• Title/Summary/Keyword: 프레임워크 개발

Search Result 1,737, Processing Time 0.029 seconds

Implementation of Loop Peeling in CTOC (CTOC에서 루프 벗기기 구현)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.27-35
    • /
    • 2008
  • The CTOC framework was implemented to efficiently perform analysis and optimization of the Java bytecode that is often being used lately. In order to analyze and optimize the bytecode from the CTOC, the eCFG was first generated. Due to the bytecode characteristics of difficult analysis, the existing bytecode was expanded to be suitable for control flow analysis. and the control flow graph was drawn. We called eCFG(extended Control Flow Graph). Furthermore, the eCFG was converted into the SSA Form for a static analysis. Many loops were found in the conversion program. The previous CTOC performed conversion directly into the SSA Form without processing the loops. However, processing the loops prior to the SSA Form conversion allows more efficient generation of the SSA Form. This paper examines the process of finding the loops prior to converting the eCFG into the SSA Form In order to efficiently process the loops, and exhibits the procedures for generating the loop tree.

  • PDF

Cleaning Noises from Time Series Data with Memory Effects

  • Cho, Jae-Han;Lee, Lee-Sub
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.37-45
    • /
    • 2020
  • The development process of deep learning is an iterative task that requires a lot of manual work. Among the steps in the development process, pre-processing of learning data is a very costly task, and is a step that significantly affects the learning results. In the early days of AI's algorithm research, learning data in the form of public DB provided mainly by data scientists were used. The learning data collected in the real environment is mostly the operational data of the sensors and inevitably contains various noises. Accordingly, various data cleaning frameworks and methods for removing noises have been studied. In this paper, we proposed a method for detecting and removing noises from time-series data, such as sensor data, that can occur in the IoT environment. In this method, the linear regression method is used so that the system repeatedly finds noises and provides data that can replace them to clean the learning data. In order to verify the effectiveness of the proposed method, a simulation method was proposed, and a method of determining factors for obtaining optimal cleaning results was proposed.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

Implementation of Management of Cafe Staying Time (블록체인을 활용한 카페 이용시간 관리 시스템 구현)

  • Park, Jae-hoon;Kwon, Hyeok-dong;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.946-954
    • /
    • 2021
  • Since COVID19 virus has been occured, variety steps of the quarantine guidelines were enacted. In step 2.5, eating in a cafe was prohibited and only takeout was permitted, but the government has changed several rules. So now people can have a dissert or coffee in the cafe. Though the government adviced available staying time as 1 hour, it is not obeyed often except superstore, and even the management depends on handwriting. In this paper, we implemented a blockchain system to use for this case. This system is implemented with using hyperledger fabric, the blockchain framework which is made by IBM. For a test, 1 organization is in the system and chaincode is installed to the organization to run the system. We expect the certain effect to the quarantine via this system. Moreover, we will develop an application by using this system as a backend.

Analysis of Tensor Processing Unit and Simulation Using Python (텐서 처리부의 분석 및 파이썬을 이용한 모의실행)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.165-171
    • /
    • 2019
  • The study of the computer architecture has shown that major improvements in price-to-energy performance stems from domain-specific hardware development. This paper analyzes the tensor processing unit (TPU) ASIC which can accelerate the reasoning of the artificial neural network (NN). The core device of the TPU is a MAC matrix multiplier capable of high-speed operation and software-managed on-chip memory. The execution model of the TPU can meet the reaction time requirements of the artificial neural network better than the existing CPU and the GPU execution models, with the small area and the low power consumption even though it has many MAC and large memory. Utilizing the TPU for the tensor flow benchmark framework, it can achieve higher performance and better power efficiency than the CPU or CPU. In this paper, we analyze TPU, simulate the Python modeled OpenTPU, and synthesize the matrix multiplication unit, which is the key hardware.

A Study on the Standard Link-based Travel Speed Calculation System Using GPS Tracking Information (GPS 운행궤적정보를 이용한 표준링크기반 통행속도 산출 시스템 연구)

  • Song, Gil jong;Hwang, Jae Seon;Lim, Jae Jung;Jung, Eui Yong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.142-155
    • /
    • 2019
  • This study was conducted with the aim of developing a system to collect taxi GPS probe information to prevent link defects and to improve the accuracy of the standard link-based travel speed by determining when to go into and come out the link. For this purpose, a framework and algorithm consisting of a five-step process for standard link-based map matching and individual vehicle travel speed are presented and used it to calculate the average travel speed of the service link. Two on-site surveys of Teheran and Hakdong-ro were conducted to verify the results by the methods proposed in this paper. On the basis of the overall time of the field survey, the deviation in the travel speed was 0.2 km/h and 0.6 km/h, the accuracy was 99% and 96%, and the MAPE(Mean Absolute Percentage Error) was 1% and 4% in Teheran and Hakdong-ro, respectively. These results were more accurate thand those obtained using conventional methodologies without standard links.

