• Title/Summary/Keyword: 언어 식별

Search Result 161, Processing Time 0.025 seconds

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

The Study of technique to find and prove vulnerabilities in ActiveX Control (ActiveX Control 취약점 검사 및 검증 기법 연구)

  • Sohn, Ki-Wook;Kim, Su-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.3-12
    • /
    • 2005
  • To provide visitors with the various services, Many web sites distribute many ActiveX controls to them because ActiveX controls can overcome limits of HTML documents and script languages. However, PC can become dangerous if it has unsecure ActiveX controls, because they can be executed in HTML documents. Nevertheless, many web sites provide visitors with ActiveX controls whose security are not verified. Therefore, the verification is needed by third party to remove vulnerabilities in ActiveX controls. In this paper, we introduce the process and the technique to fad vulnerabilities. The existing proof codes are not valid because ActiveX controls are different from normal application and domestic environments are different from foreign environments. In this paper, we introduce the technique to prove vulnerabilities in ActiveX control.

Groundwater Resources Management with ChatGPT: Harnessing AI for Quantitative and Qualitative Approaches (지하수 수량 및 수질 관리를 위한 ChatGPT의 활용)

  • Eungyu Park
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.12-12
    • /
    • 2023
  • 지하수자원 관리의 정량적 및 정성적 측면에 있어, 최첨단 인공지능 언어 모델인 ChatGPT의 혁신적인 기능이 활용될 수 있다. 본 발표에서는 지하수 자료에 대한 분석과 도출된 문제의 중요도에 따른 목표를 설정, 그리고 지하수 관리 전략 개발에 있어서의 ChatGPT 활용 방법을 논의할 것이다. 이를 위한 구체적 사례로, 지하수자원 관리에 활용될 수 있는 다양한 도구들의 개발과 고도화에 ChatGPT가 기여하는 방식을 살펴볼 것이다. 이러한 개별 도구들은 지하수자원 관리 결정에 있어 더 나은 예측 및 평가를 제공하여, 지하수 자원 관리의 효율성을 도모할 수 있다. 또한, ChatGPT의 문제 발견 및 해결책 제안 능력에 대해서도 다룰 것이다. 이를 통해 지하수 관리에 있어서의 다양한 문제를 식별하고, 이해당사자들이 보다 효과적으로 대응할 수 있는 방안을 찾아낼 수 있을 것이다. 또한 ChatGPT가 제공하는 다양한 정보 및 문제에 대한 솔루션 접근 방식을 활용한 브레인스토밍 방법을 설명할 것이다. 추가적으로, 일반 인공지능(AGI)의 개발에 근접하면서 지하수 관리의 자동화 및 가속화 그리고 산업 및 환경에 미칠 수 있는 영향에 대해 고찰해 볼 것이다. 이를 위하여, ChatGPT와 같은 인공지능 기술이 더욱 고도화되고 향상되면서, 지하수 관리 및 관련 분야에서의 의사결정, 계획 수립, 그리고 모니터링과 같은 작업들이 어떻게 변화할지에 대하여 토의할 것이다. 본 발표는 지하수 자원 관리 분야에서 ChatGPT와 같은 인공지능 기반 접근법의 가치를 보여주며, 복잡한 지하수 환경 문제를 해결하는 데 있어 첨단 기술의 활용 가능성을 강조할 것이다. 또한, AGI가 등장할 때까지 여전히 요구되는 지하수 분야 도메인 지식과 전문기술의 중요성을 강조할 것이다. 지하수 관리자들의 도메인 지식과 전문적 기술은 인공지능 기반 도구와 결합되어 보다 정확한 분석, 예측 및 해결책 도출을 가속화하며 정교화할 것이다. 결론적으로, 지하수 관리에 대한 종합적인 이해와 전문성을 갖춘 전문가들의 인공지능 기술활용은 지속가능한 지하수의 첨단 관리 효과적 달성에 중요한 계기가 될 것으로 판단한다.

