• Title/Summary/Keyword: 업데이트

Search Result 960, Processing Time 0.022 seconds

Design of Border Surveillance and Control System Based on Wireless Sensor Network (WSN 기반 국경 감시 및 제어 시스템 설계)

  • Hwang, Bo Ram;An, Sun Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.11-14
    • /
    • 2015
  • WSN (Wireless Sensor Network) based on low-power is one of the core technologies in the ubiquitous society. In this paper, we present a border surveillance and control system in WSN environment. The system consists of static sensor node, mobile sensor node, static gateway, mobile gateway, server and mobile application. Mobile applications are divided into user mode and manager mode. So users monitor border surveillance through mobile phone and get information of border network environment without time and space constraints. In manager mode, for the flexible operation of nodes, manager can update to the software remotely and adjust the position of the mobile node. And also we implement a suitable multi-hop routing protocol for scalable low-power sensor nodes and confirm that the system operates well in WSN environment.

Analyzing Differences of Binary Executable Files using Program Structure and Constant Values (프로그램의 구조와 상수 값을 이용하는 바이너리 실행 파일의 차이점 분석)

  • Park, Hee-Wan;Choi, Seok-Woo;Seo, Sun-Ae;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.452-461
    • /
    • 2008
  • Binary diffing is a method to find differences in similar binary executables such as two different versions of security patches. Previous diffing methods using flow information can detect control flow changes, but they cannot track constant value changes. Biffing methods using assembly instructions can detect constant value changes, but they give false positives which are due to compiling methods such as instruction reordering. We present a binary diffing method and its implementation named SCV which utilizes both structure and value information. SCV summarizes structure and constant value information from disassembled code, and matches the summaries to find differences. By analyzing a Microsoft Windows security patches, we showed that SCV found necessary differences caused by constant value changes which the state-of-the-art binary diffing tool BinDiff failed to find.

The Effect of Vocational Training on Employment Outcome in Korea's Training Credit Program (내일배움카드제 훈련이 취업성과에 미치는 영향)

  • Kim, Yong-seong
    • Journal of Labour Economics
    • /
    • v.43 no.1
    • /
    • pp.1-34
    • /
    • 2020
  • As the economic environment rapidly changes, the ability to flexibly adapt has become a vital skill which is primarily attained through education and training. Subsequently, it is essential that the effects of vocational eduction and training are closely examined to see if they are fulfilling their goals; specifically, whether they bolster the chances of gaining employment. To that end, the endogenous aspects of training variables must be controlled. This study critically assesses the approaches of current literature in regards to tackling the endogeneity issue, and investigates the effects of vocational training through various econometric models. The results failed to reveal any positive effects of Korea's vocational training on employment. However, the negative effects were also not large enough to be significant. Additionally, the marginal effects were weaker for women and older age groups-which show a disparity between men and women-than for men and younger age groups, respectively. A more comprehensive and in-depth analysis will be needed of these results using recent data and detailed information about the training process.

  • PDF

The Risk Assessment and Prediction for the Mixed Deterioration in Cable Bridges Using a Stochastic Bayesian Modeling (확률론적 베이지언 모델링에 의한 케이블 교량의 복합열화 리스크 평가 및 예측시스템)

  • Cho, Tae Jun;Lee, Jeong Bae;Kim, Seong Soo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.5
    • /
    • pp.29-39
    • /
    • 2012
  • The main objective is to predict the future degradation and maintenance budget for a suspension bridge system. Bayesian inference is applied to find the posterior probability density function of the source parameters (damage indices and serviceability), given ten years of maintenance data. The posterior distribution of the parameters is sampled using a Markov chain Monte Carlo method. The simulated risk prediction for decreased serviceability conditions are posterior distributions based on prior distribution and likelihood of data updated from annual maintenance tasks. Compared with conventional linear prediction model, the proposed quadratic model provides highly improved convergence and closeness to measured data in terms of serviceability, risky factors, and maintenance budget for bridge components, which allows forecasting a future performance and financial management of complex infrastructures based on the proposed quadratic stochastic regression model.

