• Title/Summary/Keyword: multiple verification

Search Result 521, Processing Time 0.029 seconds

Delay Time Modeling for ED MOS Logic LSI and Multiple Delay Logic Simulator (ED MOS 논리 LSI 의 지연시간 모델링과 디자인 논리 시뮬레이터)

  • 김경호;전영준;이창우;박송배
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.4
    • /
    • pp.701-707
    • /
    • 1987
  • This paper is concerned with an accurate delay time modling of the ED MOS logic gates and its application to the multiple delay logic simulator. The proposed delay model of the ED MOS logic gate takes account of the effects of not only the loading conditions but also the slope of the input waveform. Defining delay as the time spent by the current imbalance of the active inverter to charge and discharge the output load, with respect to physical reference levels, rise and fall model delay times are obtained in an explicit formulation, using optimally weighted imbalance currents at the end points of the voltage transition. A logic simulator which uses multiple rise/fall delays based on the model as decribed in the above has been developed. The new delay model and timing verification method are evaluated with repect to delay accuracy and execution time.

  • PDF

Strain-specific Detection of Bacillus Anthracis using Multiple-locus Variable-number Tandem Repeat Analysis (Multiple-locus Variable-number Tandem Repeat 분석을 사용한 Bacillus Anthracis 균주간 특이성 규명)

  • Jung, Kyoung-Hwa;Kim, Sang-Hoon;Kim, Seong-Joo;Kim, Ji-Cheon;Chai, Young-Gyu
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.2
    • /
    • pp.305-312
    • /
    • 2011
  • Bacillus anthracis(Ba) is a Gram-positive spore-forming bacterium that causes the disease anthrax. The feature of Ba is the presence of two large virulence plasmids, pXO1 and pXO2. Molecular genotyping of Ba has been difficult to the lack of polymorphic DNA marker. Ba isolated from Korea has been genotyped using various nucleotide analysis methods, such as 16s rDNA sequencing and multiple-locus variable-number tandem repeat (MLVA) analysis. We identified genotypes that represent a genetic lineage in the B1 cluster. This study emphasized the need to perform molecular genotyping when attempting to verify a strain-specific Ba.

The verification of the hardware implementation of packet classification algorithm on multiple fields by Veriolg-HDL (Verilog-HDL을 이용한 다중필드 패킷분류 알고리듬의 설계 검증)

  • Hong, Seong-Pyo;Kim, Jun-Hyeong;Choe, Won-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.852-855
    • /
    • 2003
  • This paper reports the RFC(Recursive Flow Classification) algorithm that is available on multiple fields. It is easy to be implemented by both software and hardware. For high speed classification of packets, the implementation of RFC is essential by hardware. Hence, in this paper, RFC algorithm is simulated by Verilog-HDL, and it verify the efficiency of the algorithm. The result shows that the algorithm can perform a packet classification within several cycles. It is not only much faster than software implementation but also enough to support OC192c.

  • PDF

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

Fuzzing Method for Web-Assembly Module Safety Validation (웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.275-285
    • /
    • 2019
  • Web-assemblies are a new binary standard designed to improve the performance of Web browser JavaScript. Web-assemblies are becoming a new web standard that can run at near native speed with efficient execution, concise representation, and code written in multiple languages. However, current Web-assembly vulnerability verification is limited to the Web assembly interpreter language, and vulnerability verification of Web-assembly binary itself is insufficient. Therefore, it is necessary to verify the safety of the web assembly itself. In this paper, we analyze how to operate the web assembly and verify the safety of the current web-assembly. In addition, we examine vulnerability of existing web -assembly and analyze limitations according to existing safety verification method. Finally, we introduce web-assembly API based fuzzing method to overcome limitation of web-assembly safety verification method. This verifies the effectiveness of the proposed Fuzzing by detecting crashes that could not be detected by existing safety verification tools.

