• 제목/요약/키워드: Complete network

검색결과 516건 처리시간 0.031초

전자상거래를 위한 128비트 블록 암호 알고리즘의 구현 (An Implementation of 128bit Block Cipher Algorithm for Electronic Commerce)

  • 서장원;전문석
    • 한국전자거래학회지
    • /
    • 제5권1호
    • /
    • pp.55-73
    • /
    • 2000
  • Recently; EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done on the cyber space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher algorithm. NC(Nonpolynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 128bits key length for input, output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption. The result of simulation by the comparison with other cipher algorithm for capacity evaluation of proposed NC cipher algorithm is that the speed of encryption and decryption is 7.63 Mbps per block and the speed of subkey generation is 2,42 μ sec per block. So, prosed NC cipher algorithm is regarded as proper level for encryption. Furthermore, speed of subkey generation shows that NC cipher algorithm has the probability used to MAC(Message Authentication Code) and block implementation of Hash function.

  • PDF

고속철도 운행1년의 성과와 개선 방향 -일본의 동해도 신간선과 비교하여- (Achievement of the KTX project for the past year and improvement measures - compared with those of the Tokaido Shinkansen-)

  • 이용상;원종덕
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2005년도 춘계학술대회 논문집
    • /
    • pp.947-956
    • /
    • 2005
  • In this paper, I scrutinize what Korea has achieved from the KTX(Korea Train Express) project for the past one year of operation since it was open to public in April 2004 while looking into some improvement measures for better services in the future. I tried to compare the clements with those of the Tokaido Shinkasen in Japan. As things may turn at its premier operation, the KTX has been suffering from a small number of passengers, low in demand. However, when I compared the previous year with the post KTX operation of one year, demand of the passenger has increased $40\%$ on Kyong-bu line. I figured the first one year of the KTX operation pretty much followed in the footstep of the Tokaido Shinkansen's. For example, the rate of the each train to be on time as the timetable was equivalent while KTX went through less technical problems than the Tokaido Shinkansen. I have come up with some ideas for improvement, which I believe will lead to the development growth of KTX. First, I suggest that we complete the construction of laying new rails on Kyong-bu line at the earliest possible time. Second, we need to extend the high speed network as well as the rail modernization. Last, I have no doubt that we should secure high technology before we forge in the overseas markets.

  • PDF

이온주입에 의한 폴리머의 전기특성 조사 (Electrical properties of polymers by ion implantation)

  • 양대정;김보영;이재형
    • 한국전기전자재료학회:학술대회논문집
    • /
    • 한국전기전자재료학회 2003년도 하계학술대회 논문집 Vol.4 No.1
    • /
    • pp.203-207
    • /
    • 2003
  • Ion implantation has been shown to significantly alter the surface properties of polymers. Polycarbonate(PC) and Polyimide(PI) were irradiated with 50keV $N^+$, $Xe^+$ ions to the fluences of $1{\times}10^{16}{\sim}3{\times}10^{17}\;cm^2$. The ion beam-induced modification of the electrical conductivity and the related structural features have been studied for polymers. The beam-induced chemical and structural modifications have been investigated by using X-ray Phooelectron Spectroscopy(XPS) and Fourier Transform-Infrared Spectroscopy(FT-IR), while the modification of the electrical properties was followed by performing a complete set of sheet resistance measurements. Samples irradiated at higher fluence showed a good conductivity, with a saturation value of $10^7{\Omega}/sq$. The XPS data demonstrate that the modification of the electrical properties is due to the progressive formation with increasing ion fluence of a dense amorphous carbon network, while PF-IR data reveal that material degradations through bond breaking are the main effects.

