• Title/Summary/Keyword: 에뮬레이터

Search Result 103, Processing Time 0.026 seconds

A design of a parking lot management system to a small position information (소규모 위치 정보를 갖는 주차장 관리시스템의 설계)

  • Lee, Chang-Hee;Lee, Jong-Yong;Won, Young-Jin;Lee, Woo-Sang
    • 전자공학회논문지 IE
    • /
    • v.43 no.4
    • /
    • pp.60-64
    • /
    • 2006
  • This system constructs system devoted to what supplement that I follow at an installation interval of attribute quotient repeater of a thing devoted wireless communication device gaining position information, and range of information is limited. A parking lot management system constructed a database of parking information, and the database information was planned so that there was the number of to easily offer client and an Administrator. There is a sensor in several to perceive a vehicle about adhesion in a radio communication device installed in a parking lot and covers, and hits data after parking to a server and transmits base information. The Administrator program that I verified an information treatment of the server parking management database that I did wireless hand phone emulator J2MEWTK with client and verified working together of a server, and was understood by a transfer of, parking information, and was devoted to a, server and an Administrator offered the menu screen which was easy for a user convenience and management.

Andro-profiler: Anti-malware system based on behavior profiling of mobile malware (행위기반의 프로파일링 기법을 활용한 모바일 악성코드 분류 기법)

  • Yun, Jae-Sung;Jang, Jae-Wook;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.145-154
    • /
    • 2014
  • In this paper, we propose a novel anti-malware system based on behavior profiling, called Andro-profiler. Andro-profiler consists of mobile devices and a remote server, and is implemented in Droidbox. Our aim is to detect and classify malware using an automatic classifier based on behavior profiling. First, we propose the representative behavior profiling for each malware family represented by system calls coupled with Droidbox system logs. This is done by executing the malicious application on an emulator and extracting integrated system logs. By comparing the behavior profiling of malicious applications with representative behavior profiling for each malware family, we can detect and classify them into malware families. Andro-profiler shows over 99% of classification accuracy in classifying malware families.

A Study on CSS3 Stylesheet Extension and Emulator for Representation of Stereo Web Content in 3DTV (3DTV에서 스테레오 웹 콘텐츠 표현을 위한 CSS3 사양 확장 및 에뮬레이터 연구)

  • Lee, Hee-Jin;Yim, Hyun-Jeong;Lim, Soon-Bum
    • Journal of the Korea Computer Graphics Society
    • /
    • v.19 no.4
    • /
    • pp.1-11
    • /
    • 2013
  • In this paper, we represented the HTML5 webpage in 3D space for the 3D stereoscopic display by using CSS3 stylesheet; browser-based declarative contents, and proposed CSS Stereo 3DTV Profile. First, we suggested various webpage separation methods for reconstructing webpages in the 3D space effectively. Next, we suggested 3D view volume setting method by using extended CSS3 modules. And then, pre-processor converts sample contents which is written extended CSS stylesheet into the present CSS stylesheet for displaying in the webkit based browser. For the resulting stereoscopic images, we developed a rendering engine emulator which is implemented in JavaScript for simple display in the web browser, which produced dual images from virtual left and right-eyed cameras. And we have checked the sample contents displayed on the 3DTV.

An Implementation on the Computing Algorithm for Inverse Finite Field using Composite Field (합성체를 이용한 유한체의 역원 계산 알고리즘 구현)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.76-81
    • /
    • 2006
  • Recently, Finite field is applied the cryptography in the modern multimedia communication. Especially, block codes such as Elliptic Curve Cryptosystem and Reed-Solomon code among the error correcting codes are defined with finite field. Also, finite field algorithm is conducting the research actively because many kind of application parts need the real time operating ability therefore the exclusive hardware have been implementing. In this paper, we proposed the inverse finite field algorithm over GF($2^8$) using finite composite field and implemented in a hardware, and then compare this hardware with the currently used 'Itoh and Tsujii' hardware in respect to structure, area and computation time. Furthermore, this hardware was inserted into the AES SubBytes block and implemented on FPGA emulator board to confirm that the superiority of the proposed algorithm through the performance evaluation.

Reader Emulation System for Accessing Sensor Device Through EPCglobal Reader Protocol (EPCglobal 리더 프로토콜을 통한 센서장치 접근을 위한 리더 에뮬레이션 시스템)

  • Choi, Seung-Hyuk;Kim, Tae-Yong;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.842-852
    • /
    • 2010
  • RFID applications use tags to identify objects, but recent applications tend to include diverse sensor devices such as light, temperature, and humidity sensors as well. RFID tag information is usually processed via the event driven model. However sensor devices are usually accessed via the functional call model. Therefore application developers have to deal with mixed data access models and device dependent interface functions. In this paper, we propose a sensor reader emulator that provides a consistent access interface to sensor devices regardless of the types of devices. SRE provides a more efficient way of developing RFID applications by providing a single application programmer's view to RFID tags and sensor devices. In applications where tags are fixed to a place, SRE can replace expensive sensor tags and sensor readers with inexpensive sensor devices reducing the total cost while providing the same functionality.

