• Title/Summary/Keyword: 함수상태

Search Result 1,792, Processing Time 0.029 seconds

Detection of Potential Invalid Function Pointer Access Error based on Assembly Codes (어셈블리어 코드 기반의 Invalid Function Pointer Access Error 가능성 검출)

  • Kim, Hyun-Soo;Kim, Byeong-Man
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.938-941
    • /
    • 2010
  • Though a compiler checks memory errors, it is difficult for the compiler to detect function pointer errors in code level. Thus, in this paper, we propose a method for effectively detecting Invalid function pointer access errors, by analyzing assembly codes that are obtained by disassembling an executable file. To detect the errors, assembly codes in disassembled files are checked out based on the instruction transition diagrams which are constructed through analyzing normal usage patterns of function pointer access. When applying the proposed method to various programs having no compilation error, a total of about 500 potential errors including the ones of well-known open source programs such as Apache web server and PHP script interpreter are detected among 1 million lines of assembly codes corresponding to a total of about 10 thousand functions.

  • PDF

A Study on Encryption using Polynomial Hash Function for e-Seal (e-Seal을 위한 다항식 해시 함수를 이용한 암호화기법 연구)

  • Yon, Yong-Ho;Shin, Moon-Sun;Lee, Jong-Yon;Hwange, Ik-Soo;Seok, Changk-Boo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1977-1985
    • /
    • 2009
  • An e-Seal is an active RFID device that was set on the door of a container. e-Seal provides both the state of the seal and the remote control of the device automatically. But it has vulnerabilities like eavesdrop and impersonate because of using RFID system. A secure e-Seal authentication protocol must use PRF for encryption/decryption of reader and e-Seal. The existing PRF uses simple hash function such as MD5 or SHA which is not available for e-Seal. It is required to use strong hash functions. The hash function is a essential technique used for data integrity, message authentication and encryption in the mechanism of information security. Therefore, in this paper, we propose more secure and effective hash function based on polynomial for e-Seal authentication protocol.

Modeling of Degenerate Quantum Well Devices Including Pauli Exclusion Principle

  • Lee, Eun-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.2
    • /
    • pp.14-26
    • /
    • 2002
  • A new model for degenerate semiconductor quantum well devices was developed. In this model, the multi-subband Boltzmann transport equation was formulated by applying the Pauli exclusion principle and coupled to the Schrodinger and Poisson equations. For the solution of the resulted nonlinear system, the finite difference method and the Newton-Raphson method was used and carrier energy distribution function was obtained for each subband. The model was applied to a Si MOSFET inversion layer. The results of the simulation showed the changes of the distribution function from Boltzmann like to Fermi-Dirac like depending on the electron density in the quantum well, which presents the appropriateness of this modeling, the effectiveness of the solution method, and the importance of the Pauli -exclusion principle according to the reduced size of semiconductor devices.

A Function Approximation Method for Q-learning of Reinforcement Learning (강화학습의 Q-learning을 위한 함수근사 방법)

  • 이영아;정태충
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1431-1438
    • /
    • 2004
  • Reinforcement learning learns policies for accomplishing a task's goal by experience through interaction between agent and environment. Q-learning, basis algorithm of reinforcement learning, has the problem of curse of dimensionality and slow learning speed in the incipient stage of learning. In order to solve the problems of Q-learning, new function approximation methods suitable for reinforcement learning should be studied. In this paper, to improve these problems, we suggest Fuzzy Q-Map algorithm that is based on online fuzzy clustering. Fuzzy Q-Map is a function approximation method suitable to reinforcement learning that can do on-line teaming and express uncertainty of environment. We made an experiment on the mountain car problem with fuzzy Q-Map, and its results show that learning speed is accelerated in the incipient stage of learning.

Transient Response Analysis of a Lumped Mass System Using Sensitivity Method in Time Domain (시간영역 민감도 방법을 이용한 집중 질량 구조물의 천이응답 해석)

  • 백문열;기창두
    • Computational Structural Engineering
    • /
    • v.10 no.3
    • /
    • pp.217-223
    • /
    • 1997
  • This paper deals with the basic concepts of sensitivity analysis in a time domain for the transient response of a lumped mass system. Sensitivity analysis methods in thme domain for determining the effects of parameter changes on the response of a dynamic system by external excitation are presented. The parametric sensitivity of a lumped mass system in time domain can be investigated using different types of sensitivity functions, including first order standard and percentage sensitivity functions. These sensitivity functions are determined as a function of partial derivatives of system variables taken with respect to system parameters. In addition, we compared the results of the analytical method by direct method and those of numerical methods.

