• Title/Summary/Keyword: Resource Block

Search Result 224, Processing Time 0.027 seconds

High-Performance and Low-Complexity Image Pre-Processing Method Based on Gradient-Vector Characteristics and Hardware-Block Sharing

  • Kim, Woo Suk;Lee, Juseong;An, Ho-Myoung;Kim, Jooyeon
    • Transactions on Electrical and Electronic Materials
    • /
    • v.18 no.6
    • /
    • pp.320-322
    • /
    • 2017
  • In this paper, a high-performance, low-area gradient-magnitude calculator architecture is proposed, based on approximate image processing. To reduce the computational complexity of the gradient-magnitude calculation, vector properties, the symmetry axis, and common terms were applied in a hardware-resource-shared architec-ture. The proposed gradient-magnitude calculator was implemented using an Altera Cyclone IV FPGA (EP4CE115F29) and the Quartus II v.16 device software. It satisfied the output-data quality while reducing the logic elements by 23% and the embedded multipliers by 76%, compared with previous work.

Design and Implementation of Multi-file Transfer Protocol for Wireless Network (무선 망을 위한 다중 파일 전송 프로토콜 설계)

  • Yun, Min-Hong;Ryu, Eun-Seok;Yoo, Hyuck
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.688-690
    • /
    • 2001
  • 휴대폰의 성능이 급격히 향상되며 많은 사람들이 휴대폰이 PC 가 할 수 있는 많은 일을 처리할 것이라는 전망을 한다. 휴대폰이 편리한 이유는 움직이면서 네트워크에 접근할 수 있다는 것이다. 그러나 휴대폰이 PC 에 비해 열악한 자원(resource)을 가지고 있기 때문에 데이터 교환에 있어서 제한이 존재한다. 또한 휴대폰 사용자의 특성은 여러 개의 파일을 각각 전송 받은 후에 하나씩 접근하는 것보다, 조금씩 받으면서 파일에 접근하는 식의 방법을 사용하는 패턴을 가지고 있다. 본 논문에서는 여러 개의 파일을 열악한 대역폭과 메모리의 한계를 갖는 휴대폰을 위해 동시에 전송하는 데에 적합한 프로토콜을 설계하면서 겪은 과정과 실험결과, 설계한 여러 프로토콜들 중 가장 성능이 좋은 프로토콜로 증명된 'UDP best block with NAK set'을 소개한다.

  • PDF

Implementation and Experiment of Observing Resource and Block-wise Transfer Using CoAPthon (CoAPthon을 이용한 자원 관찰 및 블록 전송 기능 구현 및 실험)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Kim, Tae-Hyeong;Han, Youn-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.1008-1010
    • /
    • 2016
  • 최근 사물 인터넷의 핵심 프로토콜인 CoAP (Constrained Application Protocol)에 대한 활용도가 높아짐에 따라 관련 라이브러리가 등장하고 있으며 그 중 python을 기반으로한 CoAPthon은 개발이 용이한 장점 때문에 많은 관심을 받고 있다. 하지만, CoAPthon의 현재 구현 버전에는 자원 관찰과 블록 전송의 결합 기능이 올바르게 구현되어 있지 않다. 본 논문에서는 CoAPthon에 자원 관찰과 블록 전송의 결합 기능을 구현하고, Raspberry Pi 2에서 구현 내용을 실험하여 그 기능을 검증하였다.

DDoS Defense Using the Exhaustiveness of Attackers (공격자의 자원소진특성을 이용한 분산서비스불능화 (DDoS) 공격에 대한 방어)

  • Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.77-82
    • /
    • 2007
  • A novel DDoS (Distributed Denial-of-Service) defense technique, Exaustiveness-Based Detection, is proposed in this work. It dispenses with the network congestion and the unfairness between users of the Defense-by-Offense technique by incorporating a kind of simple Detect-and-Block scheme (user identification), still improving the effectiveness of the defense in comparison to the original Defense-by-Offense technique. It uses SYN cookies to identify users in the granularity of ip address and to prevent ip address spoofing by the attacker. There can be, however, some probability of false negative (denying service to good clients), if the attacker wisely adapt to the new technique by saving some portion of its bandwidth resource and later mimicking good clients. Quantitative analysis the requirement for the good clients to be safe from the false negative is provided and a procedure to design the server capacity is explained.

