• Title/Summary/Keyword: Execution Tracing

Search Result 22, Processing Time 0.031 seconds

Optimal Routing and Uncertainty Processing using Geographical Information for e-Logistics Chain Execution

  • Kim, Jin Suk;Ryu, Keun Ho
    • Management Science and Financial Engineering
    • /
    • v.10 no.2
    • /
    • pp.1-28
    • /
    • 2004
  • The integrated supply chain of business partners for e-Commerce in cyber space is defined as Logistics Chain if the cooperative activities are logistics-related. Logistics Chain could be managed effectively and efficiently by cooperative technologies of logistics chain execution. In this paper, we propose a routing and scheduling algorithm based on the Tabu search by adding geographical information into existing constraint for pick-up and delivery process to minimize service time and cost in logistics chain. And, we also consider an uncertainty processing for the tracing of moving object to control pick-up and delivery vehicles based on GPS/GIS/ITS. Uncertainty processing is required to minimize amount of telecommunication and database on vehicles tracing. Finally, we describe the Logistics Chain Execution (LCE) system to perform plan and control activities for postal logistics chain. To evaluate practical effects of the routing and scheduling system, we perform a pretest for the performance of the tabu search algorithm. And then we compare our result with the result of the pick-up and delivery routing plan generated manually by postmen.

Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status (에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법)

  • 정창렬;고진광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.743-750
    • /
    • 2003
  • With the expansion of computer technology the mobility of a mobile agent code having the flexibility in the dispersive computer situation is used to set up the applications distributed on the Internet. As it also has the ability to transmit the mobile code of a mobile agent and to receive it from a far-off host, the executive circumstances of the host system in which an agent is executed have to access to an agent code and the executive state capable of executing an agent code. Therefore, it is difficult to prevent the forgery, the alteration and the wrong execution of an agent from a malicious host. This dissertation suggests the mechanism which can protect an agent from the malicious action through the executive pursuit of a code-named mobile agent. The security of this mechanism is verified through the protective process of a mobile agent in this mechanism.

Implementation of a Real-Time Tracing Tool for Remote Debugging of SoC Programs (SoC 프로그램의 원격 디버깅을 위한 실시간 추적도구의 구현)

  • Park Myeong-Chul;Kim Young-Joo;Ha Seok-wun;Jun Yong-Kee;Lim Chae-Deok
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.583-588
    • /
    • 2005
  • To develop SoC program for embedded systems, a tool that can remotely debug from host system is needed. Because the existing remote debugging systems using GDB don't offer information of the SoC program execution in real-time, it is difficult to observe condition of the program execution, and also they have limited characteristics to tools and use costly adaptors. In this paper, a real-time tracking tool that can record SoC status on the nv each execution of the assigned instructions is introduced and an economical USB-JTAG adaptor is proposed. And it is shown that this tool can track the execution of a composed program in the target system based on PXA255 processor.

Feature Based Tool Path Planning and Modification for STEP-NC (STEP-NC의 피쳐 기반 공구경로 생성 및 갱신)

  • 조정훈;서석환
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.4
    • /
    • pp.295-311
    • /
    • 1999
  • An increasing attention is paid to STEP-NC, the next generation CNC controller interfacing STEP-compatible data. In this paper, we first propose an Architecture for the STEP-NC (called FBCC: Feature Baled CNC Controller) accepting feature code compatible with STEP-data, and executing NC motion feature by feature while monitoring the execution status. The main thrust of the paper has been to develop an automatic on-line tool path generation and modification scheme for milling operation. The tool path it generated iota each feature by decomposing into a finite number of primitive features. The key function in the new scheme is haw to accommodate unexpected execution results. In our scheme, the too1 path plinker is designed to have a tracing capability iota the tool path execution so that a new path can be generated from the point where the operation is stopped. An illustrative example is included to show the capability of the developed algorithm.

  • PDF

A Study on Implementation of Real-Time Multiprocess Trace Stream Decoder (실시간 다중 프로세스 트레이스 스트림 디코더 구현에 관한 연구)

  • Kim, Hyuncheol;Kim, Youngsoo;Kim, Jonghyun
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.67-73
    • /
    • 2018
  • From a software engineering point of view, tracing is a special form of logging that records program execution information. Tracers using dedicated hardware are often used because of the characteristics of tracers that need to generate and decode huge amounts of data in real time. Intel(R) PT uses proprietary hardware to record all information about software execution on each hardware thread. When the software execution is completed, the PT can process the trace data of the software and reconstruct the correct program flow. The hardware trace program can be integrated into the operating system, but in the case of the window system, the integration is not tight due to problems such as the kernel opening. Also, it is possible to trace only a single process and not provide a way to trace multiple process streams. In this paper, we propose a method to extend existing PT trace program to support multi - process stream traceability in Windows environment in order to overcome these disadvantages.

