Korea may cause secondary damage once stolen because they contain very specifically expressed fingerprint information. In order to solve this problem, in ID is required that can utilize the state-owned fingerprint DB, while while maintaining confidentiality of the identification information and satisfying the cost as well. At this point accordingly, a secure form of ID, which uses the encrypted QR code and fingerprint information, is proposed.

Three Phase Voltage Sag Generator for LVRT Algorithm Verification with LVRT Requirements of Various Grid Codes (다양한 국가의 계통 코드를 만족하는 LVRT 알고리즘 검증용 3상 저전압 발생장치)

  • Lee, Jongpil;Lee, Kyoung-Jun;Shin, Dongsul;Kim, Taejin;Yoo, Dongwook;Cho, DongHwan
    • Proceedings of the KIPE Conference
    • /
    • 2013.07a
    • /
    • pp.149-150
    • /
    • 2013
  • 본 논문에서는 계통 이상 시 요구되는 대용량 분산발전용 계통연계형 PCS의 LVRT(Low Voltage Ride Through) 알고리즘을 시험하기 위한 저전압발생장치를 제안한다. 제안한 저전압 발생장치는 변압기 tap 변경 방식을 적용하여 원하는 시점과 전압레벨에 저전압 조건을 만들 수 있는 시스템을 구성하고 대용량 확장성을 고려하여 모든 나라의 LVRT 계통 코드를 만족 할 수 있다. 제안한 저전압 발생 시스템의 나라별 LVRT 코드 발생 특성을 살펴보고 10kVA급 저전압발생 시스템을 통해 유용성을 확인한다.

  • PDF

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF