• Title/Summary/Keyword: Obstacle information

Search Result 782, Processing Time 0.026 seconds

Efficient Indirect Branch Predictor Based on Data Dependence (효율적인 데이터 종속 기반의 간접 분기 예측기)

  • Paik Kyoung-Ho;Kim Eun-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.1-14
    • /
    • 2006
  • The indirect branch instruction is a most substantial obstacle in utilizing ILP of modem high performance processors. The target address of an indirect branch has the polymorphic characteristic varied dynamically, so it is very difficult to predict the accurate target address. Therefore the performance of a processor with speculative methodology is reduced significantly due to the many execution cycle delays in occurring the misprediction. We proposed the very accurate and novel indirect branch prediction scheme so called data-dependence based prediction. The predictor results in the prediction accuracy of 98.92% using 1K entries, and. 99.95% using 8K But, all of the proposed indirect predictor including our predictor has a large hardware overhead for restoring expected target addresses as well as tags for alleviating an aliasing. Hence, we propose the scheme minimizing the hardware overhead without sacrificing the prediction accuracy. Our experiment results show that the hardware is reduced about 60% without the performance loss, and about 80% sacrificing only the performance loss of 0.1% in aspect of the tag overhead. Also, in aspect of the overhead of storing target addresses, it can save the hardware about 35% without the performance loss, and about 45% sacrificing only the performance loss of 1.11%.

The Model of Network Packet Analysis based on Big Data (빅 데이터 기반의 네트워크 패킷 분석 모델)

  • Choi, Bomin;Kong, Jong-Hwan;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.392-399
    • /
    • 2013
  • Due to the development of IT technology and the information age, a dependency of the network over the most of our lives have grown to a greater extent. Although it provides us to get various useful information and service, it also has negative effectiveness that can provide network intruder with vulnerable roots. In other words, we need to urgently cope with theses serious security problem causing service disableness or system connected to network obstacle with exploiting various packet information. Many experts in a field of security are making an effort to develop the various security solutions to respond against these threats, but existing solutions have a lot of problems such as lack of storage capacity and performance degradation along with the massive increase of packet data volume. Therefore we propose the packet analysis model to apply issuing Big Data technology in the field of security. That is, we used NoSQL which is technology of massive data storage to collect the packet data growing massive and implemented the packet analysis model based on K-means clustering using MapReudce which is distributed programming framework, and then we have shown its high performance by experimenting.

Design of Communication Protocol for Developing WISDOM(Wireless Interface Signal Control System for Dynamic and Optimal Management) (WISDOM(차세대 신호제어시스템) 개발을 위한 통신 프로토콜 설계)

  • Jung, Sung-Dae;Lee, Sang-Sun;Yoon, Young-Bum;Kim, Jong-Bok;Moon, Young-Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.1
    • /
    • pp.92-100
    • /
    • 2008
  • The existing transportation systems is emerged as a major obstacle to solve the problems such as a traffic jam and the increasing cost for a distribution and a traffic safety. In hun, ITS targeting intellectual vehicles and transportation infrastructure like road and signals is getting more important and the standards of ITS wireless communication is also getting attention. New traffic control strategies are being developed to utilize real-time traffic information collected by detection method using ITS wireless technology. Especially, DSRC system is being expanded wit ETCS and the use of OBU is spreading. These infrastructures will have much influence on ITS industry and a profound study on the method of utilizing a present infrastructure is going on in various fields. The optimum traffic signal control system using quality real-time information through these infrastructure is under development and so is WISDOM. Accordingly, this paper proposes communication protocol utilizing DSRC to collect real-time traffic information in WISDOM.

  • PDF

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Data Product Value Evaluation Method for Data Exchange Platform (데이터거래 활성화를 위한 데이터상품가치 평가모델 연구)

  • Kim, Sujin;Lee, Junghyun;Park, Cheonwoong
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.34-46
    • /
    • 2021
  • In the domestic data exchanging market, unreasonable pricing of purchase data is consistently mentioned as a major obstacle in data trading. This is a problem caused by the inability to properly evaluate the value of data products due to lack of product information and experience in using them. In order to activate trading, the data exchanges need to provide information that allows consumers to comprehensively judge the value of data products in addition to prices. The cost-based, income-based, and market-based methods, which are mainly applied to data valuation, are insufficient as data valuation methods to stimulate trading and distribution because only price information, a result of valuation from a supplier's point of view, can be shared with consumers. This study aims to develop a measurable valuation method that allows data trading stakeholders (exchanges, suppliers, and consumers) to judge and share the value of data products from a common perspective. To this end, we identified the value drivers of data products, which are considered important in overseas data exchanges and related research, and derived an evaluation method that can quantitatively measure each value driver. In addition, evaluation criteria in the form of a rating table were developed using data products for transactions, and a value evaluation index was developed through stratification analysis (AHP) to enable relative value comparison. As a result of applying the evaluation criteria to actual data products, it was found that the evaluation values were differentiated according to the characteristics of individual data products, so it could be used as a relative value comparison tool.

