• Title/Summary/Keyword: 획기적

Search Result 739, Processing Time 0.023 seconds

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Remote Control Apparatus and Display Remote Control System Comprising the Same (원격 제어 장치 및 이를 포함하는 디스플레이 원격 제어 시스템)

  • Yoon, Yeo-Jun;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.165-174
    • /
    • 2006
  • This paper is a matter of remote control apparatus and display remote control system comprising the same. The remote controller is a wireless remote pointing device that is included a function of mouse and a function of remote controller for VOD etc. It is assembled a sending signal part to communicate with display device, a image sensor part to capture a seen of front view and a main body. Also, it includes a control part that analyzes the captured image, calculates a relative moving factor that main body is moved by user, and then controls the mouse cursor on the display device. The remote control apparatus is able to capture a seen of front view, to analyze the captured image, and to move a mouse cursor point on the display device as much as it calculated relative moving factor. Therefor it brings down the cost of production by a product design that is increased user satisfaction. And it, using the patent and the new product design, will make an epoch in development of the remote control system for Ubiquitous broadcasting industry.

  • PDF

A Study on the issues and measures of the China's Anti-dumping law (중국의 반덤핑 제도 과제와 대응방안)

  • Oh, Moon-Kap
    • International Commerce and Information Review
    • /
    • v.16 no.1
    • /
    • pp.117-142
    • /
    • 2014
  • China having largest market in the world, has been criticized by its trading partner countries due to its unfair trade practices, particularly in the field of anti-dumping regulation. The main reasons for such criticism seem to come from the incomplete anti-dumping law as instrument to protect the industry concerned. In 2001, though new anti-dumping law was established to replace the former one by revising it to meet the needs for economic development which should be secured for china to take part in the competition world as the new member of WTO. The provisions concerned have been evaluated not to be sufficient and efficient from the viewpoint of the safeguard mechanism, while are required to be modified to meet the real world of international trade law. I consider that as the biggest partner of chinese trade activity, we will need to maintain a well understanding of the Chinese anti-dumping regulations. So this report conducts the Chinese anti-dumping regulations, compares between the chinese regulations and the WTO agreement, and studies deeply in to the problems and the improvements of the Chinese anti-dumping regulations.

  • PDF

A Study of improving reliability on prediction model by analyzing method Big data (빅데이터 분석방법을 이용한 예측모형의 신뢰도 향상에 관한 연구)

  • Song, Min-Gu;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.103-112
    • /
    • 2013
  • Traditional method of establishing prediction model is usually using formal data stored in Data Base. However, nowadays advent of "smart" era brought by ground-breaking development of communication system makes informal data to dominate overall data, such 80% in total. Therefore, conventional method using formal data as establishing predicting model would be untrustworthy means in present. In other words, it is indispensible to make prediction model credible including informal data(SNS, image, video) and semi-formal data(log data). In this study, we increase credibility of predicting model adapting Bigdata method and comparing reliability of conventional measurement to real-data.

Industrial Cluster Policies of the Korean Government in the Early 2000s: The Case of Daejeon (지방 차원의 산업 클러스터 정책: 대전광역시를 사례로)

  • Shin, Dong-Ho
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.12 no.1
    • /
    • pp.96-110
    • /
    • 2009
  • To tackle the problem of regional economic and social disparities in Korea, the government of Roh, Mu-Hyun(2003-2007), launched a series of radical policies and programs to decentralize administrative activities of the capital region and stimulate economic growth in less developed regions, based on regional innovation systems and industrial cluster concepts. This paper highlights the Roh government's approach to reducing regional disparities, and makes some comments on the innovation cluster strategy by investigating the realities appearing in a major city, Daejeon. It concludes that many ministries of the Roh government created various competing, undifferentiated programs that were assigned too much money and energy, and drained resources from other governmental activities. In fact, very few programs show positive signs of achieving the goals of innovation in less developed regions, balancing the growth gaps between well-off regions and the rest of Korea, and generating overall economic growth for the country.

