• Title/Summary/Keyword: Process sharing

Search Result 1,211, Processing Time 0.026 seconds

A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths (4가지 운영모드와 128/256-비트 키 길이를 지원하는 ARIA-AES 통합 암호 프로세서)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.795-803
    • /
    • 2017
  • This paper describes a dual-standard cryptographic processor that efficiently integrates two block ciphers ARIA and AES into a unified hardware. The ARIA-AES crypto-processor was designed to support 128-b and 256-b key sizes, as well as four modes of operation including ECB, CBC, OFB, and CTR. Based on the common characteristics of ARIA and AES algorithms, our design was optimized by sharing hardware resources in substitution layer and in diffusion layer. It has on-the-fly key scheduler to process consecutive blocks of plaintext/ciphertext without reloading key. The ARIA-AES crypto-processor that was implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,658 gate equivalents (GEs), and it can operate up to 95 MHz clock frequency. The estimated throughputs at 80 MHz clock frequency are 787 Mbps, 602 Mbps for ARIA with key size of 128-b, 256-b, respectively. In AES mode, it has throughputs of 930 Mbps, 682 Mbps for key size of 128-b, 256-b, respectively. The dual-standard crypto-processor was verified by FPGA implementation using Virtex5 device.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

Effects of Collective Intelligence-Based SSI Instruction on Promoting Middle School Students' Key Competencies as Citizens (집단지성을 강조한 과학기술 관련 사회쟁점 수업이 중학교 영재학급 학생들의 역량 함양에 미치는 효과)

  • Lee, Hyunju;Choi, Yunhee;Ko, Yeonjoo
    • Journal of The Korean Association For Science Education
    • /
    • v.35 no.3
    • /
    • pp.431-442
    • /
    • 2015
  • SSI instruction can be an effective tool to promote key competencies for future citizens. Our assumption of the study is that applying the concept of collective intelligence in the context of SSI learning would facilitate the learning. Thus, we designed and implemented Collective Intelligence-based SSI instruction over almost a year and observed the effects of the instruction on enhancing students' collaboration, information management, critical thinking, and communication skills. Twenty 9th grade students enrolled in a science-gifted program voluntarily participated. Data was collected by administering a questionnaire to examine the skills before, in the middle of, and after the instruction, and by conducting classroom observations and focus student group interviews. The results indicated some degree of improvement in their targeted skills. First, they experienced the expansion of their thoughts by actively sharing information and ideas using the web platform. Second, they became more flexible and open to different points of views in order to accomplish a common goal. Third, they appreciated having independent time and space to explore their own positions on the issues and to search necessary information, and believed that the process encouraged them to more pro-actively participate and communicate in the group debates. Lastly, they positively perceived the values that collaboration with diverse group members could produce.

Artificial Intelligence and College Mathematics Education (인공지능(Artificial Intelligence)과 대학수학교육)

  • Lee, Sang-Gu;Lee, Jae Hwa;Ham, Yoonmee
    • Communications of Mathematical Education
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2020
  • Today's healthcare, intelligent robots, smart home systems, and car sharing are already innovating with cutting-edge information and communication technologies such as Artificial Intelligence (AI), the Internet of Things, the Internet of Intelligent Things, and Big data. It is deeply affecting our lives. In the factory, robots have been working for humans more than several decades (FA, OA), AI doctors are also working in hospitals (Dr. Watson), AI speakers (Giga Genie) and AI assistants (Siri, Bixby, Google Assistant) are working to improve Natural Language Process. Now, in order to understand AI, knowledge of mathematics becomes essential, not a choice. Thus, mathematicians have been given a role in explaining such mathematics that make these things possible behind AI. Therefore, the authors wrote a textbook 'Basic Mathematics for Artificial Intelligence' by arranging the mathematics concepts and tools needed to understand AI and machine learning in one or two semesters, and organized lectures for undergraduate and graduate students of various majors to explore careers in artificial intelligence. In this paper, we share our experience of conducting this class with the full contents in http://matrix.skku.ac.kr/math4ai/.

Quality of Working Life (직장생활에 대한 새로운 인식)

