• Title/Summary/Keyword: 소프트웨어 동적 결함

Search Result 194, Processing Time 0.03 seconds

Graph-Based Service Scheduler for Dynamic User Requirements in Multi-Agent Environments (멀티 에이전트 환경에서 동적 요구를 위한 그래프 기반 서비스 스케줄러)

  • Sang-Min Lee;Chang-ho Lee;Jung-Min Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.869-870
    • /
    • 2024
  • 다양한 형태의 다수 에이전트가 서비스하는 환경에서 사용자가 요청하는 서비스 명령은 단순할수록 사용성이 좋다. 하나의 서비스는 다양한 로봇이 유기적으로 수행해야 하며, 사용자가 서비스 명령에 대해 요구사항을 추가하면 이를 다수 로봇이 적절하게 처리하는 방법이 필요하다. 본 논문에서는 사용자가 요청한 서비스에 대해 로봇의 동작은 노드로, 동작 간의 관계는 에지로 표현하고 이를 통해 스케줄링 하는 방법론을 제공한다. 실험 결과, 다수 로봇 환경에서 사용자의 요구사항을 동적으로 대응하며 효율적으로 서비스가 수행됨을 확인하였다.

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

Using dental virtual patients with dynamic occlusion in esthetic restoration of anterior teeth: case reports (동적 교합을 나타내는 가상 환자의 형성을 통한 심미적인 전치부 보철 수복 증례)

  • Phil-Joon Koo;Yu-Sung Choi;Jong-Hyuk Lee;Seung-Ryong Ha
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.61 no.4
    • /
    • pp.328-343
    • /
    • 2023
  • Recently, a method of fabricating an esthetic anterior fixed prosthesis by integrating data such as three-dimensional facial scan and jaw motion to form a virtual patient with dynamic occlusion has been introduced. This enables smooth communication with patients during the diagnosis process, improves the predictability of esthetic prosthetic treatment, and lowers the possibility of occlusal adjustment. In this case report, a virtual patient with dynamic occlusion was created in which the results of the treatment were simulated, and esthetic maxillary anterior fixed prosthesis was fabricated. With the aid of the virtual patient, the final restorations were satisfactory both in terms of esthetic and function.

Efficiency Evaluation of Hierarchical Finite-State Machines and Behavior Trees according to Behavior Mechanism of Intelligent NPCs (지능형 NPC의 행동 메커니즘에 따른 계층적 유한 상태 기계와 행동 트리의 효율성 평가)

  • Jung-Min Lee;Jung-Yi Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.113-118
    • /
    • 2024
  • In this study, we designed and analyzed two main structures for effectively implementing the behavior of intelligent NPCs the Hierarchical Finite State Machine (HFSM) and the Behavior Tree, by creating experimental games. The HFSM was found to be efficient for complex interaction-centered actions where state changes and transitions are crucial, while the Behavior Tree was effective in dynamic environments where ease of modification and expansion are required for dynamic responses under various conditions. These structures were experimentally applied using the Unity engine to verify their efficiency. This study focused on the basic structure design and plans to apply these structures to an upcoming action-adventure escape game. The results of this research are expected to assist game developers in efficiently implementing intelligent NPCs, thereby contributing to the improvement of game quality and player satisfaction.

A Verification Method for Handwritten text in Off-line Environment Using Dynamic Programming (동적 프로그래밍을 이용한 오프라인 환경의 문서에 대한 필적 분석 방법)

  • Kim, Se-Hoon;Kim, Gye-Young;Choi, Hyung-Il
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.12
    • /
    • pp.1009-1015
    • /
    • 2009
  • Handwriting verification is a technique of distinguishing the same person's handwriting specimen from imitations with any two or more texts using one's handwriting individuality. This paper suggests an effective verification method for the handwritten signature or text on the off-line environment using pattern recognition technology. The core processes of the method which has been researched in this paper are extraction of letter area, extraction of features employing structural characteristics of handwritten text, feature analysis employing DTW(Dynamic Time Warping) algorithm and PCA(Principal Component Analysis). The experimental results show a superior performance of the suggested method.

Alignment and Navigation of Inertial Navigation and Guidance Unit using Inertial Explorer Software (Inertial Explorer 소프트웨어를 이용한 관성항법유도장치 정렬 및 항법계산)

  • Kim, Jeong-Yong;Oh, Jun-Seok;Roh, Woong-Rae
    • Aerospace Engineering and Technology
    • /
    • v.9 no.1
    • /
    • pp.50-59
    • /
    • 2010
  • In this paper, the alignment and navigation results by INGU(Inertial Navigation and Guidance Unit) onboard software and by Inertial Explorer which is a post-processing software specialized for IMU(Inertial Measurement Unit) are compared for identification of inertial sensor error models and estimation of alignment and navigation errors for KSLV-I INGU. For verification of the IMU error estimated by Kalman Filter of Inertial Explorer, the covariance parameters of inertial sensor error model state are identified by using stochastic error model of inertial sensors estimated by Allan variance and the alignment and navigation test with static condition and the land navigation test with dynamic condition are carried out. The validity of inertial sensor model for KSLV-I INGU is verified by comparison the alignment and navigation results of INGU on-board software and Inertial Explorer.

