• Title/Summary/Keyword: Bug

Search Result 318, Processing Time 0.038 seconds

Development of a 3D simulator for optimal path generation of a mobile multiped robot (다족 모바일 로봇의 최적 경로 생성을 위한 3D 시뮬레이터의 개발)

  • Kim, Ki-Woo;Choi, Woo-Chang;Yoo, Young-Kuk;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.79-80
    • /
    • 2007
  • This paper deals with generating multi-ped mobile robot's optimal path and its simulation. The multi-ped robot has six-legs which make it possible to move actively by attached driving wheel at the end of legs. The simulation environment is created similarly to the indoor environment as simple obstacles and walls. Also simulator can reconstruct an simulation environment. In this paper, the suggested simulator can generate the optimal path from starting point to destination by applying the A* algorithm and Bug2 algorithm. Then it is possible to check algorithms as 3D screen and we can simulate under the generated path.

  • PDF

A Software Update Method Using Clustering WSNs (클러스터링을 이용한 SW 업데이트 방법)

  • Jeong, Hyeyeong;Ahn, Byoungchul
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.4
    • /
    • pp.245-251
    • /
    • 2014
  • Wireless Sensor Networks(WSNs) are applied to many monitoring applications. Present sensor nodes can perform many functions at the same time and contain complex software. During the lifetime of sensor nodes, they are required to reprogram their software because of their new functions, software, software bug fixes. The nodes are inaccessible physically or it is very difficult to upgrade their software by one by one. To upgrade the software of sensor nodes in WSNs remotely, this paper presents an energy efficient method by selecting an optimal relay node. The CHR(Cluster Head Relay) method is compared with SPIN and RANDOM method. Three methods are simulated in NS-2 with the same environmental parameters. Simulation results show that CHR shows faster update time and less power consumption compared with other two methods.

Ecological Characteristics and Insecticidal Susceptibility of Sycamore Lace Bug, Corythucha ciliata Say (Hemiptera: Tingidae) (버즘나무방패벌레 (Corythucha ciliata Say)의 생태적 특성 및 살충제감수성)

  • Song, Cheol;Cho, Kwang-Yun
    • Journal of Life Science
    • /
    • v.10 no.2
    • /
    • pp.164-168
    • /
    • 2000
  • To understand the biological characteristics of Corythucha ciliata occurring in Korea, developmental periods and its susceptibility to several insecticides were examined under growth chamber condition at $25^{\circ}C$. It took 11.1 day from egg to hatch. And duration of each stage up to the 5th nymph after hatching was 4.0, 2.1, 2.0, 2.9, and 4.0 days, respectively. Total duration from egg to adult was 26.1 days, preoviposition period was 12.2 days, and average number of eggs laid by a female was 83.0. Sex ratio of female was 51.6% and lifespan of female adult was 43.2% days. LC50 value of deltamethrin and esfenvalerate were 0.8 and 0.9 ppm, respectively. Insecticidal effects were better in pyrethroids than organophosphates and carbamates.

  • PDF

Analyzing File Characteristic For Security Bug Localization (보안 버그 추적을 위한 파일 특징 분석)

  • Heo, Jin-Seok;Kim, Young-Kyoung;Kim, Mi-Soo;Lee, Eun-Seok
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.517-520
    • /
    • 2018
  • 보안 버그는 소프트웨어의 치명적인 취약점을 노출해 제품의 질 저하 및 정보유출을 일으킨다. 위 상황을 최소화하기 위해 보안 버그 추적 기술이 필요하다. 본 논문에서는 보안 버그가 발생한 소스 파일의 특징을 분석하여 보안 버그 추적을 위한 정보를 제공한다. 우리는 보안이 중요하게 다루어져야 하는 안드로이드와 블록체인 오픈소스를 대상으로 보안 버그 리포트를 수집해 보안 버그가 나타난 소스 파일의 텍스트를 분석했다. 분석 결과, 안드로이드의 경우 통신 관련 패키지에 포함된 파일에서 보안 버그가 발생했다. 블록체인의 경우 계정, 키 저장 관련 파일들에서 보안 버그가 주로 발생했다. 보안 버그 추적 시 본 연구의 분석 결과를 반영한다면 빠르고 정확하게 보안 버그 파일을 찾을 수 있을 것으로 보인다.

The Video on Demand System Failure Evaluation of Software Development Step

  • Jang, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.107-112
    • /
    • 2019
  • Failure testing is a test that verifies that the system is operating in accordance with failure response requirements. A typical failure test approaches the operating system by identifying and testing system problems caused by unexpected errors during the operational phase. In this paper, we study how to evaluate these Failure at the software development stage. Evaluate the probability of failure due to code changes through the complexity and duplication of the code, and evaluate the probability of failure due to exceptional situations with bugs and test coverage extracted from static analysis. This paper studies the possibility of failure based on the code quality of software development stage.

Bugs on the IEEE 802.11 Module of ns-2.31 (ns-2.31의 IEEE 802.11 모듈 버그)

  • Jung, Nak-Cheon;Ahn, Jong-Suk
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.841-844
    • /
    • 2008
  • 본 논문은 공개 네트워크 시뮬레이터 ns-2.31(Network Simulator 2.31)의 802.11 DCF 모듈에서 버그(bug)를 소개하고 이의 영향 결과를 분석한다. ns의 802.11 DCF 모듈은 다음과 같은 문제점을 가지고 있다. 첫째, 백오프(backoff) 알고리즘은 표준안에서 명시한 알고리즘대로 작성되지 않았다. 둘째, 특정조건에 해당되는 충돌에 대하여 트레이스 파일에 출력하지 않는다. 셋째, 전파 오류 모듈을 삽입하여도 전파 오류 결과를 트레이스 파일에 출력하지 않는다. 넷째, MAC(Medium Access Control) 알고리즘만을 평가할 수 있는 기법을 제공하지 않는다. 이러한 문제점을 수정한 ns-2와 수정전의 ns-2와 평균4.6%의 충돌률 차이를 보인다.

A Study on Defense Technique Against Use-After-Free Attacks Using MTE (MTE 를 활용한 사용 후 해제 공격 방어기법 연구)

  • Yunseong Hwang;Junseung You;Yunheung Paek
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.279-282
    • /
    • 2024
  • The Use-after-free (UAF) bug is a long-standing temporal memory safety issue. To prevent UAF attacks, two commonly used approaches are lock-and-key and pointer nullification. Recently, ARM architecture supports the Memory Tagging Extension (MTE) that implemented a lock-and-key mechanism using a 4-bit tag during memory access. Previous research proposed a virtual address tagging scheme utilizing MTE to prevent UAF attacks. In this paper, we aimed to measure a simplified version of the previously proposed virtual address tagging scheme on real machines supporting MTE by implementing a simple module and conducting experiments.

Analyze trends in Use-After-Free bug detection and blocking research (Use-After-Free 버그 탐지 및 예방 연구 동향 분석)

  • Jin-Hwan Kim;Yeong-Pil Cho
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.222-225
    • /
    • 2024
  • 전통적 프로그래밍 언어인 C/C++는 시스템 프로그래밍 언어로 널리 사용되고 있으며, 이는 저수준 메모리 제어와 하드웨어 상호작용 등의 특성 때문이다. 하지만 C/C++가 가지고 있는 특성중 하나인 저수준 메모리 제어는 프로그래머가 직접 메모리를 관리해야한다. 다양한 메모리 버그들중에서 특히 Use-after-free버그는 오래전부터 현재까지 해결되지 않은 버그로써 존재하고 있으며, 이는 프로그래머가 수동으로 메모리를 관리함으로써 발생한다. 이 버그를 예방 및 감지하기 위한 연구가 현재까지도 활발하게 진행되고 있다. 이 버그를 차단 및 감지하는 연구들의 동향을 분석하여 앞으로의 관련 연구의 지속적인 필요성을 제시한다.

Isolated dark-matter-deprived galaxies in hydrodynamical simulations: real objects or artefacts?

