• Title/Summary/Keyword: Ping

Search Result 1,340, Processing Time 0.03 seconds

PingPong-128 Keystream Generator (PingPong-128 키수열 발생기)

  • Lee Hoon-jae;Moon Sang-jae;Park Jong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.80-86
    • /
    • 2006
  • In this paper, we propose the PingPong-128(PP-128) keystream generator, based on summation generator. Proposed PingPong-128, a specific cipher of the PingPong Family, takes 128 bits key and 128 bit initial vector, has 258 bit internal state, and achieves a security level of 128 bits. The security analysis of PingPong-128 is presented, including the resistence to known attacks against the summation generator and other clock-controlled generators.

Handover Method Avoiding Ping-Pong Phenomenon for VoIP Service in Wireless LAN Systems (무선랜을 이용한 인터넷 전화 서비스에서 핑퐁현상 방지를 위한 핸드오버 수행 방법)

  • Kang, Tae-Sung;Kim, Ju-Il
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.211-214
    • /
    • 2009
  • In this paper, we present an efficient handover method avoiding ping-pong phenomenon in Wireless LAN systems. In order to provide the seamless VoIP service for terminals with mobility in Wireless LAN systems. Since the variation range of the received signal strength of the moving terminals is large, the handover procedure can be started by an instant drop of the signal strength. Then the handover procedure is repeated, which makes ping-pong phenomenon. Since the quality of service of VoIP can be lowered by ping-pong phenomenon, in this paper, we present the necessary condition to avoid the ping-pong phenomenon. Through LAB test, we show that the proposed handover method can provide an seamless service without the ping-pong phenomenon.

  • PDF

Landscape Characteristics and Suggestions in Chinese Traditional Village - Cases Study of Ping-shan Village - (중국 전통마을의 경관 특성과 시사점 - 병산촌을 대상 지역으로 -)

  • Huai, Kang;Jang, Byoung-Kwan;Yun, Ju-Cheul
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.2
    • /
    • pp.67-75
    • /
    • 2016
  • This Research was carried out to investigate landscape characteristics of the traditional Chinese village through the landscape analysis. The Purpose of this study was to offer suggestions for improving Korea's traditional village scenery. This research was conducted by analysis about an important component of the landscape in Ping-shan traditional village. It was studied natural landscape, life landscapes, agricultural production landscapes and symbols landscape. This study was carried out through literature research, field research and interviews. The results of Chinese traditional village's landscape characteristic was First, Ping-shan traditional village was located on the basis of Feng-Shui settings. Second, Ping-shan traditional village was clan-based. Third, It is composed of a large green space on the outskirts of the village. Fourth, Ping-shan traditional village was a typical channel village. Fifth, Ping-shan traditional village was a living landscape with various features. sixth, Ping-shan traditional village was a lot of space to agricultural production, most of the arable land surround village. Suggestions for improving Korea's traditional village scenery are as follows ; First, proposes actively re-design on the base of defense fengshi landscape interpreted as a modern sense. Seconds, when large-scale farmland project is established in Korea, you can expect to gain knowledge from traditional Chinese village spacing. Thirds, It seems to require a study of the public space for festival. in the case of china, ancestral shrine space is center and space for festival. Fourth, It was important to seek knowledge about protection for frequent in flood plains in Korea's traditional village. Ping-shan traditional village was well-known for housing with contact water, connected channels and beautiful defense pond. Fifth, for improving Korea's traditional village scenery, we need to make various focus landscape features. Most of the visitors to Ping-shan traditional village was interested in the big and small beautiful landscapes and shelters.

Ping Pong Stream cipher of Using Logistic Map (로지스틱 맵을 활용한 Ping Pong 스트림 암호)

  • Kim, Ki-Hwan;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.326-329
    • /
    • 2017
  • Most modern computer communications and storage media support encryption technology. Many of the Ping Pong algorithms are stream ciphers that generate random numbers in the LFSR core structure. The LFSR has a structure that guarantees the maximum period of a given size, but it has a linear structure and can be predicted. Therefore, the Ping Pong algorithm has a feature of making the linearity of the LFSR into a nonlinear structure through variable clocks and functions. In this paper, we try to improve the existing linearity by replacing the linear disadvantages of LFSR with logistic maps.

  • PDF

Active Measurement Analysis of KREONET using Modified PingER

  • Lee, Man-Hui
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.7
    • /
    • pp.134-140
    • /
    • 2001
  • To know about the performance of KREONET, we installed an active network performance measurement tool, PingER. For customization, we modified its architecture and some codes. Although this customization is a minor change of PingER, it gives much benefit and convenience for both operators and users. Using PingER, we can measure the effect of the STAR TAP link. The new networking through the link is a little bit slower than the previous networking. But the new link shows far fewer packet losses and provides more reliable networking.

