• Title/Summary/Keyword: 논리연산

Search Result 310, Processing Time 0.019 seconds

Mechanism of RFID Authentication for u-Vehicle (u-Vehicle 환경에 적합한 RFID 인증 메커니즘)

  • Rhee, Yoon-Jung;Kim, Do-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.66-73
    • /
    • 2008
  • The concept of u-Vehicle is a technological model that people try to build the ubiquitous world in the car which moves, by using the RFID technology as well as the telematics service based on the location. RFID is weak on the point of information security because RFID has possibility for being abused such as chasing, counterfeiting, and invading personal privacy. RFID's tags use a weak cryptographic algorithm. This paper presents the vulnerabilities of information security under u-Vehicle environments. To solve that, we propose a mechanism enhancing RFID tag's security but with low cost by reducing the number of mutual authentication stages and using the hash function.

Moving area detection for moving object tracking (이동 객체 추적을 위한 움직임 영역 검출)

  • 오명관;최동진;전병민
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.281-284
    • /
    • 2003
  • In this study, we have proposed the method of moving area detection as the preprocessing step of moving object tracking system. First, we catch the two frames which are different at time in image sequence. We obtain the moving area by using their binary differential image. In differential image, the object area of previous and current frame is present. In the tracking system, the background is changed by camera motion. So, in this case we have to decide which moving area of object is current at time. We obtain the binary edge image of current frame by applying a threshold to the output of an edge detector. Then we performed logical AND operation between the edge image and differential image. As a result of this work moving area of object can be detected.

  • PDF

Structured Information Modeling and Query Method for SMIL Documents (SMIL 문서의 구조 정보 모델 및 검색)

  • 류은숙;이기호;이규철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.3
    • /
    • pp.293-307
    • /
    • 2004
  • The SMIL(Synchronized Multimedia Integration Language) documents are represented as logical structure information, spatial layout structure information, temporal synchronization structure information and hyperlink structure information, according as the structural characteristics of SMIL documents based on XML. This paper proposes the effective modeling and query method for the multi -structure information of inherent SMIL documents. In particular, we present the object-oriented modeling by using UML class diagram in order to represent the objects classes for the structured information of SMIL documents, and the hierarchical structure and the relationships for the objects classes. In addition, the objects classes definition is specified in compliance with SQL3 for database standard language. We also propose the access method and the query representation for hierarchical structure in order to retrieve efficiently the structural objects of SMIL documents.

  • PDF

Development of Superconductive Arithmetic and Logic Devices (초전도 논리연산자의 개발)

  • Kang J. H
    • Progress in Superconductivity
    • /
    • v.6 no.1
    • /
    • pp.7-12
    • /
    • 2004
  • Due to the very fast switching speed of Josephson junctions, superconductive digital circuit has been a very good candidate fur future electronic devices. High-speed and Low-power microprocessor can be developed with Josephson junctions. As a part of an effort to develop superconductive microprocessor, we have designed an RSFQ 4-bit ALU (Arithmetic Logic Unit) in a pipelined structure. To make the circuit work faster, we used a forward clocking scheme. This required a careful design of timing between clock and data pulses in ALU. The RSFQ 1-bit block of ALU used in this work consisted of three DC current driven SFQ switches and a half-adder. We successfully tested the half adder cell at clock frequency up to 20 GHz. The switches were commutating output ports of the half adder to produce AND, OR, XOR, or ADD functions. For a high-speed test, we attached switches at the input ports to control the high-speed input data by low-frequency pattern generators. The output in this measurement was an eye-diagram. Using this setup, 1-bit block of ALU was successfully tested up to 40 GHz. An RSFQ 4-bit ALU was fabricated and tested. The circuit worked at 5 GHz. The circuit size of the 4-bit ALU was 3 mm ${\times}$ 1.5 mm, fitting in a 5 mm ${\times}$ 5 mm chip.

  • PDF

Improved Authentication Protocol for RFID/USN Environment (RFID/USN 환경을 위한 개선된 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • Recently, Shin and Park proposed an authentication protocol using the hash function and the XOR operation in RFID/USN environment. However, Shin and Park's proposed authentication protocol is vulnerable to spoofing attack and location tracking attack and tag key exposure attack, and it does not provide tag anonymity. In this paper, we propose an improved authentication protocol for the RFID/USN environment that can withstand those attacks. The proposed authentication protocol provides more improved secrecy and communication efficiency because it decreases the communication rounds compared with the Shin and Park's protocol.

A Study on Blind Watermarking Technique of Digital Image using 2-Dimensional Empirical Mode Decomposition in Wavelet Domain (웨이블릿 평면에서의 2D-EMD를 이용한 디지털 영상의 블라인드 워터마킹 기술에 관한 연구)

  • Lee, Young-Seock;Kim, Jong-Weon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.99-107
    • /
    • 2010
  • In this paper a blind watermarking algorithm for digital image is presented. The proposed method operates in wavelet domain. The watermark is decomposed into 2D-IMFs using BEMD which is the 2-dimensional extension of 1 dimensional empirical mode decomposition. The CDMA based on SS technique is applied to watermark embedding and detection process. In the watermark embedding process, each IMF of watermark is embedded into middle frequency subimages in wavelet domain, so subimages just include partial information about embedded watermark. By characteristics of BEMD, when the partial information of watermark is synthesized, the original watermark is reconstructed. The experimental results show that the proposed watermarking algorithm is imperceptible and moreover is robust against JPEG compression, common image processing distortions.

