• Title/Summary/Keyword: Hardware Resources

Search Result 442, Processing Time 0.03 seconds

Design of Diigence/Indolence System using a Smart Phone (스마트폰을 이용한 근태관리시스템의 설계)

  • Jo, Hyun Joon;Lee, Dong Gi;Kim, Min Gyu;Park, Jin Soo;Kim, Dong Hyun;Ban, Chae Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.307-309
    • /
    • 2013
  • Diligence/Indolence records are the basic data at a human resource management and the essential data for measure salaries of employees. However, since the D/I systems using RFIDs or biometric sensors require hish costs to build and operate the D/I systems, it is difficult for to small business or self-employed business to use them. In this paper, we propose the Diligence/Indolence system to use the location identification of a smart phon. To locate the position of an employee, the WiFi signal of a smart phone and the wireless access point are exploited. Because the pre-owned hardware resources are used and initial building costs are low, it is easy for small business to use the proposed D/I system with low cost.

  • PDF

A Scalable Word-based RSA Cryptoprocessor with PCI Interface Using Pseudo Carry Look-ahead Adder (가상 캐리 예측 덧셈기와 PCI 인터페이스를 갖는 분할형 워드 기반 RSA 암호 칩의 설계)

  • Gwon, Taek-Won;Choe, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.8
    • /
    • pp.34-41
    • /
    • 2002
  • This paper describes a scalable implementation method of a word-based RSA cryptoprocessor using pseudo carry look-ahead adder The basic organization of the modular multiplier consists of two layers of carry-save adders (CSA) and a reduced carry generation and Propagation scheme called the pseudo carry look-ahead adder for the high-speed final addition. The proposed modular multiplier does not need complicated shift and alignment blocks to generate the next word at each clock cycle. Therefore, the proposed architecture reduces the hardware resources and speeds up the modular computation. We implemented a single-chip 1024-bit RSA cryptoprocessor based on the word-based modular multiplier with 256 datapaths in 0.5${\mu}{\textrm}{m}$ SOG technology after verifying the proposed architectures using FPGA with PCI bus.

Implementation of High Performance Overlay Multicast Packet Forwarding Engine On NetFPGA (NetFPGA를 이용한 고성능 오버레이 멀티캐스트 패킷 전송 엔진 구현)

  • Jeon, Hyuk-Jin;Lee, Hyun-Seok;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.6
    • /
    • pp.9-17
    • /
    • 2012
  • High-quality multimedia on the Internet has attracted attention because of its wide application area. IP multicast has been proposed as a solution to use efficient network resources in these services. However, IP multicast has not been commonly used due to a number of practical issues such as security and management. As an alternative, an overlay multicast routing which is performed in upper protocol layers on legacy networks without changing hardware has been presented. Yet, the maximum data transmission capacity of the overlay multicast is not sufficient for real time transmission of multimedia data. In this paper, we have implemented an overlay multicast engine on NetFPGA which allows us to perform packet replication and tunneling which need high-speed. In addition, we have implemented extra portions which need low-speed in software. From now on, we will progress research which increase the number of terminal spots which can be replicated by improvement and amplify throughputs by optimization.

Target Classification for Multi-Function Radar Using Kinematics Features (운동학적 특징을 이용한 다기능 레이다 표적 분류)

  • Song, Junho;Yang, Eunjung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.4
    • /
    • pp.404-413
    • /
    • 2015
  • The target classification for ballistic target(BT) is one of the most critical issues of ballistic defence mode(BDM) in multi-function radar(MFR). Radar responds to the target according to the result of classifying BT and air breathing target(ABT) on BDM. Since the efficiency and accuracy of the classification is closely related to the capacity of the response to the ballistic missile offense, effective and accurate classification scheme is necessary. Generally, JEM(Jet Engine Modulation), HRR(High Range Resolution) and ISAR(Inverse Synthetic Array Radar) image are used for a target classification, which require specific radar waveform, data base and algorithms. In this paper, the classification method that is applicable to a MFR system in a real environment without specific waveform is proposed. The proposed classifier adopts kinematic data as a feature vector to save radar resources at the radar time and hardware point of view and is implemented by fuzzy logic of which simple implementation makes it possible to apply to the real environment. The performance of the proposed method is verified through measured data of the aircraft and simulated data of the ballistic missile.

Secure route determination method to prevent sinkhole attacks in INSENS based wireless sensor networks (INSENS 기반의 무선 센서 네트워크에서 싱크홀 공격을 방어하기 위한 강화된 경로 설정 기법)

  • Song, Kyu-Hyun;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.4
    • /
    • pp.267-272
    • /
    • 2016
  • Wireless sensor networks (WSNs) are vulnerable to external intrusions due to the wireless communication characteristics and limited hardware resources. Thus, the attacker can cause sinkhole attack while intruding the network. INSENS is proposed for preventing the sinkhole attack. INSENS uses the three symmetric keys in order to prevent such sinkhole attacks. However, the sinkhole attack occurs again, even in the presence of INSENS, through the compromised node because INSENS does not consider the node being compromised. In this paper, we propose a method to counter the sinkhole attack by considering the compromised node, based on the neighboring nodes' information. The goals of the proposed method are i) network reliability improvement and ii) energy conservation through effective prevention of the sinkhole attack by detecting compromised nodes. The experimental results demonstrate that the proposed method can save up to, on average, 19.90% of energy while increasing up to, on average, 71.50%, the report reliability against internal sinkhole attacks in comparison to INSENS.

