• Title/Summary/Keyword: 결함허용성

Search Result 152, Processing Time 0.028 seconds

Design of a Mutual Exclusion Algorithm in Mobile Distributed Systems (이동 분산 시스템에서 상호배제 알고리즘의 설계)

  • Park, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.50-58
    • /
    • 2006
  • The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.

  • PDF

Onboard Store and Access for Communication Link Data: Grape Linked-List (통신 링크 데이터 온보드 저장 및 접근: 포도송이 연결리스트)

  • Cheol Hea Koo
    • Journal of Aerospace System Engineering
    • /
    • v.18 no.4
    • /
    • pp.89-95
    • /
    • 2024
  • This paper introduces an effective and convenient method for utilizing onboard memory space to process remote commands, telemetry, and interplanetary network protocol data in satellite onboard systems. By enhancing the doubly linked list data structure to store and make accessible variable-length communication protocol data either sequentially or at variable locations, the paper enhances memory capacity utilization. The concept of 'grape' is introduced into the doubly linked list data structure to manage variable-length data and its access, with performance verification conducted through its reference implementation. This novel approach to linked lists is termed 'grape.'

Exact Security Analysis of Some Designated Verifier Signature Schemes With Defective Security Proof (결함 있는 안전성 증명을 갖는 수신자 지정 서명기법들에 대한 정확한 안전성분석)

  • Kim, Ki-Tae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.37-48
    • /
    • 2010
  • Designated verifier signatures allow a signer to prove the validity of a signature to a specifically designated verifier. The designated verifier can be convinced but unable to prove the source of the message to a third party. Unlike conventional digital signatures, designated verifier signatures make it possible for a signer to repudiate his/her signature against anyone except the designated verifier. Recently, two designated verifier signature schemes, Zhang et al.'s scheme and Kang et al.'s scheme, have been shown to be insecure by concrete attacks. In this paper, we find the essential reason that the schemes open attacks while those were given with its security proofs, and show that Huang-Chou scheme and Du-Wen scheme have the same problem. Indeed, the security proofs of all the schemes reflect no message attackers only. Next, we show that Huang-Chou scheme is insecure by presenting universal forgery attack. Finally, we show that Du-Wen scheme is, indeed, secure by completing its defective security proof.

Structural Performance Evaluation of End-plate Connections According to Constructional Quality in P.E.B System (P.E.B 시스템에서 시공상태에 따른 엔드플레이트 접합부의 구조성능평가)

  • Lee, Eun-Taik
    • Journal of Korean Society of Steel Construction
    • /
    • v.24 no.4
    • /
    • pp.461-468
    • /
    • 2012
  • P.E.B (Pre-Engineering Building) system means an economical system, which designs and uses optimal section proportion of tapered members according to the magnitude of bending moment. However, it is hard to adjust the friction type bolted joint in the joint of tapered member in the P.E.B system. End-plate connection is mainly used in this system due to that difficulty. Because P.E.B system has end-plate vertical defacts by heat welding deformation, a gap between end-plates and rafter or rib can be observed. In this study, an examination of construction stability was throughly performed and analyzed by the investigation of permissible internal force of bolts in end-plate connections under the bending moment using the end-plate's initial connection-defect (gap).

A Range Query Method using Index in Large-scale Database Systems (대규모 데이터베이스 시스템에서 인덱스를 이용한 범위 질의 방법)

  • Kim, Chi-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1095-1101
    • /
    • 2012
  • As the amount of data increases explosively, a large scale database system is emerged to store, retrieve and manipulate it. There are several issues in this environments such as, consistency, availability and fault tolerance. In this paper, we address a efficient range-query method where data management services are separated from transaction management services in large-scale database systems. A study had been proposed using partitions to protect independence of two modules and to resolve the phantom problem, but this method was efficient only when range-query is specified by a key. So, we present a new method that can improve the efficiency when range-query is specified by a key attribute as well as other attributes. The presented method can guarantee the independence of separated modules and alleviate overheads for range-query using partial index.

Application and Analysis of the Paradigm of Software Safety Assurance for a Digital Reactor Protection System in Nuclear Power Plants (원전 디지털 원자로보호계통 소프트웨어 안전보증 패러다임 적용 및 분석)

  • Kwon, Kee-Choon;Lee, Jang-Soo;Jee, Eunkyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.335-342
    • /
    • 2017
  • In the verification and validation procedures regarding the safety-critical software of nuclear power plants for the attainment of the requisite license from the regulatory body, it is difficult to judge the safety and dependability of the development, implementation, and validation activities through a simple reading and review of the documentation. Therefore, these activities, especially safety assurance activities, require systematic evaluation techniques to determine that software faults are acceptable level. In this study, a safety case methodology is applied in an assessment of the level and depth of the results of the development and validation of a manufacturer in its targeting of the bistable processor of a digital reactor protection system, and the evaluation results are analyzed. This study confirms the possibility of an effective supplementation of the existing safety demonstration method through the application of the employed safety case methodology.