  • PDF

Trend of Simulation Systems for Satellite Development and Verification (위성 개발 및 검증을 위한 모사 환경 시스템 개발 현황)

  • Kim, Young-Yun;Cho, Seung-Won;Choi, Jong-Yeoun;Choi, Joon-Min
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.6 no.2
    • /
    • pp.40-50
    • /
    • 2008
  • Most of satellite program process consists of mission analysis, thermal, structure, electronics design, and operation, etc. Each step has several steps like design phase, development phase, and verification phase, etc. As to do this kind of process, very high costs and much time are required, further high risk is included. So for solving those difficulties, satellite developers have designed and used satellite simulator system. In early stage of satellite development, simulator system was just used for a fragment of development and verification, so it could not give enough advantage on satellite development. In order to get high advantage on satellite development, full system level simulators which can be used for several steps for development and verification are evolved. So This paper introduces the trend of simulation systems for satellite development and verification used by several satellite developers.

  • PDF

Efficient Performance Evaluation Method for Digital Satellite Broadcasting Channels (효율적인 디지틀 위성방송채널 성능평가 기법)

  • 정창봉;김준명;김용섭;황인관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6A
    • /
    • pp.794-801
    • /
    • 2000
  • In this paper, the efficient new performance evaluation method for digital communication channels is suggested and verified its efficiency in terms of simulation run-tim for the digital satellite broadcasting satellite TV channel. In order to solve the difficulties of the existing Importance Sampling(IS) Technics, we adopted the discrete probability mass function(PMF) in the new method for estimating the statistical characteristics of received signals from the measured Nth order central moments. From the discrete probability mass function obtained with less number of the received signal than the one required in the IS technic, continuous cumulative probability function and its inverse function are exactly estimated by using interpolation and extrapolation technic. And the overall channel is simplified with encoding block, inner channel performance degra-dation modeing block which is modeled with the Uniform Random Number Generator (URNG) and concatenated Inverse Cummulative Pr bility Distribution function, and decoding block. With the simplified channel model, the overall performance evaluation can be done within a drastically reduced time. The simulation results applied to the nonlinear digital satellite broadcasting TV channel showed the great efficiency of the alogrithm in the sense of computer run time, and demonstrated that the existing problems of IS for the nonlinear satellite channels with coding and M-dimensional memory can be completely solved.

  • PDF

A Big Data Application for Anomaly Detection in VANETs (VANETs에서 비정상 행위 탐지를 위한 빅 데이터 응용)

  • Kim, Sik;Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.175-181
    • /
    • 2014
  • With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

An Applied Study of DRM(Digital Right Management) to Distribution and Price Structure of Digital Contents (DRM(Digital Right Management)에 의한 디지털 컨텐츠 유통 및 가격정책에의 영향 분석)

  • Song, Jae-Do
    • Journal of Global Scholars of Marketing Science
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • DRM(Digital Right Management), which realize the controllability of intellectual right in the process of transactions with economically feasible cost, may cause critical changes in the distributions of digital contents. This Paper takes notice of the concept of 'Super Distribution' in which every user can be the core of the distribution and the possibility of usingvarious price structures by introducing DRM. We reviews that Super Distribution can increase the demand of digital contents by decreasing the information cost in the user aspect, and it can also diminish the distribution cost dramatically in the provider aspect. Also, DRM may allow various types of pricing which use different criteria such as the number or duration of usage. The variety in price structure can increase not only the profit of provider but the utility of consumer. These characteristics of DRM, as a whole, increase the efficiency of distribution and make the providers differentiate their services.

  • PDF

A Research on the Cloud Computing Security Framework (클라우드 컴퓨팅 정보보호 프레임워크에 관한 연구)

  • kim, Jung-Duk;Lee, Seong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1277-1286
    • /
    • 2013
  • Cloud computing's unique attributes such as elasticity, rapid provisioning and releasing, resource pooling, multi-tenancy, broad-network accessibility, and ubiquity bring many benefits to cloud adopters(company and organization), but also entails specific security risks associated with the type of adopted cloud and deployment mode. To minimize those types of risk, this paper proposed cloud computing security framework refered to strategic alliance model. The cloud computing security framework has main triangles that are cloud threat, security controls, cloud stakeholders and compose of three sides that are purposefulness, accountability, transparent responsibility. Main triangles define purpose of risk minimization, appointment of stakeholders, security activity for them and three sides of framework are principles of security control in the cloud computing, provide direction of deduction for seven service packages.