• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.024 seconds

The Reduction Method for Radiated EMI in USB Power Line of Cable (USB 케이블의 전원선 에서의 방사성 EMI 개선)

  • Park, Kyoung-Jin;Lee, Dae-Woo;Ko, Yong-Mok;Gang, Eun-Gyun;Park, Jong-Hyun;Kim, Keun-Yong;Ra, Keuk-Whan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.201-208
    • /
    • 2013
  • In this paper, we studied on improvement for radiated EMI of USB power line of cable. it is made by using wireless video access point system for confirming the phenomenon of radiated EMI from cable. then, we make sure that the limit exceed through the initial measurement of radiated EMI limit criteria in comparison to about 3 [dBuV/m]~15 [dBuV/m]. after that we confirmed the resonance in power line of cable through measurement of s-parameters. so, we confirmed the relation radiated EMI and power line of cable resonance and we reduced radiated EMI in power line of cable through a capacitor and low pass-band filter using the technique of power networks management. in conclusion, we suggested how to reduce power line of cable resonance applied for the improved method. and we confirmed that suggested reduction method is suitable through testing radiated EMI. the result of radiated EMI reduction limit criteria 40[dBuV/m]~47[dBuV/m] in comparison to about 3 [dBuV/m]~20 [dBuV/m].

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

Influence of Melatonin on Reproductive Function in Male Golden Hamsters (수컷 골든 햄스터의 생식기능에 미치는 멜라토닌의 영향)

  • Choi, Don-Chan
    • Development and Reproduction
    • /
    • v.5 no.1
    • /
    • pp.1-8
    • /
    • 2001
  • Golden hamsters show the reproductive activity that is determined by the photoperiod (length of light per day). Photoperiod is an environmental factor that is predictable through an entire year. The hamsters are sexually active in summer during which day length exceeds night time. The critical length is at least 12.5 hours of light in a day where reproductive function is maintained. The information of photoperiod is mediated by the pineal gland because removal of pineal gland blocks the influence of photoperiod on reproductive activity. The hamsters without pineal gland maintain sexual activity and promote it in a situation that suppresses gonadal activity. The pineal gland secretes melatonin that reflects the photoperiod. The appropriate administrations of melatonin into both pineal intact and pinealectomized hamsters lead to a gonadal reression. The results suggest that melatonin constitutes a part of control mechanism whereby environmental information is transduced to neuroendocrine signal respensible for the functional integrity of the reproductive system. Despite of the intense studies, the action site of melatonin is on the whole unknown. It is mainly due to the lack of acute efffct of melatonin on the secretion of reproductive hormones. However, sexually regressed animals display the low levelsof gonadotropins and the augmentation of the hypothalamic gonadotropin-releasing hormone (GnRH) content, implying that the antigonadotropic effects either by photoperiod and/or by the treatment of melatonin are mediated by the GnRH neuronal system. The action mechanism by which melatonin exerts its effect on GnRH neuron needs to be investigated. Recent cloning of melatonin receptor will contribute to examine various and putative potencies of melatonin via its anatomical identification and the action mechanism of melatonin on target tissues at the molecular level.

  • PDF

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

The Effects of the News Media, Campaign Media, and Political Talk on Voters' Candidate Images and Political Decision Making -A Study of the 17th Presidential Election in Korea- (뉴스미디어, 캠페인 미디어, 그리고 정치 대화가 후보자 이미지와 정치적 의사결정에 미치는 영향 -제17대 대통령 선거를 중심으로-)

  • Min, Young
    • Korean journal of communication and information
    • /
    • v.44
    • /
    • pp.108-143
    • /
    • 2008
  • Candidate images refer to a holistic impression of a candidate which is composed of various dimensions of attributes. This study investigated how online and offline news media, campaign media such as political ads, televised debates, and candidate web-sites, and interpersonal political talk influenced voters' images of a candidate in such dimensions as personal traits, job-performance abilities, and policy capabilities, and further their political decision making in the 17th presidential election in Korea. The analysis focused on President Lee, Myung Bak who won the election by obtaining nearly 50% of the effective votes. According to the data analyses, first, uses of offline newspapers positively influenced voters' images of candidate Lee's personal traits such as his morality, integrity, trustworthiness, and compassion, yet online news uses had an opposite effect on voters' impression of his job-performance and economic policy capabilities. Secondly, among various campaign media, television ads and candidate web-sites positively contributed to the formation of candidate Lee's images, yet showed little direct effect on vote choice, indicating that campaign media mainly indirectly influenced voters' political decision making. Each of the first, second, and third televised candidate debates revealed unique effects on image formation and vote choice. Thirdly, the network size and frequency of political talk negatively influenced image formation regarding candidate Lee's personal traits and economic policy capabilities, yet the discussion network size positively contributed to the Lee votes. Forth, among various dimensions of candidate images, voters' perceptions of candidate Lee's personal traits appeared to be the most significant predictor of the support for him.

  • PDF

The Characteristic Improvement of Photodiode by Schottky Contact (정류성 접합에 의한 광다이오드의 특성 개선)

  • Hur Chang-wu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1448-1452
    • /
    • 2004
  • In this paper, a photodiode capable of obtaining a sufficient photo/ dark current ratio at both a forward bias state and a reverse bias state is proposed. The photodiode includes a glass substrate, an Cr thin film formed as a lower electrode over the glass substrate, Cr silicide thin film(∼l00$\AA$) ) formed as a schottky barrier over the Cr thin film, a hydrogenated amorphous silicon film formed as a photo conduction layer over a portion of the Cr silicide thin film. Transparent conduction film ITO (thickness 100nm) formed as an upper electrode over the hydro-generated amorphous silicon film is then deposited in pure argon at room temperature for the Schottky contact and light window. The high quality Cr silicide thin film using annealing of Cr and a-Si:H is formed and analyzed by experiment. We have obtained the film with a superior characteristics. The dark current of the ITO/a-Si:H Schottky at a reverse bias of -5V is ∼3$\times$IO-12 A/un2, and one of the lowest reported, hitherto. AES(Auger Electron Spectroscophy) measurements indicate that this notable improvement in device characteristics stems from reduced diffusion of oxygen, rather than indium, from the ITO into the a-Si:H layer, thus, preserving the integrity of the Schottky interface. The spectral response of the photodiode for wavelengths in the range from 400nm to 800nm shows the expected behavior whereby the photocurrent is governed by the absorption characteristics of a-Si:H.

An Environmental Analysis of Candidate SBAS Reference Station (위성기반 보강시스템 기준국 후보지의 환경 분석)

  • Han, Younghoon;Park, Sul Gee;Lee, Sangheon;Park, Sang Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.685-688
    • /
    • 2016
  • SBAS(Satellite Based Augmentation System) broadcasts the correction message based on satellite communication to improve the positioning accuracy of GNSS user. For this reason, SBAS is actively being utilized on navigation part. To apply SBAS to navigation part, it should satisfy not only accuracy but also integrity, continuity, availability, coverage requirements and so on. Since SBAS reference station is the base infrastructure of SBAS, it is the main factor to determine the environment, position, and geometry of reference stations to achieve SBAS service performance. Therefore, a site environmental analysis should be performed prior to the selection of SBAS reference station. In this paper, it performs the environmental analysis of NDGPS(Nationwide Differential GPS) reference station sites on the premise that SBAS reference station will be co-operated in the same site of NDGPS operated by MOF(Ministry of Oceans and Fisheries). The environmental analysis is conducted as carrying out the visibility analysis of GPS satellite and interference analysis. This paper also presents the brief procedures and requirements for site survey of SBAS reference station.