Design and Implementation of a High Performance Web Crawler (고성능 웹크롤러의 설계 및 구현)

  • 권성호;이영탁;김영준;이용두
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.4
    • /
    • pp.64-72
    • /
    • 2003
  • A Web crawler is an important Internet software technology used in a variety of Internet application software which includes search engines. As Internet continues to grow, implementations of high performance web crawlers are urgently demanded. In this paper, we study how to support dynamic scheduling for a multiprocess-based web crawler. For high peformance, web crawlers are usually based on multiprocess in their implementations. In these systems, crawl scheduling which manages the allocation of web pages to each process for loading is one of the important issues. In this paper, we identify issues which are important and challenging in the crawl scheduling. To address the issue, we propose a dynamic crawl scheduling framework and subsequently a system architecture for a web crawler with dynamic crawl scheduling support. And we analysed the behaviors of Web crawler. Based on the analysis result, we suggest the direction for the design of high performance Web crawler.

  • PDF

Incremental Interpreter based on Action Equations (작용 식 기반 점진 해석기)

  • Han, Jeong-Ran;Lee, Gi-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.1018-1027
    • /
    • 1999
  • 속성 문법은 언어의 정적인 의미구조를 표현하는 형식적인 표기법으로 동적인 의미구조를 표현하기는 부적절하다. 동적 의미구조를 잘 명세하고 명세된 언어를 구현하기 위해서 기존의 속성 문법을 확장하여 언어 구현에 필요한 동적인 작용들(actions)을 잘 표현해야 한다. 본 논문에서는 속성 문법을 확장하여 정적이고 동적인 의미구조를 잘 표현할 수 있는 새로운 작용 식(action equation)을 제시한다. 제시된 작용 식(action equation)의 동적인 의미 구조로 부터 SIMP 언어의 점진 해석기(incremental interpreter)를 설계하고 구현한다. 점진 해석기는 언어 기반의 프로그래밍 환경에서 수정된 부분만을 번역하여 프로그램의 전체 실행 결과를 얻는 해석기를 의미한다. 본 해석기는 SUN 1000에서 Lex와 Yacc을 사용해서 C 언어로 설계하고 구현하였다. 예제 프로그램을 실행시켰을 때 배정 문이나 IF문의 경우는 매우 효율적이었고 Loop의 경우는 재실행될 필요가 있는 영향받는 명령문들이 적을수록 점진 해석이 더 효율적으로 수행된다.Abstract Attribute grammars are a formal notation which expresses the static semantics of programming languages, but they are not suitable for expressing dynamic semantics. To describe dynamic semantics and implement a specified language, we extend attribute grammars and present new action equations which describe static and dynamic semantics. The incremental interpreter of a SIMP language is designed and implemented from the dynamic semantics of presented action equations. The incremental interpreter is to translate only modified part in the language-based programming environments and have results of whole program.Our interpreter is implemented in C with Lex and Yacc on SUN 1000. When we execute example programs, the incremental evaluation of any assignment and IF statements executes efficiently. But in the case of loop, we execute efficiently when the effected statements to be reexecuted in the loop are of small number.

Effective Integer Promotion Bug Detection Technique for Embedded Software (효과적인 내장형 소프트웨어의 정수 확장 (Integer Promotion) 버그 검출 기법)

  • Kim, Yunho;Kim, Taejin;Kim, Moonzoo;Lee, Ho-jung;Jang, Hoon;Park, Mingyu
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.692-699
    • /
    • 2016
  • C compilers for 8-bit MCUs used in washing machines and refrigerators often do not follow the C standard to improve runtime performance. Developers who are unaware of the difference between C compilers following the C standard and the C compilers for 8-bit MCU can cause bugs that do not appear in the standard C environment but appear in the embedded systems using 8-bit MCUs. It is difficult for bug detectors that assume the standard C environment to detect such bugs. In this paper, we introduce integer promotion bugs caused by the different integer promotion rules of the C compilers for 8-bit MCU from the C standard and propose 5 bug patterns where the integer promotion bugs occur. We have developed an integer promotion bug detection tool and applied it to the washing machine control software developed by the LG electronics. The integer promotion bug detection tool successfully detected 27 integer promotion bugs in the washing machine control software.

Dynamic Bayesian Network-Based Gait Analysis (동적 베이스망 기반의 걸음걸이 분석)

  • Kim, Chan-Young;Sin, Bong-Kee
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.354-362
    • /
    • 2010
  • This paper proposes a new method for a hierarchical analysis of human gait by dividing the motion into gait direction and gait posture using the tool of dynamic Bayesian network. Based on Factorial HMM (FHMM), which is a type of DBN, we design the Gait Motion Decoder (GMD) in a circular architecture of state space, which fits nicely to human walking behavior. Most previous studies focused on human identification and were limited in certain viewing angles and forwent modeling of the walking action. But this work makes an explicit and separate modeling of pedestrian pose and posture to recognize gait direction and detect orientation change. Experimental results showed 96.5% in pose identification. The work is among the first efforts to analyze gait motions into gait pose and gait posture, and it could be applied to a broad class of human activities in a number of situations.