• Title/Summary/Keyword: Address Data

Search Result 2,389, Processing Time 0.026 seconds

Design on Pipeline Architecture for the Low and Column Address Generator of 2D DCT/IDCT (2D DCT/IDCT의 행, 열 주소생성기를 위한 파이프라인 구조 설계)

  • 노진수;박종태;문규성;성해경;이강현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.14-18
    • /
    • 2003
  • This paper presents the pipeline architecture for the low and column address generator of 2D DCT/IDCT(Discrete Cosine Transform/Inverse Discrete Cosine Transform). For the real time process of image data, it is required that high speed operation and small size hardware In the proposed architecture, the area of hardware is reduced by using the DA(distributed arithmetic) method and applying the concepts of pipeline on the parallel architecture. As a results, the designed pipeline of the low and column address generator for 2D DCT/IDCT architecture is implemented with an efficiency and high speed compared as the non-pipeline architecture. And the operation speed is improved about 50% up. The design for the proposed pipeline architecture of DCT/IDCT is coded using VHDL.

  • PDF

A Partitioned Compressed-Trie for Speeding up IP Address Lookups (IP 주소 검색의 속도 향상을 위한 분할된 압축 트라이 구조)

  • Park, Jae-Hyung;Jang, Ik-Hyeon;Chung, Min-Young;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.641-646
    • /
    • 2003
  • Packet processing speed of routers as well as transmission speed of physical links gives a great effect on IP packet transfer rate in Internet. The router forwards a packet after determining the next hop to the packet's destination. IP address lookup is a main design issue for high performance routers. In this paper, we propose a partitioned compressed-trie for speeding-up IP address lookup algorithms based on tie data structure by exploiting path compression. In the ,proposed scheme, IP prefixes are divided into several compressed-tries and lookup is performed on only one partitioned compressed-trie. Memory access time for IP address lookup is lessen due to compression technique and memory required for maintaining partition does not increased.

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.

Design of the Specific IP Access Deny for the Database (데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계)

  • Jang, Seung-Ju;Kim, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.716-721
    • /
    • 2014
  • This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

The Analysis of the Correlation between the Sustain-Electrode Gap of an AC-PDP and Address Discharge Characteristics (AC-PDP의 유지방전 전극사이의 간격과 어드레스 방전 특성과의 상관성 분석)

  • Lee, Young-Jun;Choi, Su-Sam;Park, Se-Kwang;Kim, Yong-Duk
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.55 no.5
    • /
    • pp.239-244
    • /
    • 2006
  • To drive the high-image quality plasma displays of XGA and/or full-HD, we must effectively improve the driving waveform, which get the reset period for the stabilized control of wall charges, the address period to select discharge or non-discharge, and sustain period for luminance in 1 TV-frame, and also the display quality. To accomplish them, the development of the technology for the fast address discharge is required. In this paper, the correlation between the sustain-electrode gap and address discharge characteristics for the high-speed addressing was analyzed using the measurements of dynamic voltage margins. Results showed that the narrower the gap between the sustain electrodes, the narrower the with of the scan pulse became and a dynamic margin of data voltage of 29.2 V was obtained at scan pulse width of $1.0{\mu}s\;and\;V_{ramp}$ of 240 V for driving 4-inch test penal, which the gap between sustain electrodes was $65{\mu}m$.

Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting (이진 코드 변환을 이용한 효과적인 버퍼 오버플로우 방지기법)

  • Kim Yun-Sam;Cho Eun-Sun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.323-330
    • /
    • 2005
  • Buffer overflow is one of the most prevalent and critical internet security vulnerabilities. Recently, various methods to prevent buffer overflow attacks have been investigated, but they are still difficult to apply to real applications due to their run-time overhead. This paper suggests an efficient rewrite method to prevent buffer-overflow attacks only with lower costs by generating a redundant copy of the return address in stack frame and comparing return address to copied return address. Not to be overwritten by the attack data the new copy will have the lower address number than local buffers have. In addition, for a safer execution environment, every vulnerable function call is transformed during the rewriting procedure.

