• Title/Summary/Keyword: computer center

Search Result 4,824, Processing Time 0.033 seconds

A Study on Efficient Hardware Design of Digital Signature Algorithm for Post-Quantum Cryptography SPHINCS+ (PQC SPHINCS+ 전자 서명 알고리즘의 효과적인 하드웨어 설계에 관한 연구)

  • Yongseok Lee;Cansu Karakuzu;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.239-241
    • /
    • 2023
  • 본 논문은 통신 시스템에 주로 사용되는 디지털 전자 서명 알고리즘 중 양자 내성 암호인 SPHINCS+ 알고리즘에 대한 효과적인 하드웨어 설계 방안에 대한 연구이다. SPHINCS+ 알고리즘은 해시 함수 기반 알고리즘으로, 많은 횟수의 해시 함수가 반복해서 사용된다. 해시 함수를 가속 연산해도, 그 횟수가 크기 때문에 SPHINCS+ 알고리즘은 다른 전자 서명 알고리즘보다 하드웨어 설계 후 큰 latency 를 가지는 특징이 있다. 이를 극복하기 위해 SPHINCS+ 알고리즘에서 사용되는 해시 함수들을 면밀하게 분석한다. 그 결과 같은 해시 함수에 대해서도 입출력 데이터 크기가 다양하게 변화하고, 서로 다른 데이터 플로우를 가지는 그 세부 차이점들을 파악하여, 이를 접목한 하드웨어 설계에 대해 논의한다.

A Survey on Collaborative Fuzzing Techniques (협업 퍼징 기법에 대한 연구)

  • Hyun-Jun Kim;Jinmyung Choi;Yun-Heung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.251-253
    • /
    • 2024
  • 본 논문에서 여러 종류의 퍼저들을 주기적으로 동기화하여 효율적으로 퍼징을 수행하는 협업 퍼징 기법 연구들을 소개한다. 정적으로 효율적인 퍼저의 조합을 찾거나 동적으로 각 퍼저에 리소스를 효율적으로 할당하는 협업 퍼징 기법들 3가지를 정리하고, 향후 연구 방향을 조망하고자 한다.

A Study on Defense Technique Against Use-After-Free Attacks Using MTE (MTE 를 활용한 사용 후 해제 공격 방어기법 연구)

  • Yunseong Hwang;Junseung You;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.279-282
    • /
    • 2024
  • The Use-after-free (UAF) bug is a long-standing temporal memory safety issue. To prevent UAF attacks, two commonly used approaches are lock-and-key and pointer nullification. Recently, ARM architecture supports the Memory Tagging Extension (MTE) that implemented a lock-and-key mechanism using a 4-bit tag during memory access. Previous research proposed a virtual address tagging scheme utilizing MTE to prevent UAF attacks. In this paper, we aimed to measure a simplified version of the previously proposed virtual address tagging scheme on real machines supporting MTE by implementing a simple module and conducting experiments.

An Investigation of Grammar Design to Consider Minor Sentence in Speech Recognition (조각문을 고려한 음성 인식 문법 설계)

  • Yun, Seung;Kim, Sang-Hun;Park, Jun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.409-410
    • /
    • 2007
  • 조각문이란 문장 성분을 온전히 갖추지 못한 문장으로 일반적인 문장과 달리 종결 어미로 문장을 끝맺지 못하는 문장을 말한다. 실험실 환경에서와 달리 실제 음성 인식 환경에서는 이러한 조각문이 비교적 빈번히 나타나므로 연속 음성 인식 시스템의 성능 향상을 위해서는 이러한 조각문에 대한 고려가 필수적이다. 본 연구에서는 음성 인식 문법 기술에 있어서 조각문을 반영한 경우와 그렇지 않은 경우의 커버리지를 비교해 봄으로써 조각문에 대한 고려가 음성 인식 성능 향상에 기여할 수 있음을 알아 보았다.

Nanofluidic Biochip

  • Chang, Jun-Keun
    • 순환기질환의공학회:학술대회논문집
    • /
    • 2002.05a
    • /
    • pp.85-100
    • /
    • 2002
  • PDF

Development of a Call Center System using CTI : A Proxy Driving System (CTI를 이용한 콜센터 시스템 개발 : 대리운전 시스템)

  • Park, Sang-Sung;Jung, Won-Gyo;Shin, Young-Guen;Jang, Dong-Sik
    • IE interfaces
    • /
    • v.20 no.3
    • /
    • pp.309-314
    • /
    • 2007
  • By an explosive increase of proxy driving, customers require the quick and correct services of call center. But because most call centers have an unsystematic management system, grievance of customers is continually increasing. To solve these problem, we constructed a call center system of proxy driving that is based on CTI (Computer Telephony Integration) in this paper. The proposed system is constructed using CID (Caller Identify Display) terminal, SMS (Short Message Service) and call center management program etc. Customer service level could be improved through efficient customer management by using the proposed system. Also it could be convenient and easy to implement customer management, order management, staff management, SMS and settlement of accounts.

