• Title/Summary/Keyword: Non-Execution

Search Result 260, Processing Time 0.026 seconds

Transaction Signing-based Authentication Scheme for Secure Distributed Spectrum Sensing in Cognitive Radio Networks (인지 라디오 네트워크의 안전한 분산 스펙트럼 센싱을 위한 트랜잭션 서명기법)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.75-83
    • /
    • 2011
  • Cognitive radio (CR) technology is to maximize the spectrum utilization by allocating the unused spectrums to the unlicensed users. This technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel and as a result, it is possible to harness wireless frequency more efficiently. To enhance the accuracy of sensing, RDSS was suggested. It is a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test). However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose a transaction signing-based authentication scheme for secure distributed spectrum sensing to response the forged values. The validity of proposed scheme is provided by BAN logic.

Embedded Real-Time Software Architecture for Unmanned Autonomous Helicopters

  • Hong, Won-Eui;Lee, Jae-Shin;Rai, Laxmisha;Kang, Soon-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.5 no.4
    • /
    • pp.243-248
    • /
    • 2005
  • The UAV (Unmanned Aerial Vehicle) systems like unmanned autonomous helicopters are used in various missions of flight navigation and used to collect the environmental information of the surroundings. To realize the full functionalities of the UAV, the software part becomes a challenging problem. In this paper embedded real-time software architecture for unmanned autonomous helicopter is proposed that guarantee real-time performance of hard-real time tasks and re-configurability of soft-real time and non-real time tasks. The proposed software architecture has four layers: hardware, execution, service agent and remote user interface layer according to the reactiveness level for external events. In addition, the layered separation of concurrent tasks makes different kinds of mission reconfiguration possible in the system. An Unmanned autonomous helicopter system was implemented (Kyosho RC Helicopter) in our lab to test and evaluate the performance of the proposed system.

Design of Equal-Cost Bifurcated Routing Algorithm : A Case Study Using Closure Approximation (클로즈 근사화를 이용한 등가 라우팅 알고리즘의 설계)

  • Lee, Bong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.3
    • /
    • pp.380-390
    • /
    • 1994
  • In this paper, we propose an equal-cost bifurcated routing algorithm which may be useful in practical computer network design problem. The performance of the routing algorithm is evaluated using the conventional Monte Carlo simulation and a transient queueing approximation. The relative errors between the closure approximation and the Monte Carlo simulation was fairly small. The closure approximation may be used to evaluate the performance of the load splitting algorithms, which results in considerable execution time reduction. The performance of the proposed algorithm is compared to that of the known algorithms based on average packet delay. For networks that have many non-disjoint equal-paths, the proposed algorithm performed better than other algorithms.

  • PDF

The Study for Mixed Operation of CBTC Train and Non-CBTC Ones (기존도시철도의 CBTC도입에 따른 병행운전방안 도출연구)

  • Kim Yoo-Ho;Lee Soo-Hwan;Yoo Jong-Cheon;Kim Jong-Ki;Baek Jong-Hyen
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.151-156
    • /
    • 2003
  • The Communication Based Train Control(CBTC) System generally used to improving existing lines in the world is efficient and stable for improvement. Also it is efficient for improvement because it does not cause any problems in operation of existing lines. We examined the mixed operation scheme for more efficient and stable improvement when improvement is implemented depending on aged equipment and the increased number of passengers in the Korean city railroad. The biggest point in the mixed operation is to implement a stable test without interfering with the operation of the existing lines. For this purpose, we deduced a method of installing the equipment, a method of testing depending on the installed equipment, and the types of mixed operation, and presented a scheme of execution of the methods depending on the mixed operation.

  • PDF

OpenFOAM : Open source CFD in research and industry

  • Jasak, Hrvoje
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.1 no.2
    • /
    • pp.89-94
    • /
    • 2009
  • The current focus of development in industrial Computational Fluid Dynamics (CFD) is integration of CFD into Computer-Aided product development, geometrical optimisation, robust design and similar. On the other hand, in CFD research aims to extend the boundaries of practical engineering use in "non-traditional" areas. Requirements of computational flexibility and code integration are contradictory: a change of coding paradigm, with object orientation, library components, equation mimicking is proposed as a way forward. This paper describes OpenFOAM, a C++ object oriented library for Computational Continuum Mechanics (CCM) developed by the author. Efficient and flexible implementation of complex physical models is achieved by mimicking the form of partial differential equation in software, with code functionality provided in library form. Open Source deployment and development model allows the user to achieve desired versatility in physical modeling without the sacrifice of complex geometry support and execution efficiency.

