• 제목/요약/키워드: Hardware Resources

검색결과 442건 처리시간 0.024초

SSG기반 개선된 RFID 인증 프로토콜 (Improved RFID Authentication Protocol Based on SSG)

  • 박택진
    • 한국정보전자통신기술학회논문지
    • /
    • 제4권4호
    • /
    • pp.311-317
    • /
    • 2011
  • 최근 유비쿼터스 환경에서 바코드 대신 RFID가 대치되었지만, RFID 는 무선 주파수를 사용하기 때문에 프라이버시와 보안성에 많은 문제점을 가지고 있다. 첫째는 비인가 리드가 임의 RFID 태그의 ID 정보를 쉽게 읽어 들일 수 있고, 둘째는 공격자가 수집한 태그 ID 정보를 이용하여 합법적인 리더에게 인가된 태그인 것처럼 쉽게 속일 수 있다. 본 논문에서는 SSG 기반 개선된 RFID 인증 프로토콜을 제안하였다. SSG 알고리즘은 LFSR 과 선택로직만으로 구성되어 있다. 따라서 RFID 태그와 같은 극히 제한적인 자원을 갖는 시스템에서 하드웨어 구현이 가능하며, 출력 비트 스트림은 의사난수로 사용함으로써 다양한 공격에 안전하다. 제안한 프로토콜은 SSG를 기반으로 하기 때문에 안전하고 효율적이다.

소형 열병합 발전소 관리 및 제어 S/W 개발 연구 (A Study on the Development of Managing and Control Software for Small Size Cogeneration System)

  • 김진일;차종환;김창태;고요
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1996년도 하계학술대회 논문집 B
    • /
    • pp.916-918
    • /
    • 1996
  • We have an urgent matter that is lack of energy resource. So we have to accomplish the design of economical energy utility systems and to develop energy facilities with high efficiency. Cogeneration system is one of them. It has high efficiency and can solve unbalanced electricity and heat demand in Summer & Winter concurrently. Recently, to increase the efficiency and stability of the total system, it is applying automatic control and monitoring software to the hardware facilities in industrial control systems. Therefore, these systems has been researched and developed in the advanced countries. It also has been researched and developed in the domestic since '60. But the control and monitoring software in cogeneration system has been hardly developed and has been imported expensive products from the advanced countries. In this study, we have developed the software of operating control, status monitoring, operating data managing and tele-controlling. We have confirmed usefullness of developed software by applying to gas turbine cogeneration system.

  • PDF

사물인터넷 보안용 경량 블록암호 알고리듬 HIGHT의 효율적인 하드웨어 구현 (An Efficient Implementation of Lightweight Block Cipher Algorithm HIGHT for IoT Security)

  • 배기철;신경욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.285-287
    • /
    • 2014
  • 한국기술표준원(KATS)과 국제표준화기구(ISO/IEC)에 의해 표준으로 채택된 경량 블록암호 알고리듬 HIGHT용 저면적/저전력 암호/복호 코어를 설계하였다. IoT(Internet of Things) 보안에 적합하도록 개발된 경량 블록암호 알고리듬 HIGHT는 128비트의 마스터 키를 사용하여 64비트의 평문을 64비트의 암호문으로, 또는 그 역으로 변환한다. 저면적과 저전력 구현을 위해 data path를 32 비트로 축소하여 설계하였으며, 암호화 및 복호화를 위한 라운드 변환 블록과 키 스케줄러의 하드웨어 자원이 공유되도록 설계를 최적화하였다.

  • PDF

Automated Audiometry: A Review of the Implementation and Evaluation Methods

  • Shojaeemend, Hassan;Ayatollahi, Haleh
    • Healthcare Informatics Research
    • /
    • 제24권4호
    • /
    • pp.263-275
    • /
    • 2018
  • Objectives: Automated audiometry provides an opportunity to do audiometry when there is no direct access to a clinical audiologist. This approach will help to use hearing services and resources efficiently. The purpose of this study was to review studies related to automated audiometry by focusing on the implementation of an audiometer, the use of transducers and evaluation methods. Methods: This review study was conducted in 2017. The papers related to the design and implementation of automated audiometry were searched in the following databases: Science Direct, Web of Science, PubMed, and Scopus. The time frame for the papers was between January 1, 2010 and August 31, 2017. Initially, 143 papers were found, and after screening, the number of papers was reduced to 16. Results: The findings showed that the implementation methods were categorized into the use of software (7 papers), hardware (3 papers) and smartphones/tablets (6 papers). The used transducers were a variety of earphones and bone vibrators. Different evaluation methods were used to evaluate the accuracy and the reliability of the diagnoses. However, in most studies, no significant difference was found between automated and traditional audiometry. Conclusions: It seems that automated audiometry produces the same results compared with traditional audiometry. However, the main advantages of this method; namely, saving costs and increased accessibility to hearing services, can lead to a faster diagnosis of hearing impairment, especially in poor areas.

