• Title/Summary/Keyword: simple module

Search Result 522, Processing Time 0.025 seconds

System Integrity Monitoring System using Kernel-based Virtual Machine (커널 기반 가상머신을 이용한 시스템 무결성 모니터링 시스템)

  • Nam, Hyun-Woo;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.157-166
    • /
    • 2011
  • The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine's dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM's internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.

A Client Agent Framework for Dynamic Connection with Web Services (웹 서비스 동적 연동을 위한 클라이언트 에이전트 프레임워크)

  • Park, Young-Joon;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.339-346
    • /
    • 2009
  • In order to connect web services, clients generally should use heavy frameworks such as .Net framework and Java run-time environment, which require high performance hardware resources like a personal computer. Therefore, it is impossible for sensor nodes to handle web services due to their limited resources. In this paper, a client agent framework is proposed for dynamically connecting web services in the client node with limited resources. A client agent, which is managed by the framework in other server, has full capability for connecting web services, while a real client has a simple connection module with the client agent. In this framework, a client agent is dynamically generated using the WSDL in the web service server. By using the framework, sensor nodes or mobile devices can enhance their functionalities and services by accessing web services with minimum resources.

Improving the performance for Relation Networks using parameters tuning (파라미터 튜닝을 통한 Relation Networks 성능개선)

  • Lee, Hyun-Ok;Lim, Heui-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.377-380
    • /
    • 2018
  • 인간의 추론 능력이란 문제에 주어진 조건을 보고 문제 해결에 필요한 것이 무엇인지를 논리적으로 생각해 보는 것으로 문제 상황 속에서 일정한 규칙이나 성질을 발견하고 이를 수학적인 방법으로 법칙을 찾아내거나 해결하는 능력을 말한다. 이러한 인간인지 능력과 유사한 인공지능 시스템을 개발하는데 있어서 핵심적 도전은 비구조적 데이터(unstructured data)로부터 그 개체들(object)과 그들간의 관계(relation)에 대해 추론하는 능력을 부여하는 것이라고 할 수 있다. 지금까지 딥러닝(deep learning) 방법은 구조화 되지 않은 데이터로부터 문제를 해결하는 엄청난 진보를 가져왔지만, 명시적으로 개체간의 관계를 고려하지 않고 이를 수행해왔다. 최근 발표된 구조화되지 않은 데이터로부터 복잡한 관계 추론을 수행하는 심층신경망(deep neural networks)은 관계추론(relational reasoning)의 시도를 이해하는데 기대할 만한 접근법을 보여주고 있다. 그 첫 번째는 관계추론을 위한 간단한 신경망 모듈(A simple neural network module for relational reasoning) 인 RN(Relation Networks)이고, 두 번째는 시각적 관찰을 기반으로 실제대상의 미래 상태를 예측하는 범용 목적의 VIN(Visual Interaction Networks)이다. 관계 추론을 수행하는 이들 심층신경망(deep neural networks)은 세상을 객체(objects)와 그들의 관계(their relations)라는 체계로 분해하고, 신경망(neural networks)이 피상적으로는 매우 달라 보이지만 근본적으로는 공통관계를 갖는 장면들에 대하여 객체와 관계라는 새로운 결합(combinations)을 일반화할 수 있는 강력한 추론 능력(powerful ability to reason)을 보유할 수 있다는 것을 보여주고 있다. 본 논문에서는 관계 추론을 수행하는 심층신경망(deep neural networks) 중에서 Sort-of-CLEVR 데이터 셋(dataset)을 사용하여 RN(Relation Networks)의 성능을 재현 및 관찰해 보았으며, 더 나아가 파라미터(parameters) 튜닝을 통하여 RN(Relation Networks) 모델의 성능 개선방법을 제시하여 보았다.

Long Distance Transmission System of Tag's ID in RFID System (전자인식 시스템에서 택 ID의 원거리 전송 시스템)

  • Kim, Dong-Hun;Jo, Hyeong-Guk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.63-67
    • /
    • 2009
  • In RFID system, Tag's Identification data is processed in host computer by application program. Example of application program is parking administration program, library state program etc.. Tag's ID that is recognized in reader is inputted to the Host computer. Application program of computer searches data in DB of computer such as Tag ID. After finding the same ID, host computer send to control command to driver H/W in accordance with application purpose. But, It need to confirm in long distance whether achievement process is acted normally. There will be the 2 methods, when we monitors the process in long distance. One is wired monitoring system, another is wireless monitoring system. Among wire method, internet communication network is useful. RFID system manufacture first in this treatise. RFID system Embody using EM4095 chip that is doing 125KHz by carrier wave. Tag's characteristic ID is sent in remote place through module that use W3100A chip. This system Manufacture, and data send-receive confirmed using simple application program. Reception confirm by result, and pictures show by whole system and each part. And a control program explained of each part.

  • PDF

A Methodology for Improving fitness of the Latent Growth Modeling using Association Rule Mining (연관규칙을 이용한 잠재성장모형의 개선방법론)

  • Cho, Yeong Bin;Jun, Jae-Hoon;Choi, Byungwoo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.217-225
    • /
    • 2019
  • The Latent Growth Modeling(LGM) is known as the typical analysis method of longitudinal data and it could be classified into unconditional model and conditional model. It is common to assume that the growth trajectory of unconditional model of LGM is linear. In the case of quasi-linear, the methodology for improving the model fitness using Sequential Pattern of Association Rule Mining is suggested. To do this, we divide longitudinal data into quintiles and extract periodic changes of the longitudinal data in each quintiles and make sequential pattern based on this periodic changes. To evaluate the effectiveness, the LGM module in SPSS AMOS was used and the dataset of the Youth Panel from 2001 to 2006 of Korea Employment Information Service. Our methodology was able to increase the fitness of the model compared to the simple linear growth trajectory.

