• Title/Summary/Keyword: real-time implementation

Search Result 3,203, Processing Time 0.037 seconds

Implementation of RSA modular exponentiator using Division Chain (나눗셈 체인을 이용한 RSA 모듈로 멱승기의 구현)

  • 김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.21-34
    • /
    • 2002
  • In this paper we propos a new hardware architecture of modular exponentiation using a division chain method which has been proposed in (2). Modular exponentiation using the division chain is performed by receding an exponent E as a mixed form of multiplication and addition with divisors d=2 or $d=2^I +1$ and respective remainders r. This calculates the modular exponentiation in about $1.4log_2$E multiplications on average which is much less iterations than $2log_2$E of conventional Binary Method. We designed a linear systolic array multiplier with pipelining and used a horizontal projection on its data dependence graph. So, for k-bit key, two k-bit data frames can be inputted simultaneously and two modular multipliers, each consisting of k/2+3 PE(Processing Element)s, can operate in parallel to accomplish 100% throughput. We propose a new encoding scheme to represent divisors and remainders of the division chain to keep regularity of the data path. When it is synthesized to ASIC using Samsung 0.5 um CMOS standard cell library, the critical path delay is 4.24ns, and resulting performance is estimated to be abort 140 Kbps for a 1024-bit data frame at 200Mhz clock In decryption process, the speed can be enhanced to 560kbps by using CRT(Chinese Remainder Theorem). Futhermore, to satisfy real time requirements we can choose small public exponent E, such as 3,17 or $2^{16} +1$, in encryption and verification process. in which case the performance can reach 7.3Mbps.

Relationship between Stock Market & Housing Market Trends and Liquidity (주식시장과 주택시장의 동향 및 유동성과의 관계)

  • Choi, Jeong-Il
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.133-141
    • /
    • 2021
  • Governments of each country are actively implementing fiscal expansion policies to recover the real economy after Corona 19. In Korea, the stock market and housing market are greatly affected as liquidity in the market increases due to the implementation of disaster subsidies and welfare policies. The purpose of this study is to analyze the relationship between stock market and housing market trends and liquidity. Data were collected by the Bank of Korea and Kookmin Bank. The analysis period is from January 2000 to December 2020, and monthly data are used. For empirical analysis, the rate of change from the same month of the previous year was calculated for each variable, and numerical analysis, index analysis, and model analysis were performed. As a result of the analysis, it was found that the stock index showed a positive(+) relationship with the house price, while a negative(-) relationship with M2. Previous studies have suggested that, in general, an increase in liquidity affects the stock market and the housing market, and inflation also rises. In this study, it was found that the stock market and the housing market had an effect on each other. However, it was investigated that liquidity showed an inverse relationship with the stock market and had no relationship with the housing market. Through this, this study estimated that there is a time difference in the relationship between liquidity and the stock market & housing market.

Implementation of Prosumer Management System for Small MicroGrid (소규모 마이크로그리드에서 프로슈머관리시스템의 구현)

  • Lim, Su-Youn;Lee, Tae-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.590-596
    • /
    • 2020
  • In the island areas where system connection with the commercial power grid is difficult, it is quite important to find a method to efficiently manage energy produced with independent microgrids. In this paper, a prosumer management system for P2P power transaction was realized through the testing the power meter and the response rate of the collected data for the power produced in the small-scale microgrids in which hybrid models of solar power and wind power were implemented. The power network of the microgrid prosumer was composed of mesh structure and the P2P power transaction was tested through the power meter and DC power transmitter in the off-grid sites which were independently constructed in three places. The measurement values of the power meter showed significant results of voltage (average): 380V + 0.9V, current (average): + 0.01A, power: 1000W (-1W) with an error range within ±1%. Stabilization of the server was also confirmed with the response rate of 0.32 sec. for the main screen, 2.61 sec. for the cumulative power generation, and 0.11 sec for the power transaction through the transmission of 50 data in real time. Therefore, the proposed system was validated as a P2P power transaction system that can be used as an independent network without transmitted by Korea Electric Power Corporation (KEPCO).

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

Technology Trends of Smart Abnormal Detection and Diagnosis System for Gas and Hydrogen Facilities (가스·수소 시설의 스마트 이상감지 및 진단 시스템 기술동향)

  • Park, Myeongnam;Kim, Byungkwon;Hong, Gi Hoon;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.4
    • /
    • pp.41-57
    • /
    • 2022
  • The global demand for carbon neutrality in response to climate change is in a situation where it is necessary to prepare countermeasures for carbon trade barriers for some countries, including Korea, which is classified as an export-led economic structure and greenhouse gas exporter. Therefore, digital transformation, which is one of the predictable ways for the carbon-neutral transition model to be applied, should be introduced early. By applying digital technology to industrial gas manufacturing facilities used in one of the major industries, high-tech manufacturing industry, and hydrogen gas facilities, which are emerging as eco-friendly energy, abnormal detection, and diagnosis services are provided with cloud-based predictive diagnosis monitoring technology including operating knowledge. Here are the trends. Small and medium-sized companies that are in the blind spot of carbon-neutral implementation by confirming the direction of abnormal diagnosis predictive monitoring through optimization, augmented reality technology, IoT and AI knowledge inference, etc., rather than simply monitoring real-time facility status It can be seen that it is possible to disseminate technologies such as consensus knowledge in the engineering domain and predictive diagnostic monitoring that match the economic feasibility and efficiency of the technology. It is hoped that it will be used as a way to seek countermeasures against carbon emission trade barriers based on the highest level of ICT technology.