3D Object Encryption Employed Chaotic Sequence in Integral Imaging (집적영상에서의 혼돈 수열을 사용한 3D 물체의 암호화)

  • Li, Xiao-Wei;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.411-418
    • /
    • 2018
  • This paper presents a novel three-dimensional (3D) object encryption scheme by combining the use of the virtual optics and the chaotic sequence. A virtual 3D object is digitally produced using a two-dimensional (2D) elemental image array (EIA) created with a virtual pinhole array. Then, through a logistic mapping of chaotic sequence, a final encrypted video can be produced. Such method converts the value of a pixel which is the basic information of an image. Therefore, it gives an improved encryption result compared to other existing methods. Through computational experiments, we were able to verify our method's feasibility and effectiveness.

A Study on the Expanded Theory of Sequential Multiple-valued Logic Circuit (순서다치논리회로의 파장이론에 관한 연구)

  • 이동열;최승철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.6
    • /
    • pp.580-598
    • /
    • 1987
  • This paper presents a method to realize the sequential multiple-valued Logic on Galois field. First, We develop so that Taylor series can be corresponded the irreducible polynomial to realize over the finite field, and produce the matrix. This paper object expanded a basic concept of the conbinational Logic circuit so as to apply in the sequential Logic circuit. First of all, We suggest a theory for constructing sequential multiple-valued Logic circuit. Then, We realized the construction with the single input and the multi-output that expanded its function construction. In case of the multi-output, the circuit process by the partition function concept as the mutual independent. This method can be reduced a enormous computer course to need a traditional extention that designed the sequential multi-valued Logic circuit.

  • PDF

Characterization of a TSV sputtering equipment by numerical modeling (수치 모델을 이용한 TSV 스퍼터링 장비의 특성 해석)

  • Ju, Jeong-Hun
    • Proceedings of the Korean Institute of Surface Engineering Conference
    • /
    • 2018.06a
    • /
    • pp.46-46
    • /
    • 2018
  • 메모리 소자의 수요가 데스크톱 컴퓨터의 정체와 모바일 기기의 폭발적인 증가로 NAND flash 메모리의 고집적화로 이어져서 3차원 집적 기술의 고도화가 중요한 요소가 되고 있다. 1 mm 정도의 얇은 웨이퍼 상에 만들어지는 메모리 소자는 실제 두께는 몇 마이크로미터 되지 않는다. 수직방향으로 여러 장의 웨이퍼를 연결하면 폭 방향으로 이미 거의 한계에 도달해있는 크기 축소(shrinking) 기술에 의지 하지 않고서도 메모리 소자의 용량을 증대 시킬 수 있다. CPU, AP등의 논리 연산 소자의 경우에는 발열 문제로 3D stacking 기술의 구현이 쉽지 않지만 메모리 소자의 경우에는 저 전력화를 통해서 실용화가 시작되었다. 스마트폰, 휴대용 보조 저장 매체(USB memory, SSD)등에 수 십 GB의 용량이 보편적인 현재, FEOL, BEOL 기술을 모두 가지고 있는 국내의 반도체 소자 업체들은 자연스럽게 TSV 기술과 이에 필요한 장비의 개발에 관심을 가지게 되었다. 특히 이 중 TSV용 스퍼터링 장치는 transistor의 main contact 공정에 전 세계 시장의 90% 이상을 점유하고 있는 글로벌 업체의 경우에도 완전히 만족스러운 장비를 공급하지는 못하고 있는 상태여서 연구 개발의 적절한 시기이다. 기본 개념은 일반적인 마그네트론 스퍼터링이 중성 입자를 타겟 표면에서 발생시키는데 이를 다시 추가적인 전력 공급으로 전자 - 중성 충돌로 인한 이온화 과정을 추가하고 여기서 발생된 타겟 이온들을 웨이퍼의 표면에 최대한 수직 방향으로 입사시키려는 노력이 핵심이다. 본 발표에서는 고전력 이온화 스퍼터링 시스템의 자기장 해석, 냉각 효율 해석, 멀티 모듈 회전 자석 음극에 대한 동역학적 분석 결과를 발표한다. 그림1에는 이중 회전 모듈에 대한 다물체 동역학 해석을 Adams s/w package로 해석하기 위하여 작성한 모델이고 그림2는 180도 회전한 서브 모듈의 위상이 음극 냉각에 미치는 효과를 CFD-ACE+로 유동 해석한 결과를 나타내고 있다.

  • PDF

Multi-Criteria decision making based on fuzzy measure

  • Sun, Yan;Feng, Di
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.19-25
    • /
    • 2013
  • Decision procedure was done with the evaluation of multi-criterion analysis. Importance of each criterion was considered through heuristically method, specially it was based on the heuristic least mean square algorithm. To consider coalition evaluation, it was carried out by calculation of Shapley index and Interaction value. The model output is also analyzed with the help of those two indexes, and the procedure was also displayed with details. Finally, the differences between the model output and the desired results are evaluated thoroughly, several problems are raised at the end of the example which require for further studying.

  • PDF