• Title/Summary/Keyword: kernel functions

Search Result 271, Processing Time 0.031 seconds

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

Design of Disaster Control System based on 4S Kernel Component (4S 핵심 컴포넌트 기반의 재난재해 시스템 설계)

  • Joo, In-Hak;Lee, Seung-Yong;Oh, Byoung-Woo;Kim, Min-Soo
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.1 s.5
    • /
    • pp.27-36
    • /
    • 2001
  • The 4S represents four systems that are commonly related to spatial information: GIS, GNSS, SIIS, ITS. The 4S technology that integrates the four systems gets more and more interests recently. In this paper, we adopt component paradigm to 4S system, apply it to the disaster control field, and design a system based on component architecture. There are many application areas to which the 4S technology can be applied. but the disaster control system is one of the most typical fields. We apply 4S technology to the disaster control fields, including fire, flood, and typhoon. Because of the characteristics of disaster control system that handles large-volume map data, component-based 4S system will take considerable effects on the improvement of disaster control works. The core functions that are common to all disaster control fields are included in 4S kernel component because of the consideration of time performance. Remaining non-common functions are implemented as separate components named as work-specific components. In our suggested system, a vehicle named as 4S-Van collects real-time information on the spot of disaster and sends image and location information to control center via wireless transmission. The control center analyzes the information together with its own spatial database or map, which was not possible in the conventional disaster control works. The control center can get desired information by sending a request of re-transmission to 4S-Van. Such method of real-time transmission supported by on-the-spot information makes the current situation judgment, decision making, and order issuance more exact, effective, and timely. The suggested system and method are expected to bring remarkable improvement on disaster control works.

  • PDF

Developing a STEP-NC Prototype based on ISO 14649 Paradigm (ISO14649 패러다임에 입각한 STEP-NC 프로토타입 시스템 개발)

  • Seo, Seok-Hwan;Jo, Jeong-Hun;Jeong, Dae-Hyeok;Lee, Byeong-Eon;Cheon, Sang-Uk
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.7
    • /
    • pp.171-179
    • /
    • 2002
  • STEP-NC is the next generation CNC controller taking STEP-based data model as the interface scheme (or language) between CAM and CNC, and carrying out various intelligent functions. At the moment, efforts are being made worldwide to establish international standard for the new interface scheme formalized as ISO14649. As the new language is being established, increasing attention is being paid to the development of the new CNC. Korea STEP-NC is an integrated STEP-NC system taking ISO 14649 as an input, and carrying out various intelligent functions. It is composed of 5 modules: 1) Shop Floor Programming System (PosSFP), 2) Tool Path Generator (PosTPG), 3) Tool Path Viewer (PosTPV), 4) Man Machine Interface (PosMMI), and 5) CNC Kernel (PosCNC). Distinguished from other prototypes (of Europe and USA), the Korea STEP-NC is top-down designed, and bottom-up implemented comprehensively incorporating all the crucial components for realizing the full benefit of STEP-NC paradigm, without using any existing commercial CAD/CAM systems and CNC kernels. The Korea STEP-NC prototype was successfully demonstrated and evaluated in the ISO conventions Together with prototypes of Europe and USA, Korea STEP-NC will be used as a reference system fur the Triangular Conformance Test to be jointly carried out by ISO TC184 SC1, SC4, and IMS Project.

Investigating the future changes of extreme precipitation indices in Asian regions dominated by south Asian summer monsoon

  • Deegala Durage Danushka Prasadi Deegala;Eun-Sung Chung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.174-174
    • /
    • 2023
  • The impact of global warming on the south Asian summer monsoon is of critical importance for the large population of this region. This study aims to investigate the future changes of the precipitation extremes during pre-monsoon and monsoon, across this region in a more organized regional structure. The study area is divided into six major divisions based on the Köppen-Geiger's climate structure and 10 sub-divisions considering the geographical locations. The future changes of extreme precipitation indices are analyzed for each zone separately using five indices from ETCCDI (Expert Team on Climate Change Detection and Indices); R10mm, Rx1day, Rx5day, R95pTOT and PRCPTOT. 10 global climate model (GCM) outputs from the latest CMIP6 under four combinations of SSP-RCP scenarios (SSP1-2.6, SSP2-4.5, SSP3-7.0, and SSP5-8.5) are used. The GCMs are bias corrected using nonparametric quantile transformation based on the smoothing spline method. The future period is divided into near future (2031-2065) and far future (2066-2100) and then the changes are compared based on the historical period (1980-2014). The analysis is carried out separately for pre-monsoon (March, April, May) and monsoon (June, July, August, September). The methodology used to compare the changes is probability distribution functions (PDF). Kernel density estimation is used to plot the PDFs. For this study we did not use a multi-model ensemble output and the changes in each extreme precipitation index are analyzed GCM wise. From the results it can be observed that the performance of the GCMs vary depending on the sub-zone as well as on the precipitation index. Final conclusions are made by removing the poor performing GCMs and by analyzing the overall changes in the PDFs of the remaining GCMs.

