• Title/Summary/Keyword: Private Memory

Search Result 55, Processing Time 0.025 seconds

The Proposal and Implementation of New Private Parcel Locker with Automatic Transmission Function of Short Message Service by Smartphone Application (스마트폰 어플리케이션에 의해 단문 메시지 서비스의 자동 발송 기능을 가진 새로운 무인 택배함 제안 및 구현)

  • Seo, Jong-Beom;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.101-108
    • /
    • 2017
  • In existing public parcel locker, if there is not an empty storage box, it is not used. In existing private parcel locker, because it is a lock-based locker, there is strong weak point in security. To prevent these drawbacks, the proposed private parcel locker has a menu-driven remote control application which is operated on smartphone. The lock release and the security number change by the security number which is stored in the Electrically erasable read-only memory, are possible. As a result, the proposed method has better advantages than the existing methods in terms of unnecessariness of empty storage box check and security by the security number accumulation function and the automatic SMS transmission representing parcel locker operation result.

Engineering Model Design and Implementation of Mass Memory Unit for STSAT-2 (과학기술위성 2호 대용량 메모리 유닛 시험모델 설계 및 구현)

  • Seo, In-Ho;Ryu, Chang-Wan;Nam, Myeong-Ryong;Bang, Hyo-Choong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.11
    • /
    • pp.115-120
    • /
    • 2005
  • This paper describes the design and implementation of engineering model(EM) of Mass Memory Unit(MMU) for Science and Technology Satellite 2(STSAT-2) and the results of integration test. The use of Field-Programmable Gate Array(FPGA) instead of using private electric parts makes a miniaturization and lightweight of MMU possible. 2Gbits Synchronous Dynamic Random Access Memory(SDRAM) module for mass memory is used to store payload and satellite status data. Moreover, file system is applied to manage them easily in the ground station. RS(207,187) code improves the tolerance with respect to Single Event Upset(SEU) induced in SDRAM. The simulator is manufactured to verify receiving performance of payload data.

Function and Meaning of Color Gray in Korean Films : Memory and Oblivion (한국영화에 표현된 회색의 기능과 의미 : 기억과 망각)

  • Kim, Jong-Guk
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.77-87
    • /
    • 2021
  • The color gray in the cinema expresses the private or public memory and oblivion in the reminiscence scenes. The aesthetic function and meaning of gray that interacts with other elements in cinematic time and space are expanded in various ways. This study was analyzed the cases in which gray was used as the main visual style by limiting the scope to Korean films. Based on the traditional cultural symbolic meaning of gray, I analyzed how it was applied and transformed in films, and interpreted the cultural-social meaning by the interaction between gray and other elements. In film history starting from monochrome, gray has been used as a visual device suitable for realizing cinematic or imaginary reality. Gray is adopted when dreams or recollections are visualized as imaginary reality, and it is used when dreamy imaginations of daydreaming are demonstrated. Gray, which reproduces the dreamlike reality of imagination, is the concrete and realistic way of expression. First, in Korean films, gray is a flashback visual device that recalls the past, and is an intermediary visual form that materializes the imaginary. In films such as Ode to My Father (2014), DongJu (2015), A Resistance(2019) and The Battle : Roar to Victory (2019), the gray of the past is a visual device for cultural memory that builds the homogeneity and identity of the group. In the era of hyper-visibility, gray in black and white images is intended to be clearly remembered by unfamiliarity rather than blurry oblivion by familiarity. Second, in genre films with disaster materials such as Train To Busan (2016) and Ashfall (2019), the grays of rain, fog, clouds, shadows and smoke highlight other elements, and the gray color causes anxiety and fear. In war films such as TaeGukGi: Brotherhood Of War (2003) and The Front Line (2011), gray shows a more intense brutality than the primary color. In sports films such as 4th Place (2015), Take Off (2009) and Forever The Moment (2007), gray expresses uncertainty and immaturity. Third, gray visualizes the historical memory of A Petal (1996), the oblivion in Oh! My Gran (2020) and Poetry (2010), and the reality of daydreaming Gagman (1988) and Dream (1990). At the boundary between imagination and reality, gray is a visual form of dreams, memories and forgetfulness.

Core-aware Cache Replacement Policy for Reconfigurable Last Level Cache (재구성 가능한 라스트 레벨 캐쉬 구조를 위한 코어 인지 캐쉬 교체 기법)

  • Son, Dong-Oh;Choi, Hong-Jun;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.1-12
    • /
    • 2013
  • In multi-core processors, Last Level Cache(LLC) can reduce the speed gap between the memory and the core. For this reason, LLC has big impact on the performance of processors. LLC is composed of shared cache and private cache. In computer architecture community, most researchers have mainly focused on the management techniques for shared cache, while management techniques for private cache have not been widely researched. In conventional private LLC, memory is statically assigned to each core, resulting in serious performance degradation when the workloads are not fairly distributed. To overcome this problem, this paper proposes the replacement policy for managing private cache of LLC efficiently. As proposed core-aware cache replacement policy can reconfigure LLC dynamically, hit rate of LLC is increases drastically. Moreover, proposed policy uses 2-bit saturating counters to improve the performance. According to our simulation results, the proposed method can improve hit rates by 9.23% and reduce the access time by 12.85% compared to the conventional method.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

