• Title/Summary/Keyword: Communication message

Search Result 1,643, Processing Time 0.033 seconds

COMPARISONS OF PARALLEL PRECONDITIONERS FOR THE COMPUTATION OF SMALLEST GENERALIZED EIGENVALUE

  • Ma, Sang-Back;Jang, Ho-Jong;Cho, Jae-Young
    • Journal of applied mathematics & informatics
    • /
    • v.11 no.1_2
    • /
    • pp.305-316
    • /
    • 2003
  • Recently, an iterative algorithm for finding the interior eigenvalues of a definite matrix by CG-type method has been proposed. This method compares to the inverse power method. The given matrices A, and B are assumed to be large and sparse, and SPD( Symmetric Positive Definite) The CG scheme for the optimization of the Rayleigh quotient has been proven a very attractive and promising technique for large sparse eigenproblems for smallest eigenvalue. Also, it is very amenable to parallel computations, like the CG method for the linear systems. A proper choice of the preconditioner significantly improves the convergence of the CG scheme. But for parallel computations we need to find an efficient parallel preconditioner. Our candidates we ILU(0) in the wave-front order, ILU(0) in the multi-coloring order, Point-SSOR(Symmetric Successive Overrelaxation), and Multi-Color Block SSOR preconditioner. Wavefront order is a simple way to increase parallelism in the natural order, and Multi-coloring realizes a parallelism of order(N), where N is the order of the matrix. Another choice is the Multi-Color Block SSOR(Symmetric Successive OverRelaxation) preconditioning. Block SSOR is a symmetric preconditioner which is expected to minimize the interprocessor communication due to the blocking. We implemented the results on the CRAY-T3E with 128 nodes. The MPI (Message Passing Interface) library was adopted for the interprocessor communications. The test problem was drawn from the discretizations of partial differential equations by finite difference methods. The results show that for small number of processors Multi-Color ILU(0) has the best performance, while for large number of processors Multi-Color Block SSOR performs the best.

Intelligent Emergency Alarm System based on Multimedia IoT for Smart City

  • Kim, Shin;Yoon, Kyoungro
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.3
    • /
    • pp.122-126
    • /
    • 2019
  • These-days technology related to IoT (Internet of Thing) is widely used and there are many types of smart system based IoT like smart health, smart building and so on. In smart health system, it is possible to check someone's health by analyzing data from wearable IoT device like smart watch. Smart building system aims to collect data from sensor such as humidity, temperature, human counter like that and control the building for energy efficiency, security, safety and so forth. Furthermore, smart city system can comprise several smart systems like smart building, smart health, smart mobility, smart energy and etc. In this paper, we propose multimedia IoT based intelligent emergency alarm system for smart city. In existing IoT based smart system, it communicates lightweight data like text data. In the past, due to network's limitations lightweight IoT protocol was proposed for communicating data between things but now network technology develops, problem which is to communicate heavy data is solving. The proposed system obtains video from IP cameras/CCTVs, analyses the video by exploiting AI algorithm for detecting emergencies and prevents them which cause damage or death. If emergency is detected, the proposed system sends warning message that emergency may occur to people or agencies. We built prototype of the intelligent emergency alarm system based on MQTT and assured that the system detected dangerous situation and sent alarm messages. From the test results, it is expected that the system can prevent damages of people, nature and save human life from emergency.

Exploring Political Figures' Image Through Microbloging: Analyzing Twitter Messages of Political Figures (마이크로 블로깅에서의 정치인 이미지 구축 방식 -정치인의 트위터 메시지 분석을 중심으로-)

  • Hong, Sook-Yeong;Cho, Seung-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.95-104
    • /
    • 2011
  • This study explored how political figures build their image using twitters. To examine the research question, this study analyzed twitter messages in five political figures: Si-Min, Yu, Jung-hee, Lee, Mun-soo, Kim, and Young-gil, Song. The findings showed that except for Mrs. Lee, the other political figures presented more one-way messages than two-way messages in twitters. Even though twitter has benefits of communicating instantly and two-way communication between followers and followings, most messages in their twitters were limited to informative message. The study also classified the messages into social-oriented and individual-oriented in each politician' s twitter. The result presented that Mrs. Lee twitter included individual-oriented messages, but the other three political figures had more social-oriented messages.

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.

