• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.026 seconds

Implementation of Ring Topology Interconnection Network with PCIe Non-Transparent Bridge Interface (PCIe Non-Transparent Bridge 인터페이스 기반 링 네트워크 인터커넥트 시스템 구현)

  • Kim, Sang-Gyum;Lee, Yang-Woo;Lim, Seung-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.3
    • /
    • pp.65-72
    • /
    • 2019
  • HPC(High Performance Computing) is the computing system that connects a number of computing nodes with high performance interconnect network. In the HPC, interconnect network technology is one of the key player to make high performance systems, and mainly, Infiniband or Ethernet are used for interconnect network technology. Nowadays, PCIe interface is main interface within computer system in that host CPU connects high performance peripheral devices through PCIe bridge interface. For connecting between two computing nodes, PCIe Non-Transparent Bridge(NTB) standard can be used, however it basically connects only two hosts with its original standards. To give cost-effective interconnect network interface with PCIe technology, we develop a prototype of interconnect network system with PCIe NTB. In the prototyped system, computing nodes are connected to each other via PCIe NTB interface constructing switchless interconnect network such as ring network. Also, we have implemented prototyped data sharing mechanism on the prototyped interconnect network system. The designed PCIe NTB-based interconnect network system is cost-effective as well as it provides competitive data transferring bandwidth within the interconnect network.

Asia and Europe: So Distant So Close? The Case of Lipoptena fortisetosa in Italy

  • Andreani, Annalisa;Giangaspero, Annunziata;Marangi, Marianna;Barlaam, Alessandra;Ponzetta, Maria Paola;Roy, Lise;Belcari, Antonio;Sacchetti, Patrizia
    • Parasites, Hosts and Diseases
    • /
    • v.58 no.6
    • /
    • pp.661-668
    • /
    • 2020
  • In Europe, 5 Lipoptena species have been recorded, including Lipoptena fortisetosa. This species, native to Asian countries, was described as a parasite of sika deer and its appearance in Europe dates back to more than 50 years ago. Lipoptena fortisetosa has been recently reported in Italy, sharing its hosts with Lipoptena cervi. A morpho-molecular approach was developed to determine the phylogenetic interrelationship of Italian and Asian CO1 haplotypes sequenced from Lipoptena fly individuals collected in Italy, and their DNA sequences were compared with conspecifics available in GenBank; morphological key-characters (terminalia) of L. fortisetosa were compared with the original description. Two haplotypes were recorded from Italy and assigned to L. cervi and L. fortisetosa, respectively. The latter was part of the monophyletic clade L. fortisetosa, along with 2 Central European and 2 Korean haplotypes (100% identical to one of the Korean haplotypes); moreover, Italian L. fortisetosa female terminalia were consistent with the original description of Asian individuals. Pending more in-depth investigations, this study provides a first answer to the hypothesis of the recent colonization of Italy by L. fortisetosa from Asia as we did not detect any obvious and stable morphological and molecular differences in specimens from the 2 geographical areas. The presence of the sika deer in Europe was retraced and the possible route traveled by the parasite from Asia and the eco-biological factors that may have enhanced its settlement are discussed.

Resource Allocation for Heterogeneous Service in Green Mobile Edge Networks Using Deep Reinforcement Learning

  • Sun, Si-yuan;Zheng, Ying;Zhou, Jun-hua;Weng, Jiu-xing;Wei, Yi-fei;Wang, Xiao-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2496-2512
    • /
    • 2021
  • The requirements for powerful computing capability, high capacity, low latency and low energy consumption of emerging services, pose severe challenges to the fifth-generation (5G) network. As a promising paradigm, mobile edge networks can provide services in proximity to users by deploying computing components and cache at the edge, which can effectively decrease service delay. However, the coexistence of heterogeneous services and the sharing of limited resources lead to the competition between various services for multiple resources. This paper considers two typical heterogeneous services: computing services and content delivery services, in order to properly configure resources, it is crucial to develop an effective offloading and caching strategies. Considering the high energy consumption of 5G base stations, this paper considers the hybrid energy supply model of traditional power grid and green energy. Therefore, it is necessary to design a reasonable association mechanism which can allocate more service load to base stations rich in green energy to improve the utilization of green energy. This paper formed the joint optimization problem of computing offloading, caching and resource allocation for heterogeneous services with the objective of minimizing the on-grid power consumption under the constraints of limited resources and QoS guarantee. Since the joint optimization problem is a mixed integer nonlinear programming problem that is impossible to solve, this paper uses deep reinforcement learning method to learn the optimal strategy through a lot of training. Extensive simulation experiments show that compared with other schemes, the proposed scheme can allocate resources to heterogeneous service according to the green energy distribution which can effectively reduce the traditional energy consumption.

