• Title/Summary/Keyword: 패스 설계

Search Result 320, Processing Time 0.026 seconds

A Scheduling Algorithm for the Synthesis of a Pipelined Datapath using Collision Count (충돌수를 이용한 파이프라인 데이타패스 합성 스케쥴링 알고리즘)

  • Yu, Dong-Jin;Yoo, Hee-Jin;Park, Do-Soon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2973-2979
    • /
    • 1998
  • As this paper is a scheduling algorithm for the synthesis of a pipelined datapath under resource constraints in high level synthesis, the proposed heuristic algorithm uses a priority function based on the collision count of resourecs. In order to schedule the pipelined datapath under resource constraints, we define the collision count and the priority function based on the collision count, a number of resource, and the mobility of operations to resolve a resource collision. The proposed algorithm supports chaining, multicycling, and structural pipelining to design the realistic hardware. The evaluation of the Performance is compared with other systems using the results of the synthesis for a 16point FIR filter and a 5th order elliptic wave filter, where in most cases, the optimal solution is obtained.

  • PDF

Design and Fabrication of Dielectric Duplexers and Bandpass Filters for CDMA and W-CDMA Dualband Using the Notch and Isolation (너치와 아이솔레이션을 활용한 CDMA와 W-CDMA 듀얼밴드용 유전체 듀플렉셔와 밴드패스 필터의 설계 및 제작)

  • Choi, U-Sung;Yang, Sung-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1227-1232
    • /
    • 2011
  • Using the notch and isolation, we investigated the insertion loss and isolation characterics of the fabricated dielectric duplexers and bandpass filters for CDMA and W-CDMA dualband. Insertion loss(Tx band) and isolation(between Tx and Rx) of duplxer were about -2.1708dB and 45dB at CDMA band, respectively. Also, in the case of W-CDMA, the insertion loss(Tx band) and isolation(between Tx and Rx) showed about -2.6946 and 100dB, respectively. Summering the aboved results, fabricated the dielectric duplexers and bandpass filters will be contributed the increase of atttenuation and the decrease of interference at CDMA and W-CDMA dualband.

Key Exchange Method in Instant Messaging Service Using Elliptic Curve Cryptography (타원곡선 암호체계를 이용한 인스턴트 메세징 서비스에서의 키 교환 방식)

  • Park, Su-Young;Park, Byung-Jun;Jung, Choi-Yeoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1925-1928
    • /
    • 2003
  • 컴퓨터와 네트워크의 보급이 일반화되면서 인터넷을 통한 정보전달이 일상 생활처럼 되고 있다. 기존에는 정보를 전달하기 위한 방법이 주로 전자메일에 한정되어 있던 것에 반해, 요즘은 좀 더 즉각적으로 메시지를 전달해주는 인스턴트 메신저를 많이 사용하고 있다. 인스턴트 메신저는 이러한 장점으로 인해 국내에서도 사용자가 급속하게 늘고 있다. 현재 사용하고 있는 대부분의 인스턴트 메신저는 서버에 로그 온 할 때 패스워드를 대칭키 암호기술로 암호화해서 보내지만 패스워드 크래킹 프로그램들이 많이 알려져 있어 전송되는 정보가 제 3자에 의한 암호 해독이 가능하게 된다. 또한 키 분배 및 관리에 있어서 어려움이 있다. 대칭키 암호기술의 어려움을 극복하는 방안으로 제안되었던 공개키 암호기준은 키 분배 및 관리는 편리해졌지만 알고리즘이 더 복잡하고 키의 길이가 상당히 길어 많은 제약이 따르며 처리속도가 오래 걸린다는 단점을 지닌다.[1] 이에 대안으로 제안된 타원곡선 암호체계(Elliptic Curve Cryptography, ECC)는 동일한 키 사이즈를 갖는 다른 암호체계보다 훨씬 강하다고 알려져 있다. 본 논문에서는 ECC를 이용하여 빠르고 효율적이며 높은 안전도를 나타내는 인스턴트 메신저에서의 패스워드 키 교환 방식을 설계한다.

  • PDF

Design of Quaternary Logic gate Using Double Pass-transistor Logic with neuron MOS Threshold gate (뉴런 MOS 임계 게이트를 갖는 2중 패스-트랜지스터 논리를 이용한 4치 논리 게이트 설계)

  • Park, Soo-Jin;Yoon, Byoung-Hee;Kim, Heung-Soo
    • Journal of IKEEE
    • /
    • v.8 no.1 s.14
    • /
    • pp.33-38
    • /
    • 2004
  • A multi-valued logic(MVL) pass gate is an important element to configure multi-valued logic. In this paper, we designed the Quaternary MIN(QMIN)/negated MIN(QNMIN) gate, the Quaternary MAX(QMAX)/negated MAX(QNMAX) gate using double pass-transistor logic(DPL) with neuron $MOS({\nu}MOS)$ threshold gate. DPL is improved the gate speed without increasing the input capacitance. It has a symmetrical arrangement and double-transmission characteristics. The threshold gates composed by ${\nu}MOS$ down literal circuit(DLC). The proposed gates get the valued to realize various multi threshold voltages. In this paper, these circuits are used 3V power supply voltage and parameter of 0.35um N-Well 2-poly 4-metal CMOS technology, and also represented HSPICE simulation results.

