• Title/Summary/Keyword: design computing

Search Result 2,907, Processing Time 0.032 seconds

Adaptive Consensus Bound PBFT Algorithm Design for Eliminating Interface Factors of Blockchain Consensus (블록체인 합의 방해요인 제거를 위한 Adaptive Consensus Bound PBFT 알고리즘 설계)

  • Kim, Hyoungdae;Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.17-31
    • /
    • 2020
  • With the rapid development of block chain technology, attempts have been made to put the block chain technology into practical use in various fields such as finance and logistics, and also in the public sector where data integrity is very important. Defense Operations In addition, strengthening security and ensuring complete integrity of the command communication network is crucial for operational operation under the network-centered operational environment (NCOE). For this purpose, it is necessary to construct a command communication network applying the block chain network. However, the block chain technology up to now can not solve the security issues such as the 51% attack. In particular, the Practical Byzantine fault tolerance (PBFT) algorithm which is now widely used in blockchain, does not have a penalty factor for nodes that behave maliciously, and there is a problem of failure to make a consensus even if malicious nodes are more than 33% of all nodes. In this paper, we propose a Adaptive Consensus Bound PBFT (ACB-PBFT) algorithm that incorporates a penalty mechanism for anomalous behavior by combining the Trust model to improve the security of the PBFT, which is the main agreement algorithm of the blockchain.

Design and Implementation of an Open Object Management System for Spatial Data Mining (공간 데이타 마이닝을 위한 개방형 객체 관리 시스템의 설계 및 구현)

  • Yun, Jae-Kwan;Oh, Byoung-Woo;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.1 s.1
    • /
    • pp.5-18
    • /
    • 1999
  • Recently, the necessity of automatic knowledge extraction from spatial data stored in spatial databases has been increased. Spatial data mining can be defined as the extraction of implicit knowledge, spatial relationships, or other knowledge not explicitly stored in spatial databases. In order to extract useful knowledge from spatial data, an object management system that can store spatial data efficiently, provide very fast indexing & searching mechanisms, and support a distributed computing environment is needed. In this paper, we designed and implemented an open object management system for spatial data mining, that supports efficient management of spatial, aspatial, and knowledge data. In order to develop this system, we used Open OODB that is a widely used object management system. However, the lark of facilities for spatial data mining in Open OODB, we extended it to support spatial data type, dynamic class generation, object-oriented inheritance, spatial index, spatial operations, etc. In addition, for further increasement of interoperability with other spatial database management systems or data mining systems, we adopted international standards such as ODMG 2.0 for data modeling, SDTS(Spatial Data Transfer Standard) for modeling and exchanging spatial data, and OpenGIS Simple Features Specification for CORBA for connecting clients and servers efficiently.

  • PDF

Joint Angles Analysis of Intelligent upper limb and lower extremities Wheelchair Robot System (지능형 상 · 하지 재활 휠체어 로봇 시스템의 관절각도 분석)

  • Song, Byoung-Ho;Kim, Kwang Jin;Lee, Chang Sun;Lim, Chang Gyoon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.33-39
    • /
    • 2013
  • When the eldery with limited mobility and disabled use a wheelchairs to move, it can cause decreased exercise ability like decline muscular strength in upper limb and lower extremities. The disabled people suffers with spinal cord injuries or post stroke hemiplegia are easily exposed to secondary problems due to limited mobility. In this paper, We designed intelligent wheelchair robot system for upper limb and lower extremities exercise/rehabilitation considering the characteristics of these severely disabled person. The system consists of an electric wheelchair, biometrics module for Identification characteristics of users, upper limb and lower extremities rehabilitation. In this paper, describes the design and configurations and of developed robot. Also, In order to verify the system function, conduct performance evaluation targeting non-disabled about risk context analysis with biomedical signal change and upper limb and lower extremities rehabilitation over wheelchair robot move. Consequently, it indicate sufficient tracking performance for rehabilitation as at about 86.7% average accuracy for risk context analysis and upper limb angle of 2.5 and lower extremities angle of 2.3 degrees maximum error range of joint angle.

