• Title/Summary/Keyword: Generating Codes

Search Result 90, Processing Time 0.03 seconds

Function partitioning methods for malware variant similarity comparison (변종 악성코드 유사도 비교를 위한 코드영역의 함수 분할 방법)

  • Park, Chan-Kyu;Kim, Hyong-Shik;Lee, Tae Jin;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.321-330
    • /
    • 2015
  • There have been found many modified malwares which could avoid detection simply by replacing a sequence of characters or a part of code. Since the existing anti-virus program performs signature-based analysis, it is difficult to detect a malware which is slightly different from the well-known malware. This paper suggests a method of detecting modified malwares by extending a hash-value based code comparison. We generated hash values for individual functions and individual code blocks as well as the whole code, and thus use those values to find whether a pair of codes are similar in a certain degree. We also eliminated some numeric data such as constant and address before generating hash values to avoid incorrectness incurred from them. We found that the suggested method could effectively find inherent similarity between original malware and its derived ones.

Transportation Network Data Generation from the Topological Geographic Database (GIS위상구조자료로부터 교통망자료의 추출에 관한 연구)

  • 최기주
    • Spatial Information Research
    • /
    • v.2 no.2
    • /
    • pp.147-163
    • /
    • 1994
  • This paper presents three methods of generating the transportation network data out of the topological geographic database in the hope that the conversion of the geographic database file containing the topology to the conventional node-link type trans¬portation network file may facilitate the integration between transportation planning mod¬els and GIS by alleviating the inherent problems of both computing environments. One way of the proposed conversion method is to use the conversion software that allows the bi-directional conversion between the UTPS (Urban Transportation Planning System) type transportation planning model and GIS. The other two methods of data structure conversion approach directly transform the GIS's user-level topology into the transportation network data topology, and have been introduced with codes programmed with FORTRAN and AML (Arc Macro Language) of ARC/INFO. If used successfully, any approach would not only improve the efficiency of transportation planning process and the associated decision-making activities in it, but enhance the productivity of trans¬portation planning agencies.

  • PDF

Cloning and Expression of Human Clotting Factor 9 cDNA un Escherichia coli (인체 혈액응고 9인자 cDNA cloning 및 Escherichia coli 에서의 발현)

  • Young Won Lee;Hyang Suk Hur;Myoung Hee Kim
    • Biomedical Science Letters
    • /
    • v.2 no.2
    • /
    • pp.231-240
    • /
    • 1996
  • Human blood clotting (coagulation) factor 9 cDNA which codes for 461 amino acid has been cloned by screening human fetal liver cDNA library using PCR. This 1.4 kb cDNA spanning from the ATG initiation codon to the TAA termination codon was cloned into bacterial .expression vector pGEX-2T, generating pGEX-F9 plasmid. The plasmid pGEX-F9 expresses about 73 kDa GST (Glutathione S-transferase)-Factor 9 fusion protein when introduced into E. coli. Western blot analysis using polyclonal antibody raised against human factor 9 confirmed this fusion protein contains factor 9 protein. The level of GST-factor 9 expression was about 20% of total protein and the purification of fusion protein was efficiently achieved by using GST agarose bead based on one step purification protocol.

  • PDF

A Study on Performance Enhancement for Iris Recognition by Eyelash Detection (속눈썹 추출 방법을 이용한 홍채 인식 성능 향상 연구)

  • Kang Byung Joon;Park Kang Ryoung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.233-238
    • /
    • 2005
  • With iris recognition algorithm, unique iris code can be generated and user can be identified by using iris pattern. However, if unnecessary information such as eyelash is included in iris region, the error for iris recognition is increased, consequently. In detail, if iris region is used to generate ins code not excluding eyelash and the position of eyelash is moved, the iris codes are also changed and the error rate is increased. To overcome such problem, we propose the method of detecting eyelash by using mask and excluding the detected eyelash region in case of generating iris code. Experimental results show that EER(Equal Error Rate) for iris recognition using the proposed algorithm is lessened as much as $0.18\%$ compared to that not using it.