A Study on the 3D Precise Modeling of Old Structures Using Merged Point Cloud from Drone Images and LiDAR Scanning Data (드론 화상 및 LiDAR 스캐닝의 정합처리 자료를 활용한 노후 구조물 3차원 정밀 모델링에 관한 연구)

  • Chan-hwi, Shin;Gyeong-jo, Min;Gyeong-Gyu, Kim;PuReun, Jeon;Hoon, Park;Sang-Ho, Cho
    • Explosives and Blasting
    • /
    • v.40 no.4
    • /
    • pp.15-26
    • /
    • 2022
  • With the recent increase in old and dangerous buildings, the demand for technology in the field of structure demolition is rapidly increasing. In particular, in the case of structures with severe deformation of damage, there is a risk of deterioration in stability and disaster due to changes in the load distribution characteristics in the structure, so rapid structure demolition technology that can be efficiently dismantled in a short period of time is drawing attention. However, structural deformation such as unauthorized extension or illegal remodeling occurs frequently in many old structures, which is not reflected in structural information such as building drawings, and acts as an obstacle in the demolition design process. In this study, as an effective way to overcome the discrepancy between the structural information of old structures and the actual structure, access to actual structures through 3D modeling was considered. 3D point cloud data inside and outside the building were obtained through LiDAR and drone photography for buildings scheduled to be blasting demolition, and precision matching between the two spatial data groups was performed using an open-source based spatial information construction system. The 3D structure model was completed by importing point cloud data matched with 3D modeling software to create structural drawings for each layer and forming each member along the structure slab, pillar, beam, and ceiling boundary. In addition, the modeling technique proposed in this study was verified by comparing it with the actual measurement value for selected structure member.

Barriers to University Librarians' Research Utilization (대학도서관 사서의 연구활용 장애)

  • Lee, Eun-Chul;Kim, Kap-Seon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.1
    • /
    • pp.77-91
    • /
    • 2004
  • The present study surveyed university librarians' perceptions of barriers to research utilization using the Barrier Scales. The results shows that in mean Barriers Scale scores, characteristics of the organization had the highest, and then followed by the communication, the research and the librarian. The most important factor was perceived to be organizational support relating to insufficient time to implement new ideas, inadequate facilities, and lack of authority to make changes and in the communication relating to lack of clarity of research implications for practice, lack to demonstrate research's relevance to practice, and lack of readability of research. Also, incomprehensible English research reports and statistical analyses were perceived as major barriers. The comparison with those of nursing was discussed. In order to settle the barriers identified, librarians should be educated to have 'research literacy' and organazational merit and reward systems were reinforced for research utilization. Also, it needs to explore librarians' specific experiences of barriers in utilizing process in practice. In further research, by integrating both the result of the quantitative and qualitative research, it needs to develop and to assess a standard measurement for librarians' barriers of research utilization in national and international context.

The Effects of the Export Insurance on the Exports of Big and Small-Medium Businesses (수출보험의 대기업 및 중소기업 수출지원에 대한 효과분석)

  • Lee, Seo-Young
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.377-401
    • /
    • 2011
  • Under the WTO system, direct export support system that provides financial and tax related support is altogether prohibited. This presented an obstacle in strengthening competitiveness of Korean export business and in increasing exports continuously. One of the methods used to solve this problem was to actively leverage export insurance. In Korea, export insurance services have been conducted by the Korea Trade Insurance Corporation (k-sure) to promote export. Korea has been among the world's active users of the export insurance system. Given this situation, this paper examines the effectiveness of the Korea export insurance system in the promotion of export. In particular, this study analyzed about discriminating effects of the export insurance on the export of big and small-medium business. In order to analyze, We introduce a Export Supply Function model. In this paper, We construct two model. The one is about big business, the other is small-medium business. For empirical analysis, unit-root test was conducted to understand the safety of time series. The results show that all variables are not I(0) time series. Instead, they are I(1) time series. To this, cointegration verification was conducted based on the use of Johansen verification method to define the existence (or non-existence) of long-term balance relationship among variables. The results come out as follows. The export insurance of big business has a stronger effect on export than that of small-medium business. The cause of these results is due to the distinct structure of Korea industries. In view of the fact that the insurance can make the risk decreased. We can say that the export insurance affects the export of a high-risk country.

  • PDF

Development of the Algofithm for Gaussian Mixture Models based Traffic Accident Auto-Detection in Freeway (GMM(Gaussian Mixture Model)을 적용한 영상처리기법의 연속류도로 사고 자동검지 알고리즘 개발)

  • O, Ju-Taek;Im, Jae-Geuk;Yeo, Tae-Dong
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.3
    • /
    • pp.169-183
    • /
    • 2010
  • Image-based traffic information collection systems have entered widespread adoption and use in many countries since these systems are not only capable of replacing existing loop-based detectors which have limitations in management and administration, but are also capable of providing and managing a wide variety of traffic related information. In addition, these systems are expanding rapidly in terms of purpose and scope of use. Currently, the utilization of image processing technology in the field of traffic accident management is limited to installing surveillance cameras on locations where traffic accidents are expected to occur and digitalizing of recorded data. Accurately recording the sequence of situations around a traffic accident in a freeway and then objectively and clearly analyzing how such accident occurred is more urgent and important than anything else in resolving a traffic accident. Therefore, in this research, existing technologies, this freeway attribute, velocity changes, volume changes, occupancy changes reflect judge the primary. Furthermore, We pointed out by many past researches while presenting and implementing an active and environmentally adaptive methodology capable of effectively reducing false detection situations which frequently occur even with the Gaussian Mixture model analytical method which has been considered the best among well-known environmental obstacle reduction methods. Therefore, in this way, the accident was the final decision. Also, environmental factors occur frequently, and with the index finger situations, effectively reducing that can actively and environmentally adaptive techniques through accident final judgment. This implementation of the evaluate performance of the experiment road of 12 incidents in simulated and the jang-hang IC's real-time accident experiment. As a result, the do well detection 93.33%, false alarm 6.7% as showed high reliability.