• Title/Summary/Keyword: Side Information

Search Result 3,584, Processing Time 0.029 seconds

Mechanism for Efficient Use of Server's Resource on the Web

  • Rhee, Yoon-Jung;Park, Nam-Sup;Kim, Tai-Yoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.507-510
    • /
    • 2001
  • HTTP/1.1 standard reduces latencies and overhead from closing and re-establishing connections by supporting persistent connections as a default, which encourage multiple transfers of objects over one connection. HTTP/1.1, however, does not define explicitly connection-closing time but specifies a certain fixed holding time model. This model may induce wasting server's resource when server maintains conn ection with the idle-state client that requests no data for a certain time. This paper proposes the mechanism of a heuristic connection management supported by the client-side under persistent HTTP, in addition to HTTP/1.1's fixed holding time model on server-side. The client exploits the tag information within transferred HTML page so that decides connection-closing time. As a result, the mechanism allows server to use server's resource more efficiently without server's efforts.

  • PDF

A CRL Distribution Scheme Minimizing the Time for CRL Processing of Vehicles on Vehicular Communications

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.73-80
    • /
    • 2018
  • Certification revocation list(CRL) is needed for excluding compromised, faulty, illegitimate vehicle nodes and preventing the use of compromised cryptographic materials in vehicular communications. It should be distributed to vehicles resource-efficiently and CRL computational load of vehicles should not impact on life-critical applications with delay sensitive nature such as the pre-crash sensing that affords under 50msec latency. However, in the existing scheme, when a vehicle receives CRL, the vehicle calculates linkage values from linkage seeds, which results in heavy computational load. This paper proposes, a new CRL distribution scheme is proposed, which minimizes the time for CRL processing of vehicles. In the proposed scheme, the linkage value calculation procedure is performed by road-side unit(RSU) instead of the vehicle, and then the extracted linkage values are relayed to the vehicle transparently. The simulation results show that the proposed scheme reduces the CRL computational load dramatically, which would minimize impact on life-critical applications' operations with low latency.

Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing (비프로파일링 기반 전력 분석의 성능 향상을 위한 오토인코더 기반 잡음 제거 기술)

  • Kwon, Donggeun;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.491-501
    • /
    • 2019
  • In side-channel analysis, which exploit physical leakage from a cryptographic device, deep learning based attack has been significantly interested in recent years. However, most of the state-of-the-art methods have been focused on classifying side-channel information in a profiled scenario where attackers can obtain label of training data. In this paper, we propose a new method based on deep learning to improve non-profiling side-channel attack such as Differential Power Analysis and Correlation Power Analysis. The proposed method is a signal preprocessing technique that reduces the noise in a trace by modifying Auto-Encoder framework to the context of side-channel analysis. Previous work on Denoising Auto-Encoder was trained through randomly added noise by an attacker. In this paper, the proposed model trains Auto-Encoder through the noise from real data using the noise-reduced-label. Also, the proposed method permits to perform non-profiled attack by training only a single neural network. We validate the performance of the noise reduction of the proposed method on real traces collected from ChipWhisperer board. We demonstrate that the proposed method outperforms classic preprocessing methods such as Principal Component Analysis and Linear Discriminant Analysis.

Structure and Challenges of a Security Policy on Small and Medium Enterprises

  • Almeida, Fernando;Carvalho, Ines;Cruz, Fabio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.747-763
    • /
    • 2018
  • Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.