An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance

  • Hababeh, Ismail;Thabain, Anton;Alouneh, Sahel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.86-109
    • /
    • 2019
  • Cloud computing systems' performance is still a central focus of research for determining optimal resource utilization. Running several existing benchmarks simultaneously serves to acquire performance information from specific cloud system resources. However, the complexity of monitoring the existing performance of computing systems is a challenge requiring an efficient and interactive user directing performance-monitoring system. In this paper, we propose an effective multivariate control framework for monitoring cloud systems performance. The proposed framework utilizes the hardware cloud systems performance metrics, collects and displays the performance measurements in terms of meaningful graphics, stores the graphical information in a database, and provides the data on-demand without requiring a third party software. We present performance metrics in terms of CPU usage, RAM availability, number of cloud active machines, and number of running processes on the selected machines that can be monitored at a high control level by either using a cloud service customer or a cloud service provider. The experimental results show that the proposed framework is reliable, scalable, precise, and thus outperforming its counterparts in the field of monitoring cloud performance.

SDN Controller 배포를 이용한 산업 분산형 네트워크 관리 기법 (Method for Industrial Distributed Network Management using SDN Controller Deployment)

  • 박도권;정종필
    • 한국인터넷방송통신학회논문지
    • /
    • 제19권4호
    • /
    • pp.13-19
    • /
    • 2019
  • SDN은 통신에서의 트래픽 문제를 해결하기 위해 가장 활발하게 연구되고 있는 주제 중 하나이다. SDN은 진보된 API를 통해 네트워크 자원을 가상화하여 하나의 물리적 네트워크에서 다중 네트워크를 구현한다. Network Function Virtualized(NFV)는 네트워크 기능을 소프트웨어 인스턴트, 가상화 기술을 사용하는 하드웨어에서 VNF으로 배포한다. 이러한 기능은 IP, 라우터등을 가상화하여 네트워크 관리를 쉽게하고 성능을 향상시킨다. 본 논문은 가상화된 산업 네트워크에서 SDN 배포를 통해 SDN의 분산 컨트롤러 효과를 제공하고 트래픽을 제어하는 방식을 제안하였다. SDN 배포는 제안된 기법을 사용시 트래픽 관리를 보다 효율적으로 할 수 있으리라 기대한다.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권9호
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.

Factors Affecting Use of Cost Information: Empirical Evidence from Seafood Processing Enterprises in Vietnam

  • NGUYEN, Thieu Manh
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권4호
    • /
    • pp.93-98
    • /
    • 2022
  • The article analyzes the impact of factors affecting the use of cost information is examined, which adds to the empirical evidence on the factors affecting the use of cost information in Vietnam's seafood processing firms. 58 seafood processing firms in Vietnam were surveyed using a questionnaire survey of all levels of management, chief accountants, and accountants. A total of 235 questionnaires were gathered for the survey. Because many of the surveys were invalid due to empty cells, the author selected to use 214 questionnaires. The 5-level Likert scale is familiarly used in many studies, so the author also quantifies each factor according to five levels. Quantitative research was carried out with SPSS 25 software. Research results show that 4 factors The function of cost information, cost management, information technology, and management support in the seafood processing industry in Vietnam all have a positive impact on the use of cost information. The author has provided recommendations based on the research findings to expand the use of cost information, consequently helping to improve the performance of Vietnamese seafood processing businesses. Managers must improve a variety of resources, including facilities (software, hardware), people (in-depth training on CAS for administration), departmental awareness, and UCI's ability to assess responsibility and reward in the organization.

지식증류 기법을 사용한 SRGAN 경량화 연구 (A Study of Lightening SRGAN Using Knowledge Distillation)

  • 이여진;박한훈
    • 한국멀티미디어학회논문지
    • /
    • 제24권12호
    • /
    • pp.1598-1605
    • /
    • 2021
  • Recently, convolutional neural networks (CNNs) have been widely used with excellent performance in various computer vision fields, including super-resolution (SR). However, CNN is computationally intensive and requires a lot of memory, making it difficult to apply to limited hardware resources such as mobile or Internet of Things devices. To solve these limitations, network lightening studies have been actively conducted to reduce the depth or size of pre-trained deep CNN models while maintaining their performance as much as possible. This paper aims to lighten the SR CNN model, SRGAN, using the knowledge distillation among network lightening technologies; thus, it proposes four techniques with different methods of transferring the knowledge of the teacher network to the student network and presents experiments to compare and analyze the performance of each technique. In our experimental results, it was confirmed through quantitative and qualitative evaluation indicators that student networks with knowledge transfer performed better than those without knowledge transfer, and among the four knowledge transfer techniques, the technique of conducting adversarial learning after transferring knowledge from the teacher generator to the student generator showed the best performance.