The Study on Searching Algorithm of the center of Pupil for the Iris Recognition (홍채 인식을 위한 동공 중심점 탐색 알고리즘에 관한 연구)

  • Cho, Meen-Hwan;Hur, Jung-Youn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.19-25
    • /
    • 2006
  • Iris recognition is a bio metric personal identification which uses iris pattern of the pupil, and it is recognized as one of the best technology in personal identification and information security field. Before iris recognition, it is very important to search center of pupil. In recent years, there was developed many searching algorithms of center of pupil, but all most method are too many processing time. In this paper, we proposed a new method for searching center of pupil. This method is greatly reduced processing time about 30% compared with other algorithm using Hough transformation.

  • PDF

Structural Simulation of Wrist Band for Wearable Device According to Design and Material Model

  • Kwon, Soon Yong;Cho, Jung Hwan;Yoo, Jin;Cho, Chul Jin;Cho, Sung Hwan;Woo, In Young;Lyu, Min-Young
    • Elastomers and Composites
    • /
    • v.53 no.4
    • /
    • pp.226-233
    • /
    • 2018
  • Elastomers based on the thermoplastics are widely used in rubber industries. Thermoplastic elastomers have the advantages of an easy shaping process and elimination of recycling problems. Thermoplastic polyester elastomer (TPE) is used for making rubber bands in wearable devices and its applications are increasing. In this study, five wrist bands were designed and their mechanical behaviors were examined by computer simulation, using hyper elastic models, Mooney-Rivlin and Ogden models, and a linear elastic model. Simulation results were compared and discussed in terms of band design and material model.

Edge Computing based Escalator Anomaly Detection and Defect Classification using Machine Learning (머신러닝을 활용한 Edge 컴퓨팅 기반 에스컬레이터 이상 감지 및 결함 분류 시스템)

  • Lee, Se-Hoon;Kim, Ji-Tae;Lee, Tae-Hyeong;Kim, Han-Sol;Jung, Chan-Young;Park, Sang-Hyun;Kim, Pung-Il
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.13-14
    • /
    • 2020
  • 본 논문에서는 엣지 컴퓨팅 환경에서 머신러닝을 활용해 에스컬레이터 이상 감지 및 결함 분류를 하는 연구를 진행하였다. 엣지 컴퓨팅 기반 머신러닝을 사용해 에스컬레이터의 이상 감지 및 결함 분류를 위한 OneM2M환경을 구축하였으며 에스컬레이터에서 발생하는 소음에서 고장 유형에 따라 나타나는 주파수를 이용한다. Edge TPU를 활용해 엣지 컴퓨팅 시스템의 처리량을 최대화하고, 각 작업의 수행시간을 최소화함으로써 엣지 컴퓨팅 환경에서 이상 감지와 결함 분류를 수행할 수 있다.

  • PDF

Analysis of the Satisfaction with Computer Based Test Program and Test Environment in Medical School (의과대학의 컴퓨터기반시험 프로그램 및 시험환경 만족도 분석)

  • Kim, Soon Gu;Lee, Aehwa;Hwang, Ilseon
    • Korean Medical Education Review
    • /
    • v.22 no.3
    • /
    • pp.198-206
    • /
    • 2020
  • This study aimed to identify needed improvements to current evaluation methods in medical school computer-based test (CBT) programs and test environments. To that end, an analysis of the importance and satisfaction was conducted through a survey of 3rd and 4th year medical students who had sufficient experience with CBT programs. Importance performance analysis methodology using the correlation coefficient was applied to assess average satisfaction and importance. The first quadrant (keep up the good work) was a factor of review and time management and test facilities among the conveniences of the CBT program. The second quadrant (concentrate here) was a factor of the convenience of the CBT program and computer monitor and chair factor within the test facilities. The third quadrant (low priority) was a factor of cheating and computer failure. The fourth quadrant (possible overkill) was the location, spacing, and temperature factors of the test facilities. Improvements are needed to reduce 'eye fatigue' and help students focus and understand the questions in the CBT programs. It is necessary to improve computer monitors, desks and chairs, and consider the subject's body type and manager in order to cope with computer breakdown and peripheral failures. Spare computers are needed. These findings are meaningful in that they have been able to identify factors that require improvement in the CBT program and test environment resulting from changes in assessment tools.