• Title/Summary/Keyword: 코드화

Search Result 1,696, Processing Time 0.023 seconds

Method for Evaluating the Security Risk based on Webpage Source Code (웹 페이지 소스 코드에 기반한 보안 위험도 산정 기법)

  • Cho, Sanghyun;Lee, Min-Soo;Kim, Young-Gab;Lee, Junsub;Kim, Sangrok;Kim, Moon-Jeong;Kim, In Ho;Kim, Sung Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1258-1261
    • /
    • 2007
  • 온라인 피싱과 같은 경제적 목적의 정보 수집 행위들이 급격히 증가하고 있는 가운데, 위험 사이트 정보를 관리하는 블랙리스트 기반의 대응과 신뢰할 수 있는 사이트를 기반으로 하는 화이트 리스트 접근 방법이 활용되고 있다. 그러나 블랙리스트 기반 방법은 피싱 사이트의 유효시간을 볼 때 비현실적이며, 화이트 리스트 접근 방법은 인증된 사이트 내에 존재하는 악성 웹 페이지나 악성 사이트로 유도되는 피싱 메일에는 대응하기 어렵다. 이 논문에서는 화이트 리스트 접근 방법을 보완하기 위해 사용자 웹 페이지의 위험도를 정량화 할 수 있는 웹 페이지 위험도 산정 기법을 제안한다.

Globalization of Ssireum (씨름의 세계화 방안)

  • Kim, Ki-Tak;Kim, Hong-Seol;Kang, Ho-Jung;Hwang, Sun-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.8
    • /
    • pp.355-365
    • /
    • 2012
  • The purpose of this research was to review the current situation of Ssireum and to investigate a basic direction for globalization of Ssireum. Examining disposition, situation, and image of Ssireum through literatures analysis, survey, in-depth interview was conducted. In detail, it's recognition and image perceived by customers and general individuals were investigated, and it's perception and related image of foreigners were analyzed. We examined the situation and the various problems of Ssireum on the base of site and customers. We made a conclusion that Korea has to make a great deal of effort for globalization of Ssireum both as a sport through institutionalization of alternatives for the globalization and as a heritage which has a strong identity. As detail alternatives for the globalization of Ssireum, education through physical education in school, bringing up foreign athletes, maximization of event values, specialization of Ssireum organization, international instructor, glocalization, culture coding, enhancement of ritual, connection with festival and so on were suggested.

DNA (Data, Network, AI) Based Intelligent Information Technology (DNA (Data, Network, AI) 기반 지능형 정보 기술)

  • Youn, Joosang;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.247-249
    • /
    • 2020
  • In the era of the 4th industrial revolution, the demand for convergence between ICT technologies is increasing in various fields. Accordingly, a new term that combines data, network, and artificial intelligence technology, DNA (Data, Network, AI) is in use. and has recently become a hot topic. DNA has various potential technology to be able to develop intelligent application in the real world. Therefore, this paper introduces the reviewed papers on the service image placement mechanism based on the logical fog network, the mobility support scheme based on machine learning for Industrial wireless sensor network, the prediction of the following BCI performance by means of spectral EEG characteristics, the warning classification method based on artificial neural network using topics of source code and natural language processing model for data visualization interaction with chatbot, related on DNA technology.

Development of NXC Robot Programming Supporting System Based on Types of Programming Error (오류분석에 기반한 NXC 로봇프로그래밍 지원시스템의 개발)

  • Nam, Jae-Won;Yoo, In-Hwan
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.3
    • /
    • pp.375-385
    • /
    • 2011
  • Computer education is moving its focus from skill oriented education to improving students' creativity and problem solving ability. Thus, the importance of programming education is being strengthened. However, programming education was biased to grammar oriented language that has been limits of students' interest. Robot programming is problem solving itself, and by allowing students to directly see the robot which is the output of programming, can help interest and motivate to the students. In fact, it is still observed that the students are facing difficulties due to various kinds of errors during the programming education. Therefore, this study categorizes and analyzes the errors students are facing during robot programming, and based on that, a support tool to help treat errors developed. The developed supporting system for error solving reduces the frequency of errors and provides the set of coding instruction, NXC language and error message in Korean, examples and detailed information for each stage of education, function removing major coding errors, and code sorting and indication of row number. This study also confirmed that the supporting tool is helpful in reducing and solving errors after input.

  • PDF

Design of a 4kb/s ACELP Codec Using the Generalized AbS Principle (Generalized AbS 구조를 이용한 4kb/s ACELP 음성 부호화기의 설계)

  • 성호상;강상원
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.7
    • /
    • pp.33-38
    • /
    • 1999
  • In this paper, we combine a generalized analysis-by-synthesis (AbS) structure and an algebraic excitation scheme to propose a new 4kb/s speech codec. This codec partly uses the structure of G.729. We design a line spectrum pair (LSP) quantizer, an adaptive codebook, and an excitation codebook to fit the 4 kb/s bit rate. The codec has a 25㎳ algorithmic delay, which corresponds to a 20㎳ frame size and a 5㎳ lookahead. At the bit rates below 4kb/s, most CELP speech codecs using the AbS principle have a drawback that results a rapid degradation of speech quality. To overcome this drawback we use the generalized AbS structure which is efficient for the low bit rate speech codec. LP coefficients are converted to LSP and quantized using a predictive 2-stage VQ. A low complexity algebraic codebook which uses shifting method is used for the fixed codebook excitation, and gains of the adaptive codebook and the fixed codebook are quantized using the VQ. To evaluate the performance of the proposed codec A-B preference tests are done with the fixed rate 8kb/s QCELP. As the result of the test, the performance of the codec is similar to that of the fixed rate 8kb/s QCELP.

