• Title/Summary/Keyword: prime operation

Search Result 116, Processing Time 0.028 seconds

Analysis on the Tourist's Behaviors and Satisfaction of the Gwangneung Area (문화.생태지역에 대한 관광행태와 만족도 분석: 광릉지역을 사례로)

  • Kim, Sun-Hee
    • Journal of the Korean association of regional geographers
    • /
    • v.11 no.3
    • /
    • pp.336-350
    • /
    • 2005
  • The prime objective of this study is to analyze tourist's behaviors and satisfaction of the Gwangneung area and get a reading on the tourist's socio-economic traits and the propensity of activities. In addition, it highlights surveys of the tourist's consciousness of cultural, ecological and environmental tourism resources available in the Gwangneung area and the possibility for sustainable development and ways to make the most of these resources. This study found that even though Gwangneung is mostly a place for one day family outings. the tourist's demand for actually unreachable ecological resources is high while existing cultural tourism resources have less than the expected drawing power. It was also found that tourists recognize the need for preservation of the tourism resources of Gwangneung and its potential for further sustainable development. In particular, most tourists to Gwangneung are relatively satisfied with the status of preservation of its cultural and ecological resources and environment On the other hand, accessibility, tourism facilities, and management are estimated at less than desired. Gwangneung would benefit by making efforts for the positive use of its tourism resources and improvement of convenience facilities, management and operation.

  • PDF

Electrosynthesis of n-PFOSF with Potential Operation (정전위법에 의한 n-PFOSF 합성)

  • Lee, Jongil;Tae, Beomseok
    • Applied Chemistry for Engineering
    • /
    • v.7 no.3
    • /
    • pp.473-480
    • /
    • 1996
  • Synthesis of n-perfluorooctanesulfonyl fluoride(n-PFOSF), which is valuable precursor perfluoro-chemicals, was studied by electrochemical fluorination(ECF). Of prime concern was to investigate the cyclic voltamograms of Ni electrode in anhydrous hydrogen fluoride(AHF) with and without the reactants and to measure fluorine evolution potential. In a batch cell, chronoampherometric electrolysis and various chemical analysis such as GC, GC/MS and IR were used to understand the amphere change of electrode and the reaction paths. Fluorine equilibrium potential was found to be about 2.8V(vs. $Cu/CuF_2$) from the cyclic voltammograms and decay curves of anode potential in AHF. In batch processes, the ECF proceeded in two distinguished steps. The first step proceeded electrochemically and the second one chemically. Under 7V(vs. $Cu/CuF_2$), amount of crude products was proportional to the applied anode potential. Above 7V(vs. $Cu/CuF_2$), it had a hundred percentage with weight ratio of reactants and productivity of PFOSF was almost constant.

  • PDF

The Validity Analysis of SDN/NFV Military application (SDN/NFV의 군 적용 타당성 분석)

  • Jang, Ji-Hee;Kwon, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.687-694
    • /
    • 2020
  • SDN and NFV are next-generation network technologies, and cloud, such as data centers, campuses, and large companies, has been established, or is actively applied by service-oriented communication companies. In particular, the Defense Integrated Data Center will be a prime example for military applications. In order for the Defense Integrated Data Center (DIDC) to become an intelligent center, it is accelerating the promotion of the "Smart Defense Integrated Data Center", which applied the latest information and communication technology (ICT). At the time of the establishment of DIDC, it plans to start building infrastructure such as cloud services at around 30% level, and expand D-Cloud to 75% through 'Cloud First'. In addition, the introduction of SDN/NFV will reduce the operation cost and manpower of DIDC, strengthen the ability to efficiently use information resources and cyber information protection systems, and increase flexibility and agility in using each system to improve efficiency in defense management in the future. Therefore, we will discuss the justification and expected effects of SDN/NFV introduction, focusing on DIDC.

An Efficient Implementation of Mobile Raspberry Pi Hadoop Clusters for Robust and Augmented Computing Performance

  • Srinivasan, Kathiravan;Chang, Chuan-Yu;Huang, Chao-Hsi;Chang, Min-Hao;Sharma, Anant;Ankur, Avinash
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.989-1009
    • /
    • 2018
  • Rapid advances in science and technology with exponential development of smart mobile devices, workstations, supercomputers, smart gadgets and network servers has been witnessed over the past few years. The sudden increase in the Internet population and manifold growth in internet speeds has occasioned the generation of an enormous amount of data, now termed 'big data'. Given this scenario, storage of data on local servers or a personal computer is an issue, which can be resolved by utilizing cloud computing. At present, there are several cloud computing service providers available to resolve the big data issues. This paper establishes a framework that builds Hadoop clusters on the new single-board computer (SBC) Mobile Raspberry Pi. Moreover, these clusters offer facilities for storage as well as computing. Besides the fact that the regular data centers require large amounts of energy for operation, they also need cooling equipment and occupy prime real estate. However, this energy consumption scenario and the physical space constraints can be solved by employing a Mobile Raspberry Pi with Hadoop clusters that provides a cost-effective, low-power, high-speed solution along with micro-data center support for big data. Hadoop provides the required modules for the distributed processing of big data by deploying map-reduce programming approaches. In this work, the performance of SBC clusters and a single computer were compared. It can be observed from the experimental data that the SBC clusters exemplify superior performance to a single computer, by around 20%. Furthermore, the cluster processing speed for large volumes of data can be enhanced by escalating the number of SBC nodes. Data storage is accomplished by using a Hadoop Distributed File System (HDFS), which offers more flexibility and greater scalability than a single computer system.

