• Title/Summary/Keyword: 상속인

Search Result 359, Processing Time 0.026 seconds

An Implementation of Explicit Multicast with Mobile IP for Small Group Communications in Mobile Networks (이동통신환경에서의 소규모 그룹통신을 위한 XMIP 프로토콜의 구현)

  • PARK IN-SOO;PARK YONG-JIN
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.267-280
    • /
    • 2005
  • In this paper, we implement and verify XMIP integrating IETF Mobile IP and the Explicit Multicast mechanism for a great number of small group multicast communications. U a source node sends Xcast packets explicitly inserting destination nodes into the headers, each Xcast router decides routes and forwards the packets toward each destination node based on unicast routing table without the support of multicast trees. n is a straightforward and simple multicast mechanism just based on a unicast routing table without maintaining multicast states because of the inheritance from the Explicit Multicast mechanism. This research modifies and extends the functionality of IETF Mobile IP's mobility agents, such as HA/FA to HA+/FA+ respectively, considering interworking with Xcast networks. Xcast packets captured by HA+ are forwarded into X-in-X tunnel interfaces for each FA+ referred to the binding table of HA.. This X-in-X tunneling mechanism can effectively solve the traffic concentration problem of IETF Mobile IP multicast services. Finally WLAN-based testbed is built and a multi-user Instant messenger system is developed as a Xcast application for finally verify the feasibility of the implemented XMIP/Xcast protocols.

A Study on the Object-Oriented Program Slicing using Module Class Dependency Graph (모듈 클래스 종속 그래프를 이용한 객체지향 프로그램 슬라이싱에 관한 연구)

  • Kim, Un-Yong;Jeong, Gye-Dong;Choe, Yeong-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1805-1816
    • /
    • 1999
  • This paper presents the Module Class Dependency Graph for expressing the dependency relations between classes effectively. The object-oriented language is developed independently at design time, and consists of relationship between classes. Therefore we need to consider these characteristics of independence, and to express effectively the relation of classes which is existed in class hierarchy. In the System Dependence Graph and Class Dependence Graph, the relationship of classes is not expressed. To express the class relationship, we propose the Module Class Dependence Graph, and we verify the effectiveness of this method applying to object constructor, inheritance relationship and dynamic binding. Also, we presents the expressing method of parameter to identify the member data of classes. Using this Module Class Dependency Graph, we can analyze the relationship of module class correctly at design time. This method can be applied to reverse engineering, testing, visualization and other various fields to analyze system.

  • PDF

Comparison of Design and Implementation for Distributed Active Objects based on RMI and CORBA environment (RMI와 CORBA 환경하의 분산 액티브 객체의 설계 및 구현에 대한 비교 분석)

  • Lee, Do-Hak;Kim, Shik;Hyun, Mu-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2721-2731
    • /
    • 1997
  • Distributed programming can be greatly simplified by language support for distributed communication. Many web-browsers now offer some form of active objects and the number and types of them are growing daily in interesting and innovative ways. Java applets are well known as one kind of active object related to web-browser. This paper focuses in distributed active objects which is one kind of active objects that can communicate with other active objects located in different machines across the Internet. Java RMI and CORBA IDL are two major programming environments for distributed active objects which are non compatible with each other. To make discussion concrete, we introduce a single application as implemented on two environments : the HORM, adopting RMI mechanism, and the OrbixWeb2.0.1, adopting CORBA specification, respectively. Binding, inheritance, polymorphism, object passing and callbacks across the machine boundary in distributed programming environments are issued. The results show that some differences in the implementation of distributed active objects can have a significant impact on how distributed applications are structured. The comparison between two implementations on the programming environments will be the basis for building the translation system between HORB to OrbixWeb and vice versa.

  • PDF

Deposition of ZnO Thin Films by RF Magnetron Sputtering and Charcaterization of the ZnO thin film SAW filter (RF 마그네트론 스터터링에 의한 ZnO박막증착 및 SAW 필터 특성 분석)

  • Lee, Yong-Ui;Yang, Hyeong-Guk;Kim, Yeong-Jin;Han, Jeong-In;Kim, Hyeong-Jun
    • Korean Journal of Materials Research
    • /
    • v.4 no.7
    • /
    • pp.783-791
    • /
    • 1994
  • Piezoelectric ZnO thin films were deposited on 7059 glass substrate by rf magnetron sputtering. The effects of deposition parameter, such as rf power, gas pressure and $O_{2}$/Ar gas ratio, on the crystallinity and electrical properties of the deposited ZnO thin films were studied. It was found that the deposition rate was higher than the previously reported values. ZnO films were suitable for SAW filter since a standard deviation of XRD (002) peak rocking curve was less than $6^{\circ}$. ZnO thin films, which were deposited at $O_{2}$/Ar ratio larger than 25%, showed high resistance. SAW filter was fabricated using ZnO film, of which thickness was 0.25 of the wavelength of the propatating surface acoustic wave. The measured frequency response was consistent with the calculated one. The SAW filter had center frequency 39.08 MHz, phase velocity 2501 m/sec and insertion loss 29 dB.