  • PDF

Spectrum Allocation based on Auction in Overlay Cognitive Radio Network

  • Jiang, Wenhao;Feng, Wenjiang;Yu, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권9호
    • /
    • pp.3312-3334
    • /
    • 2015
  • In this paper, a mechanism for spectrum allocation in overlay cognitive radio networks is proposed. In overlay cognitive radio networks, the secondary users (SUs) must first sense the activity of primary users (PUs) to identify unoccupied spectrum bands. Based on their different contributions for the spectrum sensing, the SUs get payoffs that are computed by the fusion center (FC). The unoccupied bands will be auctioned and SUs are asked to bid using payoffs they earned or saved. Coalitions are allowed to form among SUs because each SU may only need a portion of the bands. We formulate the coalition forming process as a coalition forming game and analyze it by game theory. In the coalition formation game, debtor-creditor relationship may occur among the SUs because of their limited payoff storage. A debtor asks a creditor for payoff help, and in return provides the creditor with a portion of transmission time to relay data for the creditor. The negotiations between debtors and creditors can be modeled as a Bayesian game because they lack complete information of each other, and the equilibria of the game is investigated. Theoretical analysis and numerical results show that the proposed auction yields data rate improvement and certain fairness among all SUs.

IKPCA-ELM-based Intrusion Detection Method

  • Wang, Hui;Wang, Chengjie;Shen, Zihao;Lin, Dengwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.3076-3092
    • /
    • 2020
  • An IKPCA-ELM-based intrusion detection method is developed to address the problem of the low accuracy and slow speed of intrusion detection caused by redundancies and high dimensions of data in the network. First, in order to reduce the effects of uneven sample distribution and sample attribute differences on the extraction of KPCA features, the sample attribute mean and mean square error are introduced into the Gaussian radial basis function and polynomial kernel function respectively, and the two improved kernel functions are combined to construct a hybrid kernel function. Second, an improved particle swarm optimization (IPSO) algorithm is proposed to determine the optimal hybrid kernel function for improved kernel principal component analysis (IKPCA). Finally, IKPCA is conducted to complete feature extraction, and an extreme learning machine (ELM) is applied to classify common attack type detection. The experimental results demonstrate the effectiveness of the constructed hybrid kernel function. Compared with other intrusion detection methods, IKPCA-ELM not only ensures high accuracy rates, but also reduces the detection time and false alarm rate, especially reducing the false alarm rate of small sample attacks.

A Food and Nutrition System Analysis of South Korea

  • Jeffery Sobal;Lee, Soo-Kyung
    • Journal of Community Nutrition
    • /
    • 제5권4호
    • /
    • pp.209-217
    • /
    • 2003
  • The food and nutrition system is a network of processes linking agriculture, food, eating, nutrition, and health. The system includes a series of nine stages (production, processing, distribution, acquisition, preparation, consumption, digestion, transport, and utilization) and two types of contexts (biophysical and sociocultural). Analysis of whole food and nutrition systems provides information about the structure and processes involved in the complete scope of food and nutrition, assisting in the identification of ″upstream″ influences and ″downstream″ consequences in the system. The current analysis gathered existing data about the food and nutrition system in South Korea from public sources and professional publications, and interpreted that information to consider how different elements of the system contribute to health. The findings revealed that South Korea has substantial domestic food production and processing supplemented by imports, widespread food distribution in markets and a growing number of Korean and Western restaurants, a relatively low percentage of household income spent on food, growing use of new food preparation methods such as microwave ovens, a rice/vegetable/fish based three-meal consumption pattern, few recorded digestive problems, increasing calorie storage as body fat, and a relatively low chronic disease prevalence compared to other developed societies. Examination of the full scope of the food and nutrition system provides a broad perspective using whole system thinking that can identify potential strategies for future research and intervention.