  • PDF

A Method to Specify and Verify Requirements for Safety Critical System (안전 필수 시스템을 위한 요구사항 명세 및 검증 방법)

  • Lim, Hye Sun;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.893-907
    • /
    • 2017
  • In safety-critical systems, software defects may have serious consequences. Therefore, defects should be considered during the requirements specification process, which is the first step of a software development lifecycle. Stakeholder requirements that are usually written in natural language are difficult to derived, and there may also be defects due to ambiguity and inaccuracy. To address these issues, we propose a requirement specification method using a standardized Boilerplate and a GSN Model. The Boilerplate is a semi-standard language that follows a predefined format. Due to its ability to provide a consistent representation of the requirements, boilerplate helps stakeholders avoid ambiguities about what they mean and to define the exact meaning of the requirement. Meanwhile, GSN is recognized notation to prepare a Safety Case to prove to authorities that a system is safe. It can be expressed as a functional goal, e.g., Safety Evidence, etc. The proposed study allows an analyst to easily identify a fault from the early stage of the software development lifecycle. The Boilerplate and GSN Model are designed to specify the requirements of safety critical systems and to prove safety conformity through a connection with Safety Evidence. In addition, the proposed approach is also useful to develop secure software by correcting deficiencies in the requirements found during this process.

Standard Metadata Design for Linkage and Utilization of Damage Prediction Maps (풍수해 피해예측지도 연계·활용을 위한 표준 메타데이터 설계)

  • SEO, Kang-Hyeon;HWANG, Eui-Ho;BAECK, Seung-Hyub;LIM, So-Mang;CHAE, Hyo-Sok
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.3
    • /
    • pp.52-66
    • /
    • 2017
  • This study aims at designing standard metadata that can be incorporated for advanced utilization of damage prediction maps, and thereby constructing the standard meta-information management prototype system on the basis of the proposed design. Based on the ISO/TC 211 19115 international standard, which is considered as the most widely used standard (as per the results of a domestic and foreign metadata standard survey), the designing process for the standard metadata was established and the metadata was categorized into nine classes. Additionally, based on the output of the standard metadata design process, a standard meta-information management prototype system, capable of checking and downloading meta-property information, was constructed using the JAVASCRIPT language. By incorporating the obtained results, it is possible to maintain the quality of the constructed damage prediction map by establishing a standardized damage prediction map database. Furthermore, disaster response can be actuated through the provision and management of data for effective operation of the proposed damage prediction system.

A Robustness Test Method and Test Framework for the Services Composition in the Service Oriented Architecture (SOA에서 서비스 조합의 강건성 테스트 방법 및 테스트 프레임워크)

  • Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.800-815
    • /
    • 2009
  • Recently, Web services based service-oriented architecture is widely used to integrate effectively various applications distributed on the networks. In the service-oriented architecture BPEL as a standard modeling language for the business processes provides the way to integrate various services provided by applications. Over the past few years, some types of studies have been made on testing compatibility of services and on discriminating and tracing of the business processes in the services composition. Now a lot of studies about the services composition with BPEL are going on. However there were few efforts to solve the problems caused by the services composition. Especially, there is no effort to evaluate whether a composite service is reliable and whether it is robust against to exceptional situations. In this paper, we suggest a test framework and a testing method for robustness of the composite service written in WS-BPEL. For this, firstly we extract some information from the BPEL process and the participant services. Next, with the extracted information we construct the virtual testing environment that generates various faults and exceptional cases which may be raised within the real services. Finally the testing work for robustness of a composite service is performed on the test framework.

A Method to Manage Faults in SOA using Autonomic Computing (자율 컴퓨팅을 적용한 SOA 서비스 결함 관리 기법)

  • Cheun, Du-Wan;Lee, Jae-Yoo;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.716-730
    • /
    • 2008
  • In Service-Oriented Architecture (SOA), service providers develop and deploy reusable services on the repositories, and service consumers utilize blackbox form of services through their interfaces. Services are also highly evolvable and often heterogeneous. Due to these characteristics of the service, it is hard to manage the faults if faults occur on the services. Autonomic Computing (AC) is a way of designing systems which can manage themselves without direct human intervention. Applying the key disciplines of AC to service management is appealing since key technical issues for service management can be effectively resolved by AC. In this paper, we present a theoretical model, Symptom-Cause-Actuator (SCA), to enable autonomous service fault management in SOA. We derive SCA model from our rigorous observation on how physicians treat patients. In this paper, we first define a five-phase computing model and meta-model of SCA. And, we define a schema of SCA profile, which contains instances of symptoms, causes, actuators and their dependency values in a machine readable form. Then, we present detailed algorithms for the five phases that are used to manage faults the services. To show the applicability of our approach, we demonstrate the result of our case study for the domain of 'Flight Ticket Management Services'.