DESIGN AND IMPLEMENTATION OF THE SMALL SATELLITE ON-BOARD COMPUTER SYSTEM : KASCOM (소형위성의 제어를 위한 컴퓨터 시스템의 설계 및 구현)

  • 김기형;김형신;박재현;박규호;최순달
    • Journal of Astronomy and Space Sciences
    • /
    • v.13 no.2
    • /
    • pp.52-66
    • /
    • 1996
  • In this paper, we present the design methodology of KASCOM(KAIST satellite computer), the experimental on-board computer system of KITSAT-2. The design of the on-board computer system should consider the following constraints: operational throughput, fault tolerant input-output, low power, size, weight, and radiation hardness. KASCOM is designed to satisfy these constraints. This paper also presents the implementation and testing details of KASCOM. Finally, the in-orbit operational results are presented. The results show that about 2 SEU errors occur for the program memory(1Mbit SRAM) in a day, while 3.7 SEU errors occur for the data memory(4Mbit SRAM). This implies that high-integrated memories are more susceptible to the radiation environment than low-integrated memories.

  • PDF

Investigation on Water Leakage-Induced Tunnel Structure and Ground Responses Using Coupled Hydro-Mechanical Analysis (수리역학 연계해석을 이용한 누수로 인한 터널 구조물 및 지반 거동의 분석)

  • Dohyun Park
    • Tunnel and Underground Space
    • /
    • v.33 no.4
    • /
    • pp.265-280
    • /
    • 2023
  • Water leakage in tunnels is a defect that can affect tunnel stability and the ground movement by changing the stress and pore water pressure of the surrounding ground. Long-term or large-scale water leaks may lead to damage of tunnel structure and the surrounding environment, such as tunnel lining instability and ground surface settlement. The present study numerically investigated the effects of water leakage on the structural stability of a tunnel and the ground behavior. The tunnel was assumed to be under undrained conditions for preventing the inflow of the surrounding water and leaks occurred in the concrete lining after completion of the tunnel construction. A coupled hydro-mechanical analysis using a TOUGH-FLAC simulator developed in Python was conducted for assessing the leakage induced-behavior of the tunnel structure and ground under different conditions of the amount and location of water leak. Additionally, the effect of hydro-mechanical coupling terms on the results of coupled response was investigated and discussed.

The Case Study of Design on Steel Pipe Sheet Pile for Earth Retaining Wall on Deep Excavation (대심도 지반굴착을 위한 벽강관말뚝 흙막이공법의 설계 사례 연구)

  • Byung-Il Kim;Jong-Ku Lee;Kyoung-Tae Kim;Kang-Han Hong;Sang-Jae Han
    • Journal of the Korean Geosynthetics Society
    • /
    • v.22 no.1
    • /
    • pp.53-66
    • /
    • 2023
  • In this study, the results of the elasto-plastic beam analysis, finite element analysis and optimization design of the steel pipe sheet pile applied as an earth retaining wall under the deep excavation were presented. Through this study, it was found that the high-strength and sea resistant steel pipe has high allowable stress, excellent structural properties, favorable corrosion, and high utilization as an earth retaining wall, and the C-Y type joint has significantly improved the tensile strength and stiffness compared to the traditional P-P type. In addition, it was investigated that even if the leak or defect of the wall occurs during construction, it has the advantage of being able to be repaired reliably through welding and overlapping. In the case of steel pipe wall, they were evaluated as the best in views of the deep excavation due to the large allowable bending stress and deformation flexibility for the same horizontal displacement than CIP or slurry wall. Elasto-plastic and finite element analysis were conducted in consideration of ground excavation under large-scale earth pressure (uneven pressure), and the results were compared with each other. Quantitative maximum value were found to be similar between the two methods for each item, such as excavation behavior, wall displacement, or member force, and both analysis method were found to be applicable in design for steel pipe sheet pile wall. Finally, it was found that economical design was possible when determining the thinnest filling method with concrete rather than the thickest hollow shape in the same diameter, and the depth (the embedded length through normality evaluation) without rapidly change in displacement and member force.

Implementation and Performance Analysis of the Group Communication Using CORBA-ORB, JAVA-RMI and Socket (CORBA-ORB, JAVA-RMI, 소켓을 이용한 그룹 통신의 구현 및 성능 분석)

  • 한윤기;구용완
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.81-90
    • /
    • 2002
  • Large-scale distributed applications based on Internet and client/server applications have to deal with series of problems. Load balancing, unpredictable communication delays, and networking failures can be the example of the series of problems. Therefore. sophisticated applications such as teleconferencing, video-on-demand, and concurrent software engineering require an abstracted group communication, CORBA does not address these paradigms adequately. It mainly deals with point-to-point communication and does not support the development of reliable applications that include predictable behavior in distributed systems. In this paper, we present our design, implementation and performance analysis of the group communication using the CORBA-ORB. JAVA-RML and Socket based on distributed computing Performance analysis will be estimated latency-lime according to object increment, in case of group communication using ORB of CORBA the average is 14.5172msec, in case of group communication using RMI of Java the average is 21.4085msec, in case of group communication using socket the average is becoming 18.0714msec. Each group communication using multicast and UDP can be estimated 0.2735msec and 0.2157msec. The performance of the CORBA-ORB group communication is increased because of the increased object by the result of this research. This study can be applied to the fault-tolerant client/server system, group-ware. text retrieval system, and financial information systems.

  • PDF