  • PDF

An Efficient Storage Schema Construction and Retrieval Technique for Querying OWL Data (OWL 데이타 검색을 위한 효율적인 저장 스키마 구축 및 질의 처리 기법)

  • Woo, Eun-Mii;Park, Myung-Jae;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.34 no.3
    • /
    • pp.206-216
    • /
    • 2007
  • With respect to the Semantic Web proposed to overcome the limitation of the Web, OWL has been recommended as the ontology language used to give a well-defined meaning to diverse data. OWL is the representative ontology language suggested by W3C. An efficient retrieval of OWL data requires a well-constructed storage schema. In this paper, we propose a storage schema construction technique which supports more efficient query processing. A retrieval technique corresponding to the proposed storage schema is also introduced. OWL data includes inheritance information of classes and properties. When OWL data is extracted, hierarchy information should be considered. For this reason, an additional XML document is created to preserve hierarchy information and stored in an XML database system. An existing numbering scheme is utilized to extract ancestor/descendent relationships, and order information of nodes is added as attribute values of elements in an XML document. Thus, it is possible to retrieve subclasses and subproperties fast and easily. The improved query performance from experiments shows the effectiveness of the proposed storage schema construction and retrieval method.

Efficient Algorithms for Causal Message Logging and Revoery (인과적 메시지 로그 및 복구를 위한 효율적인 알고리즘)

  • Lee, Byeong-Ju;Park, Tae-Sun;Yeom, Heon-Yeong;Jo, Yu-Geun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.767-777
    • /
    • 1999
  • 인과적 메시지 로깅 기법은 정상프로세스를 역전(roll-back)시키거나 메시지의 저장을 위해 프로세스의 수행을 중단시키지 않는 장점을 지니고 있지만, 메시지의 크기가 지나치게 커진다는 단점을 지니고 있다. 본 논문에서는 인과적 메시지 로깅 기법의 이러한 문제점을 해결하기 위하여 로그 상속의 개념을 정의하고 로그 연혁을 이용하여 로그 비용, 특히 로그 크기 면에서 효율적인 로깅 기법을 제안한다. 또한 이 로깅 알고리즘을 이용하여 복구시 메시지의 수와 크기를 줄여 복구시간을 줄이는 효율적인 복구 알고리즘을 제안하고, 제안한 알고리즘이 메시지 로그 크기 면에서 효율적임을 증명한다. 또 제안한 알고리즘의 성능을 검증하기 위하여 두 가지 종류의 모의 실험을 수행하여 기존의 로깅 프로토콜과 메시지 크기 면에서의 성능을 비교한 결과를 제시하였다.Abstract Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algorithm based on the new message log structure, LogOn, which represents the causal inter-process dependency relation with much smaller overhead compared to the existing algorithms. The proposed algorithm is efficient in the sense that it entails no additional information other than LogOn to be carried in each message, while other existing algorithms require extra information other than the message logs. This paper also presents an efficient recovery algorithm to solve the problem of a large amount of data exchanges during the recovery. To verify the performance of our algorithm, we give an analysis of the algorithm and perform two simulations and compare the log size with other causal logging protocols.

Enhancement of SATEEC GIS system using ArcP (ArcPy를 이용한 SATEEC모델의 개선)