Fixing Security Flaws of URSA Ad hoc Signature Scheme (URSA 애드혹 서명 알고리즘의 오류 수정)

  • Yi, Jeong-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.131-136
    • /
    • 2007
  • Ad hoc networks enable efficient resource aggregation in decentralized manner, and are inherently scalable and fault-tolerant since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related challenges. Moreover, the dynamic topology change in which network nodes frequently join and leave adds a further complication in designing effective and efficient security mechanism. Security services for ad hoc networks need to be provided in a scalable and fault-tolerant manner while allowing for membership change of network nodes. In this paper, we investigate distributed certification mechanisms using a threshold cryptography in a way that the functions of a CA(Certification Authority) are distributed into the network nodes themselves and certain number of nodes jointly issue public key certificates to future joining nodes. In the process, we summarize one interesting report [5] in which the recently proposed RSA-based ad hoc signature scheme, called URSA, contains unfortunate yet serious security flaws. We then propose new scheme by fixing their security flaws.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Construction of an Asymmetric Traitor Tracing Schemes with Anonymity (익명성을 보장하는 비대칭 공모자 추적 기법의 설계)

  • Lee, Moonsik;Kang, SunBu;Lee, Juhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1231-1242
    • /
    • 2012
  • Traitor tracing schemes deter traitors from sharing their private keys by tracing at least one of the subscribers who were implicated in the construction of a pirate decoder. In general, it is assumed that the system manager in the scheme generates and distributes the subscribers' private key. But if the system manager knows the subscribers' private keys, he cannot convince a third party of a certain subscriber's piracy. To solve this problem, the system manager should not know the whole parts of subscribers' private keys and this leads to researches of asymmetric schemes. Moreover for the purpose of enhancing subscribers' privacy, there were two proposals of introducing anonymity onto asymmetric traitor tracing schemes, but one of them turned out to be a failure. In this paper, we point out that the other proposal also has flaws. We consider how to introduce anonymity to traitor tracing schemes, as a result, we suggest a new framework which is practical. We also construct a scheme by using an anonymous credential system and an asymmetric traitor tracing scheme. We prove the security of our scheme and consider the typical applications.

A Study on the Perception of Fashion Platforms and Fashion Smart Factories using Big Data Analysis (빅데이터 분석을 이용한 패션 플랫폼과 패션 스마트 팩토리에 대한 인식 연구)

  • Song, Eun-young
    • Fashion & Textile Research Journal
    • /
    • v.23 no.6
    • /
    • pp.799-809
    • /
    • 2021
  • This study aimed to grasp the perceptions and trends in fashion platforms and fashion smart factories using big data analysis. As a research method, big data analysis, fashion platform, and smart factory were identified through literature and prior studies, and text mining analysis and network analysis were performed after collecting text from the web environment between April 2019 and April 2021. After data purification with Textom, the words of fashion platform (1,0591 pieces) and fashion smart factory (9750 pieces) were used for analysis. Key words were derived, the frequency of appearance was calculated, and the results were visualized in word cloud and N-gram. The top 70 words by frequency of appearance were used to generate a matrix, structural equivalence analysis was performed, and the results were displayed using network visualization and dendrograms. The collected data revealed that smart factory had high social issues, but consumer interest and academic research were insufficient, and the amount and frequency of related words on the fashion platform were both high. As a result of structural equalization analysis, it was found that fashion platforms with strong connectivity between clusters are creating new competitiveness with service platforms that add sharing, manufacturing, and curation functions, and fashion smart factories can expect future value to grow together, according to digital technology innovation and platforms. This study can serve as a foundation for future research topics related to fashion platforms and smart factories.