An Efficient Update for Attribute Data of the Digital Map using Building Registers : Focused on Building Numbers of the New Address (건축물대장을 이용한 수치지도 속성정보의 효율적 갱신방안 : 새주소사업의 건물번호 이용을 중심으로)

  • Kim, Jung-Ok;Kim, Ji-Young;Bae, Young-Eun;Yu, Ki-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.3
    • /
    • pp.275-284
    • /
    • 2008
  • The digital map needs efficiently updating. Because it is a base map at each local government and several geographic information systems and that is the key to enhancing to use spatial data. We suggest the linking method of building registers to the building layers of digital map, to update attribute data of the building layers. To conduct that, it is very important that each building in two data is linked by one-to-one matching. In this paper, we generate the strategy for renewing attribute data of the building layers based on identifier by using identifier of the new address system.

A Study of Shirts' Patternmaking Based on 3D Body Surface Changes in Golf Swing Postures (골프 스윙 자세의 체표면 변화 특성을 반영한 셔츠 패턴 설계 연구)

  • Oh, Seol-Young;Chun, Jong-Suk
    • The Research Journal of the Costume Culture
    • /
    • v.19 no.5
    • /
    • pp.1049-1060
    • /
    • 2011
  • The purpose of this study was to develop a shirt pattern that enhances the functionality of golf swing motions. The pattern was made with 3D body surface shape data that changed according to dynamic golf postures. The data were collected from the golf swing motions. The 3D body surface data in golf swing postures piled up on the 3D surface data in a static posture. The results showed that the surface shape data changed more in the address, back swing, and finish postures than the other swing postures. The experimental pattern was developed with 3D surface scan data in those three golf swing motions. The pattern had raglan sleeves and the front-bodied piece was divided into two pieces with a princess line, which comes from armscye line of the address posture. The back bodice piece was divided into three pieces with a yoke line and a back princess line. The yoke line was made by back shoulder shape in the back swing posture. The level of comfort of the experimental garment and commercial golf shirts was evaluated by 38 women golfers. The experimental garment pattern was evaluated to be more comfortable in golf swing postures than commercial golf shirts.

Cultural Differences in Politeness and Notion of Flattery (공손표현과 아부의 문화적 차이)

  • Yoon, Jae-Hak
    • Cross-Cultural Studies
    • /
    • v.33
    • /
    • pp.331-358
    • /
    • 2013
  • This paper looks into several aspects of linguistic behaviors attested in Korean and American English corpora. A special attention is paid to the areas of politeness phenomena, terms of address, power and solidarity, practice of flattery, and closely-related non-linguistic behaviors such as tipping and gift-giving conventions. An analysis of the data reveals that Korean society remains very much superior-oriented, non-egalitarian, non-democratic despite the pride and sense of accomplishment among the populace that the nation has achieved a satisfactory level of democracy. In particular, the following facts in Korean and the Korean society are exposed by an examination of the data: ${\bullet}$ There is a notional gap of positive politeness ${\bullet}$ Superiors enjoy an unfair advantage in the power and solidarity system ${\bullet}$ The terms of address system is set up to make a clear distinction between levels and the terms of address, in turn, dictate norms of expected behavior ${\bullet}$ The notion and practice of flattery heavily favors superiors ${\bullet}$ Non-linguistic acts of gift-giving and tipping are consistent with the examined social interactions As a result, all the benefits, emotional as well as material, are garnered by superiors. These facts may reflect the real Korea that people are used to being comfortable with, a pre-modern, feudalistic society, something akin to its kin in the north. We may proclaim that we aspire to a more democratic society. However, it appears Koreans, deep inside, may have been seeking a powerful dictator all along. These findings help provide a partial but insightful clue to the political puzzle: why Koreans grew uncomfortable with an egalitarian and democratic president and could not save him, but instead replaced him with a succession of a corrupted businessman and the authoritarian daughter of a former dictator. The flight to democracy has stalled in midair, not quite making the grade yet. There is plenty of linguistic evidence in Korean.