• Title/Summary/Keyword: 한국컴퓨터

Search Result 35,900, Processing Time 0.059 seconds

A Study of High-Precision Time-Synchronization for TDoA-Based Location Estimation (TDoA 기반의 위치 추정을 위한 초정밀 시각동기에 관한 연구)

  • Kim, Jae Wan;Eom, Doo Seop
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.7-14
    • /
    • 2013
  • Presently, there are many different technologies used for position detection. However, as signal-receiving devices operating in different locations must detect the precise position of objects located at long distances, it is essential to know the precise time at which an object's or a user's terminal device sends a signal. For this purpose, the existing time of arrival (ToA) technology is not sufficiently reliable, and the existing time difference of arrival (TDoA) technology is more suitable. If a TDoA-based electric surveillance system and other tracking devices fail to achieve precise time-synchronization between devices with separation distance operation, it is impossible to obtain correct TDoA values from the signals sent by the signal-receiving devices; this failure to obtain the correct values directly affects the location estimation error. For this reason, the technology for achieving precise time synchronization between signal-receiving devices in separation distance operation, among the technologies previously mentioned, is a core technology for detecting TDoA-based locations. In this paper, the accuracy of the proposed time synchronization and the measurement error in the TDoA-based location detection technology is evaluated. The TDoA-based location measurement error is significantly improved when using the proposed method for time-synchronization error reduction.

mSFP: Multicasting-based Inter-Domain Mobility Management Scheme in Sensor-based Fast Proxy Mobile IPv6 Networks (센서기반 FPMIPv6 네트워크에서 멀티캐스팅 기반의 도메인간 이동성관리 기법)

  • Jang, Hana;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.15-26
    • /
    • 2013
  • IP-based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Because of the energy inefficiency of networks-based mobility management protocols can be supported in IP-WSN. In this paper we propose a network based mobility supported IP-WSN protocol called Multicasting-based inter-Domain Mobility Management Scheme in Sensor-based Fast Proxy Mobile IPv6 Networks (mSFP). Based on [8,20], We present its network architecture and evaluate its performance by considering the signaling and mobility cost. Our analysis shows that the proposed scheme reduces the signaling cost, total cost, and mobility cost. With respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 7% and the total cost by 3%. With respect to the number of hops, the proposed scheme reduces the signaling cost by 6.9%, the total cost by 2.5%, and the mobility cost by 1.5%. With respect to the number of IP-WSN nodes, the proposed scheme reduces the mobility cost by 1.6%.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

Distributed Assumption-Based Truth Maintenance System for Scalable Reasoning (대용량 추론을 위한 분산환경에서의 가정기반진리관리시스템)

  • Jagvaral, Batselem;Park, Young-Tack
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1115-1123
    • /
    • 2016
  • Assumption-based truth maintenance system (ATMS) is a tool that maintains the reasoning process of inference engine. It also supports non-monotonic reasoning based on dependency-directed backtracking. Bookkeeping all the reasoning processes allows it to quickly check and retract beliefs and efficiently provide solutions for problems with large search space. However, the amount of data has been exponentially grown recently, making it impossible to use a single machine for solving large-scale problems. The maintaining process for solving such problems can lead to high computation cost due to large memory overhead. To overcome this drawback, this paper presents an approach towards incrementally maintaining the reasoning process of inference engine on cluster using Spark. It maintains data dependencies such as assumption, label, environment and justification on a cluster of machines in parallel and efficiently updates changes in a large amount of inferred datasets. We deployed the proposed ATMS on a cluster with 5 machines, conducted OWL/RDFS reasoning over University benchmark data (LUBM) and evaluated our system in terms of its performance and functionalities such as assertion, explanation and retraction. In our experiments, the proposed system performed the operations in a reasonably short period of time for over 80GB inferred LUBM2000 dataset.

Naming Scheme and Its Implementation for the Network Management of Content Centric Networking Integrated with SNMP (SNMP를 연동한 콘텐츠 중심 네트워킹 망관리를 위한 이름 구조 및 이의 구현)

  • Kim, Kwangsoo;Roh, Byeong-hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.119-126
    • /
    • 2018
  • Content-centric networking (CCN) is a future Internet technology to reorganize the paradigm of end-to-end communication of the current IP-based Internet architecture into a content-based paradigm. In managing such new networks, the network management is one of the most important functions. The standard for typical network management in existing IP networks is Simple Network Management Protocol (SNMP). Though there have been several works to implement network management functions on CCN, they have their own limitations to apply them to pure CCN operational environments. The basic reason of the limitation is that existing methods operate in an IP-overlay structure, or do not support push-type information exchange. In this paper, we propose a new naming structure that can accommodate both pull and push-type SNMP methods for CCN network management with SNMP. Then, methods to support GET and TRAP methods as well as a SET method of SNMP in the pure CCN environment using the proposed naming structure are proposed. We implement the proposed method using CCNx, and construct a CCN network testbed to validate the effectiveness of the proposed method by monitoring appropriate exchange of SNMP messages over the testbed.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.