  • PDF

Design and Implementation of Preprocessing Part for Dynamic Code Analysis (동적 코드 분석을 위한 전처리부 설계 및 구현)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.37-41
    • /
    • 2019
  • Recently, due to the appearance of various types of malware, the existing static analysis exposes many limitations. Static analysis means analyzing the structure of a code or program with source code or object code without actually executing the (malicious) code. On the other hand, dynamic analysis in the field of information security generally refers to a form that directly executes and analyzes (malware) code, and compares and examines and analyzes the state before and after execution of (malware) code to grasp the execution flow of the program. However, dynamic analysis required analyzing huge amounts of data and logs, and it was difficult to actually store all execution flows. In this paper, we propose and implement a preprocessor architecture of a system that performs malware detection and real-time multi-dynamic analysis based on 2nd generation PT in Windows environment (Windows 10 R5 and above).

Fast Hand-Gesture Recognition Algorithm For Embedded System (임베디드 시스템을 위한 고속의 손동작 인식 알고리즘)

  • Hwang, Dong-Hyun;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1349-1354
    • /
    • 2017
  • In this paper, we propose a fast hand-gesture recognition algorithm for embedded system. Existing hand-gesture recognition algorithm has a difficulty to use in a low performance system such as embedded systems and mobile devices because of high computational complexity of contour tracing method that extracts all points of hand contour. Instead of using algorithms based on contour tracing, the proposed algorithm uses concentric-circle tracing method to estimate the abstracted contour of fingers, then classify hand-gestures by extracting features. The proposed algorithm has an average recognition rate of 95% and an average execution time of 1.29ms, which shows a maximum performance improvement of 44% compared with algorithm using the existing contour tracing method. It is confirmed that the algorithm can be used in a low performance system such as embedded systems and mobile devices.

A Study of MES for the Product Tracking Based on RFID (제품추적을 위한 RFID기반 제조실행시스템에 대한 연구)

  • Kim, Bong-Seok;Lee, Hong-Chul
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.159-164
    • /
    • 2006
  • MES(Manufacturing Execution System) is a control system which supports basic activities(scheduling, working process and qualify management, etc) to execute working on the shop floor. As especially MES is a system to decrease the gap between production planning and operating, it executes functions that make decision between management and labor using real-time data. MES for real-time information processing requires certain conditions such as data modeling of RFID, which has recently attracted attentions, and monitoring of each product unit from manufacture to sales. However, in the middle of processing the unit with a RFID tag, transponders(readers) can't often read the tag due to reader's malfunctions, intentional damages, loss and the circumstantial effects; for that reason, users are unable to confirm the location of the product unit. In this case, users cannot avoid tracing the path of units with uncertain clues. In this paper, we suggest that the unique MES based on RFID and Bayesian Network can immediately track the product unit, and show how to evaluate it.

  • PDF

Mobile Agent Security Mechanism through Expanding Cryptograpic Execution Tracing (확장된 암호 실행추적으로 이동에이전트 보안 메커니즘)

  • Kwon, Im-Hyung;Jung, Chang-Ryul;Koh, Jin-Gwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1877-1880
    • /
    • 2003
  • 이동에이전트는 안전한 활동을 보장할 수 있는 이동에이전트 보호가 선행되어야 한다. 본 논문에서는 이러한 이동에이전트를 보다 효과적으로 보호하고 안전성을 보장한 수 있도록 하는 이동에이전트 서버와 검증서버의 메커니즘을 제안한다. 또한 확장된 에이전트 시스템을 통한 실행추적이 기존의 에이전트 추적의 메커니즘과는 달리 확장된 암호화 실행추적을 통하여 안전하게 이동에이전트의 업무수행을 할 수 있도록 한다. 특히 확장된 암호화된 실행추적은 검증 서버를 통하여 항상 안전성을 검증 받도록 함으로써 더욱 안전하게 이동에이전트를 보호할 수 있도록 하였다.

  • PDF

Hand-Gesture Recognition Using Concentric-Circle Expanding and Tracing Algorithm (동심원 확장 및 추적 알고리즘을 이용한 손동작 인식)

  • Hwang, Dong-Hyun;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.636-642
    • /
    • 2017
  • In this paper, We proposed a novel hand-gesture recognition algorithm using concentric-circle expanding and tracing. The proposed algorithm determines region of interest of hand image through preprocessing the original image acquired by web-camera and extracts the feature of hand gesture such as the number of stretched fingers, finger tips and finger bases, angle between the fingers which can be used as intuitive method for of human computer interaction. The proposed algorithm also reduces computational complexity compared with raster scan method through referencing only pixels of concentric-circles. The experimental result shows that the 9 hand gestures can be recognized with an average accuracy of 90.7% and an average algorithm execution time is 78ms. The algorithm is confirmed as a feasible way to a useful input method for virtual reality, augmented reality, mixed reality and perceptual interfaces of human computer interaction.