• Title/Summary/Keyword: 행위기반 기법

Search Result 376, Processing Time 0.023 seconds

A Study of Automatic Code Generation for TMO-based Real-time Object Model (TMO 기반의 실시간 객체 모델의 코드 자동생성기법 연구)

  • Seok, Mi-Heui;Ryu, Ho-Dong;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.19A no.2
    • /
    • pp.101-112
    • /
    • 2012
  • In recently years, distributed real-time software has performed important roles in various areas. Real-time applications should be performed with satisfying strict constraints on response time. Usually real-time applications are developed on the real-time supporting middleware such as TMO(Time-triggered, Message-triggered Object), CORBA/RT, and RTAI. However, it is not easy to develop applications using them since these real-time middleware are unfamiliar to programmers. In this paper, we propose an automatic code generator for real-time application based on TMO in order to reduce development costs. For increasing or reflecting the characteristics of TMO into the design model, SpM and SvM methods are added into the class diagram, which have time constraints as their properties. And behaviors of them are represented as separated regions on state machine diagram in different abstract level. These diagrams are inputted into TMO-based code automatic generator, which generates details of the TMO class. Our approach has advantages for decreasing effort and time for making real time software by automatically generating TMO codes without detailed knowledge of TMO.

Tour Social Network Service System Using Context Awareness (상황인식 기반의 관광 소셜 네트워크 서비스 응용)

  • Jang, Min-seok;Kim, Su-gyum;Choi, Jeong-pil;Sung, In-tae;Oh, Young-jun;Shim, Jang-sup;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.573-576
    • /
    • 2014
  • In this paper, it provides social network service using context-aware for tourism. For this the service requires Anthropomorphic natural process. The service object need to provide the function analyzing, storing and processing user action. In this paper, it provides an algorithm to analysis with personalized context aware for users. Providing service is an algorithm providing social network, helped by 'Friend recommendation algorithm' which to make relations and 'Attraction recommendation algorithm' which to recommend somewhere significant. Especially when guide is used, server analysis history and location of users to provide optimal travel path, named 'Travel path recommendation algorithm'. Such as this tourism social network technology can provide more user friendly service. This proposed tour guide system is expected to be applied to a wider vary application services.

  • PDF

A study on the Counseling Process and Counseling Techniques Applying Freud's Psychoanalysis (프로이트 정신분석을 적용한 상담과정과 상담기법에 관한 연구)

  • Lee, Pyung-Hwa;Kim, Bo-Ki
    • Industry Promotion Research
    • /
    • v.7 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • This study is based on Freud's psychoanalysis and intends to deal with the actual psychoanalytic counseling applied to it. In particular, I would like to study the counseling process and counseling techniques. The research results are as follows. The counseling process goes through four stages: initiation, transfer development, training, and transfer resolution as follows after selecting a client and constructing a counseling situation. In the beginning phase, the client listens to important past histories. In the metastasis development stage, it is from the time when metastasis appears. The training phase is the phase in which the client's insight is translated into real life to bring about change. The transfer resolution stage is the period when transfer analysis and interpretation are completed. Counseling techniques include free association, empathy, resistance, transference and countertransference, and interpretation. Free association is a key technique in psychoanalytic therapy and plays an important role in maintaining the analytical framework. Empathy is the ability of the therapist to identify herself with the client and the ability of the therapist to convey the empathic experience to the client itself is a key mechanism for change. Resistance refers to any behavior in which the client does not cooperate with counseling. Transference and countertransference are the main techniques of psychoanalysis. This is because the psychoanalyst induces and resolves the transference of the client during the treatment process. Interpretation refers to the technique of responding verbally in order to understand the needs, meanings, and motives hidden behind the client's thoughts, feelings, and actions. In conclusion, the counseling process of psychoanalytic counseling refers to the purpose of effective counseling by selecting a client and constructing a counseling situation. In addition, the principles of psychoanalysis in counseling techniques are applied to treatment procedures that vary according to the nature of the case, and can be variably applied while treating the same client.

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.

