• Title/Summary/Keyword: 목적코드

Search Result 723, Processing Time 0.03 seconds

A Study on the Improvement of the Malware Evidence Collection Module Based On Windows (윈도우 기반 악성코드 증거 수집 모듈 개선에 관한 연구)

  • Heo, Geon-Il;Park, Chan-Uk;Park, Won-Hyung;Kuk, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.61-68
    • /
    • 2010
  • Recently a malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection tools do not provide evidences conveniently or sometimes cannot provide necessary evidences. So security officials have much difficulty in responding to malwares. This paper analyzes the current status and problems of the existing malware evidence collection tools and suggests new ways to improve those problems.

Integer Programming Models for the Design of Two-Dimensional Holographic Storage Modulation Code (2차원 홀로그래픽 변조부호 설계를 위한 정수계획법 모형)

  • Park, Taehyung;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.6
    • /
    • pp.459-464
    • /
    • 2013
  • In this paper, we introduce a modulation code design problem where best selection of two-dimensional codewords are determined to reduce two-dimensional (2D) intersymbol interference (ISI) and interpage interference (IPI). Codeword selection problem is formulated as a quadratic integer programming model that minimizes intra- and inter-symbol differences subject to uniform symbol usage and minimal Hamming distance violations. Second integer programming model detects the occurrence of isolated pixel pattern in the selected codewords. The proposed models are applied to 4-level and 2-level 6/8 codes.

Analysis of Scratch code for Student Assessment about Computational Thinking Capability (Computational Thinking 역량에 대한 학습자 평가를 위한 스크래치 코드 분석)

  • Kim, Soohwan
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.5
    • /
    • pp.25-34
    • /
    • 2015
  • The purpose of this research is to suggest the method of code analysis for evaluating learners' projects in computational thinking(CT) education. Recently, block programming tools are applied to K-12 SW education, this study considered the assessment method for evaluating students' levels and learning about CT concepts through analyzing codes of the Scratch projects that students created. As a result from the analysis of 45 projects of novices, it showed the bad coding patterns of novices and verified that it is possible to evaluate students' learning about CT concepts through the analysis of their codes. The higher learner's level, the greater scores of logical thinking, synchronization, flow control, and data representation. This result is able to apply to student assessment of CT concepts in K-12 SW education.

Emotion Coding of Sijo "The Light of the Sun in June" by Lee Jin-moon (이진문의 시조 「유월 쬐는 볕」의 감정 코딩)

  • Park, Inkwa
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.203-207
    • /
    • 2019
  • This researcher is working on coding emotional codes from the Sijos that were created. So the purpose of this study is to derive the potential for literary therapy with Sijo's emotional coding. This time, we are going to study Lee Jin-moon's Sijo "The Light of the Sun in June." In this Sijo, the code of joy is generated in the first line, the code of joy in the second line, and the code of sadness in the last line. These emotional codes can be combined in different ways in the Emotion Codon. What this combination means is that the human body can be treated with literary emotion. It is believed that we will be able to continue this research and learn a better way of life.

Reversible Data Hiding based on QR Code for Binary Image (이진 이미지를 위한 QR 코드 기반의 가역적인 데이터 은닉)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.281-288
    • /
    • 2014
  • QR code (abbreviated from Quick Response Code) is code system that is strong in against to apply image processing techniques (skew, warp, blur, and rotate) as QR codes can store several hundred times the amount of information carried by ordinary bar codes. For this reason, QR code is used in various fields, e.g., air ticket (boarding control system), food(vegetables, meat etc.) tracking system, contact lenses management, prescription management, patient wrist band (patient management) etc. In this paper, we proposed reversible data hiding for binary images. A reversible data hiding algorithm, which can recover the original image without any distortion from the marked (stego) image after the hidden data have been extracted, because it is possible to use various kinds of purposes. QR code can be used to generate by anyone so it can be easily used for crime. In order to prevent crimes related QR code, reversible data hiding can confirm if QR code is counterfeit or not as including authentication information. In this paper, we proved proposed method as experiments.

A Comparison of Low-Dimensional Reactor Kinetics Analysis Methods with Modified Borresen's Coarse-Mesh Method (저차원 원자로 동특성 해법과 다차원 수정형 Borresen 소격해법의 비교)

  • Kim, Chang-Hyo;Lee, Gyu-Bok
    • Nuclear Engineering and Technology
    • /
    • v.22 no.4
    • /
    • pp.359-370
    • /
    • 1990
  • This study concerns with comparing low-dimensional reactor kinetics methods with a three-dimensional kinetics method to be used for safety analysis of light water reactors in order to suggest means of preparing input parameters required for low-dimensional methods. For this purpose a one-dimensional finite difference two-group diffusion theory code ODTRAN and a third-order Hermit polynomial-based point kinetics code POTRAN are developed and used to obtain low-dimensional solutions to the LRA-BWR kinetics benchmark problem. The results are compared with a three-dimensional modified Borresen's coarse-mesh solution of the kinetics problem by CMSNACK code. Through this comparison some simple but practical means of preparing input parameters of low-dimensional kinetics analysis methods are suggested.

