• Title/Summary/Keyword: Detection Mechanism

Search Result 850, Processing Time 0.026 seconds

Branch Misprediction Recovery Mechanism That Exploits Control Independence on Program (프로그램 상의 제어 독립성을 이용한 분기 예상 실패 복구 메커니즘)

  • Yoon, Sung-Lyong;Lee, Won-Mo;Cho, Yeong-Il
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.7
    • /
    • pp.401-410
    • /
    • 2002
  • Control independence has been put forward as a new significant source of instruction-level parallelism for superscalar processors. In branch prediction mechanisms, all instructions after a mispredicted branch have to be squashed and then instructions of a correct path have to be re-fetched and re-executed. This paper presents a new branch misprediction recovery mechanism to reduce the number of instructions squashed on a misprediction. Detection of control independent instructions is accomplished with the help of the static method using a profiling and the dynamic method using a control flow of program sequences. We show that the suggested branch misprediction recovery mechanism improves the performance by 2~7% on a 4-issue processor, by 4~15% on an 8-issue processor and by 8~28% on a 16-issue processor.

Peroxynitrite Scavenging Mechanism of Ojawhan (오자환(五子丸)의 Peroxynitrite 제거 작용)

  • Kim, Hyung-Joon;Jeong, Ji-Cheon
    • The Journal of Internal Korean Medicine
    • /
    • v.26 no.1
    • /
    • pp.107-118
    • /
    • 2005
  • Objectives : Peroxynitrite $(ONOO^-)$, fonned from the reaction of $O_2^-$ and NO, is a cytotoxic species that can oxidize several cellular components such as proteins, lipids and DNA. It has been implicated in the aging process and age-related disease such as Alzheimer's disease, rheumatoid arthritis, cancer and atherosclerosis. Due to the lack of endogenous enzymes to thwart $ONOO^-$ activation, developing a specific $ONOO^-$ scavenger is remarkably important. The aim of this study was to investigate scavenging activities of $ONOO^-$ and its precursors, NO and $O_2^-$ and its scavenging mechanism of Ojawhan. Methods : To investigate scavenging activities of $ONOO^-$, NO, $O_2^-$ and its scavenging mechanism using fluorescent probes, DCFDA, DAF-2 and DHR 123. The $ONOO^-$ scavenging activity on Ojawhan was assayed by measuring oxidized dihydrorhodamine 123 (DHR 123) by fluorometry. Oxidative stress was induced by strong oxidants t-butyl hydroperoxide (t-BHP). Endothelial cell (YPEN-1) was used for detection of intracellular oxidative stress. Results : Ojawhan markedly scavenged authentic $ONOO^-$, $O_2^-$ and NO. It also inhibited $ONOO^-$ induced by $O_2^-$ and NO which are derived from SIN-1. Furthennore, ${\underline{Ojawhan}}$ blocked lipopolysaccharide (LPS)-induced $ONOO^-$, $O_2^-$ and NO generation utilizing kidney homogenates of LPS-injected mouse and inhibited t-BHP-induced ROS and $ONOO^-$ in endothelial cell culture system. Conclusions : These results suggest that Ojawhan be developed as an effective $ONOO^-$ scavenger for the prevention of $ONOO^-$ involved diseases and age-related diseases.

  • PDF

A Non-coherent IR-UWB RF Transceiver for WBAN Applications in 0.18㎛ CMOS (0.18㎛ CMOS 공정을 이용한 WBAN용 비동기식 IR-UWB RF 송수신기)

  • Park, Myung Chul;Chang, Won Il;Ha, Jong Ok;Eo, Yun Seong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.2
    • /
    • pp.36-44
    • /
    • 2016
  • In this paper, an Impulse Radio-Ultra Wide band RF Transceiver for WBAN applications is implemented in $0.18{\mu}m$ CMOS technology. The designed RF transceiver support 3-5GHz UWB low band and employs OOK(On-Off Keying) modulation. The receiver employs non-coherent energy detection architecture to reduce complexity and power consumption. For the rejection of the undesired interferers and improvement of the receiver sensitivity, RF active notch filter is integrated. The VCO based transmitter employs the switch mechanism. As adapt the switch mechanism, power consumption and VCO leakage can be reduced. Also, the spectrum mask is always same at each center frequency. The measured sensitivity of the receiver is -84.1 dBm at 3.5 GHz with 1.579 Mbps. The power consumption of the transmitter and receiver are 0.3nJ/bit and 41 mW respectively.

A Branch Misprediction Recovery Mechanism by Control Independence (제어 독립성과 분기예측 실패 복구 메커니즘)

  • Ko, Kwang-Hyun;Cho, Young-Il
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.14 no.1
    • /
    • pp.3-22
    • /
    • 2012
  • Control independence has been put forward as a significant new source of instruction-level parallelism for superscalar processors. In branch prediction mechanisms, all instructions after a mispredicted branch have to be squashed and then instructions of a correct path have to be re-fetched and re-executed. This paper presents a new branch misprediction recovery mechanism to reduce the number of instructions squashed on a misprediction. Detection of control independent instructions is accomplished with the help of the static method using a profiling and the dynamic method using a control flow of program sequences. We show that the suggested branch misprediction recovery mechanism improves the performance by 2~7% on a 4-issue processor, by 4~15% on an 8-issue processor and by 8~28% on a 16-issue processor.