  • Lee, Gwanjae;Shin, Yongchul;Jung, Younghun;Lim, Kyoung Jae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.515-515
    • /
    • 2015
  • 토양유실량을 산정하기 위한 모델로 Universsal Soil Loss Equation(USLE)가 전 세계적으로 가장 많이 사용되고 있다. USLE 모형은 농경지에서 면상침식(Sheet erosion)과 세류침식(Rill erosion)을 모의할 수 있는 시험포단위 모형(Field-scale)으로 농경지에서 유실된 토양이 하류 하천으로 얼마나 흘러 들어가 하류 수계의 탁수발생과 이에 따른 수질악화에 얼마나 기여하는지, 즉, 유역단위의 토양유실량을 평가하는데 이용될 수 없다. 이러한 단점을 극복하기 위하여 Sediment Assessment Tool for Effective Erosion Control (SATEEC) ArcView 시스템이 개발되어 사용되고 있다. SATEEC ArcView 시스템은 USLE모형의 입력자료와 DEM만으로 유역면적에 따른 유달률을 산정하여 유역에서 유실된 토양이 얼마만큼 하류로 유달되는지를 모의할 수 있으며, 유역 경사도에 의한 유달률도 산정할 수 있어 지형적인 특성을 좀 더 다양하게 분석 할 수 있게 개발 되었다. 그러나 ArcView는 출시한지 오래되어 사용자가 많지 않고, 프로그램상의 오류가 많고, 대용량의 데이터 처리가 가능한 64비트 운영체제에서는 설치가 불가능한 단점이 있다. 또한, ArcView의 프로그래밍 언어인 Avenue는 클래스를 정의한다거나 상속을 한다거나 하는 문법을 제공하지 않기 때문에 객체지향 언어로 보기에는 부족하다고 할 수 있다. 또한, 최근의 ArcGIS 기반의 많은 모델들이 서로 연계하여 사용하고 있으나, Avenue는 기타 다른 프로그래밍 언어와 연계하여 사용하기가 쉽지 않은 단점이 있다. 그러나 최근 ArcGIS 버전들의 프로그래밍 언어인 Python은 간결하고 확장성이 좋으며, 다른 언어와의 연계가 쉽다. 또한, ArcGIS 10.x버전부터 제공되는 arcpy 모듈은 사용자와의 접근성이 매우 향상되었다. 따라서 SATEEC ArcView 버전을 ArcGIS 10.1 기반의 Python 으로 재개발하여 기존의 불편한 접근성과 대용량 데이터의 처리가 불가능했던 부분을 개선하였다.

  • PDF

Static Type Inference Based on Static Single Assignment for Bytecode (바이트코드를 위한 정적 단일 배정문 기반의 정적 타입 추론)

  • Kim Ji-Min;Kim Ki-Tea;Kim Je-Min;Yoo Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.87-96
    • /
    • 2006
  • Although bytecode has many good features, it has slow execution speed and it is not an ideal representation for program analysis or optimization. For analysises and optimizations. bytecode must be translated to a Static Single Assignment Form(SSA Form) But when bytecode is translated a SSA Form it has lost type informations of son variables. For resolving these problem in this paper, we create extended control flow graph on bytecode. Also we convert the control flow graph to SSA Form for static analysis. Calculation about many informations such as dominator, immediate dominator. dominance frontier. ${\phi}$-Function. renaming are required to convert to SSA Form. To obtain appropriate type for generated SSA Form, we proceed the followings. First. we construct call graph and derivation graph of classes. And the we collect information associated with each node. After finding equivalence nodes and constructing Strongly Connected Component based on the collected informations. we assign type to each node.

  • PDF

A Study on ICS/SCADA System Web Vulnerability (제어시스템의 웹 취약점에 대한 현황과 연구)

  • Kim, Hee-Hyun;Yoo, Jinho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.15-27
    • /
    • 2019
  • In the past, the control system was a closed network that was not connected to the external network. However, in recent years, many cases have been opened to the outside for the convenience of management. Are connected to the Internet, and the number of operating control systems is increasing. As a result, it is obvious that hackers are able to make various attack attempts targeting the control system due to external open, and they are exposed to various security threats and are targeted for attack. Industrial control systems that are open to the outside have most of the remote management ports for web services or remote management, and the expansion of web services through web programs inherits the common web vulnerability as the control system is no exception. In this study, we classify and compare existing web vulnerability items in order to derive the most commonly tried web hacking attacks against control system from the attacker's point of view. I tried to confirm.

The study on a threat countermeasure of mobile cloud services (모바일 클라우드 서비스의 보안위협 대응 방안 연구)

  • Jang, Eun-Young;Kim, Hyung-Jong;Park, Choon-Sik;Kim, Joo-Young;Lee, Jae-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.177-186
    • /
    • 2011
  • Mobile services which are applied PC performance and mobile characteristics are increased with spread of the smartphone. Recently, mobile cloud service is getting the spotlight as a solution of mobile service problems that mobile device is lack of memory, computing power and storage and mobile services are subordinate to a particular mobile device platform. However, mobile cloud service has more potential security threats by the threat inheritance of mobile service, wireless network and cloud computing service. Therefore, security threats of mobile cloud service has to be removed in order to deploy secure mobile cloud services and user and manager should be able to respond appropriately in the event of threat. In this paper, We define mobile cloud service threats by threat analysis of mobile device, wireless network and cloud computing and we propose mobile cloud service countermeasures in order to respond mobile cloud service threats and threat scenarios in order to respond and predict to potential mobile cloud service threats.