A Security SoC supporting ECC based Public-Key Security Protocols (ECC 기반의 공개키 보안 프로토콜을 지원하는 보안 SoC)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1470-1476
    • /
    • 2020
  • This paper describes a design of a lightweight security system-on-chip (SoC) suitable for the implementation of security protocols for IoT and mobile devices. The security SoC using Cortex-M0 as a CPU integrates hardware crypto engines including an elliptic curve cryptography (ECC) core, a SHA3 hash core, an ARIA-AES block cipher core and a true random number generator (TRNG) core. The ECC core was designed to support twenty elliptic curves over both prime field and binary field defined in the SEC2, and was based on a word-based Montgomery multiplier in which the partial product generations/additions and modular reductions are processed in a sub-pipelining manner. The H/W-S/W co-operation for elliptic curve digital signature algorithm (EC-DSA) protocol was demonstrated by implementing the security SoC on a Cyclone-5 FPGA device. The security SoC, synthesized with a 65-nm CMOS cell library, occupies 193,312 gate equivalents (GEs) and 84 kbytes of RAM.

Performance Analysis of Implementation on Image Processing Algorithm for Multi-Access Memory System Including 16 Processing Elements (16개의 처리기를 가진 다중접근기억장치를 위한 영상처리 알고리즘의 구현에 대한 성능평가)

  • Lee, You-Jin;Kim, Jea-Hee;Park, Jong-Won
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.8-14
    • /
    • 2012
  • Improving the speed of image processing is in great demand according to spread of high quality visual media or massive image applications such as 3D TV or movies, AR(Augmented reality). SIMD computer attached to a host computer can accelerate various image processing and massive data operations. MAMS is a multi-access memory system which is, along with multiple processing elements(PEs), adequate for establishing a high performance pipelined SIMD machine. MAMS supports simultaneous access to pq data elements within a horizontal, a vertical, or a block subarray with a constant interval in an arbitrary position in an $M{\times}N$ array of data elements, where the number of memory modules(MMs), m, is a prime number greater than pq. MAMS-PP4 is the first realization of the MAMS architecture, which consists of four PEs in a single chip and five MMs. This paper presents implementation of image processing algorithms and performance analysis for MAMS-PP16 which consists of 16 PEs with 17 MMs in an extension or the prior work, MAMS-PP4. The newly designed MAMS-PP16 has a 64 bit instruction format and application specific instruction set. The author develops a simulator of the MAMS-PP16 system, which implemented algorithms can be executed on. Performance analysis has done with this simulator executing implemented algorithms of processing images. The result of performance analysis verifies consistent response of MAMS-PP16 through the pyramid operation in image processing algorithms comparing with a Pentium-based serial processor. Executing the pyramid operation in MAMS-PP16 results in consistent response of processing time while randomly response time in a serial processor.

An Improved Reversible Secret Image Sharing Scheme based on GF(28) (유한 체 기반의 개선된 가역 비밀이미지 공유 기법)

  • Kim, Dong-Hyun;Kim, Jung-Joon;Yoo, Kee-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.359-370
    • /
    • 2013
  • Lin and Chan proposed a reversible secret image sharing scheme in 2010. The advantages of their scheme are as follows: the low distortion ratio, high embedding capacity of shadow images and usage of the reversible. However, their scheme has some problems. First, the number of participants is limited because of modulus prime number m. Second, the overflow can be occurred by additional operations (quantized value and the result value of polynomial) in the secret sharing procedure. Finally, if the coefficient of (t-1)th degree polynomial become zero, (t-1) participants can access secret data. In this paper, an improved reversible secret image sharing scheme which solves the problems of Lin and Chan's scheme while provides the low distortion ratio and high embedding capacity is proposed. The proposed scheme solves the problems that are a limit of a total number of participants, and occurrence of overflow by new polynomial operation over GF($2^8$). Also, it solve problem that the coefficient of (t-1)th degree polynomial become zero by fixed MSB 4-bit constant. In the experimental results, PSNR of their scheme is decreased with the increase of embedding capacity. However, even if the embedding capacity increase, PSNR value of about 45dB or more is maintained uniformly in the proposed scheme.

