• Title/Summary/Keyword: 웹 프로그램

Search Result 1,375, Processing Time 0.031 seconds

Web Application Awareness using HTTP Host (HTTP Host를 이용한 웹 어플리케이션 인식에 관한 연구)

  • Choi, Ji Hyeok;Kim, Myung Sup
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.327-334
    • /
    • 2013
  • Today's network traffic has become extremely complex and diverse since the speed of network became faster and a variety of application services appear. Moreover, many applications appear and disappear fast and continuously. However, the current traffic classification system does not give much attention to this dynamic change of applications. In this paper, we propose an application awareness system in order to solve this problem. The application awareness system can provide the information, such as the usage trend of conventional applications and the emergence of new applications by recognizing the application name in a rapidly changing network environment. In order to recognize the application name, the Host field of HTTP protocol has been utilized. The proposed mechanism consists of two steps. First, the system generates the candidates of application name by extracting the domain name from the Host field in HTTP packet. Second, the administrator confirms the name afterward. The validity of the proposed system has been proved through the experiments in campus network.

An Implementation of Internet Protocol Version 6 o Windows NT Kernel Environment (윈도우 NT 커널 환경에서 IPv6 프로토콜 구현 연구)

  • Kang, Shin-Gak;Kim, Dae-Young
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2521-2532
    • /
    • 1997
  • The next generation internet protocol, IPv6, have been developed by the IETF according to the requirements of enhancement of classic IP protocols to satisfy the lack of Internet address space as well as the support of multimedia applications. This paper presents an implementation of IPv6 protocols on the Windows NT kernel environment. In this work, we developed and also tested the basic functions, required for operating as an IPv6 host, such as IPv6 header processing, IPv6 address handling, control message processing, group membership processing and neighbor discovery functions. The implemented IPv6 protocol driver module is connected to the lower network interface card through NDIS, a standard network interface. And this driver module that operates within kernel, is implemented as it is connected to upper user applications and lower NDIS using dispatch and lower-edge functions. The developed IPv6 protocol driver can provide not only enhanced performance because it is implemented in kernel mode, but also convenience of usage to the application developers because it gives user interface as a dynamic link library.

  • PDF

Verification of Machine Codes using an Effect Type System (효과 타입 시스템을 이용한 기계어 코드의 검증)

  • Chung, Jae-Youn;Ryu, Suk-Young;Yi, Kwang-Keun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.8
    • /
    • pp.886-901
    • /
    • 2000
  • Verification of the safety of untrusted codes becomes an important issue in the mobile computing environment and the safety-critical software systems. Recently, it is very common to run the codes attached to the electronic mails or downloaded from the web browsers. We propose the verification method of the machine code property. The code producer delivers the machine code and its property, then the code consumer checks whether the delivered code satisfies the delivered property. The safety of source codes is verified by the well-defined compiler systems but the verification mechanism for machine codes is not well defined yet. We design an intermediate language etySECK and propose the verification method of the property of etySECK programs. And then we prove the soundness of our system which is the type system with effect extension.

  • PDF

Adaptive Ontology Matching Methodology for an Application Area (응용환경 적응을 위한 온톨로지 매칭 방법론에 관한 연구)

  • Kim, Woo-Ju;Ahn, Sung-Jun;Kang, Ju-Young;Park, Sang-Un
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.91-104
    • /
    • 2007
  • Ontology matching technique is one of the most important techniques in the Semantic Web as well as in other areas. Ontology matching algorithm takes two ontologies as input, and finds out the matching relations between the two ontologies by using some parameters in the matching process. Ontology matching is very useful in various areas such as the integration of large-scale ontologies, the implementation of intelligent unified search, and the share of domain knowledge for various applications. In general cases, the performance of ontology matching is estimated by measuring the matching results such as precision and recall regardless of the requirements that came from the matching environment. Therefore, most research focuses on controlling parameters for the optimization of precision and recall separately. In this paper, we focused on the harmony of precision and recall rather than independent performance of each. The purpose of this paper is to propose a methodology that determines parameters for the desired ratio of precision and recall that is appropriate for the requirements of the matching environment.