  • Christoph Saulder;Owain Snaith;Changbom Park;Clotilde Laigle
    • Monthly Notices of the Royal Astronomical Society
    • /
    • v.491 no.1
    • /
    • pp.1278-1286
    • /
    • 2020
  • We searched for isolated dark-matter-deprived galaxies within several state-of-the-art hydrodynamical simulations: Illustris, IllustrisTNG, EAGLE, and Horizon-AGN and found a handful of promising objects in all except Horizon-AGN. While our initial goal was to study their properties and evolution, we quickly noticed that all of them were located at the edge of their respective simulation boxes. After carefully investigating these objects using the full particle data, we concluded that they are not merely caused by a problem with the algorithm identifying bound structures. We provide strong evidence that these oddballs were created from regular galaxies that get torn apart due to unphysical processes when crossing the edge of the simulation box. We show that these objects are smoking guns indicating an issue with the implementation of the periodic boundary conditions of the particle data in Illustris, IllustrisTNG, and EAGLE, which was eventually traced down to be a minor bug occurring for a very rare set of conditions.

Studies on the Interpretative Classification of Paddy Soils in Korea I : A Study on the Classification of Sandy Paddy Soils (우리나라 답토양(畓土壌)의 실용적분류(実用的分類)에 관(関)한 연구(硏究) -제1보(第一報) 사질답(砂質畓) 분류(分類)에 관(関)하여)

  • Jung, Yeun-Tae;Yang, Euy-Seog;Park, Rae-Kyung
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.15 no.2
    • /
    • pp.128-140
    • /
    • 1982
  • The distribution and practical classification of sandy paddy soils, which have the most extensive acreage among low productive paddy soils in Korea and have distinctive improvement effects, were studied to propose a tentative new classification system of sandy textured paddy soils as a means of improving the "Paddy Soil Type Classification" scheme used. The results are summarized as follows; 1. The potential productivity of sandy textured paddy soils was about 86% of normal paddy and the coefficient of variation was relatively high indicating that the properties of soils included were not sufficiently homogeneous. 2. As the poorly drained and halomorphic (> 16 mmhos/cm of E.C. at $25^{\circ}C$) sandy soils are not included in the "Sandy Soil" type according to the criteria of "Soil Type Classification", the recommendation of "adding clay earth" become complicated, and the soil type have to change when the salts washed away or due to ground water table fluctuations. 3. Coarse textured soils were entirely included in the "Sandy Soils" in the tentative criteria of sandy soil classification proposed, and the sandy soils were subdivided into 4 subtypes that is "Oxidized leaching sandy paddy", Red-ox. intergrading sandy paddy", "Reduced accumulating sandy paddy" and "Reduced halomorphic sandy paddy". The system of sandy soil classification proposed were consisted of following categories; Type (Sandy paddy)-Sub-type (4)-Texture family (5)-Soil series (48). 4. The variation of productivities according to the proposed scheme was more homogenized than that of the present device. 5. The total extent of sandy paddy soils was 409, 902 ha (32.3% of total paddy) according to the present classification system, but the extent reached 492,983 ha (38.9%) by the proposed system. The provinces of Gyeong-gi (88.923ha), Jeon-bug (69.717 ha), Gyeong-bug (55.390 ha) have extensive acreage of sandy paddy soils, and the provinces that had high ratio of sandy paddy soils were Gang-weon (58.9%), Gyeong-gi (50.5%), Chung-bug (48.5%), Jeon-bug (41.0%) etc. The ratio was increased by the proposed scheme, e.g. 71.4% in the case of Gang-weon prov. 6. According to the suitability group of paddy soils, the sandy soils mostly belong to 3 class (69.1%) and 4 class (29.2%). Coarse loamy textural family (59.2%) and coarse silty (16.1 %) soils were dominantly distributed. 7. The "Red-ox. intergrading subtype" of sandy paddy pertinent to 49.6% (245,012 ha) while the "Oxidized leaching sub-type" reaches to 33.5% (64,890 ha) and the remained 16.9% (83,081ha) belong to "Reduced accumulating sub-type (14.0%) and "Reduced halomorphic sub-type (2.9%)" according to the proposed scheme.

  • PDF