• 제목/요약/키워드: Kernel Module

검색결과 121건 처리시간 0.026초

Development of Linux Kernel Modules for the Cell Enhancer Management based on Embedded Internet (임베디드 인터넷에서 중계기 관리를 위한 Linux Kernel Module의 개발)

  • 금유환;고국희;정경호;안광선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2002년도 가을 학술발표논문집 Vol.29 No.2 (3)
    • /
    • pp.52-54
    • /
    • 2002
  • 최근 하루가 다르게 증가하는 이동전화 가입자의 통화 품질을 보장하기 위해CDMA중계기의 중요도가 증가하고 있으며 자동화된 모니터링 시스템의 필요성이 대두되었다. Embedded Internet하에 CDMA중계기를 임베디드 리눅스 시스템과 연동하여 리눅스 커널 레벨에서의 모니터링 방안으로 EKMM(Embedded internet based Kernel level Monitoring Modules)시스템을 제시한다. 본 시스템은 SA-1110 마이크로 프로세스로 구현된 하드웨어에 시리얼 디바이스 드라이브와 네트웍 디바이스 드라이브를 설계하였다. 또한 리눅스 커널을 재구성하며 동적 로딩 방식으로 EKMM이 탑재되어 기존의 중계기 임베디드 시스템 보다 기능 확장성이 뛰어나고 성능이 향상된 중계기 모니터링 시스템을 설계 구현하였다.

  • PDF

CONEAT SUBMODULES AND CONEAT-FLAT MODULES

  • Buyukasik, Engin;Durgun, Yilmaz
    • Journal of the Korean Mathematical Society
    • /
    • 제51권6호
    • /
    • pp.1305-1319
    • /
    • 2014
  • A submodule N of a right R-module M is called coneat if for every simple right R-module S, any homomorphism $N{\rightarrow}S$ can be extended to a homomorphism $M{\rightarrow}S$. M is called coneat-flat if the kernel of any epimorphism $Y{\rightarrow}M{\rightarrow}0$ is coneat in Y. It is proven that (1) coneat submodules of any right R-module are coclosed if and only if R is right K-ring; (2) every right R-module is coneat-flat if and only if R is right V -ring; (3) coneat submodules of right injective modules are exactly the modules which have no maximal submodules if and only if R is right small ring. If R is commutative, then a module M is coneat-flat if and only if $M^+$ is m-injective. Every maximal left ideal of R is finitely generated if and only if every absolutely pure left R-module is m-injective. A commutative ring R is perfect if and only if every coneat-flat module is projective. We also study the rings over which coneat-flat and flat modules coincide.

System Integrity Monitoring System using Kernel-based Virtual Machine (커널 기반 가상머신을 이용한 시스템 무결성 모니터링 시스템)

  • Nam, Hyun-Woo;Park, Neung-Soo
    • The KIPS Transactions:PartC
    • /
    • 제18C권3호
    • /
    • pp.157-166
    • /
    • 2011
  • The virtualization layer is executed in higher authority layer than kernel layer and suitable for monitoring operating systems. However, existing virtualization monitoring systems provide simple information about the usage rate of CPU or memory. In this paper, the monitoring system using full virtualization technique is proposed, which can monitor virtual machine's dynamic kernel object as memory, register, GDT, IDT and system call table. To verify the monitoring system, the proposed system was implemented based on KVM(Kernel-based Virtual Machine) with full virtualization that is directly applied to linux kernel without any modification. The proposed system consists of KvmAccess module to access KVM's internal object and API to provide other external modules with monitoring result. In experiments, the CPU utilization for monitoring operations in the proposed monitering system is 0.35% when the system is monitored with 1-second period. The proposed monitoring system has a little performance degradation.

Implementation of Kernel Module for Shared Memory in Dual Bus System (듀얼 버스 시스템에서의 공유 메모리 커널 모듈 구현)

  • Moon, Ji-Hoon;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제10권5호
    • /
    • pp.539-548
    • /
    • 2015
  • In this paper, shared memory feature was developed in multi-core system with different OS for different processor-specific bus, while conducting an experiment on shared memory feature between the two processors based on embedded Linux system. For the purpose of developing shared memory in dual bus structure, memory controller was used, while managing shared memory segment through list data structure. For AMP multi-core test, Linux OS was installed in 2 processor cores. In addition, it verified the creation and use of shared memory by using kernel module implemented to test shared memory.