A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism

  • Xiangyu Ma;Yuntao Zhao;Yongxin Feng;Yutao Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.456-477
    • /
    • 2024
  • With information technology's rapid development, the Internet faces serious security problems. Studies have shown that malware has become a primary means of attacking the Internet. Therefore, adversarial samples have become a vital breakthrough point for studying malware. By studying adversarial samples, we can gain insights into the behavior and characteristics of malware, evaluate the performance of existing detectors in the face of deceptive samples, and help to discover vulnerabilities and improve detection methods for better performance. However, existing adversarial sample generation methods still need help regarding escape effectiveness and mobility. For instance, researchers have attempted to incorporate perturbation methods like Fast Gradient Sign Method (FGSM), Projected Gradient Descent (PGD), and others into adversarial samples to obfuscate detectors. However, these methods are only effective in specific environments and yield limited evasion effectiveness. To solve the above problems, this paper proposes a malware adversarial sample generation method (PixGAN) based on the pixel attention mechanism, which aims to improve adversarial samples' escape effect and mobility. The method transforms malware into grey-scale images and introduces the pixel attention mechanism in the Deep Convolution Generative Adversarial Networks (DCGAN) model to weigh the critical pixels in the grey-scale map, which improves the modeling ability of the generator and discriminator, thus enhancing the escape effect and mobility of the adversarial samples. The escape rate (ASR) is used as an evaluation index of the quality of the adversarial samples. The experimental results show that the adversarial samples generated by PixGAN achieve escape rates of 97%, 94%, 35%, 39%, and 43% on the Random Forest (RF), Support Vector Machine (SVM), Convolutional Neural Network (CNN), Convolutional Neural Network and Recurrent Neural Network (CNN_RNN), and Convolutional Neural Network and Long Short Term Memory (CNN_LSTM) algorithmic detectors, respectively.

Oil Spill Detection Mechanism using Single-wavelength LED and CCD (단일 파장의 LED와 CCD를 이용한 유출유 탐지방법)

  • Oh, Sangwoo;Lee, Moonjin
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.15 no.4
    • /
    • pp.323-329
    • /
    • 2012
  • In this study, a new optical method for oil detection using an analysis the light-absorption image of separate oil-water mixture with a LED illumination is described. To obtain an information about the presence of oil on water and the thickness of oil, the intensity of light-absorption images acquired through CCD is analyzed. To select the optimal wavelength of the light source, the experiment is conducted using several LEDs having four different wavelength. In the case of using a blue LED having 465 nm wavelength, an intensity decreasing tendency of light-absorption image is obvious and clear. To identify the applicability of sensing system at the real sea condition, experiments are conducted as varying the brightness and water surface angle. Through this research, new optical oil detection methodology is proposed using the absorption difference between water and oil with single-wavelength LED and CCD.

Implementation of Compressive Receiver with Chirp LO Based on DDS for RFID Signal Detection (DDS 기반의 Chirp LO가 적용된 RFID 신호 탐지용 컴프레시브 수신기의 구현)

  • Jo, Won-Sang;Park, Dong-Chul
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.11
    • /
    • pp.1186-1193
    • /
    • 2009
  • In this paper, we propose DDS(Direct Digital Synthesizer) as a new implementation method of chirp LO(Local Oscillator) for compressive receiver applied for RFID signal detection in UHF band. We designed a receiver whose input frequency range is 908.5~914 MHz, DDL(Dispersive Delay Line) bandwidth is 6 MHz, and dispersion delay time is $13\;{\mu}s$. Chirp LO based on DDS is designed to meet $26\;{\mu}s$ sweep time and 12 MHz bandwidth for complete compressive mechanism. The measured 3 dB pulse width of the compressed signal of the fabricated receiver is 260 ns and the frequency resolution for simultaneous input signals is below 200 kHz. These performances indicate that the proposed chirp LO based on DDS and the compressive receiver is suitable for RFID signal detection in UHF band.

Development of Malicious Traffic Detection and Prevention System by Embedded Module on Wireless LAN Access Point (무선 LAN Access Point에서 임베디드 형태의 유해 트래픽 침입탐지/차단 시스템 개발)

  • Lee, Hyung-Woo;Choi, Chang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.29-39
    • /
    • 2006
  • With the increasing popularity of the wireless network, the vulnerability issue on IEEE 802.1x Wireless Local Area Network (WLAN) are more serious than we expected. Security issues range from mis-configured wireless Access Point(AP) such as session hijacking to Denial of Service(DoS) attack. We propose a new system based on intrusion detection or prevention mechanism to protect the wireless network against these attacks. The proposed system has a security solution on AP that includes an intrusion detection and protection system(IDS/IPS) as an embedded module. In this paper, we suggest integrated wireless IDS/IPS module on AP with wireless traffic monitoring, analysis and packet filtering module against malicious wireless attacks. We also present that the system provides both enhanced security and performance such as on the university wireless campus network.

  • PDF

Overcoming OBI Problem by Means of Heterodyne Detection in Upstream Transmission of WDM/SCM-PON (WDM/SCM-PON의 상향 전송에서 헤테로다인 방식을 이용한 광간섭잡음 문제 극복방안 연구)

  • Jeon, You-Chan;Shin, Hong-Seok;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2A
    • /
    • pp.202-208
    • /
    • 2010
  • The performance of upstream transmission in SCM-PON is generally limited by the presence of OBI which is caused by the beating of two or more lasers. In this paper, we propose a novel approach for reducing OBI problem by using heterodyne detection with an additional LD as a local oscillator, resulting that the RF signal is shifted to the other spectal band. In addition, it is possible that the proposed method can provide the cost-effective solution thanks to the loop-back mechanism using R-SOA in ONUs. The performance is superior when the spectral width of LD is smaller and the power difference between the transmission LD and the oscillation LD is bigger. System configuration and design consideration are discussed. Performance of the systems is evaluated by simulator called OptSim. It is expected to provide WDM/SCM-PON system not only cost-effective but also efficient in increasing the number of subscribers.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF