• Title/Summary/Keyword: 쉐이크

Search Result 26, Processing Time 0.019 seconds

Design of an Asynchronous Instruction Cache based on a Mixed Delay Model (혼합 지연 모델에 기반한 비동기 명령어 캐시 설계)

  • Jeon, Kwang-Bae;Kim, Seok-Man;Lee, Je-Hoon;Oh, Myeong-Hoon;Cho, Kyoung-Rok
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.64-71
    • /
    • 2010
  • Recently, to achieve high performance of the processor, the cache is splits physically into two parts, one for instruction and one for data. This paper proposes an architecture of asynchronous instruction cache based on mixed-delay model that are DI(delay-insensitive) model for cache hit and Bundled delay model for cache miss. We synthesized the instruction cache at gate-level and constructed a test platform with 32-bit embedded processor EISC to evaluate performance. The cache communicates with the main memory and CPU using 4-phase hand-shake protocol. It has a 8-KB, 4-way set associative memory that employs Pseudo-LRU replacement algorithm. As the results, the designed cache shows 99% cache hit ratio and reduced latency to 68% tested on the platform with MI bench mark programs.

Functional Finishing of Cotton Fabrics by Treatment with Chitosan (키토산 처리에 의한 면직물의 기능화가공)

  • 신윤숙;유동일;오경화;민경혜;장정인
    • Korean Journal of Human Ecology
    • /
    • v.1 no.1
    • /
    • pp.103-112
    • /
    • 1998
  • Cotton fabric was treated with chitosan by pad-dry(-cure) method to impart antimicrobial properties. Four chitosans of different degree of deacetylation (DAC: 65~95%) with similar molecular weight(MW: ca. 50, 000) and one chitosan oligomer(MW 1, 800, DAC 86%) were used. In order to improve the durability to laundering of antimicrobial activity for the fabrics treated with chitosan oligomer, crosslinker or binder was included in the finishing formulation. Antimicrobial activity against Staphylococcus aureus and Proteus vulgaris was evaluated by the Shake Flask Method. The treated fabrics were laundered up to 20 times according to AATCC Test Method 60-1986 or JIS 0217-104 and antimicrobial activity of the laundered fabrics was evaluated. The antimicrobial activity was increased with the increase of concentration and degree of deacetylation of chitosan. And the cured fabrics showed better durability to laundering than the not-cured fabrics according to AATCC Test Method 60-1986. Crosslinker and binder decreased antimicrobial according of the fabrics treated with chitosan oligomer and were not effective to improve the durability to laundering according to JIS 0217-104. (Korean J Human Ecology 1(1) : 103~112, 1998)

  • PDF

Adsorption Capacity and Antibacterial Activity of Porous Feldspar Porphyry (다공성 구조가 발달한 장석반암의 흡착과 항균성 연구)

  • Kim, Sung-Wook;Choi, Eun-Kyeong;Cho, Jinwoo
    • The Journal of the Petrological Society of Korea
    • /
    • v.26 no.2
    • /
    • pp.143-152
    • /
    • 2017
  • As weathering processes, micro-cavities are formed on the surface of rocks, and in particular, the porous structure is increased in feldspar. Adsorption and antibacterial tests were carried out to clarify the environmental function of porous feldspar porphyry. Almost all the heavy metals were adsorbed in the feldspar filter and the adsorption rate could be controlled by changing the filter length. The shake flask method of fabric coated with 5% and 7% feldspar powder showed very high antibacterial activity of 98% and 99.9%, respectively. The cation exchange capacity at a particle size of $10{\mu}m$ was 114.63 meq/100g probably due to the porous structure. The potential value of porous feldspar porphyry as a resource is sufficient based on the results of the experiment.

A Design of Mobile Web Server Framework for SOAP Transaction and Performance Enhancement in Web2.0 (웹2.0에서 SOAP 처리와 성능 향상을 위한 모바일 웹 서버 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1866-1874
    • /
    • 2008
  • Existing web server lowers the whole capacity of system because of the problem on the processing load of server by closing connection increasing code handshake operation, and remarkable decrease of server capacity if it is the state of overload. Also, there occurs disadvantages of increasing connection tine about client's request and response time because handling of client's multi-requests is not smooth because of thread block and it requests a lot of time and resources for revitalization of thread. Therefore, this paper proposes the extended web server which provides the technique for delay handling and improves the overload of server for better system capacity, communication support, and the unification which is the advantage of web service. And it evaluates the existing system(implemented at Tomcat 5.5) and the proposed mobile web server architecture. The extended server architecture provides excellent exchange condition for system capacity and evaluates improved web server architecture which combines multi-thread with thread pool. The proposed web service architecture in this paper got the better result of improved capacity benefit than the evaluation result of original Tomcat 5.5.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.