  • PDF

Design and Implementation of a QoS-Based Scheduling Algorithm Based on the LTE QCI Specifications

  • Ramneek, Ramneek;Choi, Wonjun;Seok, Woojin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.227-230
    • /
    • 2014
  • LTE 3GPP standard defines several QCI (QoS Class Identifier) classes to provide differential QoS, depending on the requirements of different user applications.These QCI values have been characterized in terms of priority, packet loss and delay budget. In spite of the availability of this robust QoS framework in LTE, there is no such scheduling algorithm that has its working principle based on this framework. The responsibility of fulfilling the user requirements, while satisfying the service class requirements is left upon the cellular service provider and it is an open issue at present. To solve this problem, we have proposed a MAC scheduler, which defines the priority of different users based on their bearer specification and provides desired QoS in terms of the achieved throughput through the resource block allocation based on calculated user priority.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Rendezvous Mission to Apophis: I. Mission Overview

  • Choi, Young-Jun
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.57.2-57.2
    • /
    • 2021
  • An asteroid is important for understanding the condition of our solar system in early-stage because an asteroid, considered as a building block of the solar system, preserves the information when our solar system was formed. It has been continuously flowing into the near-Earth space, and then some asteroids have a probability of impacting Earth. Some asteroids have valuable minerals and volatiles for future resources in space activity. Korean government clarified, in the 3rd promotion plan for space activity, an asteroid sample return mission by the mid-2030s. However, it is almost impossible to do so based on only a single experience of an exploration mission to the Moon, Korea Pathfinder Lunar Orbiter, which will be launched in mid-2022. We propose a Rendezvous Mission to Apophis(RMA), beneficial in terms of science, impact hazardous, resource, and technical readiness for the space exploration of Korea.

  • PDF

Design and Implementation of a 128-bit Block Cypher Algorithm SEED Using Low-Cost FPGA for Embedded Systems (내장형 시스템을 위한 128-비트 블록 암호화 알고리즘 SEED의 저비용 FPGA를 이용한 설계 및 구현)

  • Yi, Kang;Park, Ye-Chul
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.7
    • /
    • pp.402-413
    • /
    • 2004
  • This paper presents an Implementation of Korean standard 128-bit block cipher SEED for the small (8 or 16-bits) embedded system using a low-cost FPGA(Field Programmable Gate Array) chip. Due to their limited computing and storage capacities most of the 8-bits/16-bits small embedded systems require a separate and dedicated cryptography processor for data encryption and decryption process which require relatively heavy computation job. So, in order to integrate the SEED with other logic circuit block in a single chip we need to invent a design which minimizes the area demand while maintaining the proper performance. But, the straight-forward mapping of the SEED specification into hardware design results in exceedingly large circuit area for a low-cost FPGA capacity. Therefore, in this paper we present a design which maximize the resource sharing and utilizing the modern FPGA features to reduce the area demand resulting in the successful implementation of the SEED plus interface logic with single low-cost FPGA. We achieved 66% area accupation by our SEED design for the XC2S100 (a Spartan-II series FPGA from Xilinx) and data throughput more than 66Mbps. This Performance is sufficient for the small scale embedded system while achieving tight area requirement.

A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment (IoT 환경에 적용 가능한 경량화 블록 암호알고리즘에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.1-7
    • /
    • 2018
  • The IoT environment provides an infinite variety of services using many different devices and networks. The development of the IoT environment is directly proportional to the level of security that can be provided. In some ways, lightweight cryptography is suitable for IoT environments, because it provides security, higher throughput, low power consumption and compactness. However, it has the limitation that it must form a new cryptosystem and be used within a limited resource range. Therefore, it is not the best solution for the IoT environment that requires diversification. Therefore, in order to overcome these disadvantages, this paper proposes a method suitable for the IoT environment, while using the existing block cipher algorithm, viz. the lightweight cipher algorithm, and keeping the existing system (viz. the sensing part and the server) almost unchanged. The proposed BCL architecture can perform encryption for various sensor devices in existing wire/wireless USNs (using) lightweight encryption. The proposed BCL architecture includes a pre/post-processing part in the existing block cipher algorithm, which allows various scattered devices to operate in a daisy chain network environment. This characteristic is optimal for the information security of distributed sensor systems and does not affect the neighboring network environment, even if hacking and cracking occur. Therefore, the BCL architecture proposed in the IoT environment can provide an optimal solution for the diversified IoT environment, because the existing block cryptographic algorithm, viz. the lightweight cryptographic algorithm, can be used.

Analyzing Site Characteristics and Suitability for Wind Farm Facilities in Forest Lands (산지 내 풍력발전단지 입지 특성 및 적합성 분석)

  • Kwon, Soon-Duk;Joo, Woo-Yeong;Kim, Won-Kyung;Kim, Jong-Ho;Kim, Eun-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.17 no.4
    • /
    • pp.86-100
    • /
    • 2014
  • The purposes of this study are to provide a guideline for the suitability of wind farm facilities in forest lands and to suggest improvement plans of policies and systems to minimize the damage of forest lands. First, we implemented a literature review and field surveys to examine and select factors for the suitability of wind farm facilities in forest lands. Spatial database for selected location factors of wind farm facilities in forest lands was constructed to develop the suitability model for locating wind farm facilities focusing on Gangwon-do. Data used in this study include wind power resource, legal mountainous preserved area, forest roads, developed areas, forest class, and other spatial data. In order to find specific-sized potential areas for a certain number of wind farm turbines, we used block statistics and focal statistics methods. As a result, the areas for potential wind farm locations were 1,261ha from a block statistics method and 1,411ha from a focal statistics method. Based on the outputs of this research, it is required to make an urgent solution for the prevention of forest disaster and to prepare reduction measures for the destruction of ridge landscape.