Monitoring System of AtoN Charge and Discharge Controller (항로표지 충·방전조절기의 모니터링 시스템)

  • Ye, Seong-hyeon;Han, Soonhee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.639-642
    • /
    • 2014
  • If the power of the general is not supplied, Visual aids utilize solar power system. The power supply system of these, the role of the power regulator to manage the charging and discharging is very important. In recent years, by introducing the IT technology for the effective management of visual aids, it was supposed to add a device that uses the power consumption. Thus, the importance of power regulator has increased. Currently, the power regulator is installed inside the AtoN, if the accessibility is not ensured, there is a difficulty that can not be checked. In order to solve these problems, in this paper, you have installed the Blue-tooth module to the power regulator. Also, by using the Blue-tooth communication function of a smart phone, a radio check has implemented a possible monitoring system. Advantage of the system implemented is a simple configuration and low installation cost. Also, it is possible to check the state information of the real-time power supply regulator. In addition, it has the effect of preventing accidents and reducing costs of inspection.

  • PDF

Transparent Plate Thickness Measurement Approach Using a Chromatic Confocal Sensor Based on a Geometric Phase Lens (기하 위상 렌즈 기반의 색공초점 센서를 이용한 투명 물질 두께 측정 연구)

  • Song, Min Kwan;Park, Hyo Mi;Joo, Ki-Nam
    • Korean Journal of Optics and Photonics
    • /
    • v.33 no.6
    • /
    • pp.317-323
    • /
    • 2022
  • In this investigation, we describe a chromatic confocal sensor based on a geometric phase lens for measuring the thicknesses of transparent plates. In order to design a compact sensor, a geometric phase lens, which has diffractive and polarizing characteristics, is used as a device to generate chromatic aberration, and a fiber optic module is adopted. The systematic error of the sensor is reduced with wavelength peak detection by Gaussian curve fitting and the common error compensation obtained by the repeatedly consecutive experimental results. An approach to calculate the plate thickness is derived and verified with sapphire and BK7 plates. Because of the simple and compact design of the proposed sensor with rapid measurement capability, it is expected to be widely used in thickness measurements of transparent plates as an alternative to traditional approaches.

The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment (보안운영체제 환경에서의 신뢰채널 지원을 위한 모듈의 설계 및 구현)

  • 유준석;임재덕;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.3-12
    • /
    • 2004
  • Secure operating system is a special operating system that integrates some security functions(i.e. access control, user authentication, audit-trail and etc.) with normal operating system in order to protect system from various attacks. But it doesn't consider my security of network traffic. To guarantee the security of the whole system, network traffic must be protected by a certain way and IPsec is a representative technology for network security. However, it requires administrator's carefulness in managing security policies and the key management mechanism is very heavy as well as complicated. Moreover, it doesn't have a suitable framework for delivery of security information for access control mechanism. So we propose a simple trusted channel mechanism for secure communication between secure operating systems. It provides confidentiality md authentication for network traffic and ability to deliver security information. It is implemented at the kernellevel of IP layer and the simplicity of the mechanism can minimize the overhead of trusted channel processing.

Design and Fabrication of Ka-band Waveguide Combiner with High Efficiency and High Isolation Characteristics (고효율 및 높은 격리 특성을 갖는 Ka 대역 도파관 결합기 설계 및 제작)

  • Kim, Hyo-Chul;Cho, Heung-Rae;Lee, Ju-Heun;Lee, Deok-Jae;An, Se-Hwan;Lee, Man-Hee;Joo, Ji-Han;Kim, Hong-Rak
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.2
    • /
    • pp.35-42
    • /
    • 2022
  • In this paper, a method to increase the combining efficiency and isolation of the combiner, the core module of SSPA (solid state amplifier), was studied. Specifically, the isolation was secured by matching the common port and the isolation port in the waveguide combiner. The matching structure for matching is in the form of a circular disk and is engraved inside the waveguide combiner. The structure is very simple, so it is possible to secure stable performance. And this structure showed more than 60 times higher critical power performance compared to previous studies, confirming that it is suitable for high output. And by combining 1-stage T-junction and 2, 3 stage MagicT combiner, miniaturization was achieved and the combining efficiency was optimized by reducing the insertion loss. The fabricated waveguide coupler obtained an isolation of 16dB or more and a coupling efficiency of 86.2%.

Design of Lightweight S-Box for Low Power AES Cryptosystem (저전력 AES 암호시스템을 위한 경량의 S-Box 설계)

  • Lee, Sang-Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • In this paper, the design of lightweight S-Box structure for implementing a low power AES cryptosystem based on composite field. In this approach, the S-Box is designed as a simple structure by which the three modules of x2, λ, and GF((22)2) merge into one module for improving the usable area and processing speed on GF(((22)2)2). The designed AES S-Box is modelled in Veilog-HDL at structural level, and a logic synthesis is also performed through the use of Xilinx ISE 14.7 tool, where Spartan 3s1500l is used as a target FPGA device. It is shown that the designed S-Box is correctly operated through simulation result, where ModelSim 10.3. is used for performing timing simulation.