A Cryptoprocessor for AES-128/192/256 Rijndael Block Cipher Algorithm (AES-128/192/256 Rijndael 블록암호 알고리듬용 암호 프로세서)

  • 안하기;박광호;신경욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.257-260
    • /
    • 2002
  • This paper describes a design of cryptographic processor that implements the AES (Advanced Encryption Standard) block cipher algorithm“Rijndael”. To achieve high throughput rate, a sub-pipeline stage is inserted into the round transformation block, resulting that the second half of current round function and the first half of next round function are being simultaneously operated. For area-efficient and low-power implementation the round transformation block is designed to share the hardware resources in encryption and decryption. An efficient scheme for on-the-fly key scheduling, which supports the three master-key lengths of 128-b/192-b/256-b, is devised to generate round keys in the first sub-pipeline stage of each round processing. The cryptoprocessor designed in Verilog-HDL was verified using Xilinx FPGA board and test system. The core synthesized using 0.35-${\mu}{\textrm}{m}$ CMOS cell library consists of about 25,000 gates. Simulation results show that it has a throughput of about 520-Mbits/sec with 220-MHz clock frequency at 2.5-V supply.

  • PDF

A Virtual Machine Allocation Scheme based on CPU Utilization in Cloud Computing (클라우드 컴퓨팅에서 CPU 사용률을 고려한 가상머신 할당 기법)

  • Bae, Jun-Sung;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.567-575
    • /
    • 2011
  • The two most popular virtual machine allocation schemes, both match making and round robin, do consider hardware specifications such as CPU, RAM, and HDD, but not CPU usage, which results in balanced resource distribution, but not in balanced resource usage. Thus, in this paper a new virtual machine allocation scheme considering current CPU usage rate is proposed while retaining even distribution of node resources. In order to evaluate the performance of the proposed scheme, a cloud computing platform composed of three cloud nodes and one front end is implemented. The proposed allocation scheme was compared with both match making and round robin schemes. Experimental results show that the proposed scheme performs better in even distribution of overall CPU usage, which results in efficient load balancing.

Development of Mobile u-Healthcare System in WSN (무선센서네트워크 환경의 모바일 u-헬스케어 시스템 개발)

  • Lee, Seung-Chul;Chung, Wan-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.338-346
    • /
    • 2012
  • Wireless sensor network (WSN) technology provides a variety of medical and healthcare solutions to assist detection and communication of body conditions. However, data reliability inside WSN might be influenced to healthcare routing protocol due to limited hardware resources of computer, storage, and communication bandwidth. For this reason, we have conducted various wireless communication experiments between nodes using parameters such as RF strength, battery status, and deployment status to get a optimal performance of mobile healthcare routing protocol. This experiment may also extend the life time of the nodes. Performance analysis is done to obtain some important parameters in terms of distance and reception rate between the nodes. Our experiment results show optimal distance between nodes according to battery status and RF strength, or deployment status and RF strength. The packet reception rate according to deployment status and RF strength of nodes was also checked. Based on this performance evaluation, the optimized sensor node battery and deployment in the developed our mobile healthcare routing protocol were proposed.

Multi-sensor Intelligent Robot (멀티센서 스마트 로보트)

  • Jang, Jong-Hwan;Kim, Yong-Ho
    • The Journal of Natural Sciences
    • /
    • v.5 no.1
    • /
    • pp.87-93
    • /
    • 1992
  • A robotically assisted field material handling system designed for loading and unloading of a planar pallet with a forklift in unstructured field environment is presented. The system uses combined acoustic/visual sensing data to define the position/orientation of the pallet and to determine the specific locations of the two slots of the pallet, so that the forklift can move close to the slot and engage it for transport. In order to reduce the complexity of the material handling operation, we have developed a method based on the integration of 2-D range data of Poraloid ultrasonic sensor along with 2-D visual data of an optical camera. Data obtained from the two separate sources complements each other and is used in an efficient algorithm to control this robotically assisted field material handling system . Range data obtained from two linear scannings is used to determine the pan and tilt angles of a pallet using least mean square method. Then 2-D visual data is used to determine the swing angle and engagement location of a pallet by using edge detection and Hough transform techniques. The limitations of the pan and tilt orientation to be determined arc discussed. The system developed is evaluated through the hardware and software implementation. The experimental results are presented.

  • PDF

A Study on Computer Center Maintenance Savings through NT Server Consolidate Virtualization (NT 서버 통합 가상화를 통한 전산센터 유지보수 절감에 대한 연구)

  • Lee, Yong-Hui;Kim, Hwan-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2014
  • In this paper, we build server consolidate virtualization focusing on NT server dilapidated and through analysis of the effect of this, has been presented the following results. First, it was possible to obtain an increase in the constant temperature constant humidity chamber efficiency by securing the upper surface space for computing data center mounted virtualization integration server servers multiple physical. Second, by the deployment of virtualization of a large server dilapidated, the introduction of new resources and the cost of maintaining computerized data center and reduce power consumption, the reduction of hardware introduction of additional due to the new server deployment it was possible to derive a cost reduction effect. We obtain the reduction of 89% and 79% compared with conventional consumption of cooling and power savings of the top surface, respectively. Integration of NT servers are virtualized can be expected to change in the Green-IT to contribute to providing the maintenance costs of computing centers in the future as well as current. Building a virtualization server integration applied in this paper can be similarly applied to the UNIX system and to integrate the server group other.