Wear Properties of Hybrid Metal Matrix Composites (하이브리드 금속복합재료의 마모특성)

  • 부후이후이;송정일
    • Composites Research
    • /
    • v.16 no.3
    • /
    • pp.75-84
    • /
    • 2003
  • The purpose of this study is to investigate the wear properties of Saffil/Al, Saffil/A12O3/Al and Saffil/SiC/Al hybrid metal matrix composites fabricated by squeeze casting method. Wear tests were done on a pin-on-disk friction and wear tester under both dry and lubricated conditions. The wear properties of the three composites were evaluated in many respects. The effects of Saffil fibers, $\textrm{Al}_2\textrm{O}_3$ particles and SiC particles on the wear behavior of the composites were investigated. Wear mechanisms were analyzed by observing the worn surfaces of the composites. The variation of coefficient of friction(COF) during the wear process was recorded by using a computer. Under dry sliding condition, Saffil/SiC/Al showed the best wear resistance under high temperature and high load, while the wear resistances of Saffil/Al and Saffi1/$\textrm{Al}_2\textrm{O}_3$/Al were very similar. Under dry sliding condition, the dominant wear mechanism was abrasive wear under mild load and room temperature, and the dominant wear mechanism changed to adhesive wear as load or temperature increased. Molten wear occurred at high temperature. Compared with the dry sliding condition, all three composites showed excellent wear resistance when lubricated by liquid paraffin. Under lubricated condition, Saffil/Al showed the best wear resistance among them, and its COF value was the smallest. The dominant wear mechanism of the composites under lubricated condition was microploughing, but microcracking also occurred to them to different extents.

Case Study on Software Education using Social Coding Sites (소셜 코딩 사이트를 활용한 소프트웨어 교육 사례 연구)

  • Kang, Hwan-Soo;Cho, Jin-Hyung;Kim, Hee-Chern
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.37-48
    • /
    • 2017
  • Recently, the importance of software education is growing because computational thinking of software education is recognized as a key means of future economic development. Also human resources who will lead the 4th industrial revolution need convergence and creativity, computational thinking based on critical thinking, communication, and collaborative learning is known to be effective in creativity education. Software education is also a time needed to reflect social issues such as collaboration with developers sharing interests and open source development methods. Github is a leading social coding site that facilitates collaborative work among developers and supports community activities in open software development. In this study, we apply operational cases of basic learning of social coding sites, learning for storage server with sources and outputs of lectures, and open collaborative learning by using Github. And we propose educational model consisted of four stages: Introduction to Github, Using Repository, Applying Social Coding, Making personal portfolio and Assessment. The proposal of this paper is very effective for software education by attracting interest and leading to pride in the student.

A Study on the Visual Representation of TREC Text Documents in the Construction of Digital Library (디지털도서관 구축과정에서 TREC 텍스트 문서의 시각적 표현에 관한 연구)

  • Jeong, Ki-Tai;Park, Il-Jong
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.3
    • /
    • pp.1-14
    • /
    • 2004
  • Visualization of documents will help users when they do search similar documents. and all research in information retrieval addresses itself to the problem of a user with an information need facing a data source containing an acceptable solution to that need. In various contexts. adequate solutions to this problem have included alphabetized cubbyholes housing papyrus rolls. microfilm registers. card catalogs and inverted files coded onto discs. Many information retrieval systems rely on the use of a document surrogate. Though they might be surprise to discover it. nearly every information seeker uses an array of document surrogates. Summaries. tables of contents. abstracts. reviews, and MARC recordsthese are all document surrogates. That is, they stand infor a document allowing a user to make some decision regarding it. whether to retrieve a book from the stacks, whether to read an entire article, etc. In this paper another type of document surrogate is investigated using a grouping method of term list. lising Multidimensional Scaling Method (MDS) those surrogates are visualized on two-dimensional graph. The distances between dots on the two-dimensional graph can be represented as the similarity of the documents. More close the distance. more similar the documents.

From Broken Visions to Expanded Abstractions (망가진 시선으로부터 확장된 추상까지)

  • Hattler, Max
    • Cartoon and Animation Studies
    • /
    • s.49
    • /
    • pp.697-712
    • /
    • 2017
  • In recent years, film and animation for cinematic release have embraced stereoscopic vision and the three-dimensional depth it creates for the viewer. The maturation of consumer-level virtual reality (VR) technology simultaneously spurred a wave of media productions set within 3D space, ranging from computer games to pornographic videos, to Academy Award-nominated animated VR short film Pearl. All of these works rely on stereoscopic fusion through stereopsis, that is, the perception of depth produced by the brain from left and right images with the amount of binocular parallax that corresponds to our eyes. They aim to emulate normal human vision. Within more experimental practices however, a fully rendered 3D space might not always be desirable. In my own abstract animation work, I tend to favour 2D flatness and the relative obfuscation of spatial relations it affords, as this underlines the visual abstraction I am pursuing. Not being able to immediately understand what is in front and what is behind can strengthen the desired effects. In 2015, Jeffrey Shaw challenged me to create a stereoscopic work for Animamix Biennale 2015-16, which he co-curated. This prompted me to question how stereoscopy, rather than hyper-defining space within three dimensions, might itself be used to achieve a confusion of spatial perception. And in turn, how abstract and experimental moving image practices can benefit from stereoscopy to open up new visual and narrative opportunities, if used in ways that break with, or go beyond stereoscopic fusion. Noteworthy works which exemplify a range of non-traditional, expanded approaches to binocular vision will be discussed below, followed by a brief introduction of the stereoscopic animation loop III=III which I created for Animamix Biennale. The techniques employed in these works might serve as a toolkit for artists interested in exploring a more experimental, expanded engagement with stereoscopy.