• 제목/요약/키워드: Client Code

검색결과 105건 처리시간 0.028초

The Structural Design of Tianjin Goldin Finance 117 Tower

  • Liu, Peng;Ho, Goman;Lee, Alexis;Yin, Chao;Lee, Kevin;Liu, Guang-lei;Huang, Xiao-yun
    • 국제초고층학회논문집
    • /
    • 제1권4호
    • /
    • pp.271-281
    • /
    • 2012
  • Tianjin Goldin Finance 117 tower has an architectural height of 597 m, total of 117 stories, and the coronation of having the highest structural roof of all the buildings under construction in China. Structural height-width ratio is approximately 9.5, exceeding the existing regulation code significantly. In order to satisfy earthquake and wind-resisting requirements, a structure consisting of a perimeter frame composed of mega composite columns, mega braces and transfer trusses and reinforced concrete core containing composite steel plate wall is adopted. Complemented by some of the new requirements from the latest Chinese building seismic design codes, design of the super high-rise building in high-intensity seismic area exhibits a number of new features and solutions to professional requirements in response spectrum selection, overall stiffness control, material and component type selection, seismic performance based design, mega-column design, anti-collapse and stability analysis as well as elastic-plastic time-history analysis. Furthermore, under the prerequisite of economic viability and a series of technical requirements prescribed by the expert review panel for high-rise buildings exceeding code limits, the design manages to overcome various structural challenges and realizes the intentions of the architect and the client.

A Study on the IDL Compiler using the Marshal Buffer Management

  • Kim, Dong-Hyun
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.843-847
    • /
    • 2005
  • The development of distributed application in the standardized CORBA(Common Object Request Broker Architecture) environments reduces the developing time and maintaining cost of the systems. Because of these advantages, the development of application is being progressed in the several fields using the CORBA environments. The programmers in the CORBA environments usually develop the application programs using the CORBA IDL(Interface Definition Language). The IDL files are compiled by IDL compiler and translated into the stubs and skeleton codes which are mapped onto particular target language. The stubs produced by IDL compilers processes the marshaling a data into message buffer. Before a stub can marshal a data into its message buffer, the stub must ensure that the buffer has at least enough free space to contain the encoded representation of the data. But, the stubs produced by typical IDL compilers check the amount of free buffer space before every atomic data is marshaled, and if necessary, expand the message buffer. These repeated tests are wasteful and incidence of overheads, especially if the marshal buffer space must be continually expanded. Thus, the performance of the application program may be poor. In this paper, we suggest the way that the stub code is maintain the enough free space before marshaling the data into message buffer. This methods were analyzes the overall storage requirements of every message that will be exchanged between client and server. For these analysis, in the Front End of compiler has maintain the information that the storage requirements and alignment constraints for data types. Thus, stub code is optimized and the performance of application program is increased.

  • PDF

공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구 (A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code)

  • 김점구;노시춘
    • 융합보안논문지
    • /
    • 제12권1호
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection 기법은 공개된지 수년이 지났지만 웹해킹 공격중 가장 위험한 공격으로 분류되어 있다. 웹 프로그래밍은 자료의 효율적인 저장 및 검색을 위해 DBMS를 필수적으로 사용하고 있다. 주로 PHP,JSP,ASP 등의 스크립트 언어를 이용하여 DBMS와 연동한다. 이러한 웹 어플리케이션에서 클라이언트의 잘못된 입력값을 검증하지 않으므로 비정상적인 SQL 쿼리가 발생할 수 있다. 이러한 비정상적 쿼리는 사용자 인증을 우회하거나 데이터베이스에 저장된 데이터를 노출시킬 수 있다. 공격자는 SQL Injection 취약점을 이용하여 아이디와 암호를 몰라도 웹기반 인증을 통과할 수 있고 데이터베이스에 저장된 데이터를 열람해 볼 수 있다. SQL Injection에 대한 대책으로 다수의 방법이 발표되었다. 그러나 어느 한 가지 방법에 의존할 경우 많은 보안 공백이 발생할 수 있다. 단계적 대응모델은 사고 예방적 측면에서 소스코드 작성 단계, 서버 운용단계, 데이터베이스 핸드링 단계, 사용자 입력값 검증 활용 단계 등 대책을 프레임워크로 구성하여 적용하는 방법이다. 이 대응모델 을 적용할 경우 운용과정을 통해 존재하는 SQL Injection의 공격가능성을 보다 효과적으로 차단이 가능하다.

원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지 (Detecting Malicious Scripts in Web Contents through Remote Code Verification)

  • 최재영;김성기;이혁준;민병준
    • 정보처리학회논문지C
    • /
    • 제19C권1호
    • /
    • pp.47-54
    • /
    • 2012
  • 최근 웹사이트는 매쉬업, 소셜 서비스 등으로 다양한 출처의 리소스를 상호 참조하는 형태로 변화하면서 해킹 시도도 사이트를 직접 공격하기보다 서비스 주체와 연계 서비스, 클라이언트가 상호 작용하는 접점에 악성스크립트를 삽입하는 공격이 증가하고 있다. 본 논문에서는 웹사이트 이용 시 신뢰관계에 있는 여러 출처로부터 다운받은 웹컨텐츠의 HTML 코드와 자바스크립트 코드가 클라이언트 브라우저에서 구동 시 삽입된 악성스크립트를 원격의 검증시스템으로부터 탐지하는 모델을 제안한다. 서비스 주체의 구현코드 정보를 활용하여 요청 출처에 따라 검증 항목을 분류하고 웹컨텐츠의 검증 요소를 추출하여 검증 평가결과를 화이트, 그레이, 블랙 리스트로 데이터베이스에 저장하였다. 실험평가를 통해 제안한 시스템이 악성스크립트를 효율적으로 탐지하여 클라이언트의 보안이 향상됨을 확인하였다.

인공신경망 이론을 이용한 GUI홍수예측시스템 개발 (A Development of GUI Flood Forecasting System Using Artificial Neural Networks Theory)

  • 박성천;오창열;김동렬
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2005년도 학술발표회 논문집
    • /
    • pp.694-698
    • /
    • 2005
  • 본 연구에서는 우리나라 5대강 유역에 대한 홍수예경보시스템의 홍수추적방법으로 이용되고 있는 물리적인 모형인 저류함수법의 한계점을 극복하고, 영산강 유역의 본류를 대표하는 나주지점과 황룡강 유역을 대표하는 선암지점에 대하여 유역의 수문학적 구조를 나타내지 않는 인공신경망 이론을 이용하여 강우-유출 과정의 비선형 모형을 개발하였다. 또한, 신속한 홍수유출량 예측과 예측 결과에 따른 현장 적용이 가능하도록 CS(Client-Server) 기반에서 인공신경망에 대한 원시코드(source code)를 GUI(Graphical User Interface)화하여 홍수예측시스템(Flood Forecasting System : FFS)을 개발하였다. 본 연구결과 나주지점에서는 Model II의 ANN_NJ_9 모형이 선암지점에서는 Model III의 ANN_SA_9 모형이 강우-유출 특성을 가장 잘 반영하였다. 또한, 본 연구에서 개발한 GUI_FFS에 대하여 기 확보된 2004년도 강우 및 유출량 적용한 결과 0.98이상의 $R^2$값을 보임으로서 향후 수자원 및 하천계획 수립과 그에 따른 운영 및 관리에 효율성을 더할 수 있을 것이라 판단된다.

  • PDF

기능 점수를 이용한 소프트웨어 규모 및 비용산정 방안에 관한 연구 (An improvement of software sizing and cost estimation model with function point methods)

  • 김현수
    • 경영과학
    • /
    • 제14권1호
    • /
    • pp.131-149
    • /
    • 1997
  • Software cost estimation is an important both for buyers and sellers(developers). We reviewed domestic and foreign researches and practices on software cost estimation with function point method comprehensively, In this paper, we derived four promising alternative function point models. They are an IFPUG(International Function Point User Group)-based model(Model I), a shorthand model for client/sever software systems(Model II), a data-oricnted model for relatively large software projects(Model III), and a general- purpose function point model for non business application softwares as well as business applications(Model IV). Empirical data shows that Model I, II, and IV are very useful function point models. In particular, model II and IV look very useful models since they are concise and accurate. These models can be incorporated in a new improved guideline for software cost estimation. General opinion survey shows that Model I, II and IV are preferable. There are no significant differences in preference between buyers and sellers. The survey also shows that users think function point method is better than step(line of code)-oriented cost estimation methods in many ways including objectivity and estimation accuracy.