Dynamic Voltage Scaling based on Workload of Application for Embedded Processor (응용프로그램의 작업량을 고려한 임베디드 프로세서의 동적 전압 조절)

  • Wang, Hong-Moon;Kim, Jong-Tae
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • 제22권4호
    • /
    • pp.93-99
    • /
    • 2008
  • Portable devices generally have limited energy sources, so there is a need to minimize the power consumption of processor using energy conservation methods. One of the most common energy conservation methods is dynamic voltage scaling (DVS). In this paper, we propose a new DVS algorithm which uses workload of application to determine frequency and voltage of processors. The posed DVS algorithm consists of DVS module in kernel and specified function in application. The DVS module monitors the processor utilization and changes frequency and voltage periodically. The other part monitors workload of application. With these two procedures, the processor can change the performance level to meet their deadline while consuming less energy. We implemented the proposed DVS algorithm on PXA270 processor with Linux 2.6 kernel.

A Study for Task Detection Acquiring Abnormal Permission in Linux (리눅스의 비정상 권한 획득 태스크의 탐지방법 연구)

  • Kim, Won-Il;Yoo, Sang-Hyun;Kwak, Ju-Hyun;Lee, Chang-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제3권11호
    • /
    • pp.427-432
    • /
    • 2014
  • The Purpose of local system attacks is to acquire administrator's(root) privilege shell through the execution of the malicious program or change the flow of the program. This acquiring shell through attack is still valid approach method and it is difficult to cope with improving each of vulnerability because the attacker can select various forms of attack. Linux allocate a set of credentials when login, in order to manage user permissions. Credentials were issued and managed by the kernel directly, and also the kernel ensures that any change cannot be occurred outside of kernel. But, user's credentials that acquired root privilege through system attacks occurs a phenomenon that does not remain consistent. In this paper we propose a security module to detect a security threats that may cause to users and tasks by analysis user task execution and inconsistency credentials.

Implementation of 4-channel Embedded DVR Based on Linux (리눅스 기반 4채널 임베디드 DVR 구현)

  • 이흥규;정갑천;최종현;박성모
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 V
    • /
    • pp.2677-2680
    • /
    • 2003
  • This paper describes the implementation of a 4 channel embedded DVR system. It receives analog video from CCD cameras and converts to 640${\times}$480 CCIR-656 digital video by 30 frames/sec. These digital images are compressed to the wevelet transformed image using hardware codec which is capable of 350:1 real-time compression and decompression. The DVR is working on linux and it implemented on an embedded system which is based on StrongARM processor. For the interface between processor system module and image processing module, GPIO and memory control module are used, device drivers are developed. Linux kernel source is customized. This paper provides techniques of embedded system development and embedded linux porting.

  • PDF

The Design of Student Module for Web-Based Instruction System using Fuzzy Theory (웹기반 교육 시스템에서 퍼지이론을 이용한 학습자 모듈의 설계)

  • 백영태;서대우;왕창종
    • Journal of Korea Society of Industrial Information Systems
    • /
    • 제6권3호
    • /
    • pp.35-43
    • /
    • 2001
  • This thesis proposes a diagnostic formula for student's responses based on linguistic variable concept of fuzzy that makes domain expert to input the kernel elementeasily that constructs domain independent student module. And the domain expert can construct the rule with linguistic variable that is used to inference student's recognition state. This study designs a student module that can inference student's recognition state using this rule represented by linguistic variable.

  • PDF

STEP-based Information Management of Steel Bridge Using ACIS Soild Modeler (ACIS 솔리드 모델러를 이용한 STEP기반의 강교량정보 운용체계)

  • 이상호;정연석;김소운
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 한국전산구조공학회 2004년도 가을 학술발표회 논문집
    • /
    • pp.371-376
    • /
    • 2004
  • This study presents a way to generate and manage engineering information by applying steel bridge information model with 3D shape to existing application program. ACIS solid modeling kernel is used to visualize 3D geometric shape of steel bridge on the AutoCAD program. The shape information of 3D solid model can be connected to structural design information of steel bridge by an application module based on information model. The application module for manipulating steel bridge information can be easily developed by ObjectARX programming library supporting functional expansion of AutoCAD program. End-users can use the application module without any additional environmental setup on the AutoCAD. Thus this study facilitates information management of steel bridge by using ACIS solid modeler and ISO/STEP methodology.

  • PDF

Predicting Defect-Prone Software Module Using GA-SVM (GA-SVM을 이용한 결함 경향이 있는 소프트웨어 모듈 예측)

  • Kim, Young-Ok;Kwon, Ki-Tae
    • KIPS Transactions on Software and Data Engineering
    • /
    • 제2권1호
    • /
    • pp.1-6
    • /
    • 2013
  • For predicting defect-prone module in software, SVM classifier showed good performance in a previous research. But there are disadvantages that SVM parameter should be chosen differently for every kernel, and algorithm should be performed iteratively for predict results of changed parameter. Therefore, we find these parameters using Genetic Algorithm and compare with result of classification by Backpropagation Algorithm. As a result, the performance of GA-SVM model is better.