• Title/Summary/Keyword: Log Generation

Search Result 121, Processing Time 0.027 seconds

Design and Implementation of Event Analysis/Arrange Function for Mobile Device Simulator (모바일 디바이스 시뮬레이터용 이벤트 분석 및 배열 기능의 설계 및 구현)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1429-1434
    • /
    • 2010
  • Generally, the simulator for mobile device tests automatically an application software after instilling again the event, which is saved in log file according to an event generation sequence, into the application software of device. But, the simulator performance for mobile device can be different according to a extraction layer even if the events are same. And, the sequence of events extracted from an application is changeable in the environment that multiple applications are operated concurrently. Therefore, even though the same applications is executed to the same sequence, the generation sequence of events is revised in accordance with the state of mobile device system, and whether the errors occur according to circumstances or not. This kind of application software error is very difficult to perform a debugging operation. In this paper, the execution state of various applications is verifiable through the re-editing of events after analyzing the events which is generated in application, kernel, middleware layer, and the event arrange/editor is designed and implemented to understand efficiently the influence on application, kernel, and middleware layer for events.

A Low Complexity Candidate List Generation for MIMO Iterative Receiver via Hierarchically Modulated Property (MIMO Iterative 수신기에서 계층적 변조 특성을 이용한 낮은 복잡도를 가지는 후보 리스트 발생 기법)

  • Jeon, Eun-Sung;Yang, Jang-Hoon;Kim, Dong-Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.500-505
    • /
    • 2009
  • In this paper, We present a low complexity candidate list generation scheme in iterative MIMO receiver. Since QAM modulation can be decomposed into HP symbols and LP symbol and HP symbol is robust in error capability, we generate HP symbol list with simple ZF detector output and its corresponding neighbor HP symbols, Then, based on HP symbol list, the LP symbol list is generated by using the sphere decoder. From the second iteration, since apriori value from channel decoder is available, the candidate list is updated based on demodulated apriori value. Through the simulation, we observe that at the first iteration, the BER performance is worse than LSD. However, as the number of iteration is increased, the proposed scheme has almost same performance as LSD. Moreover, the proposed one has reduced candidate list generation time and lower number of candidate list compared with LSD.

Fashion Blogging and Personal Style Bloggers: The Evolving Enterprise

  • Reddy, Shweta Linga
    • International Journal of Costume and Fashion
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • This study examines existing literature and uses case studies to identify the scope of fashion blogging and the evolving role of the personal style bloggers in the fashion business. Information on six popular personal style bloggers has been gathered to demonstrate the evolving business of these bloggers and their scope of operations that are relevant to fashion. The case of these six bloggers were drawn from popular media publications such as CNN, Wall Street Journal (WSJ), Time, Women's Wear Daily (WWD) and The New York Times. The case study of these six bloggers reveals that these personal style bloggers have used their reach and influence on the blog audience to procure and access business opportunities to grow their enterprise. The findings indicate that affiliation, partnership or collaboration with brands or established designers adds more value to a personal style bloggers resume. However, the findings also indicate that the popular fashion bloggers provide a new opportunity for marketing and promoting fashion brands and products to the younger generation.

Attack Tree Generation and Real-Time Attack Detection System Using Log Analysis (로그 분석을 이용한 공격 트리 생성과 실시간 공격 탐지 시스템)

  • Kim, Duhoe;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.207-210
    • /
    • 2017
  • 최근 국방부는 우리 군이 운영하는 내부망이 해킹에 의해 공격당한 사실을 발표했다. 국방부는 내부망은 외부와의 망 분리를 통해 안전하게 관리되고 있다고 밝혔지만, 이번 사건으로 군에서 사용하는 내부망에도 악성코드 공격이 가능한 취약점이 존재한다는 사실이 밝혀졌다. 본 논문에서는 국방부에서 사용되는 내부망과 일반적으로 사용하는 외부망에서도 보안을 강화할 수 있는 시스템을 개발했다. 본 시스템은 공격 등급을 적용한 트리를 생성하여 일정 수준이 되면 사용자에게 알리고 공격에 이르기 전에 시스템 단에서 차단이 가능하다. 본 논문에서 개발한 시스템을 사용하면 중요한 국가기밀자료나 지적 재산이 높은 자료를 가진 국가 및 기업들이 데이터를 보호 할 수 있고 시스템이 파괴당하는 것을 사전에 방지하여 물리적인 측면도 이점을 얻을 수 있다.

Automating Configuration System and Protocol for Next-Generation Home Appliances

  • Lee, Eun-Seo;Lee, Hark-Jin;Lee, Kwangil;Park, Jun-Hee
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1094-1104
    • /
    • 2013
  • Home appliance manufacturers have recently been trying to provide smart products capable of various Internet services. For example, one health care manufacturer provides a Wi-Fi-capable scale. Once users register their information with the manufacturer's server, their weight and body fat records are automatically uploaded to the server whenever they measure their weight. The users can then watch and check their weight log easily using a smart device, such as a smartphone or tablet. One of the biggest problems, however, is that the initial configuration of the appliances and the user registration process may be quite complicated to typical users who are unfamiliar with such IT devices. This paper proposes an autoconfiguration system structure and protocol for Internet-capable home appliances, which supports the initial configuration and remote maintenance service of the device with only little user effort. Manufacturers can develop their own information appliances and provide differentiated services using the proposed system and protocol.

