• Title/Summary/Keyword: 대성전자

Search Result 86, Processing Time 0.021 seconds

The Software Complexity Estimation Method in Algorithm Level by Analysis of Source code (소스코드의 분석을 통한 알고리즘 레벨에서의 소프트웨어 복잡도 측정 방법)

  • Lim, Woong;Nam, Jung-Hak;Sim, Dong-Gyu;Cho, Dae-Sung;Choi, Woong-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.153-164
    • /
    • 2010
  • A program consumes energy by executing its instructions. The amount of cosumed power is mainly proportional to algorithm complexity and it can be calculated by using complexity information. Generally, the complexity of a S/W is estimated by the microprocessor simulator. But, the simulation takes long time why the simulator is a software modeled the hardware and it only provides the information about computational complexity quantitatively. In this paper, we propose a complexity estimation method of analysis of S/W on source code level and produce the complexity metric mathematically. The function-wise complexity metrics give the detailed information about the calculation-concentrated location in function. The performance of the proposed method is compared with the result of the gate-level microprocessor simulator 'SimpleScalar'. The used softwares for performance test are $4{\times}4$ integer transform, intra-prediction and motion estimation in the latest video codec, H.264/AVC. The number of executed instructions are used to estimate quantitatively and it appears about 11.6%, 9.6% and 3.5% of error respectively in contradistinction to the result of SimpleScalar.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

Reduction of Highly Concentrated Perchlorate in Aqueous Medium by Newly Isolated Bacterial Strains Rhodococcus sp. YSPW01 and YSPW02 (신균주 Rhodococcus sp. YSPW01과 YSPW02를 이용한 수중 내 고농도 Perchlorate 환원 특성 연구)

  • Lee, Sang-Hoon;Hwang, Jae-Hoon;Akhil, Kabra;Lee, Dae Sung;Jeon, Byong-Hun
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.36 no.5
    • /
    • pp.352-358
    • /
    • 2014
  • The feasibility of perchlorate reducing-bacteria isolated from the sludge of an anaerobic digester was determined using ammonium perchlorate in aqueous medium. Growth kinetics of the two perchlorate reducing bacteria including Rhodococcus sp. YSPW01 and YSPW02 were investigated using acetate as the electron donor in batch experiment. The growth of YSPW01 and YSPW02 reached a steady-state at 26 and 9 h, respectively. The initial perchlorate concentration was completely reduced within 8 and 7 h by YSPW01 and YSPW02, respectively. The reduction rates were 2.1 and $15mg\;L^{-1}h^{-1}$ for YSPW01, and 3.2 and $15.5mg\;L^{-1}h^{-1}$ for YSPW02, at 1:1 and 5:1 ratios of acetate:perchlorate (w:w), respectively. In this study, the bacteria Rhodococcus sp. YSPW01 and YSPW02 demonstrated a potential for the perchlorate reduction, which could be further investigated for development of an efficient strategy to treat the perchlorate contaminated waters.

Raman Spectroscopy Analysis of Graphene Films Grown on Ni (111) and (100) Surface (니켈 (111)과 (100) 결정면에서 성장한 그래핀에 대한 라만 스펙트럼 분석)

  • Jung, Daesung;Jeon, Cheolho;Song, Wooseok;An, Ki-Seok;Park, Chong-Yun
    • Composites Research
    • /
    • v.29 no.4
    • /
    • pp.194-202
    • /
    • 2016
  • A graphene film, two-dimensional carbon sheet, is a promising material for future electronic devices and so on. In graphene applications, the effect of substrate on the atomic/electronic structures of graphene is significant, so we studied an interaction between graphene film and substrate. To study the effect, we investigated the graphene films grown on Ni substrate with two crystal face of (111) and (100) by Raman spectroscopy, comparing with graphene films transferred on $SiO_2/Si$ substrate. In our study, the doping effect caused by charge transfer from Ni or $SiO_2/Si$ substrate to graphene was not observed. The bonding force between graphene and Ni substrate is stronger than that between graphene and $SiO_2/Si$. The graphene films grown on Ni substrate showed compressive strain and the growth of graphene films is incommensurate with Ni (100) lattice. The position of 2D band of graphene synthesized on Ni (111) and (100) substrate was different, and this result will be studied in the near future.

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

Characterization of SiC nanowire Synthesized by Thermal CVD (열 화학기상증착법을 이용한 탄화규소 나노선의 합성 및 특성연구)

  • Jung, M.W.;Kim, M.K.;Song, W.;Jung, D.S.;Choi, W.C.;Park, C.J.
    • Journal of the Korean Vacuum Society
    • /
    • v.19 no.4
    • /
    • pp.307-313
    • /
    • 2010
  • One-dimensional cubic phase silicon carbide nanowires (${\beta}$-SiC NWs) were efficiently synthesized by thermal chemical vapor deposition (TCVD) with mixtures containing Si powders and nickel chloride hexahydrate $(NiCl_2{\cdot}6H_2O)$ in an alumina boat with a carbon source of methane $(CH_4)$ gas. SEM images are shown that the growth temperature (T) of $1,300^{\circ}C$ is not enough to synthesize the SiC NWs owing to insufficient thermal energy for melting down a Si powder and decomposing the methane gas. However, the SiC NWs could be synthesized at T>$1,300^{\circ}C$ and the most efficient temperature for growth of SiC NWs is T=$1,400^{\circ}C$. The synthesized SiC NWs have the diameter with an average range between 50~150 nm. Raman spectra clearly revealed that the synthesized SiC NWs are forming of a cubic phase (${\beta}$-SiC). Two distinct peaks at 795 and $970 cm^{-1}$ in Raman spectra of the synthesized SiC NWs at T=$1,400^{\circ}C$ represent the TO and LO mode of the bulk ${\beta}$-SiC, respectively. XRD spectra are also supported to the Raman spectra resulting in the strongest (111) peaks at $2{\Theta}=35.7^{\circ}$, which is the (111) plane peak position of 3C-SiC. Moreover, the gas flow rate of 300 sccm for methane is the optimal condition for synthesis of a large amount of ${\beta}$-SiC NW without producing the amorphous carbon structure shown at a high methane flow rate of 800 sccm. TEM images are shown two kinds of the synthesized ${\beta}$-SiC NWs structures. One is shown the defect-free ${\beta}$-SiC NWs with a (111) interplane distance of 0.25 nm, and the other is the stacking-faulted ${\beta}$-SiC NWs. Also, TEM images exhibited that two distinct SiC NWs are uniformly covered with $SiO_2$ layer with a thickness of less 2 nm.