An Experimental Study of Private Key and Secret Key Disclosure Vulnerability in Cryptographic Service Provider(CSP) Module (Cryptographic Service Provider(CSP) 모듈의 개인키/비밀키 노출 취약점에 대한 실험적 연구)

  • Park, Jin-Ho;Cho, Jae-Ik;Im, Eul-Gyu
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.61-70
    • /
    • 2007
  • In Windows operating system, CSPs(Cryptographic Service Providers) are provided for offering a easy and convenient way of using an various cryptographic algorithms to applications. The applications selectively communicate with various CSPs through a set of functions known as the Crypto API(Cryptographic Application Program Interface). During this process, a secure method, accessing data using a handle, is used in order to prevent analysis of the passing parameters to function between CryptoAPI and CSPs. In this paper, our experiment which is using a novel memory traceback method proves that still there is a vulnerability of private key and secret key disclosure in spite of the secure method above-mentioned.

  • PDF

Chi-chi Earthquake Memorial Park, Taiwan - Approach and Design Process- (대만 치치 지진 메모리얼 - 접근과 설계과정 -)

  • Kim Jungyoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.32 no.5
    • /
    • pp.129-138
    • /
    • 2004
  • Cherishing the dead is based in sadness. Designing a memorial space therefore has an inherent challenge to evoke the feeling that is so personal and varied by providing a physical space. The tendency of memorials, especially in the US after the mid 20th century, has been to emphasis each dead individual, as seen at the Vietnam Veterans Memorial in Washington, D. C., the Oklahoma City National Memorial in Oklahoma City, and so forth. In the process of designing the memorial of the Taiwanese Chi-chi earth-quake, Cheng Kim Park Robidoux tried to set up a series of spaces through which not only the relatives of the dead but also unrelated visitors could have their own spatial experiences, private rituals and public events, so that they can finally build up a collective memory. Sky-Well consists of a large bamboo forest enclosing a void. Without a particular entrance and guiding system, visitors stroll and get lost in the bamboo forest before they find the central void. The horror they experienced during the earthquake is melted down into the motion and phenomenology of the bamboo forest whereas the central void is reinterpreted as an empty mind, where people find solace from the sky. Details, such as the bamboo wall to place commemorative flowers and lotus blossom paving, are echoing the theme of rebirth.

Design of Pipeline Bus and the Performance Evaluation in Multiprocessor System (다중프로세서 시스템에서 파이프라인 전송 버스의 설계 및 성능 평가)

  • 윤용호;임인칠
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.2
    • /
    • pp.288-299
    • /
    • 1993
  • This paper proposes the new bus protocol in the tightly coupled multiprocessor system. The bus protocol uses the pipelined data transfer and block transfer scheme to increase the bus bandwidth, The bus also has the independent transfer lines for the address and data respectively, and it can transfer the data up to maximum 264 Mbytes /sec. This paper also models the multiprocessor system where each processor boards have the private cache. Simulation evaluates the bus and system performance according to hit ratio of the reference data in cache memory, In the case of using this bus, the bus is evaluated not to be saturated when up to 10 processor boards are connected to the bus. As for up to 4 memory interleavng, the performance increases linearly.

  • PDF

A Case Study on the Documentation in a Disaster Area - On the Basis of Great Hanshin-Awaji Earthquake - (재해 지역의 기록화 사례 연구 - 한신·아와지 대지진 기록관리 사례를 중심으로 -)

  • Lee, Mi-young
    • The Korean Journal of Archival Studies
    • /
    • no.21
    • /
    • pp.85-116
    • /
    • 2009
  • Records are the social memory storage including collective memory about region, it is impossible to put into and represent all aspects of society with only public records. Japan showed the possibilities of cooperative collecting and the positive records producing and collecting efforts between organizations, even if it was not accomplished by systemic documentation strategy. Some characteristics were found out when this case was reviewed, it is as follows. To begin with, it is the cooperation and share in collecting. Especially, the activities of private organizations look better than public organizations and the cooperative collecting efforts lead to transmit much more social memory and historical records to next generation. Secondly, it is the positive records producing and collecting. The private organizations also left many records of various activities of those one accord. They recognized that recording experience and leaving behind is the survivors' responsibility. We cannot help recognizing the growth of a sense of duty and historical consciousness to record their own experience with undergoing big disaster, earthquake. Thirdly, there was no limit when it comes to the collecting scope. All records related with people and place in disaster area were the target for collecting just like slogan, 'Let's transmit records to next generation as much as possible', 'Common records and resources deserve leaving, because it is important life's information proving situations of the time. We were able to confirm the high will and enthusiasm about 'how, what and why do we transmit something of society to next generation' in this case.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.