  • PDF

다중등급 보안 정책을 적용한 전자결재 모듈의 개발 (Building an Electronic Approval Module Using Multi-Level Security)

  • 김진성;안병혁
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제11권1호
    • /
    • pp.175-198
    • /
    • 2002
  • This paper is to develop a security module for electronic approval systems. Electronic documents are created, transmitted and saved in the company's intranet computer network. Transmitting electronic documents, however, brings us a security problem. Communications among various computer systems are exposed to many security threats. Those threats are eavesdropping, repudiation, replay back etc. The main purpose of this paper is to develop a module which provides the security of electronic documents while they are passed from one place to another This paper applies Multi-Level security to the electronic approval system that guarantees security of electronic documents from many threats. Multi-Level security controls the access to the documents by granting security level to subject users and object electronic documents. To prevent possible replay back attacks, this paper also uses one time password to the system. The security module is composed of client program and server one. The module was developed using Microsoft Visual Basic 6.0 and Microsoft SQL Server 7.0. The code uses Richard Bondi's WCCO(Wiley CryptoAPI COM Objects) library functions which enables Visual Basic to access Microsoft CryptoAPI.

  • PDF

웹 기반 CFD s/w용 GUI 프로세서의 구현 (IMPLEMENTATION OF FULL WEB-BASED GRAPHIC USER INTERFACE PROCESSOR FOR CFD SOFTWARE)

  • 막슈다 쥬래바;에브게니 이바너프;송동주
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 2004년도 추계 학술대회논문집
    • /
    • pp.121-125
    • /
    • 2004
  • The preprocessor - solver - postprocessor software for 2D/Axisymmetric CSCM Upwind Flux Difference Splitting Navier-Stokes code has been developed for undergraduate educational purpose. This computational fluid dynamics (CFD) software allows students to setup, solve, visualize and control dynamically server for their own fluid problems via Internet. The preprocessor Is capable of generating geometry and grid, initial solution data and required solver control parameters. The postprocessor shows vector plot and contour plot with different options while residual plot shows root-mean-square (RMS) error history graphically and retrieves the data from solver interactively. Special feature of the preprocessor is grid generation part which is based on MFC/Visual C++ application and FORTRAN single block grid generator process. Many users can access solver via Internet from client computers and solve desired problems using locally installed pre- and postprocessor and remote powerful solver part.

  • PDF

A compatibility verification environment for HDL-modeled microprocessors

  • 이문기;김영완;서광수;손승일
    • 한국통신학회논문지
    • /
    • 제21권2호
    • /
    • pp.409-416
    • /
    • 1996
  • This paper describes the simulation environment that verifies whether a new microporcessor described with HDL is compatible with an existing microprocessor. The compatibility verification is done by showing that the new microprocessor executes the OS(Operating System) program used in the existing microprocessor without any modification of its binary code. The proposed verification environment consists of a virtual system and a graphic user interface (GUI) module. Each module is independently designed based on serve-client model and three exists a communication part for information interchange between the two modules. This paper describes the method of constructing the verification environment and presents the compatibility verification environment of the x86 microprocessor as the simulation result.

  • PDF

Conceptual Data Modeling on the KRR-1&2 Decommissioning Database

  • Park, Hee-Seoung;Park, Seung-Kook;Lee, Kune-Woo;Park, Jin-Ho
    • Nuclear Engineering and Technology
    • /
    • 제34권6호
    • /
    • pp.610-618
    • /
    • 2002
  • A study of the conceptual data modeling to realize the decommissioning database on the HRR-1&2 was carried out. In this study, the current state of the abroad decommissioning database was investigated to make a reference of the database. A scope of the construction of decommissioning database has been set up based on user requirements. Then, a theory of the database construction was established and a scheme on the decommissioning information was classified . The facility information, work information, radioactive waste information, and radiological information dealing with the decommissioning database were extracted through interviews with an expert group and also decided upon the system configuration of the decommissioning database. A code which is composed of 17 bit was produced considering the construction, scheme and information. The results of the conceptual data modeling and the classification scheme will be used as basic data to create a prototype design of the decommissioning database.