• Title/Summary/Keyword: Hardware Resources

Search Result 442, Processing Time 0.021 seconds

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

A Study on the Development of Managing and Control Software for Small Size Cogeneration System (소형 열병합 발전소 관리 및 제어 S/W 개발 연구)

  • Kim, Jin-Il;Cha, Jong-Hwan;Kim, Chang-Tae;Yo, Ko
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.916-918
    • /
    • 1996
  • We have an urgent matter that is lack of energy resource. So we have to accomplish the design of economical energy utility systems and to develop energy facilities with high efficiency. Cogeneration system is one of them. It has high efficiency and can solve unbalanced electricity and heat demand in Summer & Winter concurrently. Recently, to increase the efficiency and stability of the total system, it is applying automatic control and monitoring software to the hardware facilities in industrial control systems. Therefore, these systems has been researched and developed in the advanced countries. It also has been researched and developed in the domestic since '60. But the control and monitoring software in cogeneration system has been hardly developed and has been imported expensive products from the advanced countries. In this study, we have developed the software of operating control, status monitoring, operating data managing and tele-controlling. We have confirmed usefullness of developed software by applying to gas turbine cogeneration system.

  • PDF

An Efficient Implementation of Lightweight Block Cipher Algorithm HIGHT for IoT Security (사물인터넷 보안용 경량 블록암호 알고리듬 HIGHT의 효율적인 하드웨어 구현)

  • Bae, Gi-Chur;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.285-287
    • /
    • 2014
  • This paper describes a design of area-efficient/low-power cryptographic processor for lightweight block cipher algorithm HIGHT which was approved as a cryptographic standard by KATS and ISO/IEC. The HIGHT algorithm which is suitable for the security of IoT(Internet of Things), encrypts a 64-bit plain text with a 128-bit cipher key to make a 64-bit cipher text, and vice versa. For area-efficient and low-power implementation, we adopt 32-bit data path and optimize round transform block and key scheduler to share hardware resources for encryption and decryption.

  • PDF

Automated Audiometry: A Review of the Implementation and Evaluation Methods

  • Shojaeemend, Hassan;Ayatollahi, Haleh
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.263-275
    • /
    • 2018
  • Objectives: Automated audiometry provides an opportunity to do audiometry when there is no direct access to a clinical audiologist. This approach will help to use hearing services and resources efficiently. The purpose of this study was to review studies related to automated audiometry by focusing on the implementation of an audiometer, the use of transducers and evaluation methods. Methods: This review study was conducted in 2017. The papers related to the design and implementation of automated audiometry were searched in the following databases: Science Direct, Web of Science, PubMed, and Scopus. The time frame for the papers was between January 1, 2010 and August 31, 2017. Initially, 143 papers were found, and after screening, the number of papers was reduced to 16. Results: The findings showed that the implementation methods were categorized into the use of software (7 papers), hardware (3 papers) and smartphones/tablets (6 papers). The used transducers were a variety of earphones and bone vibrators. Different evaluation methods were used to evaluate the accuracy and the reliability of the diagnoses. However, in most studies, no significant difference was found between automated and traditional audiometry. Conclusions: It seems that automated audiometry produces the same results compared with traditional audiometry. However, the main advantages of this method; namely, saving costs and increased accessibility to hearing services, can lead to a faster diagnosis of hearing impairment, especially in poor areas.

An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance

  • Hababeh, Ismail;Thabain, Anton;Alouneh, Sahel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.86-109
    • /
    • 2019
  • Cloud computing systems' performance is still a central focus of research for determining optimal resource utilization. Running several existing benchmarks simultaneously serves to acquire performance information from specific cloud system resources. However, the complexity of monitoring the existing performance of computing systems is a challenge requiring an efficient and interactive user directing performance-monitoring system. In this paper, we propose an effective multivariate control framework for monitoring cloud systems performance. The proposed framework utilizes the hardware cloud systems performance metrics, collects and displays the performance measurements in terms of meaningful graphics, stores the graphical information in a database, and provides the data on-demand without requiring a third party software. We present performance metrics in terms of CPU usage, RAM availability, number of cloud active machines, and number of running processes on the selected machines that can be monitored at a high control level by either using a cloud service customer or a cloud service provider. The experimental results show that the proposed framework is reliable, scalable, precise, and thus outperforming its counterparts in the field of monitoring cloud performance.

Method for Industrial Distributed Network Management using SDN Controller Deployment (SDN Controller 배포를 이용한 산업 분산형 네트워크 관리 기법)

  • Park, Do Gun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.13-19
    • /
    • 2019
  • SDN is one of the most actively researched topics to solve traffic problems in communication. SDN implements multiple networks in a single physical network by virtualizing network resources through an advanced API. Network Function Virtualized (NFV) distributes network functions from hardware using software instant, virtualization technology to VNF. These features make network management easier and improve performance by virtualizing IP, routers, and so on. In this paper, we propose a method to control the traffic and provide the distributed controller effect of SDN through SDN distribution in the virtualized industrial network. It is expected that SDN distribution will be able to manage traffic more efficiently when using the proposed scheme.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.

Factors Affecting Use of Cost Information: Empirical Evidence from Seafood Processing Enterprises in Vietnam

  • NGUYEN, Thieu Manh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.4
    • /
    • pp.93-98
    • /
    • 2022
  • The article analyzes the impact of factors affecting the use of cost information is examined, which adds to the empirical evidence on the factors affecting the use of cost information in Vietnam's seafood processing firms. 58 seafood processing firms in Vietnam were surveyed using a questionnaire survey of all levels of management, chief accountants, and accountants. A total of 235 questionnaires were gathered for the survey. Because many of the surveys were invalid due to empty cells, the author selected to use 214 questionnaires. The 5-level Likert scale is familiarly used in many studies, so the author also quantifies each factor according to five levels. Quantitative research was carried out with SPSS 25 software. Research results show that 4 factors The function of cost information, cost management, information technology, and management support in the seafood processing industry in Vietnam all have a positive impact on the use of cost information. The author has provided recommendations based on the research findings to expand the use of cost information, consequently helping to improve the performance of Vietnamese seafood processing businesses. Managers must improve a variety of resources, including facilities (software, hardware), people (in-depth training on CAS for administration), departmental awareness, and UCI's ability to assess responsibility and reward in the organization.

A Study of Lightening SRGAN Using Knowledge Distillation (지식증류 기법을 사용한 SRGAN 경량화 연구)

  • Lee, Yeojin;Park, Hanhoon
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.12
    • /
    • pp.1598-1605
    • /
    • 2021
  • Recently, convolutional neural networks (CNNs) have been widely used with excellent performance in various computer vision fields, including super-resolution (SR). However, CNN is computationally intensive and requires a lot of memory, making it difficult to apply to limited hardware resources such as mobile or Internet of Things devices. To solve these limitations, network lightening studies have been actively conducted to reduce the depth or size of pre-trained deep CNN models while maintaining their performance as much as possible. This paper aims to lighten the SR CNN model, SRGAN, using the knowledge distillation among network lightening technologies; thus, it proposes four techniques with different methods of transferring the knowledge of the teacher network to the student network and presents experiments to compare and analyze the performance of each technique. In our experimental results, it was confirmed through quantitative and qualitative evaluation indicators that student networks with knowledge transfer performed better than those without knowledge transfer, and among the four knowledge transfer techniques, the technique of conducting adversarial learning after transferring knowledge from the teacher generator to the student generator showed the best performance.