A Study on Antecedents of Consumer's Revisit Intention in the Context of Accommodation Sharing Platform: The Role of Relative Attractiveness, Brand Identification, and Enjoyment (숙박 공유 플랫폼에서 고객들의 재방문 의도의 선행 요인에 대한 연구: 상대적 매력, 브랜드 동일화, 즐거움의 역할)

  • Kim, Seon Ju;Kim, Byoungsoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.269-278
    • /
    • 2022
  • Recently, the travel and lodging industries have been suffering from the spread of COVID-19. But Airbnb recovered its profits with a differentiated strategy. This study identified the characteristics of Airbnb and examined their effects on customer's revisit intention in the Airbnb context. Perceived value, trust about Airbnb, and social norms were considered as the key factors of revisit intention. In addition, the effects of relative attractiveness, brand identification, and enjoyment on perceived value and trust about Airbnb were examined. The proposed research model was tested based on 285 consumers who had Airbnb experience more than twice. The analysis results showed that relative attractiveness, brand identification, and enjoyment had a significant influence on perceived value and trust. Perceived value had a significant influence on revisit intention. However, trust about Airbnb and social norms did not significantly affect revisit intention. Moreover, ths analysis results found no significant moderating effect of share of wallet. Based on the results of this study, Airbnb would establish effective marketing and operation strategies by understanding the formation mechanism of consumer's revisit intention toward Airbnb.

Proposal for Government Quality Assurance Risk Assessment System for Military Supplies (군수품 정부품질보증 위험성 평가제도 개선을 위한 제언)

  • Namsu Ahn
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.2
    • /
    • pp.155-170
    • /
    • 2023
  • Purpose: Nowadays, the risk assessment system is widely used in many industrial and public areas to reduce the possible risks. The system is used to determine the priorities of the government quality assurance works in Defense Agency for Technology and Quality. However, as the risk assessment system is used for other purposes, there are some items that need improvement, and in this study, we propose improvement plans by benchmarking the risk assessment systems of other institutions. Methods: In this paper, first, the procedures of risk assessment system used in many industrial sites were reviewed, and how each institution specialized and applied the system. Afterwards, by benchmarking various risk assessment systems, an improvement plan on how to operate the risk assessment system in the case of government quality assurance for centrally procured military supplies was presented, and practical application cases were presented to prove the usefulness of the improvement plan. Results: The proposed risk assessment system differs from the existing system in five major aspects. First, inputs, outputs, and key performance indicators were specified from the systematic point of view. Second, risk analysis was analyzed in four dimensions: probability of occurrence, impact, detection difficulty. Third, risk mitigation measures were classified, control, transfer, and sharing. Fourth, the risk mitigation measures were realized through document verification, product verification, process verification, and quality system evaluation. Finally, risk mitigation measures were implemented and the effectiveness of the risk mitigation measures was evaluated through effectiveness evaluation. Conclusions: In order for the risk assessment procedure proposed in this study to be applied to actual work, it is necessary to obtain the consent of the person involved in the work due to the increased time for risk identification and preparation of the government quality assurance log, and a change in the information system that performs the actual work is required. Therefore, the authors of this study plan to actively perform internal seminar presentations and work improvement suggestions to apply these research outputs to actual work.

Resource Allocation for Performance Optimization of Interleaved Mode in Airborne AESA Radar (항공기탑재 AESA 레이다의 동시운용모드 성능 최적화를 위한 자원 할당)

  • Yong-min Kim;Ji-eun Roh;Jin-Ju Won
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.540-545
    • /
    • 2023
  • AESA radar is able to instantaneously and adaptively position and control the beam, and this enables to have interleaved mode in modern airborne AESA radar which can maximize situational awareness capability. Interleaved mode provides two or more modes simultaneously, such as Air to Air mode and Sea Surface mode by time sharing technique. In this interleaved mode, performance degradation is inevitable, compared with single mode operation, and effective resource allocation is the key component for the success of interleaved mode. In this paper, we identified performance evaluation items for each mode to analyze interleaved mode performance and proposed effective resource allocation methodology to achieve graceful performance degradation of each mode, focusing on detection range. We also proposed beam scheduling techniques for interleaved mode.