  • PDF

A new type of lightweight stream encryption algorithm motif for applying low capacity messaging data encryption for IoT / QR / electronic tags (IoT/QR/전자태그용 저용량 메시지 데이터 암호화 적용을 위한 새로운 방식의 스트림 경량 암호화 알고리즘 모티브 제안)

  • Kim, Jung-Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.46-56
    • /
    • 2017
  • Recently, the spread of IoT technology has been spreading, and it has been applied to all industrial fields such as home / home appliance / medical care. Due to the low specification, low power consumption characteristic and communication data characteristic of IoT, implementation of existing algorithm is difficult thing. From this reason, we have proposed for the first time that encryption and decryption can be proceeded by introducing a kind of variable length bit XOR operation method which changes a variable the bit length value by using carry up and carry down method. We confirmed the practicality of encrypting short message data frequently processed by IoT device / QR code / RFID / NFC without changing the size of data before and after encryption.

A Study on API Wrapping in Themida and Unpacking Technique (Themida의 API 난독화 분석과 복구방안 연구)

  • Lee, Jae-hwi;Han, Jaehyeok;Lee, Min-wook;Choi, Jae-mun;Baek, Hyunwoo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.67-77
    • /
    • 2017
  • A protector is a software for protecting core technologies by using compression and encryption. Nowadays malwares use the protector to conceal the malicious code from the analysis. For detailed analysis of packed program, unpacking the protector is a necessary procedure. Lately, most studies focused on finding OEP to unpack the program. However, in this case, it would be difficult to analyze the program because of the limits to remove protecting functions by finding OEP. In this paper, we studied about the protecting functions in the Themida and propose an unpacking technique for it.

Numerical Study on the Thermal Stratification Behavior in Underground Rock Cavern for Thermal Energy Storage (TES) (열에너지 저장을 위한 지하 암반공동 내 열성층화 거동에 대한 수치해석적 연구)

  • Park, Do-Hyun;Kim, Hyung-Mok;Ryu, Dong-Woo;Choi, Byung-Hee;SunWoo, Choon;Han, Kong-Chang
    • Tunnel and Underground Space
    • /
    • v.22 no.3
    • /
    • pp.188-195
    • /
    • 2012
  • Using a computational fluid dynamics (CFD) code, FLUENT, the present study investigated the thermal stratification behavior of Lyckebo storage in Sweden, which is the very first large-scale rock cavern for underground thermal energy storage. Heat transfer analysis was carried out for numerical cases with different temperatures of the surrounding rock mass in order to examine the effect of rock mass heating due to periodic storage and production of thermal energy on thermal stratification and heat loss. The change of thermal stratification with respect to time was quantitatively examined based on an index of the degree of stratification. The results of numerical simulation showed that in the early operational stage where the surrounding rock mass was less heated, the stratification of stored thermal energy was rapidly degraded over time, but the degradation and heat loss tended to reduce as the surrounding rock mass was heated during a long period of operation.

Study on Usable Security of Facebook (Facebook의 Usable Security에 관한 연구)

  • Kim, Chung-han;Park, Min-su;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.285-296
    • /
    • 2016
  • Recently, as the widespread use of Facebook through a smartphone or tablet PC, it has increased the threat that contains the malicious code to post a social attacks and comments that use personal information that has been published of Facebook. To solve these problems, Facebook is, by providing a security function, but would like to address these threats, in setting the security function, the security function of the user's convenience is not considered a properly there is a problem that is not in use. Thus, in this paper, on the basis of the information obtained via the cogTool, on Facebook security features, the user experience by presenting a method that can be quantitatively measured by this, the user convenience It classifies about Facebook security features to decrease.

Numerical Analysis on Plasma Particles inside Electro-magnetic Field Using Particle-in-cell Method (Particle-in-cell 기법을 이용한 전자기장내 플라즈마 입자의 거동 해석)

  • Han, Doo-Hee;Joe, Min-Kyung;Shin, Junsu;Sung, Hong-Gye;Kim, Su-Kyum
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.11
    • /
    • pp.932-938
    • /
    • 2017
  • Particle-in-cell method which blends Eulerian grids and Lagrangian particle is utilized to solve simplified hall-effect thruster. Since this study individually tracks not only neutrons and ions but also electrons, message passing interface(mpi) scheme is adopted for parallel computer cluster. Helical movement of an electron cloud in constant magnetic field is validated comparing with an exact solution. A plasma in radial magnetic field and axial electric field in a reaction cylinder is established. Electrons do double helix movement and are well anchored in a cylinder. Ionization of neutrons by impact with high-speed electrons generates ion particles. They are accelerated by axial electric field, which forms a plume of a plasma-effect thruster.