Implementation of Air Pollutant Monitoring System using UAV with Automatic Navigation Flight

  • Shin, Sang-Hoon;Park, Myeong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.77-84
    • /
    • 2022
  • In this paper, we propose a system for monitoring air pollutants such as fine dust using an unmanned aerial vehicle capable of autonomous navigation. The existing air quality management system used a method of collecting information through a fixed sensor box or through a measurement sensor of a drone using a control device. This has disadvantages in that additional procedures for data collection and transmission must be performed in a limited space and for monitoring. In this paper, to overcome this problem, a GPS module for location information and a PMS7003 module for fine dust measurement are embedded in an unmanned aerial vehicle capable of autonomous navigation through flight information designation, and the collected information is stored in the SD module, and after the flight is completed, press the transmit button. It configures a system of one-stop structure that is stored in a remote database through a smartphone app connected via Bluetooth. In addition, an HTML5-based web monitoring page for real-time monitoring is configured and provided to interested users. The results of this study can be utilized in an environmental monitoring system through an unmanned aerial vehicle, and in the future, various pollutants measuring sensors such as sulfur dioxide and carbon dioxide will be added to develop it into a total environmental control system.

A Study on Implementing BSC in the Public Enterprises : The Case of Korea Southern Power (공기업의 BSC 구축에 관한 연구: 한국남부발전(주) 사례를 중심으로)

  • Suh, Woo-Jong;Park, Jin-Bae;Hong, Jin-Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.4
    • /
    • pp.163-182
    • /
    • 2009
  • The BSC(Balanced Scorecard), a strategic performance evaluation system, has drawn attention as an innovative tool for improving an organization's performance. Recently, the Korean government has recognized the advantages of the BSC and encouraged public enterprises to implement the BSC. However, it has been pointed out that many public enterprises have faced difficulties in constructing and operating the BSC due to lack of clear understanding, a complex environment of performance evaluation, and inherent features of organizational culture. Therefore, this study analyzed a project case of a public enterprise, Korea Southern Power (KSP), which has ever been assessed as an excellent organization in implementing BSC and managing performance. This paper provides procedures, activities, resources (manpower and time), and decision-making issues and criteria required for implementing BSC, along with real project outcomes of the company. Such project details are expected to be used as helpful guidelines for public or non-profit organizations's BSC implementation. Furthermore, the KSP's efforts to cope with its problems and implications derived from the efforts are also expected to help other organizations construct and operate the BSC effectively.

Design and Implementation of Real-time Digital Twin in Heterogeneous Robots using OPC UA (OPC UA를 활용한 이기종 로봇의 실시간 디지털 트윈 설계 및 구현)

  • Jeehyeong Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.189-196
    • /
    • 2023
  • As the manufacturing paradigm shifts, various collaborative robots are creating new markets. Demand for collaborative robots is increasing in all industries for the purpose of easy operation, productivity improvement, and replacement of manpower who do simple tasks compared to existing industrial robots. However, accidents frequently occur during work caused by collaborative robots in industrial sites, threatening the safety of workers. In order to construct an industrial site through robots in a human-centered environment, the safety of workers must be guaranteed, and there is a need to develop a collaborative robot guard system that provides reliable communication without the possibility of dispatch. It is necessary to double prevent accidents that occur within the working radius of cobots and reduce the risk of safety accidents through sensors and computer vision. We build a system based on OPC UA, an international protocol for communication with various industrial equipment, and propose a collaborative robot guard system through image analysis using ultrasonic sensors and CNN (Convolution Neural Network). The proposed system evaluates the possibility of robot control in an unsafe situation for a worker.

A Study on the Incentive Method for Inducing Safe Driving (안전운전 유도를 위한 인센티브 제공 방안 연구)

  • Lee, Insik;Jang, Jeong Ah;Lee, Won Woo;Song, Jaeyong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.4
    • /
    • pp.485-492
    • /
    • 2023
  • Among the methods to improve traffic congestion by providing real-time traffic information and solving problems like traffic congestion and traffic crashes, private enterprise is implementing policies to lower insurance premiums like compensation for drivers' driving safety scores. Despite the emergence of various incentive policies, a study on the level of incentive payment for safe/eco-friendly driving is insufficient. The research analyzed the satisfactory factors that affect the scale of incentives through questionnaires and the applicable scale of incentives that enable safe/eco-friendly driving using a binary logistic regression model. As a result of analyzing the incentive scale of the appropriate payment amount for each driving score increase, 0.4% of the toll fee was derived when the driving score increased by 20 points, and 0.5% of the toll fee was derived when the driving score increased by 30 points. This study on calculating the appropriate incentive payment scale for driver information sharing and driving score increase will help optimize incentives and prepare system implementation plans.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.