• Title/Summary/Keyword: Code Translation

Search Result 80, Processing Time 0.028 seconds

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Evaluation of Real-time Target Positioning Accuracy in Spinal Radiosurgery (척추방사선수술시 실시간 추적검사에 의한 병소목표점 위치변이 평가)

  • Lee, Dong Joon
    • Progress in Medical Physics
    • /
    • v.24 no.4
    • /
    • pp.290-294
    • /
    • 2013
  • Stereotactic Radiosurgery require high accuracy and precision of patient positioning and target localization. We evaluate the real time positioning accuracy of isocenter using optic guided patient positioning system, ExacTrac (BrainLab, Germany), during spinal radiosurgery procedure. The system is based on real time detect multiple body markers attached on the selected patient skin landmarks. And a custom designed patient positioning verification tool (PPVT) was used to check the patient alignment and correct the patient repositioning before radiosurgery. In this study, We investigate the selected 8 metastatic spinal tumor cases. All type of tumors commonly closed to thoracic spinal code. To evaluate the isocenter positioning, real time patient alignment and positioning monitoring was carried out for comparing the current 3-dimensional position of markers with those of an initial reference positions. For a selected patient case, we have check the isocenter positioning per every 20 millisecond for 45 seconds during spinal radiosurgery. In this study, real time average isocenter positioning translation were $0.07{\pm}0.17$ mm, $0.11{\pm}0.18$ mm, $0.13{\pm}0.26$ mm, and $0.20{\pm}0.37$ mm in the x (lateral), y (longitudinal), z (vertical) directions and mean spatial error, respectively. And body rotations were $0.14{\pm}0.07^{\circ}$, $0.11{\pm}0.07^{\circ}$, $0.03{\pm}0.04^{\circ}$ in longitudinal, lateral, table directions and mean body rotation $0.20{\pm}0.11^{\circ}$, respectively. In this study, the maximum mean deviation of real time isocenter positioning translation during spinal radiosurgery was acceptable accuracy clinically.

Conceptual Transformation for Code Generation from SDL-92 to Object-oriented Languages (SDL-92에서 객체지향 언어의 코드 생성을 위한 개념 변환)

  • Lee, Si-Young;Lee, Dong-Gill;Lee, Joon-Kyung;Kim, Sung-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.5
    • /
    • pp.473-487
    • /
    • 2000
  • SDL-92, the language for specification and description of system, has held on to the communication method that based on processes and signals in the adoption of object-oriented concept to embrace the previous documents of system specification and description and users. It has caused problems, not only the absence of corresponding concepts in automatic generation to object-oriented language program based on method and object, but also some side effects accompanied by them like visibility and communication method. So, in this paper, we present a general object-oriented language model, which based on method and object, make a study of problems in the transformation fromSDL-92 to proposed model, and then propose conceptual transformation methods to solve them. The proposed transformation method can utilize the built-in parallelism in objects and guarantee the compiler level portability in translated program by providing translation into the syntax of target language.

  • PDF

Online Handwritten Digit Recognition by Smith-Waterman Alignment (Smith-Waterman 정렬 알고리즘을 이용한 온라인 필기체 숫자인식)

  • Mun, Won-Ho;Choi, Yeon-Seok;Lee, Sang-Geol;Cha, Eui-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.27-33
    • /
    • 2011
  • In this paper, we propose an efficient on-line handwritten digit recognition base on Convex-Concave curves feature which is extracted by a chain code sequence using Smith-Waterman alignment algorithm. The time sequential signal from mouse movement on the writing pad is described as a sequence of consecutive points on the x-y plane. So, we can create data-set which are successive and time-sequential pixel position data by preprocessing. Data preprocessed is used for Convex-Concave curves feature extraction. This feature is scale-, translation-, and rotation-invariant. The extracted specific feature is fed to a Smith-Waterman alignment algorithm, which in turn classifies it as one of the nine digits. In comparison with backpropagation neural network, Smith-Waterman alignment has the more outstanding performance.

An Evolution of Cellular Automata Neural Systems using DNA Coding Method (DNA 코딩방법을 이용한 셀룰라 오토마타 신경망의 진화)

  • Lee, Dong-Wook;Sim, Kwee-Bo
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.12
    • /
    • pp.10-19
    • /
    • 1999
  • Cellular Automata Neural Systems(CANS) are neural networks based on biological development and evolution. Each neuron of CANS has local connection and acts as a form of pulse according to the dynamics of the chaotic neuron. CANS are generated from initial cells according to the CA rule. In the previous study, to obtain the useful ability of CANS, we make the pattern of initial cells evolve. However, it is impossible to represent all solution space, so we propose an evolving method of CA rule to overcome this defect in this paper. DNA coding has the redundancy and overlapping of gene and is apt for the representation of the rule. In this paper, we show the general expression of CA rule and propose translation method from DNA code to CA rule. The effectiveness of the proposed scheme was verified by applying it to the navigation problem of autonomous mobile robot.

  • PDF

A Platform Architecture for the Integration of CORBA Technology within TMN Framework (TMN 프레임워크와 CORBA 기술의 통합을 위한 플랫폼 구조)

  • Jeong, Mun-Sang;Park, Jong-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.6
    • /
    • pp.801-808
    • /
    • 1999
  • 지금까지, 전기통신망과 장비들의 관리에 대해서는 많은 연구들이 진행되었지만, TMN 상위 계층의 서비스 관리와 비즈니스 관리에 대한 연구는 많이 수행되지 못했다. 최근 전세계적으로 TMN 상위 계층의 관리기능 구현을 위해서 CORBA 기술을 적용하고자하는 관심이 증가하고 있다. 본 논문에서는, 정보모델과 상호운용에 관한 TMN과 CORBA의 주요특징들을 비교하고, TMN 프레임웍와 효율적인 CORBA 기술 연동을 위한 플랫폼 구조를 제안한다. 제안된 구조에서, TMN 관리 정보를 CORBA IDL 인터페이스로 변환해주는 GDMO/ASN.1 - CORBA IDL 변환기가 고안, 구현되었고, JIDM의 상호 작용 변환의 구현을 위해서 TMN/CORBA 게이트웨이 또한 고안되었다. 그리고 이러한 기능의 확장을 위해서 모듈 형식으로 라이브러리들과 코드 생성기들이 설계, 구현되었다.Abstract Up to now, a lot of efforts have been made for the management of telecommunication networks and equipment, but less effort has been made for the realization of higher-layer service and business management. There are recently worldwide growing interests for applying CORBA technology for the realization of higher layer Telecommunication Management Network (TMN) management functions. In this paper, we compare the features of TMN and CORBA with respect to information model, and operational behavior. And then, we propose a platform architecture for the efficient integration of CORBA technology within TMN framework. Within platform architecture, GDMO/ASN.1 to IDL translator has been designed and implemented for translating TMN management information into CORBA IDL interface. The TMN/CORBA gateway is also designed for realization of the interaction translation specification of JIDM task force. The libraries and code generators have been designed and implemented in a modular fashion to provide the functional extensibility.

Using Roots and Patterns to Detect Arabic Verbs without Affixes Removal

  • Abdulmonem Ahmed;Aybaba Hancrliogullari;Ali Riza Tosun
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.1-6
    • /
    • 2023
  • Morphological analysis is a branch of natural language processing, is now a rapidly growing field. The fundamental tenet of morphological analysis is that it can establish the roots or stems of words and enable comparison to the original term. Arabic is a highly inflected and derivational language and it has a strong structure. Each root or stem can have a large number of affixes attached to it due to the non-concatenative nature of Arabic morphology, increasing the number of possible inflected words that can be created. Accurate verb recognition and extraction are necessary nearly all issues in well-known study topics include Web Search, Information Retrieval, Machine Translation, Question Answering and so forth. in this work we have designed and implemented an algorithm to detect and recognize Arbic Verbs from Arabic text.The suggested technique was created with "Python" and the "pyqt5" visual package, allowing for quick modification and easy addition of new patterns. We employed 17 alternative patterns to represent all verbs in terms of singular, plural, masculine, and feminine pronouns as well as past, present, and imperative verb tenses. All of the verbs that matched these patterns were used when a verb has a root, and the outcomes were reliable. The approach is able to recognize all verbs with the same structure without requiring any alterations to the code or design. The verbs that are not recognized by our method have no antecedents in the Arabic roots. According to our work, the strategy can rapidly and precisely identify verbs with roots, but it cannot be used to identify verbs that are not in the Arabic language. We advise employing a hybrid approach that combines many principles as a result.

Estimation of Extreme Wind Speeds in Korean Peninsula using Typhoon Monte Carlo Simulation (태풍 시뮬레이션을 통한 한반도 극한풍속 추정)

  • Lee, Sungsu;Kim, Ga Young
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.29 no.2
    • /
    • pp.141-148
    • /
    • 2016
  • The long-span bridges such as Incheon Bridge and Seohae Grand Bridge are located on the coastal region effected frequently by strong wind of typhoons. In order to ensure the wind-resistant performance of the structure, estimation of the proper design wind speed is very important. In this study, stochastic estimation of design wind speed incurred by typhoons is carried out. For this purpose, we first established probability distribution of climatological parameters such as central pressure depth, distance of closest approach, translation speed and heading to build statistical model of typhoons, which are employed in Monte Carlo simulation for hypothetical typhoons. Once a typhoon is generated with statistically justified parameters, wind speeds are estimated along its path using wind field model. Thousands of typhoons are generated and their peak wind speeds are utilized to establish the extreme wind speeds for different return period. The results are compared with design basic wind speeds in Korean Highway Bridge Design Code, showing that the present results agree well with similar studies while the existing code suggests higher design wind speed.

Language Games between Donald Trump and Gloria Anzaldúa (도널드 트럼프와 글로리아 안살두아의 '언어' 게임)

  • Park, Jungwon
    • Cross-Cultural Studies
    • /
    • v.46
    • /
    • pp.85-112
    • /
    • 2017
  • Donald Trump, the $45^{th}$ president of the United States, has revived the 'English Only' policy since the beginning of his presidential campaign. The monolingualism not only underscores his extremely conservative ideas, but it also reflects the nativist tendency that prevents the demographic and cultural transformation of the US, which is accelerated by globalization and transnational migration. In particular, Donald Trump tries to reconfirm the mainstream American culture that is now thought to have been threatened by Hispanization and the growing number of Spanish speakers. This paper examines the effects of "code-switching" and the possibility of a bilingual community by contrasting Donald Trump with Gloria $Anzald{\acute{u}}a$, one of the representative Latina writers who created a "border language." Borderlands/La Frontera (1987) includes Spanish glossaries and expressions to represent her bilingual realities, while attempting to translate from English to Spanish, and vice versa. However, the text occasionally demonstrates the impossibility of translation. In doing so, $Anzald{\acute{u}}a$ indirectly states that it is indispensable to present both languages at the stage; she also invites monolingual readers to make more efforts to learn and better understand the Other's language. A "border language" she attempts to embody throughout the text is created in the process of encounters, conflicts, and negotiations among languages of different ethnicities, classes and generations. It does not signify an established form: rather it appears as a constantly transforming language, which can provide us with new perspectives and an alternative way of communication beyond monolingualism.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.