• Title/Summary/Keyword: 프리미티브

Search Result 110, Processing Time 0.026 seconds

Real-Time Scheduling Facility for Video-On-Demand Service (주문형 비디오 서비스를 위한 실시간 스케쥴링 기능)

  • Sohn, Jong-Moon;Kim, Gil-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2581-2595
    • /
    • 1997
  • In this paper, the real-time facility of the operating system for a VOD(Video On Demand) server have been analyzed and implemented. The requirements of the real-time scheduling have been gathered by analyzing the model of the video-data-transfer-path. Particularly, the influence of the bottleneck subsystem have been analyzed. Thus, we have implemented the real-time scheduler and primitives which is proper for processing the digital video. In performance measurements, the degree of the guarantee of the real-time scheduler have been experimented. The measured data show that the most time constraints of the process is satisfied. But, the network protocol processing by the interrupt is a major obstacle of the real-time scheduling. We also have compared the difference between the real-time scheduler and the non-real-time scheduler by measuring the inter-execution time. According to the measured results, the real-time scheduler should be used for efficient video service because the processor time allocated to the process can't be estimated when the non-real-time scheduler is used.

  • PDF

A Development of Simulator for Autonomous Navigation System of UUV (무인잠수정의 자율운항시스템을 위한 시뮬레이터 개발)

  • Lee, Young-Il;Min, Jong-Soo;Song, Jin-Kook;Kim, Yong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.581-589
    • /
    • 2008
  • The goal of a simulator is to provide for the testing of new technologies and to facilitate the eventual transfer of these technologies to the applications. In the Development Step, Simulation can provide a cost effective alternative to expensive and hazardous field testing. In this paper, a 3D simulator is developed to test UUV navigation system bated on RVC model. The simulation system consists of a environment manager, objects and a 3D viewer. Objects are modeling all physical elements such as map, obstacle and UUV which reside in a underwater environment. Those objects are created and initialized by environment manager. The environment manager plays the role of intermediator which allows created objects to interact with each other, and transmits information on the objects to 3D viewer. The 3D viewer analyzes the received information and visualizes 3D graphic by using OpenGL primitives.

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

Separated Control Signaling Protocol for WDM Optical Networks (파장 분할 다중화 방식을 사용하는 광 전송망을 위한 분리 제어 신호 방식)

  • No, Seon-Sik;Kim, Su-Hyeon;So, Won-Ho;Kim, Yeong-Cheon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.6
    • /
    • pp.1-11
    • /
    • 2000
  • In this paper, we propose a novel control signaling protocol that efficiently controls connection setup and increases the utilization of network resources. The proposed protocol, Separated Control Signaling Protocol(SCSP), separates bearer control from call control lot WDM optical networks. The main function of call control is to check the availability of network resources such as wavelengths and receivers at destination node. Bearer control is to reserve and assign wavelengths. The signaling architecture of this protocol consists of call controller and hearer controller The call controller handles call setup and release, activates the beater controller, and manages the status of call and bearer. The bearer controller reserves wavelengths, sets up bearer, tears down bearer. and notifies the status of beater to call controller. The state transition diagrams of each controller are designed. Using control messages and related primitives, the information flows for call setup and bearer setup, hearer teardown and call release, and reaction for setup failures are described to evaluate the performance. The simulation results show that the separated control signaling protocol is superior to conventional one in terms of call blocking probability and resource utilization.

  • PDF

Standard Configuration for Interface of the Traffic Information Service using DSRC (DSRC를 이용한 교통정보서비스 인터페이스 표준 구성)

  • Kim, Kyoung-Hwan;Cho, Yung-Sung;Bae, Myoung-Hwan;Kim, Sang-Heon;Lee, Kyeong-Im
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.5
    • /
    • pp.1-13
    • /
    • 2011
  • Recently, a number of OBU(On Board Unit) have being spreaded since ETCS(Electronic Toll Collection System)using DSRC(Dedicated Short Range Communication) was installed in the tollgate of the whole country. Many R&D and commercialization related to ITS service using DSRC and OBU mentioned above are ongoing such as traffic information collection and provision and a signal control, and public traffic information and management and so on. Especially, there are many researches conducted(conducting) on traffic information collection and provision using communication between OBU and RSE. However, Standards for both DSRC application and traffic collection and provision are not established clearly yet. So we would like to suggest a method of traffic information collection and provision without changing of standard related to DSRC. This method is to put the traffic messages into the existing Action primitive for ETC, which is described on "Technical criterion IV of basic traffic information exchange" which was notified by Ministry of Land, Transport and Maritime Affairs. Proposed standard application method is applied both to RSE and OBE. It is the same system which ETCS used in highway, currently. We confirmed the efficiency and performance of the system through conducting a variety of driving test using 4 vehicles in real road condition. Result of the real road test shows the effectiveness and validity of this method with about 97% communication success rate and based on studying the cases of 3% communication failure, we can analyse the expected problems in traffic information collection and provision using this method.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

A Study on the Abstraction of Movements Based on Laban's Space Theory "Choreutics" (라반의 공간조화이론 "코레우틱스(Choreutics)"를 활용한 움직임의 추상적 시각화 연구)

  • Kim, Hyeran;Lee, Sang Wook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.371-381
    • /
    • 2017
  • This paper presents a methodology for creating abstract animation based on the human movement theories originating from the work of dance theorist Rudolf von Laban. Laban Movement Analysis is a method and language for describing, visualizing, interpreting and documenting all varieties of human movement, and Choreutics is based on universal patterns of nature and of human as part of a universal design. Laban defines the space of movements in a profoundly dualistic way. Outwardly, his objective and scientific definitions provide a concrete base for generating human movements in computer graphics in terms of geometric and motion primitives such as points, lines, planes, polygons, linear and nonlinear movements. On the other hand, he also offers a system for understanding the subtle characteristics about the way a movement is dynamically done with respect to inner intention. Laban's interpretations of human motion can be utilized potentially in plastic arts and computer arts. Our work was inspired by those physical and psychological analyses and computer algorithms have been developed for creating abstract animation. We presented our computer animation works entitled "Choreography" in the exhibitions: a special section in "2015 Craft Trend Fair" and "Make Your Movement" held in the Korean Cultural Centre in UK, 2016. In this paper, we describe our ideas and methods for creating abstract object movements based on the Laban's motion representations.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.