• Title/Summary/Keyword: host-based

Search Result 1,640, Processing Time 0.036 seconds

The architecture of a multiprocessor based programmable controller with emphasis on its system bus (다중 프로세서 방식의 프로그램형 제어기의 구조와 시스템 버스)

  • 김종일;권욱현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10a
    • /
    • pp.407-413
    • /
    • 1988
  • The architecture of a multiprocessor based programmable controller(MBPC) is presented. It consists of a host processor, processing elements, and Input/Output processors. Some problems in implementing such architecture are also described. To resolve them, we proposed and presented INFOBUS, a system bus for MBPC. The performances of INFOBUS and MBPC are analysed using both analytic models and simulations. Some results from the analysis will be given and validated. In case of 50% of BTI(Block Type Instruction) and 4 processors, the scanning time is shown to be 0.194msec/Kstep with some reasonable assumptions.

  • PDF

The Performance Enhancements of OpenGL-based 3D Graphics Application by Configuring of Microprocessors and Main Memories (마이크로프로세서와 주기억장치 변화에 따른 OpenGL 기반 3D 그래픽스 어플리케이션 성능 평가에 대한 연구)

  • Kim, Heui-Jung;Oh, Jung-Taek;Jung, Jae-Hyun
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.263-264
    • /
    • 2006
  • On this study the performance of engineering workstation running OpenGL based application The following instructions are enhanced by configuring of the microprocessor and main memories. Single processors and more main memories are better than dual and less or same is confirmed.

  • PDF

Name-Based Autoconfiguration for Mobile Ad hoc Networks

  • Kim, Nam-Hoon;Kang, Sae-Hoon;Lee, Young-Hee;Lee, Ben
    • ETRI Journal
    • /
    • v.28 no.2
    • /
    • pp.243-246
    • /
    • 2006
  • In a mobile ad hoc network, difficulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name-based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name resolution as a single protocol.

  • PDF

Design and Implementation of a Bluetooth LAN access system for VoIP phone (Bluetooth를 이용한 VOIP Phone 의 Wireless LAN Access System 개발)

  • 김정근;김영덕;장태규
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.343-346
    • /
    • 2002
  • This paper presents a Prototype system developed for a Bluetooth interfaced VoIP system. The VoIP phone is developed based on tile implementation of a CELP coder on the TI 16bit DSP Processor A PC interfaced with Bluetooth module is used to designing a access point system. Host controller protocol stack is implemented to realize gateway between the wireless and wired line networks. A server application program for user management and call processing, which is based on TCP/IP peer to peer connection, is implemented for tile evaluation of overall interface system.

  • PDF

A Dynamic Channel Allocation Algorithm Based on Time Constraints in Cellular Mobile Networks

  • Lee Seong-Hoon
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.31-34
    • /
    • 2005
  • The new realtime applications like multimedia and realtime services in a wireless network will be dramatically increased. However, many realtime services of mobile hosts in a cell cannot be continued because of insufficiency of useful channels. Conventional channel assignment approaches didn't properly consider the problem to serve realtime applications in a cell. This paper proposes a new realtime channel assignment algorithm based on time constraint analysis of channel requests. The proposed algorithm dynamically borrows available channels from neighboring cells. It also supports a smooth handoff which continuously serves realtime applications of the mobile hosts.

  • PDF

A Design of Web based GEM Using Single Object Access Protocol

  • Kang W. Joon;Park, H. Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.57.5-57
    • /
    • 2001
  • This paper presents an enhanced web-based distributed system with Single Access Object Protocol(SOAP), which uses HTTP as a communication protocol and XML as a data presentation. The suggested system is applied into a Generic Equipment Model (GEM) for exchanging specified messages(SECS-II), which are encoded into XML presentation, between Equipment and Host via the web sorrel. In this paper, the designed system architecture and its soap components are presented.

