• Title/Summary/Keyword: real-time kernel

Search Result 228, Processing Time 0.03 seconds

Uncertainty analysis of containment dose rate for core damage assessment in nuclear power plants

  • Wu, Guohua;Tong, Jiejuan;Gao, Yan;Zhang, Liguo;Zhao, Yunfei
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.673-682
    • /
    • 2018
  • One of the most widely used methods to estimate core damage during a nuclear power plant accident is containment radiation measurement. The evolution of severe accidents is extremely complex, leading to uncertainty in the containment dose rate (CDR). Therefore, it is difficult to accurately determine core damage. This study proposes to conduct uncertainty analysis of CDR for core damage assessment. First, based on source term estimation, the Monte Carlo (MC) and point-kernel integration methods were used to estimate the probability density function of the CDR under different extents of core damage in accident scenarios with late containment failure. Second, the results were verified by comparing the results of both methods. The point-kernel integration method results were more dispersed than the MC results, and the MC method was used for both quantitative and qualitative analyses. Quantitative analysis indicated a linear relationship, rather than the expected proportional relationship, between the CDR and core damage fraction. The CDR distribution obeyed a logarithmic normal distribution in accidents with a small break in containment, but not in accidents with a large break in containment. A possible application of our analysis is a real-time core damage estimation program based on the CDR.

eBPF-based Container Activity Analysis System (eBPF를 활용한 컨테이너 활동 분석 시스템)

  • Jisu Kim;Jaehyun Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.9
    • /
    • pp.404-412
    • /
    • 2024
  • The adoption of cloud environments has revolutionized application deployment and management, with microservices architecture and container technology serving as key enablers of this transformation. However, these advancements have introduced new challenges, particularly the necessity to precisely understand service interactions and conduct detailed analyses of internal processes within complex service environments such as microservices. Traditional monitoring techniques have proven inadequate in effectively analyzing these complex environments, leading to increased interest in eBPF (extended Berkeley Packet Filter) technology as a solution. eBPF is a powerful tool capable of real-time event collection and analysis within the Linux kernel, enabling the monitoring of various events, including file system activities within the kernel space. This paper proposes a container activity analysis system based on eBPF, which monitors events occurring in the kernel space of both containers and host systems in real-time and analyzes the collected data. Furthermore, this paper conducts a comparative analysis of prominent eBPF-based container monitoring systems (Tetragon, Falco, and Tracee), focusing on aspects such as event detection methods, default policy application, event type identification, and system call blocking and alert generation. Through this evaluation, the paper identifies the strengths and weaknesses of each system and determines the necessary features for effective container process monitoring and restriction. In addition, the proposed system is evaluated in terms of container metadata collection, internal activity monitoring, and system metadata integration, and the effectiveness and future potential of eBPF-based monitoring systems.

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

An Experimental Performance Evaluation with Xenomai for WSN (WSN을 위한 Xenomai의 실험적 성능평가)

  • Son, Tae-Yeong;Rim, Seong-Rak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.709-714
    • /
    • 2017
  • Structures like bridges or buildings need to be checked continuously to diagnose their safety. However, it is extremely difficult for the people who access such structures to check all areas directly. To overcome this problem, there is a lot of active research into structural health monitoring (SHM) with wireless sensor nodes (WSNs). In this paper, for more accurate checking of SHM with WSNs, we experimentally compare and evaluate the performance of Xenomai, which provides real-time processing under the traditional Linux kernel. For this purpose, we patch Xenomai into the traditional Linux kernel of a commercial embedded board, Raspberry Pi, and implement a task that periodically reads vibration data of the z-axis from an accelerometer in order to analyze the natural frequency of cantilever beams. Reading the data from the traditional Linux kernel with the same method, we analyze the natural frequency of the cantilever beams using Smart Office Analyzer. Finally, to review the validity of Xenomai for WSNs, we obtain vibration data on the z-axis from the accelerometer via wired network and compared and analyzed them the same way.

A Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load Balancing (커널 수준 실시간 스케줄링과 부하 분산을 통한 차별화된 웹 서비스 시스템)

  • 이명섭;박창현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6B
    • /
    • pp.533-543
    • /
    • 2003
  • Recently, according to the rapid increase of Web users, various kinds of Web applications have been being developed. Hence, Web QoS(Quality of Service) becomes a critical issue in the Web services, such as e-commerce, Web hosting, etc. Nevertheless, most Web servers currently process various requests from Web users on a FIFO basis, which can not provide differentiated QoS. This paper presents two approaches to provide differentiated Web QoS. The first is the kernel-level approach, which is adding a real-time scheduling processor to the operating system kernel to maintain the priority of user requests determined by the scheduling processor of Web server. The second is the load-balancing approach, which uses If-level masquerading and tunneling technology to improve reliability and response speed upon user requests.

Design and Implementation of Security Kernel Module with Additional Password for Enhancing Administrator Authentication (관리자 인증 강화를 위한 추가적인 패스워드를 가지는 보안 커널모듈 설계 및 구현)

  • Kim, Ik-Su;Kim, Myung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.675-682
    • /
    • 2003
  • Attackers collect vulnerabilities of a target computer system to intrude into it. And using several attack methods, they acquire root privilege. They steal and alter information in the computer system, or destroy the computer sysem. So far many intrusion detection systems and firewallshave been developed, but recently attackers go round these systems and intrude into a computer system . In this paper, we propose security kernel module to prevent attackers having acquired root privilege from doing illegal behaviors. It enhances administrator authentication with additional password, so prevents attackers from doing illegal behaviors such as modification of important files and installation of rootkits. It sends warning mail about sttacker's illegal behaviors to administrators by real time. So using information in the mail, they can estabilish new security policies.