Managing Flow Transfers in Enterprise Datacenter Networks with Flow Chasing

  • Ren, Cheng;Wang, Sheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1519-1534
    • /
    • 2016
  • In this paper, we study how to optimize the data shuffle phase by leveraging the flow relationship in datacenter networks (DCNs). In most of the clustering computer frameworks, the completion of a transfer (a group of flows that can enable a computation stage to start or complete) is determined by the flow completing last, so that limiting the rate of other flows (not the last one) appropriately can save bandwidth without impacting the performance of any transfer. Furthermore, for the flows enter network late, more bandwidth can be assigned to them to accelerate the completion of the entire transfer. Based on these characteristics, we propose the flow chasing algorithm (FCA) to optimize the completion of the entire transfer. We implement FCA on a real testbed. By evaluation, we find that FCA can not only reduce the completion time of data transfer by 6.24% on average, but also accelerate the completion of data shuffle phase and entire job.

Improved Meet-in-the-Middle Attacks on Crypton and mCrypton

  • Cui, Jingyi;Guo, Jiansheng;Huang, Yanyan;Liu, Yipeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권5호
    • /
    • pp.2660-2679
    • /
    • 2017
  • Crypton is a SP-network block cipher that attracts much attention because of its excellent performance on hardware. Based on Crypton, mCrypton is designed as a lightweight block cipher suitable for Internet of Things (IoT) and Radio Frequency Identification (RFID). The security of Crypton and mCrypton under meet-in-the-middle attack is analyzed in this paper. By analyzing the differential properties of cell permutation, several differential characteristics are introduced to construct generalized ${\delta}-sets$. With the usage of a generalized ${\delta}-set$ and differential enumeration technique, a 6-round meet-in-the-middle distinguisher is proposed to give the first meet-in-the-middle attack on 9-round Crypton-192 and some improvements on the cryptanalysis of 10-round Crypton-256 are given. Combined with the properties of nibble permutation and substitution, an improved meet-in-the-middle attack on 8-round mCrypton is proposed and the first complete attack on 9-round mCrypton-96 is proposed.

다중화 구조 고신뢰성 제어기기를 위한 보팅 시스템버스 프로토콜 (Voting System Bus Protocol for a Highly-Reliable PLC with Redundant Modules)

  • 정우혁;박재현
    • 제어로봇시스템학회논문지
    • /
    • 제20권6호
    • /
    • pp.689-694
    • /
    • 2014
  • An SPLC (Safety Programmable Logic Controller) must be designed to meet the highest safety standards, IEEE 1E, and should guarantee a level of fault-tolerance and high-reliability that ensures complete error-free operation. In order to satisfy these criteria, I/O modules, communication modules, processor modules and bus modules of the SPLC have been configured in triple or dual modular redundancy. The redundant modules receive the same data to determine the final data by the voting logic. Currently, the processor of each rx module performs the voting by deciding on the final data. It is the intent of this paper to prove the improvement on the current system, and develop a voting system for multiple data on a system bus level. The new system bus protocol is implemented based on a TCN-MVB that is a deterministic network consisting of a master-slave structure. The test result shows that the suggested system is better than the present system in view of its high utilization and improved performance of data exchange and voting.

디자인 피쳐에 의존하지 않는 솔리드 모델의 수정 (Modification of Solid Models Independent of Design Features)

  • 우윤환
    • 한국CDE학회논문집
    • /
    • 제13권2호
    • /
    • pp.131-138
    • /
    • 2008
  • With the advancements of the Internet and CAD data translation techniques, more CAD models are transferred from a CAD system to another through the network and interoperability is getting a common word in the CAD industry. However, when a CAD model is translated for an incompatible system into a neutral format such as STEP or IGES, its precious feature information is lost. When this feature information is lost, the advantage of feature based modeling is not valid any longer, and modification for the model is purely dependent on geometric and topological manipulations. However, the capabilities of the existing methods to modify these feature-independent models are limited as the modification involves a topological change in the model. To address this issue, we present a volumetric method to modify the solid models in neutral format. First, this method selectively decomposes the solid model to separate the portion of interest called feature volume. Next, the designer modifies the feature volume without concerning a topological change. Finally, the feature volume is united with the original solid model to complete the modification process. The results of test cases are presented to attest the usefulness of the proposed method.