• Title/Summary/Keyword: computer systems

Search Result 16,356, Processing Time 0.042 seconds

Proving an Object-Oriental interface on a Relational Database System for Switching Systems (교환기용 관계형 데이타베이스 시스템상에서의 객체지향 인터페이스 제공 기법)

  • Jeong, Hui-Taek;Lee, Gil-Haeng;Jo, Ju-Hyeon;Kim, Yong-Min;Lee, Do-Heon;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.29-53
    • /
    • 1997
  • Conventional switching systems have been using flat file systems or relational database systems to deal with their operational data. However, newly emerged requirements for advanced switching systems make relational database systems no longer proper solutions. This paper defines object-oriented interfaces that effectively incorporate data characteristics of switching systems. In addition, it exemplifies how the method works on an actual database systems for the TDX-10 switching system.

  • PDF

Stability of Sampled-Data Control Systems with Computer Interruptions (투명 PLZT 세라믹의 전기적 및 광 메모리 특성)

  • Jang, Seong-Whan
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.36 no.7
    • /
    • pp.476-483
    • /
    • 1987
  • This paper analyzes centralized sampled-data control systems with feedback loops which are closed through a digital computer which generates deadbeat control law. Intermittant computer interruptions result in failure to update the desired deadbeat design procedures for the deadbeat control law under normal operation of the control computer and the assumption of any admissible computer interruption are resented. A method that guarantees asymptotic stability under all admissible computer interruptions also is presented.

  • PDF

Personal Data Security in Recruitment Platforms

  • Bajoudah, Alya'a;AlSuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.310-318
    • /
    • 2022
  • Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.

Design for Supporting Interoperation between Heterogeneous Networks in Personal Robot System

  • Choo, Seong-Ho;Li, Vitaly;Jang, Ik-Gyu;Park, Tae-Kyu;Jung, Ki-Duk;Choi, Dong-Hee;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.820-824
    • /
    • 2004
  • Personal Robot System in developing, have a module architecture, each module are connected through heterogeneors network systems like Ethernet, WLAN (802.11), IEEE1394 (Firewire), Bluetooth, USB, CAN, or RS-232C. In developing personal robot system we think that the key of robot performance is interoperability among modules. Each network protocol are well connected in the view of network system for the interoperability. So we make a bridging architecture that can routing, converting, transporting data packets with matcing each network's properties. Furthermore we suggest a advanced design scheme for realtime / non-realtime and control signal (short, requiring hard-realtime) / multimedia data (large, requiring soft-realtime). By some application systems, we could test performance, interoperability and stability. In this paper, we show our design concept, middleware architecture, and some applications systems using this middleware.

  • PDF

EVALUATION OF SPEED AND ACCURACY FOR COMPARISON OF TEXTURE CLASSIFICATION IMPLEMENTATION ON EMBEDDED PLATFORM

  • Tou, Jing Yi;Khoo, Kenny Kuan Yew;Tay, Yong Haur;Lau, Phooi Yee
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.89-93
    • /
    • 2009
  • Embedded systems are becoming more popular as many embedded platforms have become more affordable. It offers a compact solution for many different problems including computer vision applications. Texture classification can be used to solve various problems, and implementing it in embedded platforms will help in deploying these applications into the market. This paper proposes to deploy the texture classification algorithms onto the embedded computer vision (ECV) platform. Two algorithms are compared; grey level co-occurrence matrices (GLCM) and Gabor filters. Experimental results show that raw GLCM on MATLAB could achieves 50ms, being the fastest algorithm on the PC platform. Classification speed achieved on PC and ECV platform, in C, is 43ms and 3708ms respectively. Raw GLCM could achieve only 90.86% accuracy compared to the combination feature (GLCM and Gabor filters) at 91.06% accuracy. Overall, evaluating all results in terms of classification speed and accuracy, raw GLCM is more suitable to be implemented onto the ECV platform.