  • PDF

ECG Compression Structure Design Using of Multiple Wavelet Basis Functions (다중웨이브렛 기저함수를 이용한 심전도 압축구조설계)

  • Kim Tae-hyung;Kwon Chang-Young;Yoon Dong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.467-472
    • /
    • 2005
  • ECG signals are recorded for diagnostic purposes in many clinical situations. Also, In order to permit good clinical interpretation, data is needed at high resolutions and sampling rates. Therefore In this paper, we designed to compression structure using multiple wavelet basis function(SWBF) and compared to single wavelet basis function(SWBF) and discrete cosine transform(DCT). For experience objectivity, Simulation was performed using the arrhythmia data with sampling frequency 360Hz, resolution lIbit at MIT-BIH database. An estimate of performance estimate evaluate the reconstruction error. Consequently compression structure using MWBF has high performance result.

Developing a Three-dimensional Spectral Model Using Similarity Transform Technique (유사변환기법을 이용한 3차원 모델의 개발)

  • Kang, Kwan-Soo;So, Jae-Kwi;Jung, Kyung-Tae;Sonu, Jung Ho
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.5 no.2
    • /
    • pp.107-120
    • /
    • 1993
  • This paper presents a new modal solution of linear three-dimensional hydrodynamic equations using similarity transform technique. The governing equations are first separated into external and internal mode equations. The solution of the internal mode equation then proceeds as in previous modal models using the Galerkin method but with expansion of arbitrary basis functions. Application of similarity transform to resulting full matrix equations gives rise to a set of uncoupled partial differential equations of which the unknowns are coefficients of mode vector. Using the transform technique a computationally efficient time integration is possible. In present from the model use Chebyshev polynomials for Galerkin solution of internal mode equations. To examine model performance the model is applied to a homogeneous, rectangular basin of constant depth under steady, uniform wind field.

  • PDF

The Variation of Compressional Wave Velocity with Degree of Saturation in Granites

  • Lee, Su-Gon
    • Journal of the Korean Geotechnical Society
    • /
    • v.15 no.3
    • /
    • pp.177-197
    • /
    • 1999
  • The measurement of sonic velocities is commonly used as an index of engineering properties of rock, but it is not widely appreciated that this velocity can change markedly with the degree of saturation of the sample. This paper records the nature of this variation as seen in samples of Korean granite. The ISRM method of testing suggested for this index can also create difficulties, especially if vaseline is used as a coupling agent, and invades the samples, and if the sample volume changes with degree of saturation. Careful measurements of the natural variation in sonic velocity that occur in a sample whose saturation is gradually increased may be a means of assessing the relic stresses within it.

  • PDF

ART2 Based Fuzzy Binarization Method (ART2 기반 퍼지 이진화 방법)

  • Son, Jae-hyun;Lee, Sun-mi;Park, Choong-Shik;Song, Doo Heon;Kim, Kwang-Beak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.82-85
    • /
    • 2014
  • 퍼지 이진화는 영상에 대한 임계값을 원본 영상의 가장 밝은 픽셀과 가장 어두운 픽셀의 평균값으로 설정하고 이를 삼각형 타입의 소속 함수에 적용하여 영상을 이진화한다. 그러나 퍼지 이진화는 영상의 배경과 물체의 밝기 차이가 큰 경우에는 이진화가 효과적이지만 차이가 크지 않은 경우에는 소속 함수 구간을 효율적으로 설정할 수 없어 이진화를 효과적으로 할 수 없다. 따라서 본 논문에서는 이러한 문제점을 개선하기 위해 ART2 알고리즘을 적용하여 각 클러스터의 중심 값을 구한다. 그리고 각 클러스터의 중심 값에 해당하는 명암도를 이용하여 평균값을 구한 후, 이 평균값을 퍼지 이진화 방법에서 소속 함수 구간의 중간 값으로 설정하여 영상을 이진화 한다. 제안된 방법의 성능을 평가하기 위해 다양한 영상에서 제안된 방법과 기존의 퍼지 이진화 방법을 적용한 결과, 기존의 퍼지 이진화 방법보다 정보 손실이 적은 상태에서 영상이 이진화되는 것을 확인하였다.

  • PDF

농약과 잔류성III - 토양중의 농약잔류(하) - 잔류성 지배요인은 무엇인가

  • 이해근
    • The Bimonthly Magazine for Agrochemicals and Plant Protection
    • /
    • v.9 no.2
    • /
    • pp.32-38
    • /
    • 1988
  • 농약을 매년 사용하게 되면 토양 중의 농약잔류량은 계속 증가할 것으로 생각되기 쉬우나, 실제로 토양중 농약잔류량은 지수 함수적으로 감소하기 때문에 매년 계속해서 사용하더라도 몇 년 후에는 평형상태에 도달하여 그 이상은 증가하지 않기 때문이다.

  • PDF