• Title/Summary/Keyword: 시스템 호출

Search Result 421, Processing Time 0.032 seconds

Trandency and Technical Standard of Two-ways Pagers (양방향무선호출의 동향 및 기술기준)

  • 최성호;박승근;정희창
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.93-97
    • /
    • 1999
  • This paper describes an architecture platform and a key of features for a two-way pager system that will be commercially serviced in Korea, compares with it and other country's system, and analyzes the result. Also, 1 describes possible service features and new kinds of service for the two-way pager system. From the result of analysis, I presented a technical standard of radio quality for the two-way pager system.

  • PDF

Enhanced Time Measurement Function Using Virtual System Call (가상 시스템 호출을 이용한 시간 측정 함수의 성능 향상)

  • Kim, Chei-Yol;Son, Sung-Hoon;Jung, Sung-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.1237-1240
    • /
    • 2003
  • 최근의 인터넷의 급속한 발전에 힘입어 멀티미디어 데이터를 인터넷을 통해 서비스해 주는 스트리밍 서비스가 활성화가 되고 있다. 스트리밍 서버는 서비스를 요청한 클라이언트에게 일정한 데이터 전송률로 서비스를 하게 되는데, 이때 시간측정 함수를 매우 빈번히 사용하게 된다. 본 논문은 시간 측정함수를 가상 시스템 호출 기법을 이용해 성능을 향상 시킬 수 있음을 보여준다.

  • PDF

Development of a Method Dynamic Invocation Component for Network Program (네트워크 프로그램용 메소드 동적 호출 컴포넌트 개발)

  • 신봉준;정문상;홍순구
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.11a
    • /
    • pp.29-36
    • /
    • 2004
  • 많은 기능을 수행하는 네트워크 프로그램은 그 기능 만큼의 명령어들과 명령어 인자들을 주고 받게 되다. 수신된 명령어에 대한 처리는 $"IF\~ELSE"$ 같은 순차적인 비교구문을 사용하거나 자바 RMI같은 원격 메소드 호출방식을 사용하고 있다. 그러나 많은 명령어들을 매번 순차적인 방식으로 비교하는 것과 원격 메소드를 설계하는 방식은 그 구현 및 유지보수에 많은 어려움을 유발하고 있다. 본 논문의 목적은 명령어 수신부와 실행부에 대한 컴포넌트를 개발하여 프로그램 개발 및 유지보수에 들어가는 노력을 줄이고 프로그램의 수행성능을 향상시키기 위한 컴포넌트 개발에 있다.

  • PDF

A study of a System Call Interface for Supporting File Partial Encryption (파일 부분 암호화 지원을 위한 시스템 호출에 관한 연구)

  • Seo, Hye-in;Seong, Jeong-gi;Kim, Eun-gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.549-551
    • /
    • 2017
  • There are currently various file encryption systems and applications for encryption and storage of file on disk. However, the existing file encryption solutions handle encryption and decryption all at once by file or directory. In this study, we propose a system call supporting partial encryption function of the file. The user sets the partial encryption of the file by using system call interface, and writes the contents. And then the data is encrypted and stored on the disk. Also if the user sets the decryption and reads the data, the necessary part of data is decrypted by applying the user setting. According to the user setting, only the necessary part is encrypted and stored on a storage medium. As a result, the information in a secret level can be saved efficiently and securely.

  • PDF

Proposal of elevator calling intelligent IoT system using smartphone Bluetooth (스마트폰 블루투스를 이용한 승강기 호출 지능형 IoT 시스템 제안)

  • Si Yeon Kim;Sun-Kuk Noh
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.60-66
    • /
    • 2024
  • The Internet of Things, which began by connecting sensors through a network, is developing into an intelligent IoT by combining it with artificial intelligence technology. Elevators are essential for high-rise buildings in the city, and elevators move from floor to floor and perform the functions of transporting goods and moving users. It is necessary to provide safe and convenient services for elevator users in high-rise buildings or special environments (hospitals, etc.). In an environment where rapid patient transportation is important, such as large hospitals, there is a problem that hospital staff and the general public often use the elevator for patients. In particular, when moving patients where golden time is important, the waiting time to board the elevator is a major hindrance. In order to solve this problem, this study proposes an intelligent IoT system for elevator calling using smartphone Bluetooth. First, we experimented with the elevator calling IoT system using smartphone Bluetooth, and as a result of the experiment, it was confirmed that it can authenticate elevator users and reduce unnecessary waiting time for boarding. In addition, we propose an intelligent IoT system that connects with intelligent IoT.

