• Title/Summary/Keyword: 실행코드

Search Result 780, Processing Time 0.031 seconds

Optimal Operation of the 3D Water Quality Model for Water Quality Forecast (수질예보를 위한 3차원 모형의 최적 운영 기법)

  • Lee, Seungjae;Kim, Hyeonsik;Sa, Sungoh;Hwang, Hyunsik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.72-72
    • /
    • 2016
  • 최근 발생하고 있는 기후변화로 인하여 하천 및 저수지의 수질문제가 커지고 있다. 특히 여름철 부영양화로 인해 발생하는 녹조현상은 사회적인 문제로 과학적인 수질사고에 대한 예측과 관리가 필요한 실정이다. 수질예보는 정기적으로 하천 및 저수지의 수질을 예측하여 사용자에게 제공하는 분석기법으로 수질현황을 파악하고 수질을 관리하고 의사결정을 하는데 도움을 줄 수 있다. 수질예보에 사용되는 모형은 유역모형, 하천모형, 저수지모형이 있으며, 이중 하천 및 저수지에 주로 적용되고 있는 3차원 수리수질모형의 경우 격자의 개수가 많아 모의시간이 길어지게 되고 이로 인해 일일 수질 예보가 어렵게 된다. 3차원 수리수질모형의 모의속도를 개선하는 방법에는 하드웨어의 성능을 높이는 방법과 병렬화를 이용한 소프트웨어적인 방법이 있다. 이중 하드웨어의 성능을 높이는 방법은 컴퓨터의 사양을 높이는 방법으로 높은 비용이 소요된다. 하지만 병렬화 방법은 컴퓨팅 기술의 발전으로 멀티코어가 대중화가 된 최근에 코드의 적용만으로 모의속도를 향상시킬 수 있다. 본 연구에서 사용된 모형은 서호주대학에서 개발한 3차원 수리 수질모형인 ELCOM-CAEDYM 모형으로 적용된 병렬화 기법은 OpenMP(Open Multi-Processing)방법이다. 기존 직렬 컴퓨팅 방식으로 구성되어 한번에 한 개의 명령어 밖에 처리할 수 없었던 작업방법을 동시에 여러 개의 처리요소를 이용하여 명령을 실행할 수 있게 하는 방식이다. 하지만 CPU의 개수는 제한되어 있으며, Amdahl's law에 따르면 OpenMP방식의 병렬화시 속도개선효과는 95% 병렬화 프로그램에서 최대 CPU 개수의 제한이 없다면 20배 까지 속도향상이 가능하다고 하였다. 본 연구에서는 3차원 수리 수질예측 모형인 ELCOM-CAEDYM에 적용된 병렬화 기법을 적용하는데 있어 최적 CPU사용 개수를 파악 하고자 하였으며, 이를 통해 수질예보시스템을 운영하는데 가장 효율적인 방법을 찾아 적용하고자 하고자 한다.

  • PDF

A Study on the Virtual Remote Input-Output Model for IoT Simulation Learning (IoT 시뮬레이션 학습을 위한 가상 리모트 입출력 모델에 관한 연구)

  • Seo, Hyeon-Ho;Kim, Jae-Woong;Kim, Dong-Hyun;Park, Seong-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.45-53
    • /
    • 2021
  • In our technology-driven world, various methods for teaching in an educational venue or in a simulated environment have been suggested especially for computer and coding education. In particular, IoT related education has been made possible owing to the industrial developments that have occurred in various fields since the Fourth Industrial Revolution. The proposed model allows various IoT systems to be indirectly built; it provides an inexpensive learning method by applying a simulation system in a 3D environment. The model is implemented on Virtual Remote IO based on the Arduino platform, thereby reducing the cost of building an education system. In addition various education-related content can be provided to learners through such an indirectly developed system. Test code was written to check the consistency of an operation between the real system and the virtual system.

Fuzzing Method for Web-Assembly Module Safety Validation (웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.275-285
    • /
    • 2019
  • Web-assemblies are a new binary standard designed to improve the performance of Web browser JavaScript. Web-assemblies are becoming a new web standard that can run at near native speed with efficient execution, concise representation, and code written in multiple languages. However, current Web-assembly vulnerability verification is limited to the Web assembly interpreter language, and vulnerability verification of Web-assembly binary itself is insufficient. Therefore, it is necessary to verify the safety of the web assembly itself. In this paper, we analyze how to operate the web assembly and verify the safety of the current web-assembly. In addition, we examine vulnerability of existing web -assembly and analyze limitations according to existing safety verification method. Finally, we introduce web-assembly API based fuzzing method to overcome limitation of web-assembly safety verification method. This verifies the effectiveness of the proposed Fuzzing by detecting crashes that could not be detected by existing safety verification tools.

Development of LLDB module for potential vulnerability analysis in iOS Application (iOS 어플리케이션의 잠재적 취약점 분석을 위한 LLDB 모듈 개발)

  • Kim, Min-jeong;Ryou, Jae-cheol
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.13-19
    • /
    • 2019
  • In order to register an application with Apple's App Store, it must pass a rigorous verification process through the Apple verification center. That's why spyware applications are difficult to get into the App Store. However, malicious code can also be executed through normal application vulnerabilities. To prevent such attacks, research is needed to detect and analyze early to patch potential vulnerabilities in applications. To prove a potential vulnerability, it is necessary to identify the root cause of the vulnerability and analyze the exploitability. A tool for analyzing iOS applications is the debugger named LLDB, which is built into Xcode, the development tool. There are various functions in the LLDB, and these functions are also available as APIs and are also available in Python. Therefore, in this paper, we propose a method to efficiently analyze potential vulnerabilities of iOS application by using LLDB API.