  • 김영환
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.4 no.4
    • /
    • pp.43-61
    • /
    • 1981
  • Interest in the Quality of working life is spreading rapidly and the phrase has entered the popular vocabulary. That this should be so is probably due in large measure to changes in the values of society, nowadays accelerated as never before by the concerns and demands of younger people. But however topical the concept has become, there is very little agreement on its definition. Rather, the term appears to have become a kind of depository for a variety of sometimes contradictory meanings attributed to it by different groups. A list of all the elements it if held to cover would include availability and security of employment, adaquate income, safe and pleasant physical working conditions, reasonable hours of work, equitable treatment and democracy in the workplace, the possibility of self-development, control over one's work, a sense of pride in craftsmanship or product, wider career choices, and flexibility in matters such as the time of starting work, the number of working days in the week, Job sharing and so on altogether an array that encompasses a variety of traditional aspirations and many new ones reflecting the entry into the post industrial era. The term "quality of working life" was introduced by professor Louis E. Davis and his colleagues in the late 1960s to call attention to the prevailing and needlessly poor quality of life at the workplace. In their usage it referred to the quality of the relationship between the worker and his working environment as a whole, and was intended to emphasize the human dimension so often forgotten among the technical and economic factors in job design. Treating workers as if they were elements or cogs in the production process is not only an affront to the dignity of human life, but is also a serious underestimation of the human capabilities needed to operate more advanced technologies. When tasks demand high levels of vigilence, technical problem-solving skills, self initiated behavior, and social and communication skills. it is imperative that our concepts of man be of requisite complexity. Our aim is not just to protect the worker's life and health but to give them an informal interest in their job and opportunity to express their views and exercise control over everything that affects their working life. Certainly, so far as his work is concerned, a man must feel better protected but he must also have a greater feeling of freedom and responsibility. Something parallel but wholly different if happening in Europe, industrial democracy. What has happened in Europe has been discrete, fixed, finalized, and legalized. Those developing centuries driving toward industrialization like R.O.K, shall have to bear in mind the human complexity in processing and designing the work and its environment. Increasing attention is needed to the contradiction between autocratic rule at the workplace and democratic rights in society.n society.

  • PDF

Text Analysis of : Possibilities of Feminist Sphere in Radio (라디오 프로그램 <여성시대> 분석 : 여성주의적 공간의 가능성)

  • Kim, Eun-Jeong
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.36-70
    • /
    • 2001
  • The purpose of this study is to investigate women's radio talk program and evaluate its possibilities and limitation from the point of feminist perspective. The theoretical framework is based on feminist studies and text analysis of talk show. Existing studies regarding talk show are mainly focused on television. But radio talk show is one of general entertainment and it's influences on minorities are still significant. is the most representative women's radio talk program in Korea. It has been broadcasted over 10 years and very popular among Korean housewives. The audience of this program call themselves schoolfellow, and call the program 'school of women'. The media text of is mainly consisted of letters from women audiences, and they are selected by producers. So the text is made by both audiences and producers. The unique combination of this process produces complicated discourses which contain women's experiences in letters and station's considerations through safekeeping. The problems investigated in this study are as follows: First, What discourses are produced in this program? Second, Alternative possibilities can be seen in this program in feminist perspectives? Text analysis of 1week(2000.9.18-9.24) and interview with producers are accomplished to this purposes. In the text analysis, subject matters, inscribed women's position, values of the letters are revealed. Most of the subject matters are family affairs. Some are socially oriented but family and home are the predominant category of women's letters. And the position of women subject is defined in the domestic network. They are nameless but the mother, wife, daughter, daughter-in-law of other people. In value, family-oriented value and small happiness in everyday life are generally appeared. But these values are essentially coincide with the values of status quo. The answers of the conflict are not public but individualized. And acception the status quo is presented as the wisest decision, But ` has many implications in relation to women's sharing of their experience, and construction of imagined community in media. Women continuously interact each other revealing and discussing their experiences and sometimes their social practices are stirred through this media sphere. So we see the 'emotional union' among women are formed through radio. The limitation of this program is very apparent: it's patriarchic values, acception of status quo, and individualization of the women's problems. But in the same time we can read coexisting it's latent possibilities: the possibilities of women's public sphere. But it is completely alternative women's sphere in feminist perspectives. It renders women opportunities to participate public media and share with other women, and collaborate with their problem.

  • PDF

Development of Kill Chain Based Effective Maritime Operations Model for Naval Task Forces (Kill Chain 기반 해상기동부대의 효과적인 해상작전 모델 제안)

  • Lee, Chul-Hwa;Jang, Dong-Mo;Lee, Tae-Gong;Lim, Jae-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.177-186
    • /
    • 2012
  • Navy establishes the Naval Task Forces (TF) for many kinds of maritime operations. Then the TF in the maritime environment performs simultaneous component operations such as ASUW (Anti-Surface Warfare), ASW (Anti-Submarine Warfare), AAW (Anti-Aircraft Warfare), and assault operations. The TF consists of many tactical systems for the completion of missions C4I, VOIP (Voice Over Internet Protocol), DMHS (Digital Massage Handling System), and TDLs (Tactical Data Links) such as LINK-11, 16, ISDL (Inter Site Data Link). When the TF executes naval operations to complete a mission, we are interested in the kill chain for the maritime operations in the TF. The kill chain is a standard procedure for the naval operations to crush enemy defenses. Although each ship has a procedure about a manual for 'how to fight', it leave something to be desired for the TF detailed kill chain currently. Therefore, in this paper, we propose the naval TF's kill chain to perform the naval operations. Then, the operational effectiveness of the TF in the kill chain environment is determined through operation scenarios of TDL system implementation. It is to see the operational information sharing effect to a data link model based on MND-AF OV 6c (statement of tracking operational status) in the maritime operations applied to TDL and is to identify improvements in information dissemination process. We made the kill chain of maritime TF for the effective naval operations.