  • PDF

Proposed image encryption method using PingPong256

  • Kim, Ki-Hwan;Lee, Hoon Jae;Lee, Young Sil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.71-77
    • /
    • 2020
  • In this paper, we propose a method in which PingPong256 combines LFSR and variable clock to generate an irregular PRNG and use it for image encryption. PingPong256 is guaranteed an extended period based on the two LFSRs, and the variable clock is a structure that outputs the result of operating a predetermined clock in one operation by referring to the state of the different LFSR. A variable clock is characterized by the difficulty of predicting the output at any time because the choice increases with time. PingPong256 combines the advantages of LFSR and variable clock, the convenience of hardware and software implementation, and the benefits of sensitivity and irregular periods. Also, the statistical safety was verified using the NIST SP800-22, the safety of the proposed method, and the sensitivity of the image change was tested using NPCR and UACI.

The Effect of Aquapuncture Anesthesia by Acupoint Iniection with Ketamine Hydrochloride in Dogs (개에 있어서 염산케타민 혈위주사에 의한 약침마취의 효과)

  • 김덕환;이교영;조성환;신해청;조해운;이성호;이성옥;권건오;김인봉
    • Journal of Veterinary Clinics
    • /
    • v.15 no.2
    • /
    • pp.399-403
    • /
    • 1998
  • To clarify the anesthetic effect of acupoint injection(aquapupuncture) using general anasthetics in dogs, 18 mongrel dogs were divided into control and two experimental groups(Tian-ping+Bai-hui : Tian-ping group and San-yang-luo+Gong-sun group : San -yang- lux group). Control group was intramuscularly injected with ketamine hydrochloride, 22 mg/ kg of body weight into the thigh and experimental groups were injected into each acupoint with half volume of dosage, respectively. Clinical findings(recumbency time, induction time of anesthesia, time of head lift and standing time) and changes of vital sign(temperature, heart rate and respiration rate) were investigates at pre-anesthesia, during anesthesia and poststanding, respectively. In recumbency time San-yang-luo groupui<0.05) and Tian-ping group (p<0.05) were faster than that of control, respectively and Tian-ping group was the fastest. In induction time of anesthesia San-yang-luo group was similar to that of control, however, Tian-ping group was faster than that of control(p

  • PDF

Beacon-Less Operation and Idle Ping Slot Control for Low Power Communication in LoRaWAN (LoRaWAN의 저전력 통신을 위한 Beacon-Less 동작 및 유휴 Ping 슬롯 억제 기법)

  • Kim, Kyungtae;Yoo, Younghwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.231-238
    • /
    • 2017
  • A Class B device in LoRaWAN periodically receives a Beacon message from a gateway for synchronization, and it also periodically activates a ping slot to receive data from the server. In this paper, we save energy consumption by controlling the beacon-less operation which is immediately started on the packet loss. In addition, we propose a method that the server inactivates the ping slots of a device according to the amount of messages, which have to be received from the server, to save energy consumption resulting from activated but unused empty slots. The experiment with the 20% of packet loss rate showed that the reduced beacon-less operation and the inactivation of the ping slot decrease the energy consumption by 96.7% and 60% as compared to the existing method.

PingPong 256 shuffling method with Image Encryption and Resistance to Various Noise (이미지 암호화 및 다양한 잡음에 내성을 갖춘 PingPong 256 Shuffling 방법)

  • Kim, Ki Hwan;Lee, Hoon Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1507-1518
    • /
    • 2020
  • High-quality images have a lot of information, so sensitive data is stored by encryption for private company, military etc. Encrypted images can only be decrypted with a secret key, but the original data cannot be retained when attacked by the Shear attack and Noise pollution attack techniques that overwrite some pixel data with arbitrary values. Important data is the more necessary a countermeasure for the recovery method against attack. In this paper, we propose a random number generator PingPong256 and a shuffling method that rearranges pixels to resist Shear attack and Noise pollution attack techniques so that image and video encryption can be performed more quickly. Next, the proposed PingPong256 was examined with SP800-22, tested for immunity to various noises, and verified whether the image to which the shuffling method was applied satisfies the Anti-shear attack and the Anti-noise pollution attack.

Web-based Resource Usage Monitoring by Using Ping Message (PING 메시지를 이용한 웹 기반 자원 사용 감시)

  • Huang, Xiao;Chae, Jeong-Sik;Jeong, Dae-Ryeong;Jung, Heo-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.546-548
    • /
    • 2011
  • Various technologies for resource monitoring such as network traffic, IP resource usages have been developed. PING protocol message is one of the most simple, powerful way to monitor the network resources. In this paper we describe the efficient way to serves a real-time traffic information reports such as IP usage statistics by using saved database information. And we serve web-based traffic information services, so it can monitor a traffics more efficiently.

  • PDF