• Title/Summary/Keyword: Open network

Search Result 1,739, Processing Time 0.033 seconds

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

ESP : A DVR File Format for Enhanced Recording and Searching (ESP : 녹화 및 검색 기능 향상을 위한 DVR전용 파일 포맷)

  • Park, Jae-Kyung;Yang, Seung-Min
    • The KIPS Transactions:PartB
    • /
    • v.16B no.1
    • /
    • pp.25-34
    • /
    • 2009
  • DVR(Digital Video Recorder) system stores video inputs in compressed digital formats and retrieve them. DVR system has several advantages over traditional analog tape recorder system which are (1) improved real-time monitoring, recording and searching capability, and (2) other capabilities such as watermarking and remote monitoring through network. AVI format is the most popular format used for DVR systems. However, AVI format has drawbacks in recording and searching due to structural problem. Some vendors develop and use their own format, do not open the format to the public. In this paper, ESP format is proposed. ESP format solves the drawbacks of AVI format, and the advantages of AVI format apply to ESP format. Moreover, ESP format provides multistream recording/replay and event-recording. In result, ESP format enchances functionality of recording and searching in DVR system.

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

A Distinction Technology for Harmful Web Documents by Rates (등급에 따른 웹 유해 문서 분류 기술)

  • Kim, Yong-Soo;Nam, Taek-Yong;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.859-864
    • /
    • 2006
  • The openness of the Web allows any user to access almost any type of information easily at any time and anywhere. However, with function of easy access for useful information, internet has dysfunctions of providing users with harmful contents indiscriminately. Some information, such as adult content, is not appropriate for all users, notably children. Additionally for adults, some contents included in abnormal porn sites can do ordinary people's mental health harm. In the meantime, since Internet is a worldwide open network it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse way, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies.

Public Administration Town Plan of Sejong-City based on Landscape Ecological Perspectives (경관생태학적 관점에서의 세종시 중심행정타운 조성계획)

  • Lee, Ai-Ran
    • Ecology and Resilient Infrastructure
    • /
    • v.1 no.2
    • /
    • pp.94-101
    • /
    • 2014
  • This is the urban design master plan for the Public Administration Town. The project proposes a newly configured city, where environmental and democratic principles are expressed in the shape of the urban fabric. To achieve the goal, the concepts of 'Flat City, Link City, and Zero City' were introduced. These concept show "Space fabric arrange, connection and material circulation and flow from ecological landscape". 'Flat City' shaped the government buildings into an iconic plane, and democratic society. The iconic plane's surface extends across the whole city, creating an expansive public park, which is easily accessible, and open to nature. 'Link City' connects governmental agencies to enhance their function and interactions. Government facilities, parks and green spaces, cultural facilities, commercial zones, and residential districts areas create an interconnecting network. 'Zero City' has integrated infrastructure systems to reuse waste, reduce pollution, and provide essential city functions. It creates a new wildlife habitat, making 'Zero City' a good neighborhood. This proposal was made to integrate historical, regional, nature experiences with various approaches in architecture, city, and landscape architecture.

Log processing using messaging system in SSD Storage Tester (SSD Storage Tester에서 메시징 시스템을 이용한 로그 처리)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1531-1539
    • /
    • 2017
  • The existing SSD storage tester processed logs in a 1-N structure between server and client using TCP and network file system. This method causes some problems for example, an increase in CPU usage and difficulty in exception handling, etc. In this paper, we implement a log processing message layer that can deal with asynchronous distributed processing using open source messaging system such as kafka, RabbitMQ and compare this layer with existing log transmission method. A log simulator was implemented to compare the transmission bandwidth and CPU usage. Test results show that the transmission using the message layer has higher performance than the transmission using the message layer, and the CPU usage does not show any significant difference The message layer can be implemented more easily than the conventional method and the efficiency is higher than that of the conventional method.