  • PDF

Design of efficient self-repair system for multi-faults (다중고장에 대한 효율적인 자가치유시스템 설계)

  • Choi, Ho-Yong;Seo, Jung-Il;Yu, Chung-Ho;Woo, Cheol-Jong;Lee, Jae-Eun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.11 s.353
    • /
    • pp.69-76
    • /
    • 2006
  • This paper proposes a self-repair system which is able to self-repair in cell unit by imitating the structure of living beings. Because the data of artificial cells move even diagonally, our system can self-repair faults not in column unit, but in cell unit. It leads to design an efficient self-repair system for multiple faults. Moreover, in artificial cell design, the usage of logic-based design method has smaller system size than that of the previous register-based design method. Our experimental result for 2-bit up/down counter shows 40.3% reduction in hardware overhead, compared to the previous method [6].

Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information (지문 정보를 이용한 공개키 기반의 전자입찰시스템)

  • Park, So-Ah;Chae, Cheol-Joo;Cho, Han-Jin;Lee, Jae-Kwang
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.69-77
    • /
    • 2012
  • In the case of the password-based PKI technology, because it protects by using the password which is easy that user memorizes the private key, he has the problem about the password exposure. In addition, in the system of electronic bidding, the illegal use using the authentic certificate of the others increases. Recently, in order to solve this problem, the research about the PKI technology using the biometrics is actively progressed. If the bio information which the user inputs for the bio authentication is converted to the template, the digest access authentication in which the security is strengthened than the existing authentication technology can be built. Therefore, in this paper, we had designed and developed the system of electronic bidding which it uses the most widely used fingerprint information in the biometrics, it stores the user fingerprint information and certificate in the fingerprint security token and can authenticate the user. In case of using the system of electronic bidding of the public key infrastructure using the fingerprint information proposed in this paper the agent bid problem that it uses the certificate of the others in not only user authentication intensification but also system of electronic bidding can be concluded.

Design and Evaluation of Hybrid Digital Retrodirective Array Antenna System (하이브리드 디지털 RDA 시스템의 설계와 평가)

  • Park, Hae-Gyu;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.5
    • /
    • pp.251-257
    • /
    • 2014
  • Digital RDA system is retransmit into the opposite direction of the incident signals. Digital RDA system have a disadventage that this system do not signal classification in multipath environment. because multipath signal is shown as vector sum of multipath signal, digital RDA system required complex signal process for multipath signal classification. In this paper, to solve these problem we propose hybrid digital RDA system which combination of the MUSIC algorithm and the digital RDA system. Proposed system has two modes. First mode is digital RDA mode. Secornd mode is digital beamforming mode. Digital RDA mode is used in situations where the less the impact of multipath. Digital beamforming mode is applied to multipath effects is greater. In secornd mode, we find optimal path using MUSIC algorithm. After than the proposed system uses only the optimal path. Through the proposed system in a multipath environment with digital RDA can be used to supplement a disadvantage.

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

A Study on the Capacity Review of One-lane Hi-pass Lanes on Highways : Focusing on Using Bootstrapping Techniques (고속도로 단차로 하이패스차로 용량 검토에 관한 연구 : 부트스트랩 기법 활용 중심으로)

  • Bosung Kim;Donghee Han
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.3
    • /
    • pp.1-16
    • /
    • 2024
  • In the present highway design guidelines suggest that the capacity of one-lane hi-pass lanes is 2,000 veh/h for mainline toll plaza and 1,700 veh/h for interchange toll plaza. However, in a study conducted in early 2010, capacity of the mainline toll plaza was presented with 1,476 veh/h/ln to 1,665 veh/h/ln, and capacity of the interchange toll plaza was presented as 1,443 veh/h/ln. Accordingly, this study examined the feasibility of the capacity of the currently proposed highway one-lane hi-pass lane. Based on the 2021 individual vehicle passing data collected from the one-lane hi-pass gantry, the speed-traffic volume relationship graph and headway were used to calculate and compare capacity. In addition, the bootstrapping technique was introduced to utilize the headway and new processing methods for collected data were reviewed. As a result of the analysis, the one-lane hi-pass capacity could be estimated at 1,700 veh/h/ln for the interchange toll plaza, and at least 1,700 veh/h/ln for the mainline toll plaza. In addition, by using the bootstrap technique when using headway data, it was possible to present an estimated capacity similar to the observed capacity.

A Design and Implementation of Two-Phase Server Login Authentication System based on XML-Signature Extension (XML-Signature 확장을 통한 2단계 서버 로그인 인증 시스템의 설계 및 구현)

  • Kim, Yong-Hwa;Kim, Jin-Sung;Kim, Yong-Sung
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.321-330
    • /
    • 2007
  • This paper proposes a two-phase server login authentication system by XML-Signature schema extension to protect server's information resources opened on network which offer various web contents. A proposed system requests and publishes XML-based certificate through on-line, registers certificate extension information provided by CA(Certification Authority) to XCMS(XML Certificate Management Server), and performs prior authentication using user's certificate password. Then, it requests certificate extension information added by user besides user's certificate password and certificate extension information registered in XCMS by using SOAP message, and performs posterior authentication by comparing these certificate extension information. As a result, a proposed system is a security reinforced system compared with existing systems.