An Interlace Test Tool Based on an Emulator for Improving Embedded Software Testing (임베디드 소프트웨어 테스트를 개선하기 위한 에뮬레이터 기반 인터페이스 테스트 도구)

  • Seo, Joo-Young;Choi, Byoung-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.547-558
    • /
    • 2008
  • Embedded system is tightly coupled with heterogeneous layers such as application, as kernel, device driver, HAL and hardware. Embedded system is customized for the specific purpose and hardware. In addition, the product cycle is so fast that software and hardware, which are developed by several vendors, are integrated together under unstable status. Therefore, there are lots of possibilities of faults in all layers. Because embedded software developers test their codes integrated with faulty layers, they cannot confirm 'whether testing of every aspects was completed, their code was failed, or integrated software/hardware has some problems'. In this paper, we propose an embedded software interface test method and a test tool called Justitia for detecting faults and tracing causes in the interface among heterogeneous layers. The proposed technique is an automated method which improves debugging upto professional testing using an emulator for helping developer.

Development of Simulation System For Real-Time Location Tracking In Global Shipping Logistics (글로벌 해운물류 실시간 위치 추적 시뮬레이션 시스템 개발)

  • Park, Byung-Kwon;Choi, Hyung-Rim;Kim, Chae-Soo;Lee, Kang-bae;Park, Min-Seon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1235-1242
    • /
    • 2015
  • In global shipping logistics, it is important for users to keep track of the location of their continuously moving cargos. Analyzing the GPS data stream coming from the tag which is attached to the cargo, we are able to keep track of the cargo location in terms of going into or out of a certain logistics area using the information of the spatial relationship change between the tag and the logistics area. In this paper, we propose a simulation system for measuring the precision and false alarm rate of the cargo location tracking algorithm which generates spatial events over the global logistics areas. Due to the difficulty of experiment with a real tag, we developed a tag emulator to create a virtual tag which operates exactly like a real tag. We show the cargo location tracking system works correctly with the tag emulator which communicates with it using the same protocol as the real tag.

Dynamic storage management for mobile platform based on the characteristics of mobile applications (응용프로그램 특성을 고려한 모바일 플랫폼의 동적 메모리 관리기법)

  • You, Yong-Duck;Park, Sang-Hyun;Choi, Hoon
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.561-572
    • /
    • 2006
  • Performance of the mobile devices greatly depends on the efficient resource management because they are usually resource-restricted. In particular, the dynamic storage allocation algorithms very important part of the mobile device's operating system and OS-like software platform. The existing dynamic storage allocation algorithms did not consider application's execution style and the type, life-time, and characteristics of memory objects that the application uses. Those algorithms, as a result, could not manage memory efficiently Therefore, this Paper analyzes the mobile application's execution characteristics and proposes anew dynamic storage allocation algorithm which saves the memory space and improves mobile application's execution speed. The test result shows that the proposed algorithm works 6.5 times faster than the linked-list algorithm[11], 2.5 times faster better than the Doug. Lea's algorithm[12] and 10.5 times faster than the Brent algorithm[14].

Construction of a Bidding System Using SyncML Data Synchronization Mechanism (SyncML 자료 동기화 방법을 이용한 이동무선통신 환경에서의 경매 시스템 구축)

  • Park, Kee-Hyun;Yoo, Sang-Jin
    • Information Systems Review
    • /
    • v.6 no.1
    • /
    • pp.155-166
    • /
    • 2004
  • As the necessity of such mobile wireless terminals as PDAs or Cellular phones drastically increases, the terminals play important role in various business areas. In this paper, a bidding system in mobile wireless environments is constructed. However, with many mobile wireless terminals modifying at the same time their (duplicated) bidding values for a given data item, data coherency for the data item becomes essential. Therefore, in this paper, a bidding system using SyncML data synchronization mechanism is proposed and constructed. SyncML is one of data synchronization mechanisms proposed by the SyncML Initiative, a consortium of mobile wireless mobile technology leaders for universal data synchronization. The bidding system is implemented and tested in LINUX, C++, and PocketPC 2000 emulator programming environments.

Comparative Analysis of Synthetic Memristor Emulator and M-R Mutator (합성형 멤리스터 에뮬레이터와 M-R 뮤테이터의 특성 비교)

  • Choi, Hyuncheol;Kim, Hyongsuk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.5
    • /
    • pp.98-107
    • /
    • 2016
  • An analytical comparison of a synthetic memristor emulator and a M-R mutator-based memristor emulator has been performed. Memristor is an electrical element with the characteristic of variable resistance. It is called the fourth fundamental electrical element following resistor, capacitor, and inductor. Memristor emulator is a circuit which implements the feature of variable resistance via the composition of various electrical devices. It is an essential circuit to study memristor characteristics during the time before it is commercially available. There are two representative memristor emulators depending upon their implementation methods. One is a memristor emulator which is synthesized via combining various electrical devices and the other one is M-R mutator-based memristor emulator implemented by extracting resistance from a nonlinear device. In this paper, implementation methods of these two memristor emulators are studied and their differences are investigated by analysing their characteristics.