  • PDF

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

Development of a Real-time OS Based Control System for Laparoscopic Surgery Robot (복강경 수술로봇을 위한 실시간 운영체제 기반 제어 시스템의 개발)

  • Song, Seung-Joon;Park, Jun-Woo;Shin, Jung-Wook;Kim, Yun-Ho;Lee, Duk-Hee;Jo, Yung-Ho;Choi, Jae-Seoon;Sun, Kyung
    • Journal of Biomedical Engineering Research
    • /
    • v.29 no.1
    • /
    • pp.32-39
    • /
    • 2008
  • This paper reports on a realtime OS based master-slave configuration robot control system for laparoscopic surgery robot which enables telesurgery and overcomes shortcomings with conventional laparoscopic surgery. Surgery robot system requires control system that can process large volume information such as medical image data and video signal from endoscope in real-time manner, as well as precisely control the robot with high reliability. To meet the complex requirements, the use of high-level real-time OS (Operating System) in surgery robot controller is a must, which is as common as in many of modem robot controllers that adopt real-time OS as a base system software on which specific functional modules are implemened for more reliable and stable system. The control system consists of joint controllers, host controllers, and user interface units. The robot features a compact slave robot with 5 DOF (Degree-Of-Freedom) expanding the workspace of each tool and increasing the number of tools operating simultaneously. Each master, slave and Gill (Graphical User Interface) host runs a dedicated RTOS (Real-time OS), RTLinux-Pro (FSMLabs Inc., U.S.A.) on which functional modules such as motion control, communication, video signal integration and etc, are implemented, and all the hosts are in a gigabit Ethernet network for inter-host communication. Each master and slave controller set has a dedicated CAN (Controller Area Network) channel for control and monitoring signal communication with the joint controllers. Total 4 pairs of the master/slave manipulators as current are controlled by one host controller. The system showed satisfactory performance in both position control precision and master-slave motion synchronization in both bench test and animal experiment, and is now under further development for better safety and control fidelity for clinically applicable prototype.

A Study on the Improvement of the Network Performance Measurement of Virtual Machine between Host OS and Guest OS for a Mobile Personalized Software Platform based on SaaS (SaaS 기반 이동형 개인 맞춤 소프트웨어 플랫폼을 위한 VM의 Host OS와 Guest OS의 네트워크 성능 측정 방법 개선)

  • U, Su-Jeong;On, Jin-Ho;Choi, Jung-Rhan;Choi, Wan;Lee, Moon-Kun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.85-98
    • /
    • 2009
  • Recently, there are a number of researches and developments for the personalized software platform for mobility based on SaaS. The platform requires an optimal virtual machine in order to satisfy the operating systems of various users for the software. In addition, the platform must guarantee the mobility of the users' working environments by supporting fast and secure services between internal and external networks in the platform operating systems. In order to verify the optimal behaviors of virtual machines for the platform, the performance of the virtual machines must be measured and analyzed in various perspectives. In the previous research, unfortunately, the performance of a virtual machine were conducted in the condition that a guest operating system was installed on the virtual machine and considered as a computer, by measuring the network traffic between the guest operating system and an external client operating system. This performance measurement was not suitable for a virtual machine for the platform since a number of different software must be handled in the virtual machine. In order to overcome this limitation, this paper presents a measurement method for network performance and proposes the most optimal virtual machine by the method.

  • PDF

The Intelligent Intrusion Detection Systems using Automatic Rule-Based Method (자동적인 규칙 기반 방법을 이용한 지능형 침입탐지시스템)

  • Yang, Ji-Hong;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.6
    • /
    • pp.531-536
    • /
    • 2002
  • In this paper, we have applied Genetic Algorithms(GAs) to Intrusion Detection System(TDS), and then proposed and simulated the misuse detection model firstly. We have implemented with the KBD contest data, and tried to simulated in the same environment. In the experiment, the set of record is regarded as a chromosome, and GAs are used to produce the intrusion patterns. That is, the intrusion rules are generated. We have concentrated on the simulation and analysis of classification among the Data Mining techniques and then the intrusion patterns are produced. The generated rules are represented by intrusion data and classified between abnormal and normal users. The different rules are generated separately from three models "Time Based Traffic Model", "Host Based Traffic Model", and "Content Model". The proposed system has generated the update and adaptive rules automatically and continuously on the misuse detection method which is difficult to update the rule generation. The generated rules are experimented on 430M test data and almost 94.3% of detection rate is shown.3% of detection rate is shown.