• Title/Summary/Keyword: 사본변수

Search Result 4, Processing Time 0.017 seconds

Adaptive Fuzzy Drop Manager for Service of Reliable Distribution Application Domain Objects (신뢰성 있는 분산 도메인 객체 서비스를 위한 적응형 퍼지 드럽 관리기)

  • Jeong, Taeg-Won;Lee, Chong-Deuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.511-518
    • /
    • 2009
  • A lot of methods are proposed to provide services for object informations in distributed domain to satisfy the recent increase of user-centered services. This paper proposed a method called fuzzy drop manager for the service of reliable distribution application domain objects. The proposed system accesses the domain using replica parameter ci,j and access matrix Z, and evaluates the reference relatedness inside the domain using the relatedness, given by the mapping of intra-domain fuzzy relevance, between fuzzy sets. Objects in the domain generated an $\alpha$-level set according to the reference relatedness obtained by applying $\alpha$-level to extend queries. Simulation results showed that the proposed method has better performance than the other methods.

Efficient Binary Code Rewriting Technique for Buffer-Overflow Prevention (버퍼오버플로우 방지를 위한 효율적인 이진코드 재작성 기법)

  • Kim, Yun-Sam;Cho, Eun-Sun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1047-1050
    • /
    • 2004
  • 버퍼 오버플로우 공격의 방어는 그 심각한 위험성 때문에 많은 연구가 되고 있지만 방어에 의한 오버헤드의 발생으로 인해 실제 적용되기 어려운 면이 있다. 본 논문은 이진 코드를 재작성 하여 스택의 리턴 주소 사본을 지역변수 아래 부분에 두고 함수 반환시 비교 검사를 하는 것으로써, 소스코드가 없는 경우에도 버퍼 오버플로우 공격을 막는 동시에 오버헤드를 줄일 수 있는 방법을 제안하였다.

  • PDF

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience (선형결합 공모공격에 강인한 각도해석 기반의 대용량 핑거프린팅)

  • Seol, Jae-Min;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.713-720
    • /
    • 2008
  • Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.

Design and Evaluation of a Fuzzy Logic based Multi-hop Broadcast Algorithm for IoT Applications (IoT 응용을 위한 퍼지 논리 기반 멀티홉 방송 알고리즘의 설계 및 평가)

  • Bae, Ihn-han;Kim, Chil-hwa;Noh, Heung-tae
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.17-23
    • /
    • 2016
  • In the future network such as Internet of Things (IoT), the number of computing devices are expected to grow exponentially, and each of the things communicates with the others and acquires information by itself. Due to the growing interest in IoT applications, the broadcasting in Opportunistic ad-hoc networks such as Machine-to-Machine (M2M) is very important transmission strategy which allows fast data dissemination. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose a fuzzy logic based probabilistic multi-hop broadcast (FPMCAST) algorithm which statistically disseminates data accordingly to the remaining energy rate, the replication density rate of sending node, and the distance rate between sending and receiving nodes. In proposed FPMCAST, the inference engine is based the fuzzy rule base which is consists of 27 if-then rules. It maps input and output parameters to membership functions of input and output. The output of fuzzy system defines the fuzzy sets for rebroadcasting probability, and defuzzification is used to extract a numeric result from the fuzzy set. Here Center of Gravity (COG) method is used to defuzzify the fuzzy set. Then, the performance of FPMCAST is evaluated through a simulation study. From the simulation, we demonstrate that the proposed FPMCAST algorithm significantly outperforms flooding and gossiping algorithms. Specially, the FPMCAST algorithm has longer network lifetime because the residual energy of each node consumes evenly.