• 제목/요약/키워드: Data corruption

검색결과 107건 처리시간 0.028초

실시간 운영체제에서 효율적인 메시지 큐 제어 (Effective Control of Message Queues on Real-Time Operating Systems)

  • 류현수;이재규;성영락;이철훈
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 가을 학술발표논문집 Vol.30 No.2 (1)
    • /
    • pp.295-297
    • /
    • 2003
  • 실시간 운영체제는 여러 개의 독립적인 태스크가 동시에 실행될 수 있는 멀티태스킹 환경을 제공한다. 이러한 독립적인 태스크들 사이에 정보를 주고받기 위해서는 태스크들 사이의 통신이 필요하며 이러한 ITC(Inter-Task Communication)를 지원하는 방법에는 Global Variable과 Message 전송 두 가지 방법이 있다. Global Variable 은 Data Corruption 의 위험이 있기 때문에 보통의 실시간 운영체제에서는 Message 전송 방식을 주로 사용하는데 이러한 방식에는 메시지 큐, 메시지 메일박스, 메시지 포트 등이 있다. 본 논문에서는 태스크들 간에 또는 태스크와 ISR(Interrupt Service Routine)이 여러 개의 메시지를 서로 전달할 수 있는 메시지 큐에 대해서 설명하고 있다. 또한 태스크 또는 ISR 이 메시지 큐로부터 메시지를 주고받을 때 메모리의 동적 할당을 보다 효과적으로 처리함으로써 효율적인 메시지 큐 제어기법에 대해서 제시하고 있다.

  • PDF

블록체인 기반의 스마트 건설계약 프레임워크 (Construction Contract Management Framework Using the Blockchain Technology)

  • 추이 진뤼이;문성우
    • 한국BIM학회 논문집
    • /
    • 제11권1호
    • /
    • pp.1-10
    • /
    • 2021
  • Blockchain is a secure technology that enables transactions between parties without risking data corruption. Besides cryptocurrencies, blockchain technology is being widely adopted in various forms by diverse industries. One promising application is construction contracts. Given that construction projects are executed under strict contractual requirements, blockchain technology-based contracts can ensure that contractual requirements are executed among parties to the contract. The objective of this study is to apply blockchain technology to smart construction contracts and determine their potential feasibility in construction management. In this study, a prototype smart construction contract is presented and its applicability is explored. We conclude that smart construction contracts can be effective as a contractual tool to enhance payment flows in the construction process.

Natural resource management: A systematic literature review

  • Asif, Muhammad;Zaman, Khalid;Khan, Khan Burhan
    • Advances in environmental research
    • /
    • 제9권4호
    • /
    • pp.295-312
    • /
    • 2020
  • The earlier literature widely documented the role of natural resources in economic development and confined their findings either in support of resource blessing growth or resource curse hypothesis. The ample research on the stated theme has available in the relevant databases, supported with empirical data, while a few studies used a case study or mixed-method approach. The study identified plenty of room on a given topic by conducting a systematic literature review and synthesizing the literature in more meaningful inferences. After a thorough investigation of the literature review through systematic intervention, the study concludes that natural resource management is imperative for a country's sustained growth. Simultaneously, it is desirable to reduce resource conflicts, improve institutional performance, decrease corruption, and stabilize the political environment to get maximum natural resource management potential globally.

Fault injection and failure analysis on Xilinx 16 nm FinFET Ultrascale+ MPSoC

  • Yang, Weitao;Li, Yonghong;He, Chaohui
    • Nuclear Engineering and Technology
    • /
    • 제54권6호
    • /
    • pp.2031-2036
    • /
    • 2022
  • Energetic particle strikes the device and induces data corruption in the configuration memory (CRAM), causing errors and even malfunctions in a system on chip (SoC). Software-based fault injection is a convenient way to assess device performance. In this paper, dynamic partial reconfiguration (DPR) is adopted to make fault injection on a Xilinx 16 nm FinFET Ultrascale+ MPSoC. And the reconfiguration module implements the Sobel and Gaussian image filtering, respectively. Fault injections are executed on the static and reconfiguration modules' bitstreams, respectively. Another contribution is that the failure modes and effects analysis (FMEA) method is applied to evaluate the system reliability, according to the obtained injection results. This paper proposes a software-based solution to estimate programmable device vulnerability.

The Ethics of Multinational Enterprises and ESG Response: Suggestions for Transparent Management

  • LEE, Chun-Su;CHO, Yoonkyo;KIM, Byong-Goo
    • 동아시아경상학회지
    • /
    • 제10권3호
    • /
    • pp.41-50
    • /
    • 2022
  • Purpose - Through multinational corporate ethics and environmental, social, and governance (ESG), various policy and strategic countermeasures for transparent management in the management and economic fields are presented. Research design, data, and methodology - A literature review is conducted to find important areas for transparent management and to summarize and present transparent management countermeasures based on simple brainstorming opinions from experts. Result - Issues facing transparent management are presented. In particular, multinational enterprises present cases involving prevention of transfer prices and tax avoidance in relation to Industry 4.0. Additionally, a plan is presented to establish a corruption-free economic system through the practice of ESG transparency, ethical management of social enterprises, and transparent management. Conclusion - According to the brainstorming opinions of experts, ESG management and ethical management should be the cornerstone of transparent management in the future. Therefore, it is necessary to institutionally supplement the imposition of digital taxes on fourth industrial companies.

AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델 (Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System)

  • 김인경;박남제
    • 한국정보기술학회논문지
    • /
    • 제17권12호
    • /
    • pp.125-134
    • /
    • 2019
  • 인공지능 기술은 작동과정에 대한 투명성이 보장되지 않는 수동적 인식 영역에 제한되는 한계점으로 인해, AI가 학습하는 데이터에 의존적인 취약점을 갖는다. 인공지능 학습을 위한 원시데이터는 AI 학습의 고도화를 위한 데이터 품질 확보를 위해 수작업으로 가공과 검수를 해야 하기에 인적 오류가 내재되어 있으며, 데이터의 훼손, 불완전함, 원시데이터와의 차이 등으로 인해 가공데이터를 통한 AI 학습 시 예상 치 못한 결과값을 도출할 수 있다. 이에 본 연구에서는 사이버 보안 관점에서의 접근을 통한 AI 학습데이터의 부정확한 사례 및 사이버보안 공격 방법 분석을 통해 기계학습 전 학습데이터 관리의 필요성을 살펴보고, 학습 데이터 무결성 검증을 위해 블록체인 기반의 학습데이터 환경 모델인 Data-preserving 인공지능 시스템 구축 방향을 제시한다. Data-preserving AI 학습환경 모델은 AI 학습데이터 제공 전 변조되지 않은 데이터로 학습됨을 보장 하여 데이터 가공 시 및 원시데이터 수집을 위한 오픈 네트워크에서의 데이터 제공 및 활용 시 있을 수 있는 사이버 공격, 데이터 변질 등의 위협을 사전에 방지할 수 있을 것으로 기대된다.

무인항공기 이중화 대기자료시스템 설계 및 통합 연구 (Design and Integration of a Dual Redundancy Air Data System for Unmanned Air Vehicles)

  • 원대연;윤성훈;이홍주;홍진성;황선유;임흥식;김태겸
    • 한국군사과학기술학회지
    • /
    • 제23권6호
    • /
    • pp.639-649
    • /
    • 2020
  • Air data systems measure airspeed, pressure altitude, angle of attack and angle of sideslip. These measurements are essential for operating flight control laws to ensure safe flights. Since the loss or corruption of air data measurements is considered as catastrophic, a high level of operational reliability needs to be achieved for air data systems. In the case of unmanned air vehicles, failure of any of air data sensors is more critical due to the absence of onboard pilot decision aid. This paper presents design of a dual redundancy air data system and the integration process for an unmanned air vehicle. The proposed dual-redundant architecture is based on two independent air data probes and redundancy management by central processing in two independent flight control computers. Starting from unit testing of single air data sensor, details are provided of system level tests used to meet overall requirements. Test results from system integration demonstrate the efficiency of the proposed process.

후보자 득표율 예측 모형과 지표의 구성: 2010 광역단체장 선거를 중심으로 (A Trial to Develop Forecasting Model for Turn-out Rates with the 2010 Korean Gubernatorial Election Data)

  • 송근원
    • 한국조사연구학회지:조사연구
    • /
    • 제12권1호
    • /
    • pp.31-63
    • /
    • 2011
  • 이 논문은 많은 비용의 부담없이 어느 후보가 당선될 것인지를 정확히 예측할 수 있는 방법을 찾기 위한 하나의 시도이다. 이 논문에서는 선거기간 동안에 각 후보들이 어느 정도의 득표율을 획득하고 있는지를 예측하기 위해 후보의 가시성, 현직자 효과, 지역 지배 정당효과, 부정 비리 효과, 사표 방지 효과, 중간 평가로서 견제 효과, 정책 효과 등을 독립변수로 삼아 회귀 모형을 만들어 유용한 득표율 예측 모형을 제시하고 있다. 제시된 모형은 득표율 = -4.65 + 1.02 가시성 + 16.90 현직 효과 + 16.78 지역 효과 - 9.12 견제 효과이다. 이 모형의 설명력은 91.2%이며, 다른 조건이 일정할 때 후보의 가시성이 득표율과 거의 같음을 보여준다. 또한 현직자가 16.9%의 후광 효과를, 지역 지배 정당 후보들이 16.8%의 지역 효과를 얻고 있으며, 중간평가로서의 견제 효과 때문에 여당 후보들은 9.1%의 득표율 손실을 보고 있다는 것을 보여준다. 이 모형은 큰 비용의 부담없이 선거 기간 동안 후보자들의 득표율 예측에 활용될 수 있다. 이 이외에도 이 논문은 예측의 정확도를 높이기 위한 각 변수들의 측정 방법들 및 이 모형의 한계점 등을 논의하고 있다.

  • PDF

Preventing Capital Flight to Reach Lucrative Investment In Indonesia

  • BASORUDIN, Muhammad;KUSMARYO, R. Dwi Harwin;RACHMAD, Sri Hartini
    • Asian Journal of Business Environment
    • /
    • 제10권1호
    • /
    • pp.29-36
    • /
    • 2020
  • Purpose: This study aims to analyze the effect of macroeconomic and non-macroeconomic determinants of capital flight. Research design, data and methodology: With five determinants, this survey was conducted by Eviews 10, and the ordinary least squares (OLS) as a statistical method was applied for examining the research hypothesis. The five determinants are a budget deficit, economic growth, inflation rate, the exchange rate, and sovereign rating. The capital flight measurement uses the World Bank residual approach. The data derive from the Central Bank of Indonesia, BPS-Statistics Indonesia, OECD, and Moody's Investor Service. Results: The result considers that economic growth, the exchange rate, and the sovereign rating will decrease capital flight. In addition, the budget deficit and the inflation rate will increase capital flight. The sovereign rating decreases capital flight bigger than the other determinants. In addition, the exchange rate is statistically significant. Conclusions: The most influential problem of capital flight in Indonesia is because of non-macroeconomics factor political issue, corruption, bad regulation, and others. That's why the investment climate in Indonesia is still not secure. We propose that the regime would have to amend the business rule for reducing capital, raising the investment climate, and demonstrating the creative industry.

IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가 (Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments)

  • 진병욱;정동욱;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.