An Empirical Study of SNS Users' Switching Intention Toward Closed SNS (SNS 이용자의 폐쇄형 SNS로의 전환의도에 영향을 미치는 요인에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.135-160
    • /
    • 2014
  • Most Social Network Service (SNS) provide online chat, video and file sharing, blogging and others. Because of this advantage, people depend on SNS to communicate with others. However, recently SNS encourage people to reveal too much information broadly so SNS users are concerned about privacy invasion and data spill. They also feel fatigue in process of touching people they don't know while using SNSs. That is the reason why they attempt to switch from opened SNS to Closed SNS. Therefore, the purpose of this study is to empirically investigate and analyze the effect of the factors on the SNS users' switching behavior when using SNS. To accomplish this purpose, this research adopted "Push-Pull-Mooring (PPM)" framework. The PPM is proposed by population geologist, who used it to explain the incentives of demographic migration. Following PPM model, this research empirically examines the three categories of antecedents for SNS switching intention toward closed SNS: push (i.e., weak connection, privacy concern, relative complexity), pull (i.e., enjoyment, belongingness, peer influence), mooring (i.e., SNS fatigue, user resistance) factors. The survey was conducted for 285 users on SNS communities in Korea. The results of this study are as follows; First, wear connection and privacy concern are significantly related to SNS switching intention. Second, enjoyment and belongingness are significantly related to SNS switching intention. Finally, the results show that SNS fatigue has a moderating effect on the links between push factors and SNS switching Intention. Also, user resistance has a moderating effect on the links between pull factors and SNS switching Intention. These findings contribute to the SNS literature both theoretically and practically.

Realities of a Hospital's web-site' Management and It's Effect on Hospital Management (병원의 홈페이지 관리운영 실태와 병원경영에 미치는 효과)

  • Hwang, Byung-Deog;Im, Bock-Hee;Lee, Young-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.241-249
    • /
    • 2010
  • The purpose of this study is to provide basic information for marketing strategy for hospitals in Busan Metropolitan area by investigating of the web-site management and effect on hospital management about the web-sites managers. Survey of 53 web-site managers was taken between May 1st and May 25th 2008. The survey was carried out to gather information about characteristics of web-site managers and creating, managing and operating process of web-sites and web-sites' effect and information sharing abilities. The results of survey are as follows. First, most of hospitals' web-sites were launched between 2001 to 2005 via outsourcing. Most of hospitals spent about one to three million won for their web-sites and renew web-sites every year. Most of these web-sites have hospital PR, Q&A, and on-line support functions. Second, most of whom participated in survey have agreed that a hospital web-site has influence in hospital management in various categories such as introducing hospital to medical examination, making doctor's appointment, providing patient guidance, providing medical information, and patient counselling. This study shows that effects of web-sites are closely related to web-site satisfaction level. Therefore, to raise the hospital satisfaction level, it is necessary for hospitals to put more efforts in creating web-site that provides more medical information and improved on-line services.

Program Translation from Conventional Programming Source to Java Bytecode (기존 프로그래밍 원시코드에서 자바 바이트 코드로의 변환)

  • Jeon-Geun Kang;Haeng-Kon Kim
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.963-980
    • /
    • 2002
  • Software reengineering is making various research for solutions against problem of maintain existing systems. Reengineering has a meaning of development of software on exizting systems through the reverse engineering auf forward engineering. Most of the important concepts used in reengineering is composition that is restructuring of the existing objects. Is there a compiler that can compile a program written in a traditional procedural language (like C or Pascal) and generate a Java bytecode, rather than an executable code that runs oかy on the machine it was compiled (such as an a.out file on a Unix machine)\ulcorner This type of compiler may be very handy for today's computing environment of heterogeneous networks. In this paper we present a software system that does this job at the binary-to-binary level. It takes the compiled binary code of a procedural language and translates it into Java bytecode. To do this, we first translate into an assembler code called Jasmin [7] that is a human-readable representation of Java bytecode. Then the Jasmin assembler converts it into real Java bytecode. The system is not a compiler because it does not start at the source level. We believe this kind of translator is even more useful than a compiler because most of the executable code that is available for sharing does not come with source programs. Of course, it works only if the format of the executable binary code is known. This translation process consists of three major stages: (1) analysis stage that identifies the language constructs in the given binary code, (2) initialization stage where variables and objects are located, classified, and initialized, and (3) mapping stage that maps the given binary code into a Jasmin assembler code that is then converted to Java bytecode.

  • PDF