• Title/Summary/Keyword: a kind of computer OS

Search Result 10, Processing Time 0.029 seconds

A Study for Improvement Effect of Paralleled Genetic Algorithm by Using Clustering Computer System (클러스터링 컴퓨터 시스템을 이용한 병렬화 유전자 알고리즘의 효율성 증대에 대한 연구)

  • 이원창;성활경;백영종
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2004.04a
    • /
    • pp.430-438
    • /
    • 2004
  • Among the optimization method, GA (genetic algorithm) is a very powerful searching method enough to compete with design sensitivity analysis method. GA is very easy to apply, since it dose not require any design sensitivity information. However, GA has been computationally not efficient due to huge repetitive computation. In this study, parallel computation is adopted to Improve computational efficiency, Paralleled GA is introduced on a clustered LINUX based personal computer system.

  • PDF

A Study for Improvement Effect of Paralleled Genetic Algorithm by Using Clustering Computer System (클러스터링 컴퓨터 시스템을 이용한 병렬화 유전자 알고리듬의 효율성 증대에 대한 연구)

  • 이원창;주지한;성활경
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.4
    • /
    • pp.189-196
    • /
    • 2003
  • Among the optimization method, GA (genetic algorithm) is a very powerful searching method enough to compete with design sensitivity analysis method. GA is very easy to apply, since it dose not require any design sensitivity information. However, GA has been computationally not efficient due to huge repetitive computation. In this study, parallel computation is adopted to improve computational efficiency. Paralleled GA is introduced on a clustered LINUX based personal computer system.

Implementation of Embedded Educational Router System (임베디드 교육용 라우터 실습장비의 구현)

  • Park, Gyun Deuk;Chung, Joong Soo;Jung, Kwang Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.9-17
    • /
    • 2013
  • This paper presents the design of the educational router system. This system is designed and implemented to support network configuration and embedded programming technology of the user on Internet. Not only Static routing protocol but also a kind of dynamic routing protocols such as OSPF and RIP and firewall have been programmed for education based on ethernet interface. ADS 1.2 as debugging environment, uC/OS-ii as RTOS and C language as development language are used. The educational procedures is compile, loading of static routing protocol, a kind of dynamic routing protocols such as OSPF and RIP and firewall program already supplied. Thereafter the verification is checked by using "ping" test to allow for demo operation such as hands-on training procedure. Finally programming procedure similar with demo operation of static routing protocol, a kind of dynamic routing protocols such as OSPF and RIP and packet filtering function is educated step by step.

A Development of Intelligent Electronic Device(IED) for Electric Power System applied embedded OS (임베디드 OS를 적용한 전력용 디지털 장치의 개발)

  • Oh, Jae-Hoon;Kwon, Hyo-Chul;Oh, Sung-Min;Hong, Jung-Ki
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.936-937
    • /
    • 2008
  • As a micro computer or micro processor technology has been advanced, the essential part which consists of electric power system has been changed into intelligent electronic device(IED), that is one kind of embedded system. There are already many parts changed into digital from analog in control and maintenance devices of electric system. These trends make advanced and novel concepts of devices and systems, that we couldn't even imagine in the analog circumstances. Now, the rate's of change is comparatively slower than IT field that is mainly represented by mobile communication, but that is a big change in the history of electric industries. Some people in those field called it Power-IT, and there have been many kinds of researches. Accelerated systems to go digital, users always and continuously demand more convenient, practical, and new functions. So, a lot of electric system manufactures have had tasks realizing many kinds of functions in an electronic device. According to the high-end technologies in semi-conductor and micro-computer field, manufactures can fully satisfy almost all of customer's needs, but there are other kinds of problems, such as large amount of program code, increasing complexity in proportion with program amount, and the hardness of maintenance and revision of the program. So nowadays, the necessity of embedded OS was emerged as a solution, and many researchers and manufactures have concentrated on studies related to embedded OS and its application.

  • PDF

Supplementary Event-Listener Injection Attack in Smart Phones

  • Hidhaya, S. Fouzul;Geetha, Angelina;Kumar, B. Nandha;Sravanth, Loganathan Venkat;Habeeb, A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4191-4203
    • /
    • 2015
  • WebView is a vital component in smartphone platforms like Android, Windows and iOS that enables smartphone applications (apps) to embed a simple yet powerful web browser inside them. WebView not only provides the same functionalities as web browser, it, more importantly, enables a rich interaction between apps and webpages loaded inside the WebView. However, the design and the features of WebView lays path to tamper the sandbox protection mechanism implemented by browsers. As a consequence, malicious attacks can be launched either against the apps or by the apps through the exploitation of WebView APIs. This paper presents a critical attack called Supplementary Event-Listener Injection (SEI) attack which adds auxiliary event listeners, for executing malicious activities, on the HTML elements in the webpage loaded by the WebView via JavaScript Injection. This paper also proposes an automated static analysis system for analyzing WebView embedded apps to classify the kind of vulnerability possessed by them and a solution for the mitigation of the attack.

