• Title/Summary/Keyword: 자동설계 시스템

Search Result 2,340, Processing Time 0.031 seconds

An Active Network Execution Environment for on Demand Customization of Communication Protocols and Services (맞춤형 통신 프로토콜과 서비스를 위한 액티브 네트워크 실행환경)

  • Lee Hwa Young;Kang Bo-young;Lim Kyungshik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.937-950
    • /
    • 2004
  • In this paper, we present the design and implementation of new execution environment named Customizable Architecture for Flexible Execution Environment(CAFEs) that supports the mechanism of protocol customization and service referencing. We introduce a new concept as micro protocols and active services to enhance software reusability. Micro protocol represents a specific algorithm or functionality of existing network protocol and the active service is in charge of binding legacy application and releasing the active network oriented services. The pro-posed active network execution environment is made up of three parts, virtual network system, protocol and service manager, event engine. First, the virtual network system is used to connect each active nodes using virtual network channels which are based on multiple existing protocol layers. Second, the protocol and service manager is responsible for composing micro protocols and active services to develop new network proto-col and service easily. Finally, the event engine is used to detect the automatic transition of system components using event delegation model. To verify the CAFTs, we have an experiment about the delivery of web contents which are suitable for the user's terminals in the wireless Internet environment. As a result. we are able to obtain the availability of developed execution environment.

Design and Implementation of VIES for Integrity Evaluation in VPN (VPN의 데이터 무결성 평가를 위한 VIES 설계 및 구현)

  • Lee, Dong-Chun;Kim, Jeom-Gu;Jo, Seok-Pal
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.481-488
    • /
    • 2002
  • Guarantee of the data integrity is important to the Virtual Private Network (VPN) which can be improved cost decreasing and effective work by applying on Internet as the private network. Thus, the integrity function in the VPN must be maintained and the security manager must be check it occasionally. In this paper we propose the VPN Integrity Evaluation System (VIES) which is collecting, and evaluating automatically the vulnerable data of VPN against current hacking mechanisms in information security system. And this VIES obtain to the results which have objectivity and fairness of evaluation by driving off the evaluation scenario based on Common Criteria (CC), and general users or non-specialist can utilize easy the security evaluation of organization.

A Design of Active Spatial-Operation-Trigger for supporting the Integrity of Meet-Spatial-Objects in a Spatial Layer (공간 레이어에서 상접한 공간 객체의 무결성 지원을 위한 능동적인 공간연산 트리거의 설계)

  • Ahn, Jun-Soon;Kim, Jae-Hong;Jung, Bo-Heung;Bae, Hae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.933-936
    • /
    • 2001
  • 공간데이터베이스 시스템에서 데이터베이스의 일관성 유지를 위해 의미적 무결성을 지원해야 한다. 예를 들어, 실세계의 구경계 레이어에서 공간 객체인 구는 주위의 구들과 항상 접해 있어야만 하는 상접 (Meet)한 성질과 두개 이상의 다른 구가 동일한 이름을 가질 수 없는 성질을 가진다. 이 성질은 실세계에서 묵시적으로 인지되는 개념이다. 따라서 공간객체의 갱신으로 인해 레이어에 대한 묵시적인 개념이 위배될 경우 무결성 유지가 필요하다. 본 논문에서는 이 레이어에 대한 공간 객체의 무결성을 유지하기 위한 능동적 공간 연산 트리거를 제안한다. 제안한 기법은 레이어에 대한 무결성 제약조건이 위배될 때 수행되며, 동일 레이어에 대한 공간과 비공간 데이터 트리거로 나누어 수행되고, 다른 레이어에 대한 비공간 데이터 트리거를 수행하는 기법이다. 동일한 레이어에 대한 능동적 공간 연산 트리거는 공간객체인 공간 비공간 데이터에 대한 각각 또는 모두에 대한 갱신인지를 구분하여 공간 데이터에 대한 트리거 수행단계와 비공간 데이터에 대한 트리거의 수행단계로 나누어 수행 전략를 결정하여 수행되고, 마지막으로 다른 레이어에 대한 비공간 데이터에 대한 트리거를 수행한다. 능동적 공간 연산 트리거는 상접성을 유지해야 하는 공간 객체들의 의미적 무결성을 위해 각각의 공간과 비공간 데이터에 대하여 3 단계 수행으로 공간 객체에 대한 의미적 무결성 유지와 자동 보정으로 사용자 편의성을 제공한다.