  • PDF

Estimation of HMM parameters Using a Codeword Dependent Distance Normalization and a Distance Based codeword Weighting by Fuzzy Contribution (코드워드 의존 거리 정규화와 거리에 기반한 코드워드 가중을 이용한 은닉마르코프모델의 파라미터 추정)

  • Choi, Hwan-Jin;Oh, Yung-Hwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.4
    • /
    • pp.36-42
    • /
    • 1996
  • In this paper, we have proposed the robust estimation of HMM parameters which is based on CDDN(codeword dependent distance normalization)and codeword weighting by distance. The proposed method has used a distance normalization based on the characteristics of a codeword dependent distribution and have computed fuzzy contributions of codeword to a input vector with a fuzzy objective function. From experimental results, we have shown the effectiveness of the proposed method in that the correction rate of the proposed method is improved 4.5% over the conventional FVQ based method. Especially, the application of distance weighting to smoothing of output probability is improved the performance of 2.5% compared to distance based codeword weighting.

  • PDF

Implementation of AMOSS by Using JDBC-based on the Integration Object manager Model (컴포넌트 재구성을 위한 JFC기반 통합 객체 관리 모델 설계)

  • 선수균;송영재
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.628-630
    • /
    • 2001
  • 최근 전산 환경은 통합되는 개방형 시스템으로 변모하고 있고 JFC(Java Foundation Classess : Swing)는 분산 네트웍 환경에서 매우 적합한 환경으로 주목 받고있다. DB와 application에서 부수적인 문제점들이 발견되고, 서로 다른 platform을 기반으로 한 client들과의 연동을 위해서, platform에 따른 application이 개발되어야 했다. 이런 환경에서 개발자가 프로그램 변경이 발생할 때 연결관계에 따라 템플리트에 의해 개발된 부분을 코드로 변경해 주는 도구가 필요하게 되었다. 이를 위해 JFC기반의 통합 Middleware의 선정이 필요하게 되었다. 따라서, 본 논문에서는 JFC기반의 통합 관리하는 통합 객체 관리 모델을 설계한다. 이것은 특히 컴포넌트 재구성을 위한 것이고, 목적은 기존의 시스템을 재사용하고 현존하는 컴포넌트를 재구성하여 최소한의 코드 수정을 통하여 시스템을 구동할 수 있게 함으로써 소프트웨어의 경제성을 높이는 것이 본 논문의 목적이다.

  • PDF

A Study on Java Information Extractor using JML Document (JML 문서를 이용한 자바 정보 추출기에 대한 연구)

  • Jang, Geun-Sil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.173-176
    • /
    • 2001
  • XML을 중심으로 많은 컴퓨팅 분야에서 다양한 연구가 이루어지고 있는데, 이는 기존의 웹 정보 표현 언어인 HTML이 갖는 부족한 부분을 해결할 수 있는 XML의 특징 때문이다. JML은 Java Markup Language의 약어로서 Java로 작성된 원시코드의 정보를 다양한 목적으로 이용하는데 적합하도록 작성된 XML의 응용으로 클래스 계층구조나 클래스 관계성 및 메소드 등에 관련된 다양한 정보를 효과적으로 표현할 수 있는 DTD를 포함한다. 본 연구의 목적은 역공학 측면에서의 JML의 응용으로, JML문서에 포함된 정보로부터 Java 응용 프로그램의 스켈레턴 코드를 생성하는데 있다. 본 연구의 의미는 기존에 수행된 Java 응용 프로그램의 정보를 추출하여 JHL문서를 생성해 주는 도구와 접목시킴으로써 순방향과 역방향 측면에서 모두 접근가능한 도구를 제공하는데 있다.

  • PDF

Design and Implementation of Packet Processing Programming Language and Compiler (패킷 처리 프로그래밍을 위한 언어의 설계와 컴파일러의 구현)

  • Choi, YeJi;Ko, BangWon;Shin, KyoungHee;Yoo, ChaeWoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.510-513
    • /
    • 2012
  • 본 논문은 하드웨어에 독립적이고 패킷 처리 프로그래밍 개발의 효율성을 높이기 위하여 eFlowC 언어와 eFlowC 컴파일러를 제안한다. eFlowC 언어는 C 언어 기반의 고급언어이다. 그리고 기존의 C 문법에 패킷 처리 관련 기능을 위한 새로운 라이브러리를 추가하였다. eFlowC 컴파일러는 eFlowC 언어로 작성된 프로그램을 입력으로 받는다. 그리고 결과물로 가상 기계 목적 코드를 생성한다. 가상 기계 목적 코드는 언어 번역기의 입력 파일로 언어 번역기를 통하여 다양한 하드웨어 기계어로 번역이 가능하다.