Design of a Metamodel for the Development Process of a Mobile Application (모바일 앱 개발 프로세스 메타모델 설계)

  • Cho, Eun-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5248-5255
    • /
    • 2014
  • Because of the rapid growth of smart phone market, the number of mobile applications has increased exponentially. As mobile applications are developing at a rapid rate, many of them are being developed without considering a systematic development process or quality factors, such as reusability, extensibility, etc.. As a result, they have many faults internally, they are being underrated in satisfaction or reliability from customers, and finally customers do not update or repeat the purchase. Therefore, a meta-model of development process for mobile applications was designed to improve the continuous usability of mobile applications as well as the satisfaction and reliability from users. Applying development process based on a meta-model to mobile application development is expected to improve development productivity and quality of mobile applications.

Development of Auto Traffic Light Control System for Prevention of Traffic Jam (교통 정체 예방을 위한 자동 신호등 제어시스템 개발)

  • Beck, Kwang-Moo;Shin, Ji-Hwan;Park, Mu-Hun
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.4
    • /
    • pp.148-154
    • /
    • 2014
  • This paper suggests a new system based on image-processed information which is designed to control traffic light by measuring two-way traffic at the same time with a surveillance camera. With this system, the existing way of using one camera for one lane or loop coil will be improved to the more effective way of using only one camera to monitor a two-way, 8 lane roads statistically. Car images can be detected clearly even in irregular condition because of the background updating in real time. In addition, more accurate measurement is possible to users by selecting extra attention-needed regions. The automatic traffic light controlling algorithm, suggested in this paper, will prevent users and drivers from wasting their time and energy by controlling the number of traffic in advance.

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.

A Study on Network System Design for the Support of Multi-Passengers' Multimedia Service Based on HMI (Human Machine Interface) (다인승 차량용 멀티미디어 서비스 지원을 위한 HMI기반 네트워크 시스템 설계에 관한 연구)

  • Lee, Sang-yub;Lee, Jae-kyu;Cho, Hyun-joong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.899-903
    • /
    • 2017
  • In this paper, it is shown the in-vehicle network architecture and implementation for multimedia service which supports Human machine interface of multi-passengers. For multi-passengers' vehicle, it has to be considered the factor of network traffic, simultaneously data transferring to multi users and accessibility to use variety of media contents for passengers compared to conventional in-vehicle network architecture system Therefore, it is proposed the change of network architecture compared with general MOST network, implementation of designed software module which can be interoperable between ethernet and MOST network and accessible interface that passenger can be plugged into MOST network platform using their device based on ethernet network system.

Design of an Avatar Assembly System based on a Commercial Game Engine (상용 게임엔진 기반의 아바타 조립 시스템의 설계)

  • Kim, Byung-Cheol;Roh, Chang Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.489-494
    • /
    • 2016
  • Developing 3D games of quality is getting easier as commercial game engines have significantly evolved. It is still difficult, however, for entry-level developers to create various avatars which could affect the entire game because it requires expertise in 3D design and programming. We propose a design of an avatar assembly system based on a commercial game engine, Unity. It includes the assembly, customization, and management of avatars. It also provides an avatar update mechanism via the World Wide Web(WWW) provided by Unity's asset system so that various avatars can be supplied after the initial game distribution.

A Study on the Reliability Prediction for Space Systems (우주 시스템의 신뢰성 예측에 관한 연구)

  • Yu, Seung-U;Lee, Baek-Jun;Jin, Yeong-Gwon
    • Aerospace Engineering and Technology
    • /
    • v.5 no.2
    • /
    • pp.227-239
    • /
    • 2006
  • Reliability prediction provides a rational basis for design decisions such as the choice between alternative concepts, choice of part quality levels, derating factors to be applied, use of proven versus state-of-the-art techniques, and other factors. For this reasons, reliability prediction is essential functions in developing space systems. The worth of the quantitative expression lies in the information conveyed with the numerical value and the use which is made of that information and reliability prediction should be initiated early in the configuration definition stage to aid in the evaluation of the design and to provide a basis for item reliability allocation (apportionment) and establishing corrective action priorities. Reliability models and predictions are updated when there is a significant change in the item design availability of design details, environmental requirements, stress data, failure rate data, or service use profile. In this paper, the procedure, selection of reliability data and methods for space system reliability prediction is presented.

  • PDF