• 제목/요약/키워드: Computer-based Solution

검색결과 1,247건 처리시간 0.033초

Dynamic Redundancy-based Fault-Recovery Scheme for Reliable CGRA-based Multi-Core Architecture

  • Kim, Yoonjin;Sohn, Seungyeon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제15권6호
    • /
    • pp.615-628
    • /
    • 2015
  • CGRA (Coarse-Grained Reconfigurable Architecture) based multi-core architecture can be considered as a suitable solution for the fault-tolerant computing. However, there have been a few research projects based on fault-tolerant CGRA without exploiting the strengths of CGRA as well as their works are limited to single CGRA. Therefore, in this paper, we propose two approaches to enable exploiting the inherent redundancy and reconfigurability of the multi-CGRA for fault-recovery. One is a resilient inter-CGRA fabric that is ring-based sharing fabric (RSF) with minimal interconnection overhead. Another is a novel intra/inter-CGRA reconfiguration technique on RSF for maximizing utilization of the resources when faults occur. Experimental results show that the proposed approaches achieve up to 94% faulty recoverability with reducing area/delay/power by up to 15%/28.6%/31% when compared with completely connected fabric (CCF).

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • 제37권3호
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

상호영향 관계를 고려한 가상교육 시스템 평가 방법론 (An Evaluation methodology of cyber-Education system based on interdependent relationship)

  • 한기준;김성옥
    • 컴퓨터교육학회논문지
    • /
    • 제4권2호
    • /
    • pp.155-163
    • /
    • 2001
  • 이 논문은 사이버교육시스템의 평가방법론을 제시하고자 한다. 사이버 교육에 대한 정보기술의 급격한 발달에도 불구하고 사이버교육환경에 대한 평가 방법론에 대한 연구가 거의 없는 실정이다. 우리는 사이버교육시스템 평가를 위한 기준에 대하여 정의를 하고 시스템 솔루션 선택 및 평가를 위한 방법론을 제시한다. 기준들간의 상호영향관계를 고려하여 사이버교육시스템 평가 과정의 방법을 예제를 통하여 제시하고 있다.

  • PDF

Robust Capacity Planning in Network Coding under Demand Uncertainty

  • Ghasvari, Hossien;Raayatpanah, Mohammad Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권8호
    • /
    • pp.2840-2853
    • /
    • 2015
  • A major challenge in network service providers is to provide adequate resources in service level agreements based on forecasts of future demands. In this paper, we address the problem of capacity provisioning in a network subject to demand uncertainty such that a network coded multicast is applied as the data delivery mechanism with limited budget to purchase extra capacity. We address some particular type of uncertainty sets that obtain a tractable constrained capacity provisioning problem. For this reason, we first formulate a mathematical model for the problem under uncertain demand. Then, a robust optimization model is proposed for the problem to optimize the worst-case system performance. The robustness and effectiveness of the developed model are demonstrated by numerical results. The robust solution achieves more than 10% reduction and is better than the deterministic solution in the worst case.

분산 컴퓨터 시스템에서 파일 할당에 관한 연구 (A Study on the File Allocation in Distributed Computer Systems)

  • 홍진표;임재택
    • 대한전자공학회논문지
    • /
    • 제27권4호
    • /
    • pp.571-579
    • /
    • 1990
  • A dynamic relocation algorithm for non-deterministic process graph in distributed computer systems is proposed. A method is represented for determining the optimal policy for processing a process tree. A general database query request is modelled by a process tree which represent a set of subprocesses together with their precedence relationship. The process allocation model is based on operating cost which is a function fo selection of site for processing operation, data reduction function and file size. By using expected values of parameters for non-deterministic process tree, the process graph and optimal policy that yield minimum operating cost are determined. As process is relocated according to threshold value and new information of parameters after the execution of low level process for non-deterministic process graph, the assigned state that approximate to optiaml solution is obtained. The proposed algorihtm is heuristic By performing algorithm for sample problems, it is shown that the proposed algorithm is good in obtaining optimal solution.

  • PDF

안드로이드 기반의 실시간 범죄방지 보안솔루션 설계 및 구현 (Design and implementation of The crime prevention security solution based on Android System)

  • 봉선종;윤희용
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2014년도 제49차 동계학술대회논문집 22권1호
    • /
    • pp.385-386
    • /
    • 2014
  • 최근 강력범죄와 빈집을 대상으로 하는 범죄가 증가함에 따라 언제 어디서나 실시간으로 주거지를 확인하고 대응을 할 수 있는 보안 솔루션에 대한 요구가 증가하고 있다. 본 논문에서 구현된 보안솔루션은 서버와의 통신을 통해 실시간으로 사용자의 스마트폰 애플리케이션에서 내부 침입을 확인할 수 있으며, 내부의 개폐장치를 스마트폰 애플리케이션을 통해 동작하는 보안 솔루션을 제안한다.