Mutual Information Analysis for Three-Phase Dynamic Current Mode Logic against Side-Channel Attack

  • Kim, Hyunmin;Han, Dong-Guk;Hong, Seokhie
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.584-594
    • /
    • 2015
  • To date, many different kinds of logic styles for hardware countermeasures have been developed; for example, SABL, TDPL, and DyCML. Current mode-based logic styles are useful as they consume less power compared to voltage mode-based logic styles such as SABL and TDPL. Although we developed TPDyCML in 2012 and presented it at the WISA 2012 conference, we have further optimized it in this paper using a binary decision diagram algorithm and confirmed its properties through a practical implementation of the AES S-box. In this paper, we will explain the outcome of HSPICE simulations, which included correlation power attacks, on AES S-boxes configured using a compact NMOS tree constructed from either SABL, CMOS, TDPL, DyCML, or TPDyCML. In addition, to compare the performance of each logic style in greater detail, we will carry out a mutual information analysis (MIA). Our results confirm that our logic style has good properties as a hardware countermeasure and 15% less information leakage than those secure logic styles used in our MIA.

Beyond-CMOS: Impact of Side-Recess Spacing on the Logic Performance of 50 nm $In_{0.7}Ga_{0.3}As$ HEMTs

  • Kim, Dae-Hyun;del Alamo, Jesus A.;Lee, Jae-Hak;Seo, Kwang-Seok
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.6 no.3
    • /
    • pp.146-153
    • /
    • 2006
  • We have been investigating InGaAs HEMTs as a future high-speed and low-power logic technology for beyond CMOS applications. In this work, we have experimentally studied the role of the side-recess spacing $(L_{side})$ on the logic performance of 50 nm $In_{0.7}Ga_{0.3}As$ As HEMTs. We have found that $L_{side}$ has a large influence on the electrostatic integrity (or short channel effects), gate leakage current, gate-drain capacitance, and source and drain resistance of the device. For our device design, an optimum value of $L_{side}$ of 150 nm is found. 50 nm $In_{0.7}Ga_{0.3}As$ HEMTs with this value of $L_{side}$ exhibit $I_{ON}/I_{OFF}$ ratios in excess of $10^4$, subthreshold slopes smaller than 90 mV/dec, and logic gate delays of about 1.3 ps at a $V_{CC}$ of 0.5 V. In spite of the fact that these devices are not optimized for logic, these values are comparable to state-of-the-art MOSFETs with similar gate lengths. Our work confirms that in the landscape of alternatives for beyond CMOS technologies, InAs-rich InGaAs FETs hold considerable promise.

Evaluation of Meals Students Consumed in College Foodservice (일부 서울지역 대학식당의 메뉴분석)

  • Song, Yoon-Ju;Park, Jung-Sook;Paik, Hee-Young;Lee, Yeon-Sook
    • Journal of the Korean Society of Food Culture
    • /
    • v.14 no.1
    • /
    • pp.1-15
    • /
    • 1999
  • A survey was conducted in 591 college students using 8 different cafeterias serving 31 meals. The information was obtained about the name and amount of dishes they consumed from the menu offered by college foodservice. Mean nutrient contents per meal in offered menu were higher than 1/3 of RDA for their age, sex in offered menu. The mean energy content was 466kcal from rice, 113kcal from soup, 141kcal from side dish and 21kcal from kimchi. When side dishes were classified by cooking methods, side dishes using grilling, frying, roasting methods had high energy content and fat percent above 200kcal, 40% per dish. By main ingredients, side dishes with animal food were higher energy than with plant food. Students consumed 94% of the energy provided in offered menu. When compared to proportion of foods consumed by sex, there was 43% of female and 22% of male consumed less than half in soup and 31% of female and 12% of male in kimchi. The most prevalent menu patterns of subjects included rice, soup, 2 side dishes, kimchi and were the same in both sexes. Mean energy intakes per meal were 989kcal for males and 842kcal for females which were enough to meet 1/3 of RDA for their age and sex. Most nutrient intake except fat and vitamin B1 were higher in set menu than in cafeteria. Nutrient adequacy ratio(NAR) were above 0.9 except calcium and vitamin A. The mean energy intake was 542kcal from rice, 70kcal from soup, 164kcal from side dish and 20kcal from kimchi. In conclusion, intake of most of the nutrients of students obtained from males in college foodservice were sufficient but calcium intake was insufficient and fat content was above 20% of energy. High fat consumption was due to side dishes from frying, grilling, roasting with animal food. To provide desirable meals in college foodservice, use of fat in cooking must be decreased.