Design of Smart Platform based on Image Recognition for Lifelog (라이프로그용 영상인식 기반의 스마트 플랫폼 설계)

  • Choi, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.51-55
    • /
    • 2017
  • In this paper, we designed a LBS-based smart platform for Lifelog service that can utilize the other's lifelog information. The conventional Lifelog service means that the system records the daily activities of the smart device user so the user can retrieve the early-recorded information later. The proposed Lifelog service platform uses the GPS/UFID location information and the various information extracted from the image as the lifelog data. Further, the proposed Lifelog platform using DB can provide the user with the Lifelog data recorded by the other service user. The system usually provide the other's Lifelog data within the 500m distance from the user and the range of distance can be adjustable. The proposed smart platform based on image recognition for Lifelog can acquire the image from the smart device directly and perform the various image recognition processing to produce the useful image attributes. And it can store the location information, image data, image attributes and the relevant web informations on the database that can be retrieved by the other use's request. The attributes stored and managed in the image information database consist of the followings: Object ID, the image type, the capture time and the image GPS coordinates. The image type attribute has the following values: the mountain, the sea, the street, the front of building, the inside of building and the portrait. The captured image can be classified into the above image type by the pattern matching image processing techniques and the user's direct selection as well. In case of the portrait-attribute, we can choose the multiple sub-attribute values from the shirt, pant, dress and accessory sub-attributes. Managing the Lifelog data in the database, the system can provide the user with the useful additional services like a path finding to the location of the other service user's Lifelog data and information.

A Fast Inversion for Low-Complexity System over GF(2 $^{m}$) (경량화 시스템에 적합한 유한체 $GF(2^m)$에서의 고속 역원기)

  • Kim, So-Sun;Chang, Nam-Su;Kim, Chang-Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.9 s.339
    • /
    • pp.51-60
    • /
    • 2005
  • The design of efficient cryptosystems is mainly appointed by the efficiency of the underlying finite field arithmetic. Especially, among the basic arithmetic over finite field, the rnultiplicative inversion is the most time consuming operation. In this paper, a fast inversion algerian in finite field $GF(2^m)$ with the standard basis representation is proposed. It is based on the Extended binary gcd algorithm (EBGA). The proposed algorithm executes about $18.8\%\;or\;45.9\%$ less iterations than EBGA or Montgomery inverse algorithm (MIA), respectively. In practical applications where the dimension of the field is large or may vary, systolic array sDucture becomes area-complexity and time-complexity costly or even impractical in previous algorithms. It is not suitable for low-weight and low-power systems, i.e., smartcard, the mobile phone. In this paper, we propose a new hardware architecture to apply an area-efficient and a synchronized inverter on low-complexity systems. It requires the number of addition and reduction operation less than previous architectures for computing the inverses in $GF(2^m)$ furthermore, the proposed inversion is applied over either prime or binary extension fields, more specially $GF(2^m)$ and GF(P) .

Mobile Service Modeling Based on Service Oriented Architecture (서비스 지향 아키텍처 기반의 모바일 서비스 모델링)

  • Chang, Young-Won;Noh, Hye-Min;Yoo, Cheol-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.2
    • /
    • pp.140-149
    • /
    • 2008
  • Recently, the need for accessing information from anywhere at any time has been a driving force for a variety of mobile applications. As the number of mobile applications increases rapidly, there has been a growing demand for the use of Service Oriented Architectures(SOA) for various applications. Mobile based SOA offers a systematic way to classify and assess technical realizations of business processes. But mobile has severly restricted range of utilizing services in computing environment and more, a mobile computer is envisioned to be equipped with more powerful capabilities, including the storage of a small database, the capacity of data processing, a narrow user input and small size of display. This paper present mobile adaption method based on SOA to overcome mobile restriction. To improve mobile efficient we analyzing mobile application requirement writing service specification, optimizing design, providing extended use case specification which test use case testing and testing service test case which derived from service specification. We discuss an mobile application testing that uses a SOA as a model for deploying discovering, specifying, integrating, implementing, testing, and invoking services. Such a service use case specification and testing technique including some idea could help the mobile application to develop cost efficient and dependable mobile services.

A Secure Multipath Transmission Scheme Based on One-Way Hash Functions in Wireless Sensor Networks (무선 센서 네트워크 환경에서 단-방향 해쉬 함수 기반 다중 경로 보안 전송 기법)

  • Lee, Yun-Jeong;Kim, Dong-Joo;Park, Jun-Ho;Seong, Dong-Ook;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.48-58
    • /
    • 2012
  • With the development of sensing devices and wireless communication technologies, wireless sensor networks are composed of a large number of sensor nodes that are equipped with limited computing performance and restricted communication capabilities. Besides, the sensor nodes are deployed in hostile or unattended environments. Therefore, the wireless sensor networks are vulnerable to security. In particular, the fatal damage may be occurred when data are exposed in real world applications. Therefore, it is important for design requirements to be made so that wireless sensor networks provide the strong security. However, because the conventional security schemes in wired networks did not consider the limited performance of the sensor node, they are so hard to be applied to wireless sensor networks. In this paper, we propose a secure multipath transmission scheme based on one-way hash functions in wireless sensor networks considering the limited performance of the wireless sensor nodes. The proposed scheme converts a sensor reading based on one of one-way hash functions MD5 in order to make it harder to be cracked and snooped. And then, our scheme splits the converted data and transfers the split data to the base station using multi-path routing. The experimental results show that our proposed scheme consumes the energy of just about 6% over the existing security scheme.