The Extension of CORBA for the Support of Primary-Backup Object Group (프라이머리-백업 객체 그룹 지원을 위한 CORBA의 확장)

  • 신범주;김명준
    • The Journal of Information Technology and Database
    • /
    • v.7 no.1
    • /
    • pp.17-26
    • /
    • 2000
  • To provide highly available services in the distributed object system, it is required to support the object group. The state machine approach and primary-backup approach are proposed as two representative approaches for support of object group. The primary-backup approach does not only give merits such as transparency of object group and non-deterministic execution but also require less resource than state machine approach. This paper describes an extension of CORBA that is required to support of the primary-backup object group. In this paper, the state of backup is synchronized with primary through the atomic multicast protocol whenever the request of client is executed at primary. As a result, it does not require message logging and check pointing. The object group of this paper also provides fast response time in case of failure of the primary since it makes primary election unnecessary. And through an extension of IDL, it makes possible to avoid consistency control depending on characteristic of application. A prototype has been implemented and the performance of object group has been compared with a single object invocation.

  • PDF

Development of A New Patch-Based Stereo Matching Algorithm for Extraction of Digiral Elevation Model from Satellite Imagery (위성영상으로부터 수치표고모형 추출을 위한 새로운 정합구역의 비선형 최소자승 영상정합 알고리즘 개발)

  • 김태정;이흥규
    • Korean Journal of Remote Sensing
    • /
    • v.13 no.2
    • /
    • pp.121-132
    • /
    • 1997
  • This paper describes the development of a stereo matching algorithm for extracting Digital Elevation Model(DEM) from satellite images. This matching algorithm is based on a non-linear least squares correlation estimation but has improved matching speed. The algorithm consists of three steps: matching execution, matching control and matching optimization. Each is described. The performance of the presented algorithm is quantitatively analyzed with experiments on matching probability, matching speed and matching convergence radius.

A Demand Paging for Reducing The Memory Usage of OS-Less Embedded Systems (운영체제 없는 시스템의 메모리 절감을 위한 요구 페이징 기법)

  • Lew, Kyeung Seek;Jeon, Hyun Jae;Kim, Yong Deak
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.1
    • /
    • pp.32-40
    • /
    • 2011
  • For a NAND booting based embedded system, an application program on the NAND flash memory is downloaded to the RAM when the system is booted. In this case, the application program exists in both the RAM and the NAND flash so the RAM usage is increased. In this paper, we suggested the demand paging technique for the decreasing of the RAM usage for OS-less NAND booting based embedded systems. As a result of a benchmark test, 40~80% of the code memory usage was reduced with below 5% of execution time delay.

Cryptographic Traces for the Protection of Mobile Agent Execution (이동 에이전트 실행 보호를 위한 암호학적 추적 방안)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.71-78
    • /
    • 2001
  • In this paper, we describe the vulnerabilities against mobile agent and analyze existing schemes to cope with them. Also we propose a new scheme which protects the executed information by mobile agent and simultaneously traces the executions of mobile agent. The proposed scheme provides non-repudiation between participations for the executions of mobile agent, forward integrity against modification and protection against code insertion or deletion attack.

Visual Analysis of Deep Q-network

  • Seng, Dewen;Zhang, Jiaming;Shi, Xiaoying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.853-873
    • /
    • 2021
  • In recent years, deep reinforcement learning (DRL) models are enjoying great interest as their success in a variety of challenging tasks. Deep Q-Network (DQN) is a widely used deep reinforcement learning model, which trains an intelligent agent that executes optimal actions while interacting with an environment. This model is well known for its ability to surpass skilled human players across many Atari 2600 games. Although DQN has achieved excellent performance in practice, there lacks a clear understanding of why the model works. In this paper, we present a visual analytics system for understanding deep Q-network in a non-blind matter. Based on the stored data generated from the training and testing process, four coordinated views are designed to expose the internal execution mechanism of DQN from different perspectives. We report the system performance and demonstrate its effectiveness through two case studies. By using our system, users can learn the relationship between states and Q-values, the function of convolutional layers, the strategies learned by DQN and the rationality of decisions made by the agent.