  • PDF

A Study on the Exploration of Treatment Area of Visceral Chuna Manual Therapy Using Ultrasound Image Data (초음파 영상 데이터를 활용한 내장기 추나요법 시술 부위 탐색 연구)

  • Lee, Sang-Jin;Ki, Sung-Hoon;Koh, Dong-Kyun;Lee, Sang-Hun;Lim, Hyoung-Ho;Song, Yun-Kyung
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.32 no.2
    • /
    • pp.139-154
    • /
    • 2022
  • Objectives This study was conducted to confirm anatomical information near the treatment areas of visceral chuna manual therapy and to secure stability and effectiveness during the treatment. Methods For 50 healthy adult men and women, a total of 13 ultrasound images were taken of the 7 treatment areas which are the representative treatment areas of visceral Chuna manual therapy. Results The treatment area of the bottom of the liver can be palpated around the right side ST19 and CV14. The treatment area of the gallbladder and the common bile duct can be palpated around the right side SP16 and ST20. The treatment area of the cardia and the pylorus can be palpated around the left side KI21, right side ST20, ST21, KI19, KI20, CV12, and CV13. The origin point of the mesentery root can be moved to the left and lower left from CV12 and can be palpated. The treatment area of the ileocecal valve and the cecum can be palpated around the right side SP14. The treatment area for the colic flexure can be palpated around the both side LR13. The treatment support point for the kidneys can be palpated around both side BL51. Conclusions It is thought that if the ultrasound image data from the meridians around the treatment site is used as an auxiliary, it will be more effective in terms of safety and effectiveness during the treatment of visceral Chuna manual therapy.

Channel-Divided Distributed Video Coding with Weighted-Adaptive Motion-Compensated Interpolation (적응적 가중치 기반의 움직임 보상 보간에 기초한 채널 분리형 분산 비디오 부호화기법)

  • Kim, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1663-1670
    • /
    • 2014
  • Recently, lots of research works have been actively focused on the DVC (Distributed Video Coding) techniques which provide a theoretical basis for the implementation of light video encoder. However, most of these studies have showed poorer performances than the conventional standard video coding schemes such as MPEG-1/2, MPEG-4, H.264 etc. In order to overcome the performance limits of the conventional approaches, several channel-divided distributed video coding schemes have been designed in such a way that some information are obtained while generating side information at decoder side and then these are provided to the encoder side, resulting in channel-divided video coding scheme. In this paper, the interpolation scheme by weighted sum of multiple motion-compensated interpolation frames is introduced and a new channel-divided DVC scheme is designed to effectively describe noisy channels based on the motion vector and its matching characteristics. Through several simulations, it is shown that the proposed method performs better than the conventional methods at low bit-rate and keeps the reconstructed visual quality constantly.

Simplified PAR Reduction Technique for MIMO-OFDM System (MIMO-OFDM 시스템에서 간략화된 PAR 감쇄 기법)

  • Song Hyoung-Kyu;Kook Hyung-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12C
    • /
    • pp.1181-1185
    • /
    • 2005
  • A combining of MIMO signal processing with OFDM is regarded as a promising solution of enhancing the performance of next generation wireless system. Therefore, in this paper, an OFDM-based wireless system employing layered space-time architecture is considered for a high-rate transmission. In the MIMO-OFDM system, we evaluate the PAR performance using the SLM approaches. The investigated SLM scheme for MIMO-OFDM signals selects the transmitted sequence with lowest average PAR over all transmitting antennas and retrieves the side information very accurately at the expense of a slight degradation of the PAR performance. The low probability of false side information can improve the overall detection performance of the MIMO-OFDM system with erroneous side information compared to the ordinary SLM approache, respectively. Also, we provide closed form of the average BER performance in MIMO-OFDM system using analytic approach.