Implementation of a Cluster VOD Server and an Embedded Client based on Linux (리눅스 기반의 클러스터 VOD서버와 내장형에 클라이언트의 구현)

  • Seo Dongmahn;Bang Cheolseok;Lee Joahyoung;Kim Byounggil;Jung Inbum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.435-447
    • /
    • 2004
  • For VOD systems, it is important to provide QoS to more users under the limited resources. To analyze QoS issues in real environment, we implement clustered VOD server and embedded client system based on the Linux open source platform. The parallel processing of MPEG data, load balancing for nodes and VCR like functions are implemented in the server side. To provide more user friendly interface, the general TV is used for a VOD client's terminal and the embedded board is used supporting for VCR functions. In this paper, we measure the performance of the implemented VOD system under the various user requirement features and evaluate the sources of performance limitations. From these analyses, we propose the dynamic admission control method based on the availability memory and network bandwidth. The proposed method enhances the utilization of the system resource for the more QoS media streams.

User Reputation Management Method Based on Analysis of User Activities on Social Media (소셜 미디어에서 사용자 행위 분석을 통한 사용자 평판 관리 기법)

  • Yun, Jinkyung;Jeong, Jiwon;Lee, Suji;Lim, Jongtae;Bok, Kyungsoo;Yoo, Jaesoo
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.96-105
    • /
    • 2016
  • Recently, social network services have changed by moving towards an open platform where, as well as simply allowing the building of relationships among users, various types of information can be generated and shared. Since existing user reputation management methods evaluate user reliability based on user profiles, explicit relations, and evaluation, they are not suitable for determining user reliability on social media due to few explicit evaluation. In this paper, we analyze social activities on social media and propose a new user reputation management method that considers implicit evaluation as well as explicit evaluation. The proposed method derives positive and negative implicit evaluation from social activities, and generates user reputation information by field in order to consider user expertise. It also considers the number of users that participate in evaluation in order to measure user influence. As a result, it generates the reputation information of users who have no explicit evaluation and creates user reputation information that is more suitable for social media.

A Study on the Performance Evaluation of Elliptic Curve Cryptography based on a Real Number Field (실수체 기반 타원곡선 암호의 성능 평가에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1439-1444
    • /
    • 2013
  • Recently, as the use of the applications like online banking and stock trading is increasing by the rapid development of the network, security of data content is becoming more and more important. Accordingly, public key or symmetric key encryption algorithm is widely used in open networks such as the internet for the protection of data. Generally, public key cryptographic systems is based on two famous number theoretic problems namely factoring or discrete logarithm problem. So, public key cryptographic systems is relatively slow compared to symmetric key cryptography systems. Among public key cryptographic systems, the advantage of ECC compared to RSA is that it offers equal security for a far smaller key. For this reason, ECC is faster than RSA. In this paper, we propose a efficient key generation method for elliptic curve cryptography system based on the real number field.

Effort Analysis of Unit Testing Conducted by Non-Developer of Source Code (원개발자 부재에 따른 원시코드 기반의 단위테스트 노력 분석)

  • Yoon, Hoijin
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.251-262
    • /
    • 2012
  • Unit testing is one of the test levels, which tests an individual unit or a group of related units. Recently, in Agile Development or Safety-critical System Development, the unit testing plays an important role for the qualities. According to the definition of unit testing, it is supposed to be done by the developers of units. That is because test models for the unit testing refers to the structure of units, and others but its original developers hardly can understand the structures. However, in practice, unit testing is often asked to be done without the original developers. For example, it is when faults are revealed in customer sites and the development team does not exit any more. In this case, instead of original developers, other developers or test engineers take a product and test it. The unit testing done by a non-developer, who is not the original developer, would cause some difficulties or cause more cost. In this paper, we tests an open source, JTopas, as a non-developer, with building test models, implementing test codes, and executing test cases. To fit this experiment to practical testing situations, we designed it based on the practices of unit testing, which were surveyed through SPIN(Software Process Improvement Network). This paper analyzes which part of unit testing done by non-developers needs more effort compared to the unit testing done by original developers. And it concludes that Agile Development contributes on reducing the extra effort caused by non-developers, since it implements test codes first before developing source code. That means all the units have already included their own tests code when they are released.