• Title/Summary/Keyword: Propose technological

Search Result 339, Processing Time 0.023 seconds

Development Hi-DPI Algorithm for High Speed Packet Filtering of Anti-DDoS based on HW (하드웨어 기반 Anti-DDoS 대응 장비 고속 패킷 필터링을 위한 Hi-DPI 알고리즘 연구)

  • Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.41-51
    • /
    • 2017
  • The explosive increase in the range of Internet usage gradually makes the speed and capacity of network high-speed, rapidly evolving it into mass storage. Accordingly, network equipment such as switch and router are coping with it through hardware-based rapid technological evolution, but as the technological development of the most basic and essential network security system in the hyper-connected society requires frequent alterations and updates about the security issues and signatures of tens of thousands, so it is not easy to overcome the technical limitations based on the software. In this paper, to improve problems in installing and operating such anti-DDoS devices, we propose a Hi-DPI algorithm best reflecting the hardware characteristics and parallel processing characteristics of FPGA (Field Programmable Gate Array), and would verify the practicality.

Study On Distribute Computing Network Security Using Encrypted User Security Module (분산 네트워크 환경하에서 암호화 된 사용자 인증 모듈을 적용한 데이터베이스 보안 시스템)

  • Lee Dae-Young;Kim Ok-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.315-320
    • /
    • 2006
  • This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

Analysis of Importance of Intellectual Properties on Semiconductor Design and Its Reuse (반도체설계의 지식재산권과 그 재사용의 중요성에 대한 분석)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.924-927
    • /
    • 2009
  • IP reuse technology, for the sake of out-performance and the reduction of development period of IT-SoC is the most essential factor for the sound growth of SoC industry. As for this IP reuse technology, it is very important to decide the proper specification and the standardization of the requirement from the companies, as well as to develop our own domestic technological know-how which does not depend on import. In this study, we propose to analyze a security core IP with pure domestic technological know-how, mentioning an example from $CAST_{TM}$, which presently is an American company costing royalty.

  • PDF

Prediction of shear strength and drift capacity of corroded reinforced concrete structural shear walls

  • Yang, Zhihong;Li, Bing
    • Structural Engineering and Mechanics
    • /
    • v.83 no.2
    • /
    • pp.245-257
    • /
    • 2022
  • As the main lateral load resisting system in high-rise reinforced concrete structures, the mechanical performance of shear wall has a significant impact on the structure, especially for high-rise buildings. Steel corrosion has been recognized as an important factor affecting the mechanical performance and durability of the reinforced concrete structures. To investigate the effect on the seismic behaviour of corroded reinforced concrete shear wall induced by corrosion, analytical investigations and simulations were done to observe the effect of corrosion on the ultimate seismic capacity and drift capacity of shear walls. To ensure the accuracy of the simulation software, several validations were made using both non-corroded and corroded reinforced concrete shear walls based on some test results in previous literature. Thereafter, a parametric study, including 200 FE models, was done to study the influence of some critical parameters on corroded structural shear walls with boundary element. These parameters include corrosion levels, axial force ratio, aspect ratio, and concrete compressive strength. The results obtained would then be used to propose equations to predict the seismic resistance and drift capacity of shear walls with various corrosion levels.

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks

  • Zhang, Bo;Huang, Kai-zhi;Chen, Ya-jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2595-2618
    • /
    • 2018
  • In this paper, we investigate secure communication with the presence of multiple eavesdroppers (Eves) in a two-tier downlink dense heterogeneous network, wherein there is a macrocell base station (MBS) and multiple femtocell base stations (FBSs). Each base station (BS) has multiple users. And Eves attempt to wiretap a macrocell user (MU). To keep Eves ignorant of the confidential message, we propose a physical-layer security scheme based on cross-layer cooperation to exploit interference in the considered network. Under the constraints on the quality of service (QoS) of other legitimate users and transmit power, the secrecy rate of system can be maximized through jointly optimizing the beamforming vectors of MBS and cooperative FBSs. We explore the problem of maximizing secrecy rate in both non-colluding and colluding Eves scenarios, respectively. Firstly, in non-colluding Eves scenario, we approximate the original non-convex problem into a few semi-definite programs (SDPs) by employing the semi-definite relaxation (SDR) technique and conservative convex approximation under perfect channel state information (CSI) case. Furthermore, we extend the frame to imperfect CSI case and use the Lagrangian dual theory to cope with uncertain constraints on CSI. Secondly, in colluding Eves scenario, we transform the original problem into a two-tier optimization problem equivalently. Among them, the outer layer problem is a single variable optimization problem and can be solved by one-dimensional linear search. While the inner-layer optimization problem is transformed into a convex SDP problem with SDR technique and Charnes-Cooper transformation. In the perfect CSI case of both non-colluding and colluding Eves scenarios, we prove that the relaxation of SDR is tight and analyze the complexity of proposed algorithms. Finally, simulation results validate the effectiveness and robustness of proposed scheme.