Design and Implementation of Multi Layer IDS for Network Based Anomaly Behaviors (네트워크 기반 비정상 행위에 대한 다계층 침입 탐지 시스템 설계 및 구현)

  • Lee, Jung-Hyun;Kim, Hyun-Jung;Won, Il-Yong;Park, Ju-Hyun;Kim, Sung-Hak;Lee, Chang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.939-942
    • /
    • 2001
  • 인터넷 사용자가 급격히 증가함에 따라 정보통신 산업의 발전이 되었지만, 이에 따른 역기능 또한 크게 증가하고 있는 추세이며, 이를 차단하고, 탐지하는 기술이 해킹기술을 앞지르지 못하고 있으며 수동적 입장에서 해킹 사례를 분석하거나, 접근 차체를 차단하는 방법을 택하고 있지만 새로운 해킹 시도에 노출되고, 피해가 계속되고 있다. 따라서 우리가 제안하는 Anomaly IDS는 능동적 입장에서 해킹기법에 대해 대처하고, 새로운 형태의 해킹기술을 탐지함으로써, 보호하려는 시스템에 대한 능동적 보안수단을 제공한다. 본 논문에서는 기존 Anomaly IDS에서의 문제점을 보완하는 다계층적 측면에서 Audit Data를 통계적으로 학습하여 패턴을 생성하고 탐지하는 시스템을 설계 및 구현하였다.

  • PDF

The Study of Bot Program Detection based on User Behavior in Online Game Environment (온라인 게임 환경에서 사용자 행위 정보에 기반한 봇 프로그램 탐지 기법 연구)

  • Yoon, Tae-Bok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4200-4206
    • /
    • 2012
  • Recently, online-game industry has been rapidly expanding in these days. But, the various game service victimized cases are generated by the bots program. Particularly, the abnormal collection of the game money and item loses the inherent fun of a game. It reaches ultimately the definite bad effect to the game life cycle. In this paper, we propose a Bots detection method by observing the playing patterns of game characters with game log data. It analyzed behaviors of human players as well as bots and identified features to build the model to differentiate bots from human players. In an experiment, by using the served online-game, the model of a user and bots were generated was distinguished. And the reasonable result was confirmed.

A Framework for Web Log Analysis Using Process Mining Techniques (프로세스 마이닝을 이용한 웹 로그 분석 프레임워크)

  • Ahn, Yunha;Oh, Kyuhyup;Kim, Sang-Kuk;Jung, Jae-Yoon
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2014
  • Web mining techniques are often used to discover useful patterns from data log generated by Web servers for the purpose of web usage analysis. Yet traditional Web mining techniques do not reflect sufficiently sequential properties of Web log data. To address such weakness, we introduce a framework for analyzing Web access log data by using process mining techniques. To illustrate the proposed framework, we show the analysis of Web access log in a campus information system based on the framework and discuss the implication of the analysis result.

Local Model Checking for Verification of Real-Time Systems (실시간 시스템 검증을 위한 지역모형 검사)

  • 박재호;김성길;황선호;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.1
    • /
    • pp.77-90
    • /
    • 2000
  • Real-Time verification is a procedure that verifies the correctness of specification related to requirement in time as well as in logic. One serious problem encountered in the verification task is that the state space grows exponentially owing to the unboundedness of time, which is termed the state space explosion problem. In this paper, we propose a real-time verification technique checking the correctness of specification by showing that a system model described in timed automata is equivalent to the characteristic of system property specified in timed modal-mu calculus. For this, we propose a local model checking method based on the value of the formula in initial state with constructing product graph concerned to only the nodes needed for verification process. Since this method does not search for every state of system model, the state space is reduced drastically so that the proposed method can be applied effectively to real-time system verification.

  • PDF

Determinants of the user's Intention to use of Mobile banking (Mobile Banking 사용 의도 결정 요인)

  • Han, Sang-Il
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.3
    • /
    • pp.135-157
    • /
    • 2005
  • Based on literature relating to the theory of planned behavior(TPB) and the TAM, this study extends the applicability of the TAM in a mobile banking context, by adding one trust-based construct('perceived credibility') and two resource-based constructs('perceived efficacy' and 'perceived cost') and technical suitability constructs to the model, while paying careful attention to the placing of these constructs in the TAM's existing nomological structure. Data collected from 182 users in Korea were tested against the extended TAM, using the structural equation modeling approach. The results strongly support the extended TAM in predicting users intentions to adopt mobile banking. Several implications for IT/IS acceptance research and mobile banking management practices are discussed.

  • PDF

Extending Technology Acceptance Model with Social Influence on Korean College Students' Social Commerce Context (한국 대학생의 소셜 커머스 이용행태 연구: 사회적 영향력으로 확장한 기술수용모형을 중심으로)

  • Joo, Jihyuk
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.107-115
    • /
    • 2015
  • The social commerce is an innovative and emerging transaction. It is the result of combination with transaction and social media technology. This study analyzes Korean college students' social commerce behavior through extending technology acceptance model(TAM) with social influence(SI). We confirmed all proposed hypotheses are significant and supported by the given data through PLS path modeling method with SmartPLS. It indicates that SI is an important factor influencing intention to use, so SI should be consider for theorists to enhance explanation and prediction of TAM and for practitioners to earn higher performances as well. Finally, based on the findings, suggestions for future studies are discussed.