• Title/Summary/Keyword: Hardware Resources

Search Result 442, Processing Time 0.025 seconds

A Study of the Relationship Between the IS Characteristics and the Distribution of IS (정보시스템의 특성과 분산형태와의 관계에 관한 연구)

  • Kim, Seong-Geun;Heo, Ju-Byeong
    • Asia pacific journal of information systems
    • /
    • v.1 no.1
    • /
    • pp.5-16
    • /
    • 1991
  • Business firms have been expressing a strong interest in an effective structure of computing resources. In this respect previous studies provide some guidelines about the deployment of hardware, but the question of which information systems (IS) would be run under the dispersed hardware is still unanswered. The main purpose of the study is to analyze the relationship between various IS characteristics and the distribution of IS. The IS characteristics studied in this research include the usage frequency of IS in a dispersed plant, the currency of information required by the headquarter, the data volume processed in the plant, the relatedness of IS with other information systems in the plant. The survey was performed over the domestic, large manufacturing firms. The most noticeable finding is that the more the updated information is required in the headquarter, or the more related IS is to other information systems in the plant, the more IS is distributed.

  • PDF

A Study on the Development of K-LAN Hardware (K-LAN 하드웨어 개발에 관한 연구)

  • Park, H.D.;Chung, K.S.;Choi, Y.H.;Chung, S.J.
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.23 no.3
    • /
    • pp.289-294
    • /
    • 1986
  • In this paper, we describe the development of an NIU (network interface unit) hardware for sharing computer resources and exchanging haigh-speed information between information systems distributed in a local area. The NIU designed and implemented in accordance with Ethernet specifications is operating normally with the upper layer software. Modular design makes it simple to change or expand the functions of the NIU. The NIU's are connected to 10Mbps coaxial cable through transceivers. In addition, a system and a design specifications for the NIU of a broadband LAN based on the K-LAN NIU are porposed.

  • PDF

A Survey on the Advancement of Virtualization Technology (가상화의 발전에 대한 서베이)

  • Park, JooYoung;Synn, DoangJoo;Kim, JongKook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.12-15
    • /
    • 2021
  • This paper is a survey on the advancement of virtualization technology. Virtualization of resources was an inevitable path in modern computer systems. This abstraction of hardware allowed the decoupling of the operating system that manages the hardware and applications' requirements by adding a layer between them. It also led to the application-centric view of computing and light virtual machines, where each represents a computer networking device. As virtualization technology ripens, the performance of virtual machines can only improve. This paper will be introducing how virtualization technology has evolved from Xen to LightVM and Firecracker.

A Security SoC embedded with ECDSA Hardware Accelerator (ECDSA 하드웨어 가속기가 내장된 보안 SoC)

  • Jeong, Young-Su;Kim, Min-Ju;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1071-1077
    • /
    • 2022
  • A security SoC that can be used to implement elliptic curve cryptography (ECC) based public-key infrastructures was designed. The security SoC has an architecture in which a hardware accelerator for the elliptic curve digital signature algorithm (ECDSA) is interfaced with the Cortex-A53 CPU using the AXI4-Lite bus. The ECDSA hardware accelerator, which consists of a high-performance ECC processor, a SHA3 hash core, a true random number generator (TRNG), a modular multiplier, BRAM, and control FSM, was designed to perform the high-performance computation of ECDSA signature generation and signature verification with minimal CPU control. The security SoC was implemented in the Zynq UltraScale+ MPSoC device to perform hardware-software co-verification, and it was evaluated that the ECDSA signature generation or signature verification can be achieved about 1,000 times per second at a clock frequency of 150 MHz. The ECDSA hardware accelerator was implemented using hardware resources of 74,630 LUTs, 23,356 flip-flops, 32kb BRAM, and 36 DSP blocks.

A Study on Displacement Measurement Hardware of Retaining Walls based on Laser Sensor for Small and Medium-sized Urban Construction Sites

  • Kim, Jun-Sang;Kim, Jung-Yeol;Kim, Young-Suk
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1250-1251
    • /
    • 2022
  • Measuring management is an important part of preventing the collapse of retaining walls in advance by evaluating their stability with a variety of measuring instruments. The current work of measuring management requires considerable human and material resources since measurement companies need to install measuring instruments at various places on the retaining wall and visit the construction site to collect measurement data and evaluate the stability of the retaining wall. It was investigated that the applicability of the current work of measuring management is poor at small and medium-sized urban construction sites(excavation depth<10m) where measuring management is not essential. Therefore, the purpose of this study is to develop a laser sensor-based hardware to support the wall displacement measurements and their control software applicable to small and medium-sized urban construction sites. The 2D lidar sensor, which is more economical than a 3D laser scanner, is applied as element technology. Additionally, the hardware is mounted on the corner strut of the retaining wall, and it collects point cloud data of the retaining wall by rotating the 2D lidar sensor 360° through a servo motor. Point cloud data collected from the hardware can be transmitted through Wi-Fi to a displacement analysis device (notebook). The hardware control software is designed to control the 2D lidar sensor and servo motor in the displacement analysis device by remote access. The process of analyzing the displacement of a retaining wall using the developed hardware and software is as follows: the construction site manager uses the displacement analysis device to 1)collect the initial point cloud data, and after a certain period 2)comparative point cloud data is collected, and 3)the distance between the initial point and comparison point cloud data is calculated in order. As a result of performing an indoor experiment, the analyses show that a displacement of approximately 15 mm can be identified. In the future, the integrated system of the hardware designed here, and the displacement analysis software to be developed can be applied to small and medium-sized urban construction sites through several field experiments. Therefore, effective management of the displacement of the retaining wall is possible in comparison with the current measuring management work in terms of ease of installation, dismantlement, displacement measurement, and economic feasibility.