  • PDF

REMARKS ON A PAPER OF LEE AND LIM

  • Hamedani, G.G.;Slattery, M.C.
    • 충청수학회지
    • /
    • 제27권3호
    • /
    • pp.475-477
    • /
    • 2014
  • Lee and Lim (2009) state three characterizations of Loamax, exponential and power function distributions, the proofs of which, are based on the solutions of certain second order non-linear differential equations. For these characterizations, they make the following statement : "Therefore there exists a unique solution of the differential equation that satisfies the given initial conditions". Although the general solution of their first differential equation is easily obtainable, they do not obtain the general solutions of the other two differential equations to ensure their claim via initial conditions. In this very short report, we present the general solutions of these equations and show that the particular solutions satisfying the initial conditions are uniquely determined to be Lomax, exponential and power function distributions respectively.

An XML and Component-based IDE for Document Flow Application

  • Xiaoqin, Xie;Juanzi, Li;Lu, Ma;Kehong, Wang
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2004년도 International Conference on Digital Policy & Management
    • /
    • pp.299-310
    • /
    • 2004
  • Business process in e-government mostly embody as the flow of documents. Constructing a web-based document flow system becomes an critical task for today s digital government. But few of them use an off-the-shelf workflow product. Why? One of the reasons is that most of the workflow system are heavyweight, monolithic, and package a comprehensive set of features in an all-or-nothing manner. Another reason is that workflow technology lacks the constructs and modeling capability as programming language. It is incumbent on government IT organizations to transform their solution development to component-based computing model. Component technology isolates the computation and communication parts, but how to compose different software components is still a hard nut. An integrated development environment is necessary for CBSD. In this paper we propose a XML and component-based document flow-oriented integrated development environment (DFoIDE) for software developers. By writing some xml configure file, and operate on DFoIDE, developer can construct a workflow application quickly. This method divides system to several components and the activities in process are implemented as business component. Different components are discribed detailedly in this paper, especially one of the core component. Component Integrating Tool. Different perspectives in workflow application are seperated and depicted as different XML files. Correspondly, A component composition method for developing workflow application instead of workflow itself is proposed.

  • PDF

NuDE 2.0: A Formal Method-based Software Development, Verification and Safety Analysis Environment for Digital I&Cs in NPPs

  • Kim, Eui-Sub;Lee, Dong-Ah;Jung, Sejin;Yoo, Junbeom;Choi, Jong-Gyun;Lee, Jang-Soo
    • Journal of Computing Science and Engineering
    • /
    • 제11권1호
    • /
    • pp.9-23
    • /
    • 2017
  • NuDE 2.0 (Nuclear Development Environment 2.0) is a formal-method-based software development, verification and safety analysis environment for safety-critical digital I&Cs implemented with programmable logic controller (PLC) and field-programmable gate array (FPGA). It simultaneously develops PLC/FPGA software implementations from one requirement/design specification and also helps most of the development, verification, and safety analysis to be performed mechanically and in sequence. The NuDE 2.0 now consists of 25 CASE tools and also includes an in-depth solution for indirect commercial off-the-shelf (COTS) software dedication of new FPGA-based digital I&Cs. We expect that the NuDE 2.0 will be widely used as a means of diversifying software design/implementation and model-based software development methodology.

Towards Enacting a SPEM-based Test Process with Maturity Levels

  • Dashbalbar, Amarmend;Song, Sang-Min;Lee, Jung-Won;Lee, Byungjeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.1217-1233
    • /
    • 2017
  • Effective monitoring and testing during each step are essential for document verification in research and development (R&D) projects. In software development, proper testing is required to verify it carefully and constantly because of the invisibility features of software. However, not enough studies on test processes for R&D projects have been done. Thus, in this paper, we introduce a Test Maturity Model integration (TMMi)-based software field R&D test process that offers five integrity levels and makes the process compatible for different types of projects. The Software & Systems Process Engineering Metamodel (SPEM) is used widely in the software process-modeling context, but it lacks built-in enactment capabilities, so there is no tool or process engine that enables one to execute the process models described in SPEM. Business Process Model and Notation (BPMN)-based workflow engines can be a solution for process execution, but process models described in SPEM need to be converted to BPMN models. Thus, we propose an approach to support enactment of SPEM-based process models by converting them into business processes. We show the effectiveness of our approach through converting software R&D test processes specified in SPEM in a case study.