Web-based Real Environment Monitoring Using Wireless Sensor Networks

  • Lee, Gil-Jae;Kong, Jong-Uk;Kim, Min-Ah;Byeon, Ok-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.207-210
    • /
    • 2005
  • Ubiquitous computing is one of the key technology areas in the "Project on Development of Ubiquitous computing and network technology" promoted by the Ministry of Science and Technology as a frontier business of the $21^{st}$ century in Korea, which is based on the new concept merging physical space and computer-based cyber space. With recent advances in Micro Electro Mechanical System (MEMS) technology, low cost and low-power consumption wireless micro sensor nodes have been available. Using these smart sensor nodes, there are many activities to monitor real world, for example, habitat monitoring, earthquake monitoring and so on. In this paper, we introduce web-based real environment monitoring system incorporating wireless sensor nodes. It collects sensing data produced by some wireless sensor nodes and stores them into a database system to analyze. Our environment monitoring system is composed of a networked camera and environmental sensor nodes, which are called Mica2 and developed by University of California at Berkeley. We have modified and ported network protocols over TinyOS and developed a monitoring application program using the MTS310 and MTS420 sensors that are able to observe temperature, relative humidity, light and accelerator. The sensed data can be accessed user-friendly because our environment monitoring system supports web-based user interface. Moreover, in this system, we can setup threshold values so the system supports a function to inform some anomalous events to administrators. Especially, the system shows two useful pre-processed data as a kind of practical uses: a discomfort index and a septicity index. To make both index values, the system restores related data from the database system and calculates them according to each equation relatively. We can do enormous works using wireless sensor technologies, but just environment monitoring. In this paper, we show just one of the plentiful applications using sensor technologies.

  • PDF

A Study on Implementation for Wireless Gas Sensor Data Transmission Platform using ARM11 and Linux (ARM11 과 Linux 기반의 무선 가스 센서 데이터 전송용 플랫폼 구현)

  • Sun, Hee-Gab;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.1022-1029
    • /
    • 2009
  • What Ubiquitous means "being or existing anywhere, anytime"in Latin, which is, in other words, the users are able to access the network no matter where they are, what kind of network or computer terminals they use. This paper focuses on the implementation of hardware system. The first part of the sytem is the sensor node which transmits the sensor data from node to ARM11 platform through the Zigbee network wirelessly. The other part of the system is the ARM11 platform which receives and displays the sensor data. ARM11 platform is sink node. The ARM11 platform is based on ARM11 architecture and ported with Linux OS. Qtopia is used as Window Manager in order to make applications. The highly efficient ARM11 processor, S3C6400 MPC is the main part of the ARM11 platform.

A New Intruder Traceback Mechanism based on System Process Structure (시스템 프로세스 구조에 기반을 둔 침입자 추적 메커니즘)

  • 강형우;김강산;홍순좌
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.233-239
    • /
    • 2004
  • In this paper, we describe a defense mechanism to cope with stepping stones attacks in high-speed networks. (Stepping stones Attacker launches attacks not from their own computer but from intermediary hosts that they previously compromised.) We aim at tracing origin hacker system, which attack target system via stepping stones. There are two kind of traceback technology ; IP packet traceback, or connection traceback. We are concerned with connection traceback in this paper. We propose a new host-based traceback. The purpose of this paper is that distinguish between origin hacker system and stepping stones by using process structure of OS(Operating System).

  • PDF

A Study on the online of PDF Electronic Documents System (인터넷 원거리출판의 응용과 PDF의 인쇄활용에 관한 연구)

  • 유영수;강영립;김병현;이광수
    • Proceedings of the Korean Printing Society Conference
    • /
    • 2001.06a
    • /
    • pp.63-77
    • /
    • 2001
  • PDF(Portable Document Format) is a file format that Adobe advances postscritp technique and use in managing document information or electric publishing(internet, CD-ROM, DVD). PDF is a devised document type for being able to read and print anywhere, independent of OS, printer type, resolution, and the kind of computer etc. Because this includes a compressing function, it transfers document through a small size of file in internet or intranet. In addition, that is a file format has various advantages-sharing of information and transfering documents in on line or off line environment. In this paper, we developed electronic document system using PDF format. Electronic document system consists of filter, automatic indexing, special searching system and web server. The information used in this paper is database made using Zwon\`s DocuCom. The filter recognizes various kinds of document structure. And according to property of document, it produces ASCII output. In addition to processing various formats of document, the filter can extract keywords in documents of MS WORD, Excel, Powerpoint, PDF, CAD etc. This filter uses the structure of window printer drive and can extract the information for text, page, font type and size from relevant document. The automatic indexing recognizes the formatted tag of document form ASCII text produced by filter and extracts adequate keyword to structure and property of document. PDF electronic document systems proposed in this paper can be used in Internet, PC communication. Users can choose and read electronic documents by two ways. First, users can choose and read relevant books using PDF electronic document homepage. Second, users can use PDF integrated-search system. User can search after inputing keyword and choose reference field and type of data. But, now, PDF products of Adobe can\`t support the Korean character. If this problem is resolved, we thick that PDF applications system looks active. Although there is limited function in case of using Zwon DocuCom used in this study, we think that there isn\`t a great deal of difficulty in electronic document and building digital database.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.