Handwritten One-time Password Authentication System Based On Deep Learning (심층 학습 기반의 수기 일회성 암호 인증 시스템)

  • Li, Zhun;Lee, HyeYoung;Lee, Youngjun;Yoon, Sooji;Bae, Byeongil;Choi, Ho-Jin
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.25-37
    • /
    • 2019
  • Inspired by the rapid development of deep learning and online biometrics-based authentication, we propose a handwritten one-time password authentication system which employs deep learning-based handwriting recognition and writer verification techniques. We design a convolutional neural network to recognize handwritten digits and a Siamese network to compute the similarity between the input handwriting and the genuine user's handwriting. We propose the first application of the second edition of NIST Special Database 19 for a writer verification task. Our system achieves 98.58% accuracy in the handwriting recognition task, and about 93% accuracy in the writer verification task based on four input images. We believe the proposed handwriting-based biometric technique has potential for use in a variety of online authentication services under the FIDO framework.

A Study on the Development Direction of Education and Training System based on AR/VR Technology (가상현실 및 증강현실 기술을 기반 한 교육·훈련 체계 개발 방향 설정에 관한 연구)

  • Park, Myunghwan;Lee, Sangsoo;Jeon, Ki Seok;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.4
    • /
    • pp.545-554
    • /
    • 2019
  • The purpose of this study is to develop a method of applying AR(Augmented Reality)/VR(Virtual Reality) to educational and training systems from a comprehensive perspective, rather than applying AR/VR technology to specific education and training systems. We suggested whether to apply AR or VR technology to education and training system, the level of application of technology when constructing using AR/VR technology, and the criteria of priority among many education and training systems. To do this, we presented the framework of application of AR/VR technology, the evaluation criteria for selecting priority of education and training system applying AR/VR, and the systematic procedure for utilization of developed method. This study is significant in that it has developed a method to determine the direction of systematic AR/VR technology application for all education and training systems operated by the military or organization. This is expected to contribute to the overall efficiency of the organization in terms of economical utilization of the limited budget as well as the various benefits of utilizing basic AR/VR technology.

Influence Factors of Intent to Purchase Personalized Controller Product Design in 3D Printing Environment (3D 프린팅 환경에서 개인 맞춤형 컨트롤러 제품디자인 구매 의도의 영향요인에 관한 연구)

  • Park, Jun-Hong;Lee, Junsang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.873-878
    • /
    • 2020
  • Due to the recent development of 3D printers, interest in 3D printing is growing. 3D printing should reflect individual needs and various requirements by designing products to suit the user's requirements. Research on how to use 3D printed products for the purpose of purchasing products according to user's demand characteristics is insufficient. Therefore, this study conducted a survey and statistical analysis to find out the factors influencing the intention of purchasing custom controller products in 3D printing environments. Research has confirmed that user innovation and convenience safety are important factors for the satisfaction and purchase intent of personal-tailored controller products. Considering user innovation, convenience, and safety when producing controller products using 3D printing, it is expected that value of custom controller manufacturing can be increased. Research is needed on the personalized product development framework that successfully introduces and systematically supports the production methods of personalized products in the early stages.

Design and Implementation of BioAPI v2.0 based BSP Conformance Test Suite (BioAPI v2.0 기반 BSP 표준 적합성 시험 도구의 설계 및 구현)

  • Jang Ji-Hyeon;Lee Dong-Geun;Kim Jae-Sung;Kim Hak-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.129-141
    • /
    • 2006
  • The purpose of this paper is to design Conformance Test Suite for BSP(Biometric Service Provider) based on BioAPI(Biometric Application Programming Interface) v2.0. The proposed BioAPI Conformance Test Suite enables users to test BSP with framework independently. A test scheduling tool has been embodied to use Test Assertion in the form of XML. In order to demonstrate the performance of the Conformance Test Suite, the experiment was performed by using both verification and identification BSPs. As the results of this experiment, we were able to determinate whether BSPs based on BioAPI v2.0 satisfied standard requirements or not.