• Title/Summary/Keyword: API method

Search Result 526, Processing Time 0.03 seconds

On Visualization Simulation for Generation of Three Dimensional Sea State (3차원 해상상태 생성을 위한 가시화 시뮬레이션)

  • Sohn, Kyoung-Ho;Bae, Jun-Young;Kim, Yong-Min
    • Journal of Navigation and Port Research
    • /
    • v.26 no.4
    • /
    • pp.449-453
    • /
    • 2002
  • Recently a ship manoeuvring simulator has been developed by Korea Maritime University. We are desiring to apply the movement of wave to the visual scene of sea state in the simulator. This paper discussed the calculation method and visualization simulation of three dimensional sea state using OpenGL API, and the possibility to apply calculation result to the simulator.

Design of Middleware for Interactive Data Services in the Terrestrial DMB

  • Lee, Gwang-Soon;Yang, Kyu-Tae;Kim, Kwang-Yong;Hahm, Young-Kwon;Ahn, Chung-Hyun;Lee, Soo-In
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.652-655
    • /
    • 2006
  • In this letter, we introduce a new middleware architecture and its generic application programming interface (API) (called the T-DMB MATE API) for terrestrial digital multimedia broadcasting (T-DMB). Middleware in T-DMB enables inter-operable applications to be downloaded from both broadcast and telecommunication networks in advance and to be executed in any type of T-DMB receiver. The middleware we introduce here is especially designed to support a proposed method for application provisions applied to a concept of application module appropriate to the service environment of T-DMB. We also verify the designed T-DMB MATE API through the implementation of the middleware and its application in a PC-based receiver.

  • PDF

Evaluation of Fracture Toughness on High Frequency Electric Resistance Welded API 5LB Steel Pipe (API 5LB강관의 고주파전기저항용접부에 관한 파괴인성 평가)

  • 오세욱;윤한기;안계원
    • Journal of Ocean Engineering and Technology
    • /
    • v.1 no.1
    • /
    • pp.127-137
    • /
    • 1987
  • The evaluation of the elastic-plastic fracture toughness $J_{1C}$ was performed on the center of weld metal(CWM), the heat affected zone (HAZ) and the base metal (BM) of API 5LB steel pipes welded by the high frequency electric resistance welding. The $J_{1C}$ was evaluated by the JSME R-Curve and JSME SZW methods using the smooth and side-grooved specimens. The results are as follows; (1) The $J_{1C}$ values by the SZW method are overestimated as compared with those by the R-curve method, because the micro-crack is formed as SZW increase with the deformation at SZ after initiation of the ductile crack. (2) The everage of $J_{1C}$ values by the the R-curve and the SZW methods in side-grooved specimens tended to decrease in comparison with smooth specimens 9.42% at CWM, 4.2% at HAZ, 23.2% at BM, respectively. (3) The boundary of the fatigue pre-crack, stretched zone, and dimple regions appeared more clearly in side-grooved specimens, for the slight change of SZW in the direction of the plate thickness, as compared with smooth specimens.

  • PDF

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

A Study on the Remote Method Connection using RMI in the Distributed Computing System (분산 환경 시스템에서 RMI를 이용한 원격 메소드 연결에 관한 연구)

  • 소경영;최유순;박종구
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.3
    • /
    • pp.483-491
    • /
    • 2001
  • In this paper, we design and implement of the remote method connection system using Java RMI in the distributed computing system. In pursuing this goal, we implement the dynamic method connection interface and API. And then we describe the dynamic memory management routine.

  • PDF

Detection of Privacy Information Leakage for Android Applications by Analyzing API Inter-Dependency and the Shortest Distance (API간 상호 의존성 및 최단거리 분석을 통한 안드로이드 애플리케이션의 개인정보 유출 탐지 기법)

  • Kim, Dorae;Park, Yongsu
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.707-714
    • /
    • 2014
  • In general, the benign apps transmit privacy information to the external to provide service to users as the malicious app does. In other words, the behavior of benign apps is similar to the one of malicious apps. Thus, the benign app can be easily manipulated for malicious purposes. Therefore, the malicious apps as well as the benign apps should notify the users of the possibility of privacy information leakage before installation to prevent the potential malicious behavior. In this paper, We propose the method to detect leakage of privacy information on the android app by analyzing API inter-dependency and shortest distance. Also, we present LeakDroid which detects leakage of privacy information on Android with the above method. Unlike dynamic approaches, LeakDroid analyzes Android apps on market site. To verify the privacy information leakage detection of LeakDroid, we experimented the well-known 250 malicious apps and the 1700 benign apps collected from Android Third party market. Our evaluation result shows that LeakDroid reached detection rate of 96.4% in the malicious apps and detected 68 true privacy information leakages inside the 1700 benign apps.