  • PDF

Privacy-Preserving in the Context of Data Mining and Deep Learning

  • Altalhi, Amjaad;AL-Saedi, Maram;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.137-142
    • /
    • 2021
  • Machine-learning systems have proven their worth in various industries, including healthcare and banking, by assisting in the extraction of valuable inferences. Information in these crucial sectors is traditionally stored in databases distributed across multiple environments, making accessing and extracting data from them a tough job. To this issue, we must add that these data sources contain sensitive information, implying that the data cannot be shared outside of the head. Using cryptographic techniques, Privacy-Preserving Machine Learning (PPML) helps solve this challenge, enabling information discovery while maintaining data privacy. In this paper, we talk about how to keep your data mining private. Because Data mining has a wide variety of uses, including business intelligence, medical diagnostic systems, image processing, web search, and scientific discoveries, and we discuss privacy-preserving in deep learning because deep learning (DL) exhibits exceptional exactitude in picture detection, Speech recognition, and natural language processing recognition as when compared to other fields of machine learning so that it detects the existence of any error that may occur to the data or access to systems and add data by unauthorized persons.

Adversarial Machine Learning: A Survey on the Influence Axis

  • Alzahrani, Shahad;Almalki, Taghreed;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.193-203
    • /
    • 2022
  • After the everyday use of systems and applications of artificial intelligence in our world. Consequently, machine learning technologies have become characterized by exceptional capabilities and unique and distinguished performance in many areas. However, these applications and systems are vulnerable to adversaries who can be a reason to confer the wrong classification by introducing distorted samples. Precisely, it has been perceived that adversarial examples designed throughout the training and test phases can include industrious Ruin the performance of the machine learning. This paper provides a comprehensive review of the recent research on adversarial machine learning. It's also worth noting that the paper only examines recent techniques that were released between 2018 and 2021. The diverse systems models have been investigated and discussed regarding the type of attacks, and some possible security suggestions for these attacks to highlight the risks of adversarial machine learning.

Design and Implementation of the RF Systems for Bi-directional Wireless Capsule Endoscopes

  • Moon, Yeon-Kwan;Lee, Jyung-Hyun;Park, Hee-Joon;Lee, Ju-Gab;Ryu, Jae-Jong;Lee, Wu-Seong;Woo, Sang-Hyo;Won, Chul-Ho;Cho, Jin-Ho;Choi, Hyun-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1669-1680
    • /
    • 2006
  • This paper explains that the RF systems for hi-directional wireless capsule endoscopes were designed and implemented. The designed RF systems for a capsule endoscope can transmit the images of intestines from the inside to the outside of a body and the behavior of the capsules can be controlled by an external controller simultaneously. The hi-directional wireless capsule endoscope consists of a CMOS image sensor, FPGA, LED, battery, DC to DC Converter, transmitter, receiver, and antennas. The transmitter and receiver which were used in the hi-directional capsule endoscope, were designed and fabricated with $10mm(diameter){\times}3.2mm(thickness)$ dimensions taking into the MPE, power consumption, system size, signal to noise ratio and modulation method. The RF systems designed and implemented for the hi-directional wireless capsule endoscopes system were verified by in-vivo experiments. As a result, the RF systems for the hi-directional wireless capsule endoscopes satisfied the design specifications.

  • PDF

Robust Stability and Disturbance Attenuation for a Class of Uncertain Singularly Perturbed Systems

  • Karimi, H.R.;Yazdanpanah, M.J.
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.3 no.3
    • /
    • pp.164-169
    • /
    • 2001
  • This paper considers the problem of robust stabilization and disturbance attenuation for a class of uncertain singularly perturbed systems with norm-bounded nonlinear uncertainties. It is shown that the state feedback gain matrices can be determined to guarantee the stability of the closed-loop system for all $\varepsilon$$\in$(0, $\infty$). Based on this key result and some standard Riccati inequality approaches for robust control of singularly perturbed systems, a constructive design procedure is developed.

  • PDF

Development of the Operational Architecture of Ventilative Nuclear Biological Chemical Collective Protection Systems (통풍형 화생방집단보호시설의 운용아키텍처 개발)

  • Kwon, Yong-Soo;Lee, Hun-Hee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.8 no.4 s.23
    • /
    • pp.41-49
    • /
    • 2005
  • This work describes the ventilative NBC CPS(Nuclear Biological and Chemical Collective Protection Systems). The operational requirements of NBC CPS is derived using systems engineering approach. The NBC CPS system operational architecture which describes the operational concept of NBC CPS is proposed using a computer aided systems engineering tool.