Power Cost Analysis of Go-ri Nuclear Power Plant Units 1 and 2

  • Chung, Chang-Hyun;Kim, Chang-Hyo;Kim, Jin-Soo
    • Nuclear Engineering and Technology
    • /
    • v.8 no.2
    • /
    • pp.101-116
    • /
    • 1976
  • An attempt is made to analyze the unit nuclear power cost of the Go-ri units 1 and 2 in terms of a set of model data. For the calculational purpose, the power cost is first decomposed into the cost components related to the plant capital, operation and maintenance, working capital requirements, and fuel cycle operation. Then, POWERCO-50 computer code is applied to enumerate the first three components and MITCOST-II is used to evaluate the fuel cycle cost component. The specific numerical results are the fuel cycle cost of Go-ri unit 2 for three alternative fuel cycles presumed, levelized unit power cost of units 1 and 2, and the sensitivity of the power cost to the fluctuation of the model data. Upon comparision of the results with the power cost of the fossil power plants in Korea, it is found that the nuclear power is economically preferred to the fossil power. Nevertheless, the turnkey contract value of Go-ri unit 2 appears to be rather expensive compared with the available data on the construction cost of the PWR plants. Therefore, it is suggested that, in order to make the nuclear power plants more attractive in Korea, the unfavorable contract of such kind must be avoided in the future introduction of the nuclear power plant. Capacity factor is of prime importance to achieving the economic generation of the nuclear electricity from the Go-ri plant. Therefore, it is concluded that more efforts should be directed to make the maximum use of the Go-ri plant.

  • PDF

A Fast Inversion for Low-Complexity System over GF(2 $^{m}$) (경량화 시스템에 적합한 유한체 $GF(2^m)$에서의 고속 역원기)

  • Kim, So-Sun;Chang, Nam-Su;Kim, Chang-Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.9 s.339
    • /
    • pp.51-60
    • /
    • 2005
  • The design of efficient cryptosystems is mainly appointed by the efficiency of the underlying finite field arithmetic. Especially, among the basic arithmetic over finite field, the rnultiplicative inversion is the most time consuming operation. In this paper, a fast inversion algerian in finite field $GF(2^m)$ with the standard basis representation is proposed. It is based on the Extended binary gcd algorithm (EBGA). The proposed algorithm executes about $18.8\%\;or\;45.9\%$ less iterations than EBGA or Montgomery inverse algorithm (MIA), respectively. In practical applications where the dimension of the field is large or may vary, systolic array sDucture becomes area-complexity and time-complexity costly or even impractical in previous algorithms. It is not suitable for low-weight and low-power systems, i.e., smartcard, the mobile phone. In this paper, we propose a new hardware architecture to apply an area-efficient and a synchronized inverter on low-complexity systems. It requires the number of addition and reduction operation less than previous architectures for computing the inverses in $GF(2^m)$ furthermore, the proposed inversion is applied over either prime or binary extension fields, more specially $GF(2^m)$ and GF(P) .

The nature of UN support of the Korea War (유엔의 6.25전쟁 지원과 성격 -신정공세 전후 유엔의 휴전교섭 노력을 중심으로-)

  • Yang, Yong-Jo
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.1-48
    • /
    • 2010
  • The purpose of this study is to examine and analyze the Untied Nations' efforts for peace on Korean peninsular after CCF's participation in Korean War. The Untied Nation tried to negotiate th peace plan between two sides from the end of 1950. Once the CCF's entry into the war had been confirmed, the war situation moved to a new phase, and the UN forces, which had guided the war in an effort to destroy the NKP A forces, and to punish North Korea, had to set up new guidelines to cope with the new situation. Accordingly, in late November, 1950, the UN forces camp, mainly the US Joint Chiefs of Staff and the United Nations Command, discussed various options, such as an expansion of the war up to the Chinese territory, a cease fire along the 38th Parallel, or a forced and inevitable evacuation. The Korean delegation to the UN insisted that "the unification of Korea should be achieved only by victory in the war. The Chinese intervention in the war is a Challenge to the UN in the same way as the North Korean invasion. The UN participation in the war was to repulse the invasion. With the same spirit we should drive back the Chinese Communists." The Korean delegation also emphasized to the friendly nations the political objective and will of unification, and that a cease fire at a threshold of unification might return us to the status quo ante bellum, and would be contrary to the Korean nation's desire. At that time, particularly, the US strongly considered the employment of nuclear weapons as one of the new strategies to cope with the Chinese invasion. The international effects of these casual remarks were realized almost at once. The British Prime Minister who had not wanted the expansion of war in the Far East, especially from the view point of the interest of NATO's security, visited Washington. so the conference had a very important meaning for the UN forces' new strategy. On the other hand, at the UN, on the 5th of December, the very day Truman and Attlee agreed to seek a cease-fire under UN auspices, a group of thirteen Asian and Arab states proposed to ask China and North Korea not to cross the 38th Parallel, and sounded out both sides about a cease fire along the 38th Parallel. The United States and the United Kingdom gave their assent, but China and North Korea gave no direct response. The CCF, who were securing the initiative of operation, were not agreeable with the proposal of the UN forces. The Untied Nation has tried to negotiate th peace plan between two sides from the December of 1950 and January of 1951. The Untied Nations' has achieved great results to negotiate for the peace plan on Korean peninsular after CCF's participation in Korean War. It's the results considering both the operation situation and political opinions.

  • PDF