  • PDF

Citrus sorting system with a color image boundary tracking (칼라 영상의 경계추적에 의한 윤곽선 인식이 적용된 귤 선별시스템)

  • Choi, Youn-Ho;Kwon, Woo-Hyen
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.93-101
    • /
    • 2002
  • The quality of agricultural products is classified with various factors which are measured and determined by destructive and/or nondestructive method. NIR spectrum analysis method is used to determine internal qualities such as a brix and an acidity. CCD color camera is used to measure external quality like color and a size of fruit. Today, nondestructive methods are widely researched. The quality and the grade of fruit loaded into a cup automatically and measured in real time by camera and NIR system is determined by infernal and external factors. This paper proposes modified boundary tracking algorithm which detects the contour of fruit's color image and make chain code faster than conventional method. The chain code helps compute a size of fruit image and find multiple loading of a fruit in single cup or fruit between two cups. The designed classification system sorts a citrus at speed of 8 fruit/s, with evaluating a brix, an acidity and a size grade.

Depth Scaling Method of DirectX-based Stereoscopic Game Image (DirectX 기반 입체 게임 영상의 깊이감 조절 기법)

  • Kim, Jin-Mo;Cho, Hyung-Je
    • Journal of Korea Game Society
    • /
    • v.10 no.1
    • /
    • pp.135-146
    • /
    • 2010
  • The development of image technologies in such area as broadcasting and movies has recently increased our attention to 3D stereoscopic images. In addition, the development of stereoscopic image representation technologies in 3D contents becomes more active over time due to the representational limitations of 2D images. Without limitation to the above-mentioned area, stereoscopic image technologies have been developed and studied so that they can be widely accessed in diverse areas including medical services and education. Due to the refined production, however, required to represent a three dimensional effects and the fatigue caused by the perception of a three dimensional effects, the stereoscopic image technologies are not combined into real time systems such as games where environments change unforeseeably. In this study we design a technique to adjust the depth scaling that will enable efficient management of a three dimensional effects and to relieve fatigue through automatic view point interval adjustment in accordance with situations based on the geometrical structure of the DirectX SDK graphic pipeline. Through this, we would like to suggest a new alternative idea to activate the production of games combined with stereoscopic image technologies.

Improvement of Reliability of Static Execution Time Analysis Using Software Monitoring Technique (소프트웨어 감시 기법을 활용한 정적 실행시간 분석의 신뢰성 향상)

  • Kim, Yun-Kwan;Kim, Tae-Wan;Chang, Chun-Hyon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.37-45
    • /
    • 2010
  • A system which needs timely accuracy has to design and to verify correctly about execution-time for reliability. Accordingly, it is necessary for timing analysis tools, and much previous research worked. In timing analysis tool, there are two methods. One is a static analysis, and the other is a measurement based analysis. A static analysis is able to spend time less than a measurement based analysis method, but has low reliability of analysis result caused by hard to estimate time of I/O caused by various hardware. A measurement based analysis can be close analysis to real result, but it is hard to adapt to actual application, and spend a lot of time to get result of analysis. As such, this paper present a software monitoring architecture to supply reliability of static analysis process. In a presented architecture, it can select target as needed measurement through static analysis, and reuse result of measurement exist. Therefore, The architecture can reduce overload of time and performance for measurement, and improve the reliability which is the worst problem of static analysis.

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.

Design and Implementation of a Dual Mode Terminal for Fast Handoff between WLAN and Cdma2000 Mobile Networks (무선랜과 Cdma2000 이동통신망간 고속 핸드오프를 위한 이중 모드 단말의 설계 및 구현)

  • Kim, Jun-Ha;Cho, Jin-Sung;Kim, Tae-Hyoun;Lee, Ji-Cheol;Lee, Sang-Do;Lee, Sung-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.183-190
    • /
    • 2007
  • The cdma2000 mobile network covers a wide area but its characteristics are high cost and low bandwidth. On the other hand, WLAN covers a small area like a hot spot area but its characteristics are large bandwidth and low cost. Thus we can provide efficient services when we employ an integration network between WLAN and cdma2000 mobile networks. In this paper, we propose an integration scheme between WLAN and cdma2000 mobile networks. In addition, we design and implement the dual mode terminal which receives seamless data services in the integrated network. The proposed dual mode terminal manages connections by monitoring the signal strength of WLAN and selecting a proper network. We validate the functions through the implementation of VOD and show the effectiveness through the performance measurement.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

A Study on the Realization of ADS-B 1090ES Ground Station Receivers (ADS-B 1090ES 지상국 수신기 구현에 관한 연구)

  • Park, Chan-Sub;Yoon, Jun-Chul;Cho, Ju-Yong;Shin, Hee-Sung;Seo, Jong-Deok;Park, Hyo-Dal;Kang, Suk-Youb
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.79-88
    • /
    • 2015
  • This paper introduces surveillance equipment "ADS-B", the core subject of traffic control system and study of ADS-B 1090ES ground receiver. The standard is set not only for functional but also its reliability by analyzing international standard documents and existing products. The Bias circuit is designed for less power consumption, low noise and high gain for RF module. The signal processing is capable of overcoming its bad conditions. MCU part is configured with the latest CPU for high speed communication with external parts and SNMP is selected for remote control communication. The performance of developed receiver satisfies national and international standards and its functions are more advanced compared to foreign receivers.