  • PDF

Booting Process Profiling Tool for Baseboard Management Controllers (베이스보드 매니지먼트 컨트롤러를 위한 부팅 과정 프로파일링 도구)

  • Jaeseop Kim;Minho Park;Jiman Hong
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.84-91
    • /
    • 2022
  • Baseboard Management Controller(BMC) supports server monitoring, maintenance, and control functions using various communication interfaces. However, if an unexpected problem occurs during the device driver initialization process, the BMC may not operate normally. Therefore, a boot process profiling tool that accurately analyzes the device driver initialization process and provides a function to check the analysis result is essential. Existing boot process profiling tools do not specifically provide the device driver initialization process and results required for BMC boot process analysis, forcing developers to use a combination of tools to analyze the boot process in detail. In this paper, we propose an integrated profiling tool for BMC's booting process. The proposed tool provides device driver initialization process analysis, CPU and memory usage analysis, and kernel version management functions. Users can easily analyze the booting process using the proposed tool, and the analysis result can be used to shorten the booting time. Also, the proposed tool is implemented in Linux-based BMC, and it is shown that the proposed tool is more efficient than the existing profiling tool.

Analysis of Radiation Pattern of Antenna in Multi-Layered Media (다층매질 중 안테나의 방사패턴 해석)

  • Hwang, Jae-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.677-680
    • /
    • 2008
  • The paper deals with the analysis of radiation characteristics of antenna in the multi-layered media structures. The dyadic Green's function for three layer medium is complex because the Green's functions belonging to the kernel of the integral equation are expressed as Sommerfeld integrals, in which surface wave effects are automatically included. When certain condition are met, the integral can be evaluated approximated by the method of Saddle-point integration. In this study, we propose a method to calculate a radiation pattern for several antennas by using the method of Saddle-point integration. Numerical results show how the radiation characteristics are affected by parameter of dielectric media.

  • PDF

Hybrid CSA optimization with seasonal RVR in traffic flow forecasting

  • Shen, Zhangguo;Wang, Wanliang;Shen, Qing;Li, Zechao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4887-4907
    • /
    • 2017
  • Accurate traffic flow forecasting is critical to the development and implementation of city intelligent transportation systems. Therefore, it is one of the most important components in the research of urban traffic scheduling. However, traffic flow forecasting involves a rather complex nonlinear data pattern, particularly during workday peak periods, and a lot of research has shown that traffic flow data reveals a seasonal trend. This paper proposes a new traffic flow forecasting model that combines seasonal relevance vector regression with the hybrid chaotic simulated annealing method (SRVRCSA). Additionally, a numerical example of traffic flow data from The Transportation Data Research Laboratory is used to elucidate the forecasting performance of the proposed SRVRCSA model. The forecasting results indicate that the proposed model yields more accurate forecasting results than the seasonal auto regressive integrated moving average (SARIMA), the double seasonal Holt-Winters exponential smoothing (DSHWES), and the relevance vector regression with hybrid Chaotic Simulated Annealing method (RVRCSA) models. The forecasting performance of RVRCSA with different kernel functions is also studied.

FRACTIONAL DIFFERENTIATION OF THE PRODUCT OF APPELL FUNCTION F3 AND MULTIVARIABLE H-FUNCTIONS

  • Choi, Junesang;Daiya, Jitendra;Kumar, Dinesh;Saxena, Ram Kishore
    • Communications of the Korean Mathematical Society
    • /
    • v.31 no.1
    • /
    • pp.115-129
    • /
    • 2016
  • Fractional calculus operators have been investigated by many authors during the last four decades due to their importance and usefulness in many branches of science, engineering, technology, earth sciences and so on. Saigo et al. [9] evaluated the fractional integrals of the product of Appell function of the third kernel $F_3$ and multivariable H-function. In this sequel, we aim at deriving the generalized fractional differentiation of the product of Appell function $F_3$ and multivariable H-function. Since the results derived here are of general character, several known and (presumably) new results for the various operators of fractional differentiation, for example, Riemann-Liouville, $Erd\acute{e}lyi$-Kober and Saigo operators, associated with multivariable H-function and Appell function $F_3$ are shown to be deduced as special cases of our findings.

Unsupervised Incremental Learning of Associative Cubes with Orthogonal Kernels

  • Kang, Hoon;Ha, Joonsoo;Shin, Jangbeom;Lee, Hong Gi;Wang, Yang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.1
    • /
    • pp.97-104
    • /
    • 2015
  • An 'associative cube', a class of auto-associative memories, is revisited here, in which training data and hidden orthogonal basis functions such as wavelet packets or Fourier kernels, are combined in the weight cube. This weight cube has hidden units in its depth, represented by a three dimensional cubic structure. We develop an unsupervised incremental learning mechanism based upon the adaptive least squares method. Training data are mapped into orthogonal basis vectors in a least-squares sense by updating the weights which minimize an energy function. Therefore, a prescribed orthogonal kernel is incrementally assigned to an incoming data. Next, we show how a decoding procedure finds the closest one with a competitive network in the hidden layer. As noisy test data are applied to an associative cube, the nearest one among the original training data are restored in an optimal sense. The simulation results confirm robustness of associative cubes even if test data are heavily distorted by various types of noise.

Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS (안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험)

  • Kim, Jeong-Nyeo;Sohn, Sung-Won;Lee, Chelo-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.773-780
    • /
    • 2003
  • SecuROS(Secure & Reliable Operating System) prevents and blocks possible system cracking by implementing additional security functions in FreeBSD 4.3 operating system (OS) kernel, including access control, user authentication, audit trail, encryption file system and trusted channel. This paper describes access control technique, which is one of core technologies of SecuROS, introduces the implementations of DAC, MAC and RBAC, all of which are corresponding access control policies, and show security and results of performance measurement on the basis of application of access control policies. Finally, security and performance between conventional OS environment and environment adopting access control policy is described.