A Field Investigation of Defect Type for Development of Maintenance Manual of Han-ok (한옥 유지관리매뉴얼 개발을 위한 결함 유형 현장 조사)

  • Lee, Jong Shin;Choi, Gwang Sik;Yang, Jeong Moo
    • Journal of the Korea Furniture Society
    • /
    • v.24 no.3
    • /
    • pp.302-308
    • /
    • 2013
  • To collection of field data for development of maintenance manual of Han-ok, we investigated defects which occurred in members of Han-ok by field investigation. The noticeable defects were wood cracks, gaps that developed between wood pillar and wall or wood window frame and tenon joints. The most common biological defect was blue stain which was created in log. The mold generation was observed on exterior wood and wall which get wet by precipitation. The gaps between members of Han-ok pointed out as defect that is urgently improved by residents of Han-ok. The reason is mainly due to poor of insulation in winter by bad confidentiality. The maintenance work of defect such as gap was conducted personally. As a result, the repair parts were ugly for unfamiliar repair work.

  • PDF

Generation of Internet Server Profile Using Packet Mining (패킷 마이닝 기법을 사용한 인터넷 서버 프로파일의 자동생성 연구)

  • Kwak, Mi-Ra;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.39-41
    • /
    • 2002
  • Management of internal Internet servers is increasingly becoming an important task. According to meet this requirement, they use service log analysis tools and network monitoring tools. But these are not enough to produce advanced management information considering contents of Internet services. Therefor we propose a system and let it detect Internet server systems existing in internal network and individuate those systems with providing profile. Internet server profile includes system's basic information, network traffic information, and Internet service usage information.

  • PDF

Design and Pattern Generation for the Detection of Delay Faults In IEEE 1149.1 Boundary Scan (지연고장 점검을 위한 IEEE 1149.1 Boundary Scan 설계 및 패턴 생성)

  • 김태형;박성주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10c
    • /
    • pp.662-664
    • /
    • 1998
  • IEEE 1149.1 바운다리스캔은 보드 수준에서 고장점검 및 진단을 위한 테스트 설계기술이다. 그러나, 바운다리스캔 제어기의 특성상 테스트 패턴의 주입에서 관측까지 2.5 TCK가 소요되므로, 연결선상의 지연고장을 점검할 수 없다. 본 논문에서는 Update_DR 신호를 변경하여, 테스트 패턴 주입에서 관측까지 1 TCK가 소요되게 함으로써, 지연고장 점검을 가능하게 하는 기술을 소개한다. 나아가서, 정적인 고장점검을 위한 테스트 패턴을 개선해 지연고장 점검까지 가능하게 하는, N개의 net에 대한 2log(N+2)의 새로운 테스트패턴도 제안한다. 설계와 시뮬레이션을 통해 지연고장 점검이 가능함을 확인하였다.

  • PDF

DESIGN OF COMMON TEST HARNESS SYSTEM FOR SATELLITE GROUND SEGMENT DEVELOPMENT

  • Seo, Seok-Bae;Kim, Su-Jin;Koo, In-Hoi;Ahn, Sang-Il
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.544-547
    • /
    • 2007
  • Because data processing systems in recent years are more complicated, main function of the data processing is divided as several sub-functions which are implemented and verified in each subsystem of the data processing system. For the verification of data processing system, many interface tests among subsystems are required and also a lot of simulation systems are demanded. This paper proposes CTHS (Common Test Harness System) for satellite ground segment development which has all of functions for interface test of the data processing system in one PC. Main functions of the CTHS software are data interface, system log generation, and system information display. For the interface test of the data processing system, all of actions of the CTHS are executed by a pre-defined operation scenario which is written by purpose of the data processing system test.

  • PDF

Development of Plot Design Tool for Life Log Story Generation Using Petri Net (Petri Net을 이용한 모바일 라이프 스토리 생성을 위한 플롯 디자인 도구의 개발)

  • Lee, Young-Seol;Cho, Sung-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.272-275
    • /
    • 2007
  • 사람들은 자신의 삶을 기록하고자 하는 욕구를 충족시키기 위하여 일기를 쓰거나 사진을 찍어 기록을 남긴다. 이전의 연구에서는 사람의 삶을 기록하는 방법으로서 Petri Net과 사용자 컨텍스트를 이용하여 모바일 라이프 로그로부터 사용자의 일상생활을 반영하는 스토리를 생성하고자 시도하였다. 이전 연구에서 Petri Net을 이용하여 플롯을 생성하는 과정을 기존의 Petri Net 툴로 진행하였기 때문에 일반적인 Petri Net과 플롯사이에 존재하는 차이점을 반영하기 어려웠으며 플롯 제작에 있어서 일반적인 Petri Net 툴로 디자인 한 후에 스토리 엔진을 위한 포맷으로 변형하여야 했기 때문에 디자인과 변환에 많은 시간이 소요되었다. 본 논문에서는 Petri Net을 이용하여 플롯을 구성하기 위하여 스토리 생성에 필요한 개념을 추가적으로 정의하고 추가된 개념들을 잘 나타내기 위한 도구를 작성하여 Petri Net으로 스토리를 디자인하기 위한 보다 편리한 방법을 제안한다. 또한 제안하는 방법의 유용성을 평가한다.

  • PDF