• Title/Summary/Keyword: SHA3

Search Result 149, Processing Time 0.026 seconds

Integrated Design for IPsec Cryptography Algorithms (IPsec 암호 알고리즘의 통합 설계)

  • Kim Jinbeom;Song Moonvin;Chung Yunmo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.207-210
    • /
    • 2004
  • IPsec(Internet Protocol Security protocol)에서는 기본적으로 4개의 암호 알고리즘(3-DES, AES, MD5, SHA-1)을 사용하고 있다. 본 논문은 4개의 암호 알고리즘을 효율적으로 통합 및 하드웨어로 설계하였으며 검증하였다. 그 결과 알고리즘을 각각 합친 경우보다 하드웨어에서의 크기를 줄일 수 있다.

  • PDF

Changes of Body Balance on Static Posture According to Types of Induced Ametropia (정적자세에서 유도된 비정시의 유형에 따른 신체균형의 변화)

  • Kim, Sang-Yeob;Moon, Byeong-Yeon;Cho, Hyun Gug
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.19 no.2
    • /
    • pp.239-246
    • /
    • 2014
  • Purpose: This study was performed to investigate the effect of induced ametropia on static posture for body balance. Methods: Twenty subjects (10 males, 10 females) of average age $23.4{pm}2.70$ years were participated and ametropia(binocular myopia; BM, simple myopic anisometropia; SMA, binocular hyperopia; BH, and simple hyperopic anisometropia; SHA) were induced with ${pm}0.50D$, ${\pm}1.00D$, ${\pm}1.50D$, ${\pm}2.00D$, ${\pm}3.00D$, ${\pm}4.00D$, ${\pm}5.00D$, respectively. General stability (ST), weight distribution index (WDI), and fall risk index (FI) were measured using TETRAX the biofeedback systems. Each index of the body balance was evaluated for 32 seconds in each ametropic condition and those value was compared with the value in fully corrected condition. Results: The ST showed significant increase from +0.50 D under condition of BM, from +1.00 D under condition of SMA, from -1.00 D under condition of BH, and from -1.50 D under condition of SHA compared with under condition of fully corrected condition, respectively. The FI showed significant increases from +4.00 D under condition of BM, from -1.00 D under condition of BH, and from -1.50 D under condition of SHA. The WDI show no change in all ametropia condition. Conclusions: Whatever ametropia is, uncorrected refractive error could reduce the general stability of body balance and increase the falling risk.

From Landscaping Techniques to Study the Feng Shui Geographical Thought in Chinese Garden (조경기법으로 본 중국원림의 풍수지리사상)

  • Yu, Wen-Dong;Kang, Tai-Ho
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.32 no.3
    • /
    • pp.130-138
    • /
    • 2014
  • This study aimed to grasp Feng Shui Geographical Thought appears in layout, Axial symmetry, hierarchical planning, spatial composition and hidden design techniques of Chinese Garden, that is "Xue effect", "Long-Sha effect" and "Shuikou effect", and to study on expression in Landscape Space. The Author selected the Chinese courtyard and the Nets Garden as the object to prove the Layout landscaping techniques; and selected Beijing in Ming and Qing Dynasties and the Forbidden City, A square design in Xuanwei as the object to prove the Axial Symmetrical and Hierarchical landscaping techniques, and also selected the Lingering G-arden and the Gentle Waves Pavilion, Humble Administrator's Garden in Suzhou, and Nanhu Park in Taian as the object to prove the Spatial Composition and Hidden design techniques. The methods of this article is combined Literature survey and Field survey with Case analysis to draw the conclusions as follows: First, "Xue effect" of Chinese Feng Shui Geographical Thought is suitable for the layout of Chinese courtyard and the Nets Garden in Suzhou; Second, "Long-Sha effect" is suitable for the urban planning of Beijing in Ming and Qing Dynasty, and the layout of the Forbidden City, by the city square design in Xuanwei, we can see that it is also suitable for Chinese modern landscape design; Third, "Shuikou effect" is appeared in the Spatial Composition and Hidden design techniques. All of these landscape design techniques are commonly used in China's modern landscape. It has been proved by the analysis of the Lingering Garden and the Gentle Waves Pavilion, Humble Administrator's Garden in Suzhou, and Nanhu Park in Taian.

Factors Affecting Intention to Use Smartphone Healthcare Applications (스마트폰 헬스케어 어플리케이션 수용의도에 영향을 미치는 요인)

  • Park, Mijeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.143-153
    • /
    • 2017
  • This was a descriptive survey to determine the intention of users to use smartphone healthcare applications (SHAs) and to clarify factors that may influence such intention. The data were collected during the month of April in 2015, using a structured self-report questionnaire that was distributed to 300 participants aged 20 to 70 years; 285 complete copies were used for the final analysis. The data were analyzed using descriptive statistics, independent t-test, one-way ANOVA, Pearson correlation coefficients, and hierarchical multiple regression. First, according to the results, the average intention to use SHAs was 3.28 out of 5, which varied according to age, final education, economy level, vacation, current disease, total period of smartphone use, and etc. Second, significant correlations were shown by exercise behavior, dietary management behavior, stress management, satisfaction with smartphone use, and satisfaction with using SHAs. Third, the explanatory power of the predictive model involving all general, health-related, smartphone use-related, and SHA use-related factors was 45.5%; and the economic level, interest, status, and awareness satisfaction of patients using SHA were identified to be the main influential factors. The results indicate that SHA developers need to put efforts into improving consumers' app recognition and to develop plans in provoking consumers' interests to increase the use of SHAs.

A 0.31pJ/conv-step 13b 100MS/s 0.13um CMOS ADC for 3G Communication Systems (3G 통신 시스템 응용을 위한 0.31pJ/conv-step의 13비트 100MS/s 0.13um CMOS A/D 변환기)

  • Lee, Dong-Suk;Lee, Myung-Hwan;Kwon, Yi-Gi;Lee, Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.3
    • /
    • pp.75-85
    • /
    • 2009
  • This work proposes a 13b 100MS/s 0.13um CMOS ADC for 3G communication systems such as two-carrier W-CDMA applications simultaneously requiring high resolution, low power, and small size at high speed. The proposed ADC employs a four-step pipeline architecture to optimize power consumption and chip area at the target resolution and sampling rate. Area-efficient high-speed high-resolution gate-bootstrapping circuits are implemented at the sampling switches of the input SHA to maintain signal linearity over the Nyquist rate even at a 1.0V supply operation. The cascode compensation technique on a low-impedance path implemented in the two-stage amplifiers of the SHA and MDAC simultaneously achieves the required operation speed and phase margin with more reduced power consumption than the Miller compensation technique. Low-glitch dynamic latches in sub-ranging flash ADCs reduce kickback-noise referred to the differential input stage of the comparator by isolating the input stage from output nodes to improve system accuracy. The proposed low-noise current and voltage references based on triple negative T.C. circuits are employed on chip with optional off-chip reference voltages. The prototype ADC in a 0.13um 1P8M CMOS technology demonstrates the measured DNL and INL within 0.70LSB and 1.79LSB, respectively. The ADC shows a maximum SNDR of 64.5dB and a maximum SFDR of 78.0dB at 100MS/s, respectively. The ABC with an active die area of $1.22mm^2$ consumes 42.0mW at 100MS/s and a 1.2V supply, corresponding to a FOM of 0.31pJ/conv-step.

Cryptft+ : Python/Pyqt based File Encryption & Decryption System Using AES and HASH Algorithm (Crypft+ : Python/PyQt 기반 AES와 HASH 알고리즘을 이용한 파일 암복호화 시스템)

  • Shin, Dongho;Bae, Woori;Shin, Hyeonggyu;Nam, Seungjin;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.43-51
    • /
    • 2016
  • In this paper, we have developed Crypft+ as an enhanced file encryption/decryption system to improve the security of IoT system or individual document file management process. The Crypft+ system was developed as a core security module using Python, and designed and implemented a user interface using PyQt. We also implemented encryption and decryption function of important files stored in the computer system using AES based symmetric key encryption algorithm and SHA-512 based hash algorithm. In addition, Cx-Freezes module is used to convert the program as an exe-based executable code. Additionally, the manual for understanding the Cryptft+ SW is included in the internal program so that it can be downloaded directly.

Scale and Structure of Pharmaceutical Expenditure for the year 2006 in Korea (우리나라 2006년 약제비의 규모 및 구성)

  • Jeong, Hyoung-Sun;Lee, Jun-Hyup
    • Health Policy and Management
    • /
    • v.18 no.3
    • /
    • pp.110-127
    • /
    • 2008
  • Expenditures on pharmaceuticals of different concepts were estimated and their functional, financing and providers' breakdowns were examined in line with the OECD's System of Health Accounts (SHA) manual. This study also shows the way such estimates are made. The results are then analyzed particularly from the international perspective. Data from both Household Survey by the National Statistical Office and the National Health and Nutritional Survey by the Ministry of Health and Welfare of Korea were used to estimate pharmaceutical expenditures that. are financed by out-of-pocket payments of the household, while national health insurance data etc. were used for estimation of pharmaceutical expenditures that are financed by public funding sources. The 'per capita expenditure on pharmaceutical/medical non-durables' in Korea stood at 380 US$ PPPs, less than the OECD average of 443 US$ PPPs in 2006, but its share of the per capita health expenditure of 25.9% noticeably outnumbered the OECD average of 17.1%, due partly to low per capita health expenditure as a denominator of the ratio. This indicates that Koreans tend to spend less on health care than an OECD average, while tending to spend more on pharmaceuticals than on other health care services, much like the pattern found in relatively low income countries. An international pharmaceuticals pricing mechanism is most likely responsible for such a tendency. In addition, it is to be noted that the percentage comes down to 21.0%, when expenditures on both medical non-durables and herbal medicine, which is locally quite popular among the elderly, have been excluded.

Improvement of an hydroxyapatite bead adherence assay for streptococcus sanguis (Streptococcus sanguis의 구형 Hydroxyapatite 비드에의 부착 Assay 방법의 개량)

  • 최선진;이시영;송요한
    • Korean Journal of Microbiology
    • /
    • v.27 no.1
    • /
    • pp.48-55
    • /
    • 1989
  • The purpose of the present investigation was to improve several procedures being used in the adherence assay of Streptococcus sanguis cells to hydroxyapatite (HA) beads and to study the effect of the beads on the counting of radioactivity. The standard adhere assay involved the adherence of radiolabeled bacteria to 40mg of HA beads. The beads were mixed with ['H]thymidine-labeled bacterial cells and incubated for 60 minutes at room temperature. Unadsorbed cells were removed, the beads with adsorbed cells were dried, and the radioactivity was monitered in a scintillation spectrometer. The 30 seconds sonication of cells in a form of long chains appeared to be adequate for obtaining mostly singlet or doublet cells. Unlike the counting of S. sanguis cell suspension, bacterial cells adhered to HA or saliva-coated HA(SHA) required smaller volume (2.5ml) of scintillaton fluid for better counting. Eighteen percent quenching of counts could be attributed to the beads. Among 3 procedures commonly used to equilibrate the beads for adherence assay, no differences were found in their effectiveness. The HA beads on which the bacteria remained attached in scintillant during the counting were found to be the source of sample self-absorption representing 34.5% of the total radioactivity counts resulting from the beads dissolved in HCl solution.

  • PDF

A Development of Synthetic Map Preprocessor for Mobile GIS Visualization based on GML (GML 기반 모바일 GIS 가시화를 위한 Synthetic Map Preprocessor 구축)

  • Song Eun-Ha;Park Yong-Jin;Han Sung-Kook;Jeong Young-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.383-388
    • /
    • 2006
  • Most of GIS services have been operated in single applications, and as data processing and computer and mobile technologies have developed rapidly, users request for efficient sharing between each GIS's own data and various different GIS's. However, since many GIS applications maintain their own data formats, they are incapable of processing data formats different with each other, and do not have a filtering function for mobile GIS. This paper designs an integrated preprocessor, SMP to accept features of various current formats of geographic information such as DXF(Drawing eXchange Format), DWG(DraWinG), SHP(SHaPefile), etc., and to extract core information for describing maps. The geographic information extracted by SMP(Synthetic Map Preprocessor) shows consistency in various formats by visualizing through the integrated view. By generating the extracted core data in GML, it supports rapid access to mobile devices and extensibility of file formats overcoming heterogeneity.

Security APIs for Security Services in Ultra Light-weight Environment (초경량 환경의 보안 서비스 지원을 위한 보안 API)

  • Kim, Won-Young;Lee, Young-Seok;Lee, Jae-Wan;Seo, Chang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.485-492
    • /
    • 2008
  • Computers used fer light-weight computing environments are considerably limited in resources and performance running in ubiquitous environment. Because of the limited resources, it is difficult to apply existing security technologies to the light-weight computers. In this paper, light-weight security software is implemented using RC-5 encryption and SHA-1 authentication algorithm which is appropriate for light-weight computing environments. The design of components based on security software of a light-weight computer application and the test-bed for security software are presented. The simulation verifies the correctness of the security software. The architecture of the light-weight and reconfigurable security software for light-weight computer applications is proposed. The proposed security software is small size and provides reconfigurable security library based on the light-weight component and the software manager that configures software platform is loaded with the library at the time it is needed.