Semantic Service Composition Based on Semantic Broker (시맨틱 브로커 기반 시맨틱 서비스 조합)

  • Jung, Hanmin;Lee, Mi-Kyoung;You, Beom-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.283-288
    • /
    • 2009
  • Semantic service can be defined as the service providing search API or reasoning API based on ontology and Web Services. It performs a pre-defined task by exploiting URI, classes, and properties. This study introduces a semantic service composition method based on a semantic broker referring ontology and management information of semantic services stored in a semantic service manager with requirements of the user. The requirements consist of input instances, an output class, a visualization type, semantic service names, and property names. This composition method provides dynamically generated semantic service pipelines including composit semantic services. The user can execute the pipelines provided by the semantic broker to find a meaningful semantic pipeline. After all, this study contributes to develop a system supporting human service planners who want to find composit semantic services among distributed semantic services.

  • PDF

An Android API Obfuscation Tool using Reflection and String Encryption (리플렉션과 문자열 암호화를 이용한 안드로이드 API 난독화 도구)

  • Lee, Joohyuk;Park, Heewan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.23-30
    • /
    • 2015
  • Reflection is a feature of the Java programming language that can examine and manipulate components of program itself. If you use the reflection, you can get an obfuscation effect of Java source because it converts sources into complicated structures. However, when using it, strings of components name of program are exposed. Therefore, it cannot prevent static analysis. In this paper, we presents a method and a tool of interfere with static analysis using reflection. And in this case, exposed strings are encoded using Vigen$\acute{e}$re cipher. Experimental results show that this tool is effective in increasing the overall complexity of the source code. Also the tool provides two types decryption method based on server and local. It can be selected based on the importance of the API because it affects the execution speed of the application.

A Study on Expression of NPC Colloquial Speech using Chat-GPT API in Games against Joseon Dynasty Settings (조선시대 배경의 게임에서 Chat-GPT API를 사용한 NPC 대화체 표현 연구)

  • Jin-Seok Lee;In-Chal Choi;Jung-Yi Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.157-162
    • /
    • 2024
  • This study was conducted to implement Joseon Dynasty conversational style using the ChatGPT API to enhance the immersion of games set in the Joseon era. The research focuses on interactions between middle-class players and other classes. Two methods were employed: learning the dialogues from historical dramas set in the Joseon Dynasty and learning the sentence endings typical of the period. The method of learning sentence endings was rated higher based on self-evaluation criteria. Reflecting this, prompts were constructed to represent NPC dialogues in the game settings of the Joseon era. Additionally, a method was proposed for creating various NPC prompts using prompt combination techniques. This study can serve as a reference for NPC dialogue creation in games set in the Joseon Dynasty.

A Study on the remote acuisition of HejHome Air Cloud artifacts (스마트 홈 헤이 홈 Air의 클라우드 아티팩트 원격 수집 방안 연구)

  • Kim, Ju-eun;Seo, Seung-hee;Cha, Hae-seong;Kim, Yeok;Lee, Chang-hoon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.69-78
    • /
    • 2022
  • As the use of Internet of Things (IoT) devices has expanded, digital forensics coverage of the National Police Agency has expanded to smart home areas. Accordingly, most of the existing studies conducted to acquire smart home platform data were mainly conducted to analyze local data of mobile devices and analyze network perspectives. However, meaningful data for evidence analysis is mainly stored on cloud storage on smart home platforms. Therefore, in this paper, we study how to acquire stored in the cloud in a Hey Home Air environment by extracting accessToken of user accounts through a cookie database of browsers such as Microsoft Edge, Google Chrome, Mozilia Firefox, and Opera, which are recorded on a PC when users use the Hey Home app-based "Hey Home Square" service. In this paper, the it was configured with smart temperature and humidity sensors, smart door sensors, and smart motion sensors, and artifacts such as temperature and humidity data by date and place, device list used, and motion detection records were collected. Information such as temperature and humidity at the time of the incident can be seen from the results of the artifact analysis and can be used in the forensic investigation process. In addition, the cloud data acquisition method using OpenAPI proposed in this paper excludes the possibility of modulation during the data collection process and uses the API method, so it follows the principle of integrity and reproducibility, which are the principles of digital forensics.