Introduction and Analysis of Technology Roadmap (TRM) about Eco-Friendly Process in Korea (국내 친환경공정기술 분야의 기술지도 소개 및 분석)

  • Kim, Sangyong;Park, Chulhwan;Lee, Byunghwan;Lee, Sang-Hoon
    • Clean Technology
    • /
    • v.10 no.4
    • /
    • pp.189-194
    • /
    • 2004
  • The review of the present status of Korean industries and the establishment of strategic R&D agenda are necessary to improve the innovative technological capabilities of Korea to the top level of the world. Recently, Korean ministry of science and technology (MOST) has selected specific areas to develop national technological innovation system, and prepared national technology roadmap (NTRM). Korean ministry of environment (ME) also has prepared technology roadmap (TRM) to help efficient development of environmental science and technology. The development of eco-friendly process in NTRM and TRM was introduced and reviewed in this study. In addition, strength, weakness, opportunities, and threats (SWOT) analysis of technological capabilities of Korea was performed. The results propose the core role of industry, university, research institute, and government for the development of Korean environmental process technology.

  • PDF

A Study of Housing Design Guidelines for the Single Household (독신 가구의 주거계획 방향에 관한 연구)

  • Cho, Myung-Eun
    • Journal of Families and Better Life
    • /
    • v.20 no.6
    • /
    • pp.219-227
    • /
    • 2002
  • This study was conducted to examine housing preferences among single-person households and to propose guidelines for housing design choices for single people. One hundred and sixty responses to the questionnaire developed by this researcher were analyzed utilizing frequencies, percentages, and t-tests. There were significant differences between single households and non-single households in various aspects of housing preferences. Differences were found in the desired type and size of housing, needed amount of space, and the importance of space itself. Single persons wanted to live in a small apartment, about 83.45$m^2$ (25.29 pyung) size. They consider the bathroom and the master bedroom more important than the living room and kitchen. They prefer to have specifically function-oriented rooms such as shower, home office, computer room, exercise room, or leisure space. Single persons consider information-technological facilities within an apartment very important. They would like to adopt automatic and electronic technology in the house, such as optical communication network, automatic air-cleaning system, and internet TV. Housing preferences differ significantly according to socio-demographic variables such as gender and age. I propose in this study a small-sized, information-, high-tech- and leisure-oriented design that corresponds with the actual housing preferences of the single-person households.

Discussion on the Technology Route for Land Degradation Monitoring and Assessment based on 3S Technique

  • Jing, Wang;Ting, He;Zhang, Ji-Xian;Li, Hai-Tao
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.757-765
    • /
    • 2002
  • This paper analyzes three theories for land degradation assessment and internationl/domestic methods for land degradation monitoring and assessment. Under the guidance of absolute degradation thought, this paper proposes the technological framework for monitoring and appraising cultivated land degradation based on the 3S technique. We can apply 3S technique and analyze the nature, the environmental, the social, and the economic elements which influence the land utilization and degradation synthetically, to set up the indicator system of the cultivated land degradation monitoring and assessment based on 3S technique; to propose the degradation information extraction methods based on 3S technique; to create the quantitative assessment model and method for land degradation; to analyze the ecological environment response of land use and degradation quantitatively; and to propose the measure, policy and suggestion for solving the land degradation problem from the point of view of land utilization.

  • PDF

On-Demand Remote Software Code Execution Unit Using On-Chip Flash Memory Cloudification for IoT Environment Acceleration

  • Lee, Dongkyu;Seok, Moon Gi;Park, Daejin
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.191-202
    • /
    • 2021
  • In an Internet of Things (IoT)-configured system, each device executes on-chip software. Recent IoT devices require fast execution time of complex services, such as analyzing a large amount of data, while maintaining low-power computation. As service complexity increases, the service requires high-performance computing and more space for embedded space. However, the low performance of IoT edge devices and their small memory size can hinder the complex and diverse operations of IoT services. In this paper, we propose a remote on-demand software code execution unit using the cloudification of on-chip code memory to accelerate the program execution of an IoT edge device with a low-performance processor. We propose a simulation approach to distribute remote code executed on the server side and on the edge side according to the program's computational and communicational needs. Our on-demand remote code execution unit simulation platform, which includes an instruction set simulator based on 16-bit ARM Thumb instruction set architecture, successfully emulates the architectural behavior of on-chip flash memory, enabling embedded devices to accelerate and execute software using remote execution code in the IoT environment.

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.