Histogram Equalization Based Color Space Quantization for the Enhancement of Mean-Shift Tracking Algorithm (실시간 평균 이동 추적 알고리즘의 성능 개선을 위한 히스토그램 평활화 기반 색-공간 양자화 기법)

  • Choi, Jangwon;Choe, Yoonsik;Kim, Yong-Goo
    • Journal of Broadcast Engineering
    • /
    • v.19 no.3
    • /
    • pp.329-341
    • /
    • 2014
  • Kernel-based mean-shift object tracking has gained more interests nowadays, with the aid of its feasibility of reliable real-time implementation of object tracking. This algorithm calculates the best mean-shift vector based on the color histogram similarity between target model and target candidate models, where the color histograms are usually produced after uniform color-space quantization for the implementation of real-time tracker. However, when the image of target model has a reduced contrast, such uniform quantization produces the histogram model having large values only for a few histogram bins, resulting in a reduced accuracy of similarity comparison. To solve this problem, a non-uniform quantization algorithm has been proposed, but it is hard to apply to real-time tracking applications due to its high complexity. Therefore, this paper proposes a fast non-uniform color-space quantization method using the histogram equalization, providing an adjusted histogram distribution such that the bins of target model histogram have as many meaningful values as possible. Using the proposed method, the number of bins involved in similarity comparison has been increased, resulting in an enhanced accuracy of the proposed mean-shift tracker. Simulations with various test videos demonstrate the proposed algorithm provides similar or better tracking results to the previous non-uniform quantization scheme with significantly reduced computation complexity.

A Kernel-level RTP for Efficient Support of Multimedia Service on Embedded Systems (내장형 시스템의 원활한 멀티미디어 서비스 지원을 위한 커널 수준의 RTP)

  • Sun Dong Guk;Kim Tae Woong;Kim Sung Jo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.460-471
    • /
    • 2004
  • Since the RTP is suitable for real-time data transmission in multimedia services like VoD, AoD, and VoIP, it has been adopted as a real-time transport protocol by RTSP, H.323, and SIP. Even though the RTP protocol stack for embedded systems has been in great need for efficient support of multimedia services, such a stack has not been developed yet. In this paper, we explain embeddedRTP which supports the RTP protocol stack at the kernel level so that it is suitable for embedded systems. Since embeddedRTP is designed to reside in the UBP module, existing applications which rely ell TCP/IP services can proceed the same as before, while applications which rely on the RTP protocol stack can request HTP services through embeddedRTp API. EmbeddedRTP stores transmitted RTP packets into per session packet buffer, using the packet's port number and multimedia session information. Communications between applications and embeddedRTP is performed through system calls and signal mechanisms. Additionally, embeddedRTP API makes it possible to develop applications more conveniently. Our performance test shows that packet-processing speed of embeddedRTP is about 7.5 times faster than that oi VCL RTP for multimedia streaming services on PDA in spite that its object code size is reduced about by 58% with respect to UCL RTP's.

QUASI-LIKELIHOOD REGRESSION FOR VARYING COEFFICIENT MODELS WITH LONGITUDINAL DATA

  • Kim, Choong-Rak;Jeong, Mee-Seon;Kim, Woo-Chul;Park, Byeong-U.
    • Journal of the Korean Statistical Society
    • /
    • v.33 no.4
    • /
    • pp.367-379
    • /
    • 2004
  • This article deals with the nonparametric analysis of longitudinal data when there exist possible correlations among repeated measurements for a given subject. We consider a quasi-likelihood regression model where a transformation of the regression function through a link function is linear in time-varying coefficients. We investigate the local polynomial approach to estimate the time-varying coefficients, and derive the asymptotic distribution of the estimators in this quasi-likelihood context. A real data set is analyzed as an illustrative example.

Design and implementation of real-time TCP (실시간 전송기능을 지원하는 TCP의 설계 및 구현)

  • Woo, Jung-Man;Cho, Sung-Eon;Kim, Eun-Gi;Kwon, Yong-Do
    • Journal of Advanced Navigation Technology
    • /
    • v.9 no.1
    • /
    • pp.61-69
    • /
    • 2005
  • TCP and UDP is a transport layer protocol of Internet. TCP is a connection oriented protocol which supports a reliable data transfer by offering error and flow control, but it bring a transmission delay. On the other hand, the UDP is a connectionless protocol which does not carry out error and flow control, but it guarantees a realtime transmission. There are hardly any protocols which supports not only realtime functions but also data reliability. In this paper, we have designed and implemented a new TCP mode option which supports reliable realtime transmission. Our designed TCP performs an error recovery process during a fixed amount of time. This time is negotiated during the connection establishment phase. Our designed TCP is tested in real environments, and we find that it is relatively faster than the standard TCP and more reliable than the UDP. It can be used for the reliable transfer of realtime multimedia data.

  • PDF