  • PDF

(A) Study on the Structure Change of Financial Industrial for strengthening Global Financial Control (글로벌 금융 규제 강화에 따른 금융산업의 구조변화에 대한 연구)

  • Ham, Hyung-Bum;Choi, Chang-Youl
    • International Commerce and Information Review
    • /
    • v.16 no.2
    • /
    • pp.47-67
    • /
    • 2014
  • Since the global financial crisis, criticism against the integrity of financial institutions proposed new financial regulations such as Basel III. These systems are expected to have impacts multilaterally on management and structure of mid- and long-term financial industry. It is also believed that financial institutions will inevitably review business model to respond to these enhanced regulations. The ongoing global financial regulation pursues regulation scope extension, introduction of global regulatory capital system, introduction of global liquidity, etc. As for quantitative index, Basel Committee on Banking Supervision is promoting QIS which is discussed mainly on implementation time from the juridical point of view. This study aims to present domestic banking industry's structural changes depending on regulation enhancement of foreign countries after global financial crisis, and suggest strategy that improves competitiveness of products. Looking at the research result, global financial regulation requires compliance with the regulations through treaties but it shows negative time center around banks. Furthermore, it is also pointed out financially advanced countries' passive attitude on regulation enhancement is problem. Therefore, regulations differentiated between developing and developed countries, dualistic regulations on financial industry, participation of advanced nations, etc are the postulation to change the structure of financial industry.

  • PDF

An Audio Comparison Technique for Verifying Flash Memories Mounted on MP3 Devices (MP3 장치용 플래시 메모리의 오류 검출을 위한 음원 비교 기법)

  • Kim, Kwang-Jung;Park, Chang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.41-49
    • /
    • 2010
  • Being popularized the use of portable entertainment/information devices, the demand on flash memory has been also increased radically. In general, flash memory reveals various error patterns by the devices it is mounted, and thus the memory makers are trying to minimize error ratio in the final process through not only the electric test but also the data integrity test under the same condition as real application devices. This process is called an application-level memory test. Though currently various flash memory testing devices have been used in the production lines, most of the works related to memory test depend on the sensual abilities of human testers. In case of testing the flash memory for MP3 devices, the human testers are checking if the memory has some errors by hearing the audio played on the memory testing device. The memory testing process like this has become a bottleneck in the flash memory production line. In this paper, we propose an audio comparison technique to support the efficient flash memory test for MP3 devices. The technique proposed in this paper compares the variance change rate between the source binary file and the decoded analog signal and checks automatically if the memory errors are occurred or not.

A Study on the Conflict Between the Call for Journalists' Phone Records and the Shield Law: Focusing on the Review of Paragraph 2, Article 13 of the Act of Protection of the Secrecy of Correspondence (기자의 통화내역 조회와 취재원 보호 간의 갈등: 통신비밀보호법 제13조 제2항 논의를 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.25
    • /
    • pp.103-133
    • /
    • 2004
  • Korean citizens enjoy not only the freedom of communication but also the secrecy of electronic communication. Article 18 of the Constitution of the Republic of Korea prescribes that the secrecy of correspondence should not be infringed. Namely, all citizens enjoy guaranteed privacy of correspondence. But many people have been experiencing the infringement of those rights. The purpose of this paper is to evaluate whether Paragraph 2, Article 13 of the Act on Protection of the Secrecy of Correspondence infringes on the constitutional rights of privacy of electronic communication. The results of this study indicate that the law violates the Constitution. Paragraph 3, Article 12 (Personal Liberty, Personal Integrity) of the constitution stipulates that "Warrants issued by a judge through due process (upon the request of a prosecutor) have to be presented in case of arrest, detention, seizure, or search." However, prosecutors, the police, and National Intelligence Service have made numerous inquiries calling for the journalists' telephone records without warrants issued by a judge. So, this study suggests that the paragraph should be amended to be compatible with the Constitution. Meanwhile, journalists should make a more concerted effort to protect their news sources in exercising constitutionally protected freedom of the press.

  • PDF