Translation utilizing Dynamic Structure from Recursive Procedure & Function in C to VHDL (C의 재귀 호출로부터 동적 구조를 활용한 VHDL로의 변환)

  • Hong, Seung-Wan;Lee, Jeong-A
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3247-3261
    • /
    • 2000
  • In recent years, as the complexity of signal processmg systems Increases, the needs for dcslgners to mlx up hardware-part and software-part grow more and more considering both performance and cost There exist many algorilhms In C for vanous Signal processung apphcations. We have to translate the algonlhm C to hardware descnptlon language(HDL), If portion or the algonlhm needs to be unplcmenled in hardwarc pari of the syslcm. For this translation. it's dtfftcult to handle dynamic memory allocalion, function calls, pointer manipoJalion. This research shows a design method for a hardware model about recursive calls which was classified into software part of the system previously [or the translation from C to VHDL. The benefits of havlIlg recursive calls m hardware structure can be quite high since provides flexbility in hardware/software partitioming in codesign sysem.

  • PDF

Host Anomaly Detection of Neural Networks and Neural-fuzzy Techniques with Soundex Algorithm (사운덱스 알고리즘을 적용한 신경망라 뉴로-처지 기법의 호스트 이상 탐지)

  • Cha, Byung-Rae;Kim, Hyung-Jong;Park, Bong-Gu;Cho, Hyug-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.13-22
    • /
    • 2005
  • To improve the anomaly IDS using system calls, this study focuses on Neural Networks Learning using the Soundex algorithm which is designed to change feature selection and variable length data into a fixed length learning pattern. That is, by changing variable length sequential system call data into a fixed length behavior pattern using the Soundex algorithm, this study conducted neural networks learning by using a backpropagation algorithm with fuzzy membership function. The back-propagation neural networks and Neuro-Fuzzy technique are applied for anomaly intrusion detection of system calls using Sendmail Data of UNM to demonstrate its aspect of he complexity of time, space and MDL performance.

Development of a Prototype System for Active Emergency Call Services (능동적 응급 호출 서비스 시스템 프로토타입 개발)

  • Han, Won-Hee;Song, Eun-Ha;Han, Sung-Kook;Jeong, Young-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.7
    • /
    • pp.1016-1024
    • /
    • 2008
  • In this paper, we designed and implemented the ACE(ACtive Emergency call service system) system for emergency call service actively. ACE system has two physical components; E-Device(Emergency Mobile Device) and E-Server(Emergency Server). The role of E-Device is the mobile device in order to call emergency by using mild handi-capped, the elderly and children who are able to communicate theirs intention to another. E-Server is the server for management E-devices with realtime monitering. E-Device will be developed to the portable size for easily mild handi-capped, the elderly and children. When they need the service of emergency call, the button of E-device can be used and the call signal is transmitted to the emergency office and the guardian through Internet and CDMA. E-server should be developed the integrated control system for management of E-Devices basically. And it also supported to realtime monitoring of E-devices with respect to high quality of emergency call service for rise the efficiency.

  • PDF

Combining Multiple HMMs to Improve Intrusion Detection system with Sequential Event (순서적 이벤트에 기반한 침입탐지시스템의 성능향상을 위한 다중 HMM의 모델 결합)

  • 최종호;조성배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04b
    • /
    • pp.238-240
    • /
    • 2000
  • 침입탐지시스템은 침입탐지 기법에 따라 크게 오용탐지시스템과 비정상행위탐지시스템으로 나뉜다. 비정상 행위 탐지시스템은 정상사용행위를 모델링한 후 현재 관찰중인 행위가 정상에서 벗어나는지를 검사한다. 시스템 사용시 발생하는 각 이벤트는 동시에 여러 가지 정보를 담고있으므로 여러 각도에서 모델링될 수 있다. 따라서 여러 결과를 종합해서 판정의 안정성을 높을 수 있다. 본 논문에서는 이벤트의 시스템호출에 평가결과와 BSM감사정보 중 시스템호출관련 정보, 파일 접근관련 정보, 이 둘을 모두 고려한 정보를 통합한 평가결과를 투표방식으로 결합하여 판정하는 기법을 제안하였다. 실험결과 두 모델을 별도로 적용하는 경우보다 나아진 판정성능을 보여주었다.

  • PDF