Differentiation of Facial EMG Responses Induced by Positive and Negative Emotions in Children (긍정정서와 부정정서에 따른 아동의 안면근육반응 차이)

  • Jang Eun-Hye;Lim Hye-Jin;Lee Young-Chang;Chung Soon-Cheol;Sohn Jin-Hun
    • Science of Emotion and Sensibility
    • /
    • v.8 no.2
    • /
    • pp.161-167
    • /
    • 2005
  • The study is to examine how facial EMG responses change when children experience a positive emotion(happiness) and a negative emotion(fear). It is to prove that the positive emotion(happiness) could be distinguishable from the negative emotion(fear) by the EMG responses. Audiovisual film clips were used for evoking the positive emotion(happiness) and the negative emotion(fear). 47 children (11-13 years old, 23 boys and 24 girls) participated in the study Facial EMG (right corrugator and orbicularis oris) was measured while children were experiencing the positive or negative emotion. Emotional assessment scale was used for measuring children's psychological responses. It showed more than $85\%$ appropriateness and 3.15, 4.04 effectiveness (5 scale) for happiness and fear, respectively. Facial EMG responses were significantly different between a resting state and a emotional state both in happiness and in fear (p<001). Result suggests that each emotion was distinguishable by corrugator and orbicularis oris responses. Specifically, corrugator was more activated in the positive emotion(happiness) than in the negative emotion(fear), whereas orbicularis oris was more activated in the negative emotion(fear) than in the positive emotion(fear).

  • PDF

Extracting and Visualizing Dispute comments and Relations on Internet Forum Site (인터넷 토론 사이트의 논쟁댓글 및 논쟁관계 시각화)

  • Lee, Yun-Jung;Jung, In-Joon;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.40-51
    • /
    • 2012
  • Recently, many users discuss and argue with others using replying comments. This implies that a series of comments can be a new source of information since various opinions can be appeared in the dispute. It is important to understand the implicit dispute structure immanent in the comment set. In this paper, we examine the characteristics of disputes using replying comments in the Internet forum sites using a set of test articles with the comments collected from SketicalLeft and Agora, which are famous Internet forum sites in Korea. And we propose a new method for detecting and visualizing the dispute sections and relations from a large set of replying comments. To show the performance of our method, we measured precision, recall, and F-measure. According to the experimental results, the F-measures of the detection of the comments in dispute are about 0.84 (SketpcialLeft) and 0.83 (Agora); those of the detection of the commenter pairs in dispute are 0.75 (SketpcialLeft) and 0.82 (Agora), respectively. Since our method exploits the temporal order of commenters to detect the disputes, it is not dependent on the host language nor on the typos in comments. Also, our method can help the readers to grasp the structure of controversy hidden in the comment set through the visualized view.

Impact of Word Embedding Methods on Performance of Sentiment Analysis with Machine Learning Techniques

  • Park, Hoyeon;Kim, Kyoung-jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.181-188
    • /
    • 2020
  • In this study, we propose a comparative study to confirm the impact of various word embedding techniques on the performance of sentiment analysis. Sentiment analysis is one of opinion mining techniques to identify and extract subjective information from text using natural language processing and can be used to classify the sentiment of product reviews or comments. Since sentiment can be classified as either positive or negative, it can be considered one of the general classification problems. For sentiment analysis, the text must be converted into a language that can be recognized by a computer. Therefore, text such as a word or document is transformed into a vector in natural language processing called word embedding. Various techniques, such as Bag of Words, TF-IDF, and Word2Vec are used as word embedding techniques. Until now, there have not been many studies on word embedding techniques suitable for emotional analysis. In this study, among various word embedding techniques, Bag of Words, TF-IDF, and Word2Vec are used to compare and analyze the performance of movie review sentiment analysis. The research data set for this study is the IMDB data set, which is widely used in text mining. As a result, it was found that the performance of TF-IDF and Bag of Words was superior to that of Word2Vec and TF-IDF performed better than Bag of Words, but the difference was not very significant.