Design and Implementation of E-mail Client based on Automatic Feeling Recognition (인간의 감정을 자동 인식하는 전자메일 클라이언트의 설계 및 구현)

  • Kim, Na-young;Lee, Sang-kon
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.2
    • /
    • pp.61-75
    • /
    • 2009
  • Modern day people can easily use an e-mail client for general communication, because of using Internet and cellular phone. The mail client for the purpose of private and business affair, advertisement, news searching, and business letter is widely used and has side effects. People could send an important document via an electronic mail client. It is important to support an e-mail client intelligent. We think that many kinds of techniques of natural language processing must be provided in the client with human's emotion. We consider to design a new mail client with six kinds of senders' emotional information; delight, angry, sad feeling and message to express, manner of talking, a discomfort index etc. Before sending an e-mail, we suggest a user to correct a bad word because we do not want to feel bad to a receiver. We present a proper process of sending/receiving for users with a new designed e-mail clients.

  • PDF

VLIS Design of OCB-AES Cryptographic Processor (OCB-AES 암호 프로세서의 VLSI 설계)

  • Choi Byeong-Yoon;Lee Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1741-1748
    • /
    • 2005
  • In this paper, we describe VLSI design and performance evaluation of OCB-AES crytographic algorithm that simulataneously provides privacy and authenticity. The OCB-AES crytographic algorithm sovles the problems such as long operation time and large hardware of conventional crytographic system, because the conventional system must implement the privancy and authenticity sequentially with seqarated algorithms and hardware. The OCB-AES processor with area-efficient modular offset generator and tag generator is designed using IDEC Samsung 0.35um standard cell library and consists of about 55,700 gates. Its cipher rate is about 930Mbps and the number of clock cycles needed to generate the 128-bit tags for authenticity and integrity is (m+2)${\times}$(Nr+1), where m and Nr represent the number of block for message and number of rounds for AES encryption, respectively. The OCB-AES processor can be applicable to soft cryptographic IP of IEEE 802.11i wireless LAN and Mobile SoC.

Efficient Method of Processing Long-term Transactions for Distributed Environment (분산 환경에서 장기 트랜잭션의 효율적인 처리 방안)

  • 정지호;엄기환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1498-1508
    • /
    • 2003
  • It is important to integrate an enterprise application for automating of the business process, which is responded by a flow of market environment. There are two categories of method that integrate enterprise applications. One is Synchronous Integration, and the other is Asynchronous Integration. EAI(Enterprise Application Integration) and Web service which of the asynchronous integration is focused in the automating method of the business process. After we construct the application integration for automating of the business process, we have to concern about managing of the business transaction. Many Organizations have proposed the process method of business transaction based on 2-phase commit protocol. But this method can't supply the phase that classify the transaction by transaction weight. In this Paper, we Propose an efficient method of transaction process for business transactions, which is composed by ‘Classify Phase’ that classify transactions. We called this model “3-Phase Commit Method Applied by Classify Phase”, we design this model to manage an resource of enterprise efficiently. The proposed method is compared by the method based on 2-Phase commit that could be a problem of management the resource of enterprise, and the advantage of this method is certified to propose the solution of that problem.

A Watermarking Method Based on the Informed Coding and Embedding Using Trellis Code and Entropy Masking (Trellis 부호 및 엔트로피 마스킹을 이용한 정보부호화 기반 워터마킹)

  • Lee, Jeong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2677-2684
    • /
    • 2009
  • In this paper, we study a watermarking method based on the informed coding and embedding by means of trellis code and entropy masking. An image is divided as $8{\times}8$ block with no overlapping and the discrete cosine transform(DCT) is applied to each block. Then the 16 medium-frequency AC terms of each block are extracted. Next it is compared with gaussian random vectors having zero mean and unit variance. As these processing, the embedding vectors with minimum value of linear combination between linear correlation and Watson distance can be obtained by Viterbi algorithm at each stage of trellis coding. For considering the image characteristics, we apply different weight value between the linear correlation and the Watson distance using the entropy masking. To evaluate the performance of proposed method, the average bit error rate of watermark message is calculated from different several images. By the experiments the proposed method is improved in terms of the average bit error rate.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

An Improved Side Channel Attack Using Event Information of Subtraction (뺄셈연산의 이벤트 정보를 활용한 향상된 RSA-CRT 부채널분석공격 방법)

  • Park, Jong-Yeon;Han, Dong-Guk;Yi, Okyeon;Kim, Jung-Nyeo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.83-92
    • /
    • 2013
  • RSA-CRT is a widely used algorithm that provides high performance implementation of the RSA-signature algorithm. Many previous studies on each operation step have been published to verify the physical leakages of RSA-CRT when used in smart devices. This paper proposes SAED (subtraction algorithm analysis on equidistant data), which extracts sensitive information using the event information of the subtraction operation in a reduction algorithm. SAED is an attack method that uses algorithm-dependent power signal changes. An adversary can extract a key using differential power analysis (DPA) of the subtraction operation. This paper indicates the theoretical rationality of SAED, and shows that its results are better than those of other methods. According to our experiments, only 256 power traces are sufficient to acquire one block of data. We verify that this method is more efficient than those proposed in previously published studies.