Bacterial Hash Function Using DNA-Based XOR Logic Reveals Unexpected Behavior of the LuxR Promoter

  • Pearson, Brianna;Lau, Kin H.;Allen, Alicia;Barron, James;Cool, Robert;Davis, Kelly;DeLoache, Will;Feeney, Erin;Gordon, Andrew;Igo, John;Lewis, Aaron;Muscalino, Kristi;Parra, Madeline;Penumetcha, Pallavi;Rinker, Victoria G.;Roland, Karlesha;Zhu, Xiao;Poet, Jeffrey L.;Eckdahl, Todd T.;Heyer, Laurie J.;Campbell, A. Malcolm
    • Interdisciplinary Bio Central
    • /
    • v.3 no.3
    • /
    • pp.10.1-10.8
    • /
    • 2011
  • Introduction: Hash functions are computer algorithms that protect information and secure transactions. In response to the NIST's "International Call for Hash Function", we developed a biological hash function using the computing capabilities of bacteria. We designed a DNA-based XOR logic gate that allows bacterial colonies arranged in a series on an agar plate to perform hash function calculations. Results and Discussion: In order to provide each colony with adequate time to process inputs and perform XOR logic, we designed and successfully demonstrated a system for time-delayed bacterial growth. Our system is based on the diffusion of ${\ss}$-lactamase, resulting in destruction of ampicillin. Our DNA-based XOR logic gate design is based on the op-position of two promoters. Our results showed that $P_{lux}$ and $P_{OmpC}$ functioned as expected individually, but $P_{lux}$ did not behave as expected in the XOR construct. Our data showed that, contrary to literature reports, the $P_{lux}$ promoter is bidirectional. In the absence of the 3OC6 inducer, the LuxR activator can bind to the $P_{lux}$ promoter and induce backwards transcription. Conclusion and Prospects: Our system of time delayed bacterial growth allows for the successive processing of a bacterial hash function, and is expected to have utility in other synthetic biology applications. While testing our DNA-based XOR logic gate, we uncovered a novel function of $P_{lux}$. In the absence of autoinducer 3OC6, LuxR binds to $P_{lux}$ and activates backwards transcription. This result advances basic research and has important implications for the widespread use of the $P_{lux}$ promoter.

Static Timing Analysis Tool for ARM-based Embedded Software (ARM용 내장형 소프트웨어의 정적인 수행시간 분석 도구)

  • Hwang Yo-Seop;Ahn Seong-Yong;Shim Jea-Hong;Lee Jeong-A
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.15-25
    • /
    • 2005
  • Embedded systems have a set of tasks to execute. These tasks can be implemented either on application specific hardware or as software running on a specific processor. The design of an embedded system involves the selection of hardware software resources, Partition of tasks into hardware and software, and performance evaluation. An accurate estimation of execution time for extreme cases (best and worst case) is important for hardware/software codesign. A tighter estimation of the execution time bound nay allow the use of a slower processor to execute the code and may help lower the system cost. In this paper, we consider an ARM-based embedded system and developed a tool to estimate the tight boundary of execution time of a task with loop bounds and any additional program path information. The tool we developed is based on an exiting timing analysis tool named 'Cinderella' which currently supports i960 and m68k architectures. We add a module to handle ARM ELF object file, which extracts control flow and debugging information, and a module to handle ARM instruction set so that the new tool can support ARM processor. We validate the tool by comparing the estimated bound of execution time with the run-time execution time measured by ARMulator for a selected bechmark programs.

Design and Implementation of Wireless Device Management Agent based on OMA DM (OMA DM을 기반으로 한 무선이동통신 단말기 관리 에이전트 설계 및 구현)

  • Pak, Ju-Geon;Park, Kee-Hyun;Jang, Dae-Jin;Jang, Myung-Sook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.363-368
    • /
    • 2008
  • Mobile devices become more complex and harder to manage due to the advance of technologies. In this paper, we designed and implemented the DM Agent based on OMA(Open Mobile Alliance) DM(Device Management) which is a standard for mobile device management. The proposed DM Agent basically can manage parameter configuration through the commands ADD, DELETE, REPLACE and GET currently. Each module of the agent was designed and implemented separately for additional functions such as error reporting and software management. So the additional functions can be added by modifying Adaptor part which processes the management commands instead of modifying other modules which analyze or generate management commands. The DM Agent proposed in this paper is implemented based on WIPI(Wireless Internet Platform for Interoperability), therefore portability of the agent can be improved. In addition, this research can give a development example for dissenminating OMA DM as well as verify functional compatibility of WIPI platform. SK WIPI SDK and a Funambol DM test server are used to test operations of the implemented DM Agent.