  • PDF

A Study on Conversion Between UML and Source Code Based on RTT(Round-Trip Translator) (RTT(Round-Trip Translator) 기반의 UML과 소스코드 변환에 대한 연구)

  • Kim, Ji Yong;Cho, Han Joo;Kim, Young Jong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.9
    • /
    • pp.349-354
    • /
    • 2019
  • s programming education becomes more important in recent years, it is necessary to learn how the source code written by students reflects Object-Oriented(OO) concepts. We present a tool called the Round-Trip Translator(RTT) that transforms the Unified Modeling Language(UML) class diagram and Java source code to provide a web-based environment that provides real-time synchronization of UML and source code. RTT was created by improving existing RTE and is a tool for students who are learning OO concepts to understand how their UML or source code reflects the concepts that user intended. This study compares the efficiency and user- friendliness of RTT with the existing Round-Trip Engineering-based tools. The results show that students have improved understanding of OO concepts through UML and source code translation by using the RTT. We also found out that students were satisfied with the use of the RTT, which provides more efficient and convenient user interface than the existing tools.

Implementation of Loop Peeling in CTOC (CTOC에서 루프 벗기기 구현)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.27-35
    • /
    • 2008
  • The CTOC framework was implemented to efficiently perform analysis and optimization of the Java bytecode that is often being used lately. In order to analyze and optimize the bytecode from the CTOC, the eCFG was first generated. Due to the bytecode characteristics of difficult analysis, the existing bytecode was expanded to be suitable for control flow analysis. and the control flow graph was drawn. We called eCFG(extended Control Flow Graph). Furthermore, the eCFG was converted into the SSA Form for a static analysis. Many loops were found in the conversion program. The previous CTOC performed conversion directly into the SSA Form without processing the loops. However, processing the loops prior to the SSA Form conversion allows more efficient generation of the SSA Form. This paper examines the process of finding the loops prior to converting the eCFG into the SSA Form In order to efficiently process the loops, and exhibits the procedures for generating the loop tree.

  • PDF

Cancer Health Literacy and Cancer Screening Behaviors: A Systematic Review (암 건강정보문해력과 암 조기진단행위: 체계적 문헌고찰)

  • Guo, Lingru;Kim, Hyunli
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.373-385
    • /
    • 2021
  • The purpose of this paper is to systematically evaluate the relationship between cancer health literacy and cancer screening behaviors using global data. Following the preferred reporting items for systematic reviews and meta-analyses review guidelines, full-text articles published on PubMed, CINAHL, Embase, and Cochrane Library were reviewed until 31 January 2021. The reference lists of all selected studies have been also included. The cancer health literacy and cancer-screening behaviors of the participants aged ≥18 years were assessed. Seventeen studies that met the inclusion criteria were included. The cancer screening behaviors included mammograms, clinical breast cancer examination, Papanicolaou test, colonoscopy, and PSA screening. Eleven studies revealed a statistically meaningful relationship between the cancer health literacy and cancer screening behaviors. Further research should focus on developing effective interventions and guidelines on cancer health knowledge. The research scope of all areas of cancer health literacy and cancer screening behaviors should be extended to improve the cancer screening rates and public health.

Implementation of R-language-based REST API and Solution for Security Issues (R 언어 기반의 REST API 구현 및 보안문제의 해결 방안)

  • Kang, DongHoon;Oh, Sejong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.387-394
    • /
    • 2019
  • Recently, the importance of big data has been increased, and demand for data analysis for the big data is also increased. R language is developed for data analysis, and users are analyzing data by using algorithms of various statistics, machine learning and data mining packages in R language. However, it is difficult to develop an application using R. Early study proposed a method to call R script through another language such as PHP, Java, and so on. However, it is troublesome to write such a development method in addition to R in combination with other languages. In this study, we introduce how to write API using only R language without using another language by using Plumber package. We also propose a solution for security issues related with R API. If we use propose technology for developing web application, we can expect high productivity, easy of use, and easy of maintenance.

Topic Modeling on Research Trends of Industry 4.0 Using Text Mining (텍스트 마이닝을 이용한 4차 산업 연구 동향 토픽 모델링)

  • Cho, Kyoung Won;Woo, Young Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.764-770
    • /
    • 2019
  • In this research, text mining techniques were used to analyze the papers related to the "4th Industry". In order to analyze the papers, total of 685 papers were collected by searching with the keyword "4th industry" in Korea Journal Index(KCI) from 2016 to 2019. We used Python-based web scraping program to collect papers and use topic modeling techniques based on LDA algorithm implemented in R language for data analysis. As a result of perplexity analysis on the collected papers, nine topics were determined optimally and nine representative topics of the collected papers were extracted using the Gibbs sampling method. As a result, it was confirmed that artificial intelligence, big data, Internet of things(IoT), digital, network and so on have emerged as the major technologies, and it was confirmed that research has been conducted on the changes due to the major technologies in various fields related to the 4th industry such as industry, government, education field, and job.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.