  • PDF

Service Status Analysis About the Spatial Information Open Platform based on the Analysis of Web Server Log and System Log (웹 및 시스템 로그 분석 기반 공간정보 오픈플랫폼 서비스 사용 현황 분석)

  • Jang, Han Sol;Hong, Seong Hun;Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.3
    • /
    • pp.45-54
    • /
    • 2015
  • Since the V-World, the Spatial Information Open Platform service, has started in 2012, a lot of people have increased explosively every year with their interest. It is necessary to know the specific service status in order to serve as indicators of the improvement of user's environment and the service to be added in the future based on the user's increasing need. However, there is difficulty to figure out more specific service status, such as the usage of hardware resources for 2D / 3D / Portal services and the actual user usage patterns, because the current system does not have the real-time monitoring system. Therefore, in this paper, through the analysis of the usage of system resources for 2D / 3D / Portal services based on web server log and the usage of hardware resources such as CPU, Memory based on system log, we analyze the usage of service in 2015 and compare with the results of the 2014, to present problems of the current system and the solutions about the problems.

Energy-Efficient Real-Time Task Scheduling for Battery-Powered Wireless Sensor Nodes (배터리 작동식의 무선 센서 노드를 위한 에너지 효율적인 실시간 태스크 스케줄링)

  • Kim, Dong-Joo;Kim, Tae-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.10
    • /
    • pp.1423-1435
    • /
    • 2010
  • Building wireless sensor networks requires a constituting sensor node to consider the following limited hardware resources: a small battery lifetime limiting available power supply for the sensor node, a low-power microprocessor with a low-performance computing capability, and scarce memory resources. Despite such limited hardware resources of the sensor node, the sensor node platform needs to activate real-time sensing, guarantee the real-time processing of sensing data, and exchange data between individual sensor nodes concurrently. Therefore, in this paper, we propose an energy-efficient real-time task scheduling technique for battery-powered wireless sensor nodes. The proposed energy-efficient task scheduling technique controls the microprocessor's operating frequency and reduces the power consumption of a task by exploiting the slack time of the task when the actual execution time of the task can be less than its worst case execution time. The outcomes from experiments showed that the proposed scheduling technique yielded efficient performance in terms of guaranteeing the completion of real-time tasks within their deadlines and aiming to provide low power consumption.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

An Integrated Cryptographic Processor Supporting ARIA/AES Block Ciphers and Whirlpool Hash Function (ARIA/AES 블록암호와 Whirlpool 해시함수를 지원하는 통합 크립토 프로세서 설계)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.38-45
    • /
    • 2018
  • An integrated cryptographic processor that efficiently integrates ARIA, AES block ciphers and Whirlpool hash function into a single hardware architecture is described. Based on the algorithm characteristics of ARIA, AES, and Whirlpool, we optimized the design so that the hardware resources of the substitution layer and the diffusion layer were shared. The round block was designed to operate in a time-division manner for the round transformation and the round key expansion of the Whirlpool hash, resulting in a lightweight hardware implementation. The hardware operation of the integrated ARIA-AES-Whirlpool crypto-processor was verified by Virtex5 FPGA implementation, and it occupied 68,531 gate equivalents (GEs) with a 0.18um CMOS cell library. When operating at 80 MHz clock frequency, it was estimated that the throughputs of ARIA, AES block ciphers, and Whirlpool hash were 602~787 Mbps, 682~930 Mbps, and 512 Mbps, respectively.

CTS: A Cluster System Test Suite for Preventive Maintenance (CTS: 예방 정비를 위한 클러스터 시스템 검사 도구)

  • 차광호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.5
    • /
    • pp.385-393
    • /
    • 2004
  • Cluster systems have been widely used for solving problems in various application domains, and regarded as useful high performance computing resources. As the number of cluster system user is increasing, it is no less important to maintain stable operation than to improve cluster system performance. Although hardware preventive maintenance is important for keeping normal operation, the testing tool which can be used for general cluster systems during maintenance has received little attention. In this Paper, considering hardware Preventive maintenance, we suggest a testing tool for hardware of cluster system. The cluster system testing tool which is named CTS(Cluster system Test Suite) has two check routines; one for memory, and the other for NIC respectively. The CTS is designed to support the common features of general cluster systems and all the Jobs such as setting test conditions to querying the results can be done entirely within an integrated GUI environment. CTS is used as the testing tool for two kinds of cluster systems during maintenance, and the experimental results show that CTS reports useful information for cluster systems management.