An Efficient Decoy File Placement Method for Detecting Ransomware (랜섬웨어 탐지를 위한 효율적인 미끼 파일 배치 방법)

  • Lee, Jinwoo;Kim, Yongmin;Lee, Jeonghwan;Hong, Jiman
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.27-34
    • /
    • 2019
  • Ransomware is a malicious program code evolved into various forms of attack. Unlike traditional Ransomware that is being spread out using email attachments or infected websites, a new type of Ransomware, such as WannaCryptor, may corrupt files just for being connected to the Internet. Due to global Ransomware damage, there are many studies conducted to detect and defense Ransomware. However, existing research on Ransomware detection only uses Ransomware signature database or monitors specific behavior of process. Additionally, existing Ransomware detection methods hardly detect and defense a new Ransomware that behaves differently from the traditional ones. In this paper, we propose a method to detect Ransomware by arranging decoy files and analyzing the method how Ransomware accesses and operates files in the file system. Also, we conduct experiments using proposed method and provide the results of detection and defense of Ransomware in this paper.

An Approach to Recommending of Solutions for Resolving Gradle Build Error (Gradle 빌드 오류 해결을 위한 솔루션 추천 방안)

  • Kang, Mingu;Kim, Taeyoung;Kim, Suntae;Ryu, Duksan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.33-39
    • /
    • 2020
  • Developers spend considerable time manually repairing code that was not built during project construction. If the build fails, it is necessary to understand the failed execution, identify the cause of the failure, and then implement the solution. Build tools such as Gradle have been developed to reduce this effort and automate project construction. However, build tools still do not solve many errors, requiring developers to try to solve build errors. In this study, we propose a solution recommendation method to increase the success rate of Gradle build and reduce the effort required to resolve errors. We provide a way to collect build errors and a way to transition from build error messages to successful builds. In particular, 296 build error messages collected from Github's Java project are classified as solutions, and 89% show that the solution can be applied.

Method for Detecting Modification of Transmitted Message in C/C++ Based Discrete Event System Specification Simulation

  • Lee, Hae Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.171-178
    • /
    • 2021
  • In this paper, the author proposes a method for detecting modification of transmitted messages in C/C++ based Discrete Event System Specification (DEVS) simulation. When a message generated by a model instance is delivered to other model instances, it may be modified by some of the recipients. Such modifications may corrupt simulation results, which may lead to wrong decision making. In the proposed method, every model instance stores a copy of every transmitted message. Before the deletion of the transmitted message, the instance compares them. Once a modification has been detected, the method interrupt the current simulation run. The procedure is automatically performed by a simulator instance. Thus, the method does not require programmers to follow secure coding or to add specific codes in their models. The performance of the method is compared with a DEVS simulator.

A Study on High Speed Playback of AR Contents based on Beacon RSSI Signals (무선 RSSI 신호 기반의 AR 콘텐츠 초고속 재생에 관한 연구)

  • Kim, Goo;Kim, Jin-Woo;Ha, Yeon-Chul
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.2
    • /
    • pp.67-72
    • /
    • 2020
  • AR service using the client-server method and existing physical markers(eg, OR Codes, etc.) causes a delay in the playback time of the contents because the contents download is executed after the marker recognition. In the case of the one-time installation method rather than the client-server method, proactive download of high-capacity contents for playback may cause an inefficiency of the storage space of the device(eg, smartphone, etc.). Therefore, in AR contents playback based on beacon's RSSI to secure the efficiency of the playback device storage space and to quickly play AR contents. The technique for high-speed playback in this study can be applied to various fields such as MICE exhibition using beacon signal.

Design and Development of XR Contents Authoring Framework for IT Convergence Education (융합영상콘텐츠 교육을 위한 XR 콘텐츠저작 프레임워크 설계 및 제작)

  • Leem, Eek-Su
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.633-639
    • /
    • 2020
  • Despite the growing educational demand for the extended reality (XR) convergence content creation for non-IT students, fewer studies have attempted to education material development. In this paper, non-IT students' requirement to create XR convergence contents was analyzed and designed framework system specification. The object-oriented application framework (OOAF) was developed for non-IT students to create XR convergence contents through simple interaction methods such as drag and drop in-game engines. To evaluate the developed framework XR contents development course was operated with 26 industrial design majors sophomore in university. More than 90% of students succeeded in working on prototype XR contents in Oculus Rift. This result will be expected to improve the quality of XR contents creation education for non-IT students and contribute to the growth of the future convergence contents industry.

Distributed Processing of Big Data Analysis based on R using SparkR (SparkR을 이용한 R 기반 빅데이터 분석의 분산 처리)

  • Ryu, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.161-166
    • /
    • 2022
  • In this paper, we analyze the problems that occur when performing the big data analysis using R as a data analysis tool, and present the usefulness of the data analysis with SparkR which connects R and Spark to support distributed processing of big data effectively. First, we study the memory allocation problem of R which occurs when loading large amounts of data and performing operations, and the characteristics and programming environment of SparkR. And then, we perform the comparison analysis of the execution performance when linear regression analysis is performed in each environment. As a result of the analysis, it was shown that R can be used for data analysis through SparkR without additional language learning, and the code written in R can be effectively processed distributedly according to the increase in the number of nodes in the cluster.