Toward A Reusable Knowledge Based System

  • Yoo, Young-Dong
    • The Journal of Information Systems
    • /
    • v.3
    • /
    • pp.71-82
    • /
    • 1994
  • Knowledge acquisition, maintenance of knowledge base, and validation and verification of knowledge are the addressed bottlenecks of building successful knowledge based systems. Along with the increment of interesting in the knowledge based systems, the organization needs to develop a new one although it has a similar one. This causes several serious problems including knowledge redundancy and maintenance of knowledge base. This paper present three models of the reusable knowledge base which might be the solution to the above problem. Three models are : 1) multiple knowledge bases for a single AI application, 2) multiple knowledge bases for multiple AI applications, 3) a single knowledge base for multiple AI applications. A new approach to build such a reusable knowledge base in a homogeneous environment is presented. Our model combines the essential object-oriented techniques with rules in a consistent manner. Important aspects of applying object-oriented techniques to AI are discussed (inheritance, encapsulation, message passing), and some potential problems in building an AI application (decomposition technique of knowledge, search time, and heterogeneous environment) are pointed out. The models of a reusable knowledge base provide several amenities : 1) reduce the knowledge redundancy, 2) reduce the effort of maintenance of the knowledge base, 3) reuse the resource of the multiple domain knowledge bases, 4) reduce the development time.

  • PDF

Dynamic Analysis of Multiple-Body Floating Platforms Coupled with Mooring Lines and Risers

  • Kim Young-Bok;Kim Moo-Hyun
    • Journal of Ship and Ocean Technology
    • /
    • v.9 no.1
    • /
    • pp.11-26
    • /
    • 2005
  • In this study, the program to investigate the multiple body interaction effects between a floating platform and a shuttle tanker considering the coupled effect of hull (FPSO) with mooring lines and risers was developed. The coupled analysis program, which is called WINPOST-MULT using the hydrodynamic analysis results by WAMIT, was made. For the verification of WINPOST-MULT by means of numerical experiments, two multiple-body models of an FPSO-FPSO and an FPSO-shuttle tanker system are adopted. With the FPSO-FPSO model and a two-mass-spring system to idealize two identical bodies for the 100-year storm wave condition in GOM, the numerical simulations were performed to investigate the interaction effects between two identical bodies. For the more reality, the coupled analysis for the FPSO-shuttle tanker model in the tandem arrangement was carried out in the consideration of the environmental condition of the West Africa Sea as a rather mild condition. Through the case studies with interaction effect and without interaction effect by the iteration method and the combined method, it is verified that the program is a very useful tool for the analysis of the interaction problem of multiple-body system and the coupled problem of the hull/mooring/riser.

Design and Analysis of Multiple Intrusion Detection Model (다중 침입 탐지 모델의 설계와 분석)

  • Lee, Yo-Seob
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.619-626
    • /
    • 2016
  • Intrusion detection model detects a intrusion when intrusion behaviour occurred. The model analyzes a variety of intrusion pattern and supports a modeling method to represent for a intrusion pattern efficiently. Particularly, the model defines classes of intrusion pattern and supports modeling method that detects a network level intrusion through multiple hosts for multiple intrusions. In this paper, proposes a multiple intrusion detection model that support a verification method for intrusion detection systems and verifies a safeness of proposed model and compares with other models.

A Realtime Malware Detection Technique Using Multiple Filter (다중 필터를 이용한 실시간 악성코드 탐지 기법)

  • Park, Jae-Kyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.77-85
    • /
    • 2014
  • Recently, several environment damage caused by malicious or suspicious code is increasing. We study comprehensive response system actively for malware detection. Suspicious code is installed on your PC without your consent, users are unaware of the damage. Also, there are need to technology for realtime processing of Big Data. We must develope advanced technology for malware detection. We must analyze the static, dynamic of executable file for fundamentally malware detection in recently and verified by a reputation for verification. It is need to judgment of similarity for realtime response with big data. In this paper, we proposed realtime detection and verification technology using multiple filter. Our malware study suggests a new direction of realtime malware detection.

Fuzzy Fingerprint Vault using Multiple Polynomials (다중 다항식을 이용한 지문 퍼지볼트)

  • Moon, Dae-Sung;Choi, Woo-Yong;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.125-133
    • /
    • 2009
  • Security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non.invertible transformed version. Thus, even if the transformed version is compromised, its valid biometric data are securely remained. Fuzzy vault mechanism was proposed to provide cryptographic secure protection of critical data(e.g., encryption key) with the fingerprint data in a way that only the authorized user can access the critical data by providing the valid fingerprint. However, all the previous results cannot operate on the fingerprint image with a few minutiae, because they use fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use adaptive degree of polynomial considering the number of minutiae. Also, we apply multiple polynomials to operate the fingerprint with a few minutiae. Based on the experimental results, we confirm that the proposed approach can enhance the security level and verification accuracy.