A Study of Automatic Code Generation for TMO-based Real-time Object Model (TMO 기반의 실시간 객체 모델의 코드 자동생성기법 연구)

  • Seok, Mi-Heui;Ryu, Ho-Dong;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.19A no.2
    • /
    • pp.101-112
    • /
    • 2012
  • In recently years, distributed real-time software has performed important roles in various areas. Real-time applications should be performed with satisfying strict constraints on response time. Usually real-time applications are developed on the real-time supporting middleware such as TMO(Time-triggered, Message-triggered Object), CORBA/RT, and RTAI. However, it is not easy to develop applications using them since these real-time middleware are unfamiliar to programmers. In this paper, we propose an automatic code generator for real-time application based on TMO in order to reduce development costs. For increasing or reflecting the characteristics of TMO into the design model, SpM and SvM methods are added into the class diagram, which have time constraints as their properties. And behaviors of them are represented as separated regions on state machine diagram in different abstract level. These diagrams are inputted into TMO-based code automatic generator, which generates details of the TMO class. Our approach has advantages for decreasing effort and time for making real time software by automatically generating TMO codes without detailed knowledge of TMO.

Systematic Determination of Empirical Parameters Used in Helicopter Conceptual Design (헬리콥터 개념설계에 사용하는 경험적파라메터의 체계적인 결정기법)

  • Kim, Won-Jin;Chae, Sang-Hyun;Oh, Se-Jong;Kim, Seung-Bum;Ahn, Iee-Ki;Yee, Kwan-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.8
    • /
    • pp.703-710
    • /
    • 2012
  • At the stage of conceptual design of a helicopter, it is a general way using low fidelity analysis methods because of a large number of design calculations and trade-off studies. Determination of empirical parameters used in analysis codes for more practical design, depends on an user's design experiences, which effects on the accuracy and the fidelity of conceptual design results. Thus, more precise and logical method should be required to determine the empirical parameters used in the conceptual design of a helicopter. The present method is to be used not only in verifying the empirical parameters generated by design requirements, but also regenerate them if they contain any errors. Empirical parameters produced by present method were used to design a helicopter with a payload objective and performance constraints of an operating helicopter. As a result, weights and geometries of designed helicopter matched the target value within 5% significance level, proving that the suggested parameter generating method can be useful in the conceptual design of a helicopter.

Adaptive prototype generating technique for improving performance of a p-Snake (p-Snake의 성능 향상을 위한 적응 원형 생성 기법)

  • Oh, Seung-Taek;Jun, Byung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2757-2763
    • /
    • 2015
  • p-Snake is an energy minimizing algorithm that applies an additional prototype energy to the existing Active Contour Model and is used to extract the contour line in the area where the edge information is unclear. In this paper suggested the creation of a prototype energy field that applies a variable prototype expressed as a combination of circle and straight line primitives, and a fudge function, to improve p-Snake's contour extraction performance. The prototype was defined based on the parts codes entered and the appropriate initial contour was extracted in each primitive zones acquired from the pre-processing process. Then, the primitives variably adjusted to create the prototype and the contour probability based on the distance to the prototype was calculated through the fuzzy function to create the prototype energy field. This was applied to p-Snake to extract the contour from 100 images acquired from various small parts and compared its similarity with the prototype to find that p-Snake made with the adaptive prototype was about 4.6% more precise than the existing Snake method.

A Study on Automatic Generation Method of DDS Communication Class to Improve the Efficiency of Development of DDS-based Application Software (DDS 기반 응용 SW 개발의 효율성 향상을 위한 DDS 통신 클래스 자동생성 방법 연구)

  • Kim, Keun-hee;Kim, Ho-nyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.93-96
    • /
    • 2017
  • DDS (Data Distribution Serivce) communication middleware is spreading to various private sector as well as the defense sector because it can obtain a very high application effect in a complex system environment in which a plurality of data producers and data consumers are connected by a network. However, application development using DDS middleware is an inefficient structure with a lot of repetitive codes because most users perform 1: 1 mapping with the message they want to exchange. Accordingly, the user has to perform unnecessary repetitive tasks as the topic increases. Therefore, a development support tool that identifies a series of processes required for using DDS middleware and automatically generates the classes that are repeated by Topic is required. In this paper, we propose a method for DDS communication by automatically generating a common class for efficient use of DDS middleware.

  • PDF

A Novel Approach for Deriving Test Scenarios and Test Cases from Events

  • Singh, Sandeep K.;Sabharwal, Sangeeta;Gupta, J.P.
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.213-240
    • /
    • 2012
  • Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test manually. In order to cut down on costs, save time, and increase reliability, the model based testing approach is the best solution. Such an approach does not require applications or codes prior to generating test cases, so it leads to the early detection of faults, which helps in reducing the development time. Several model-based testing approaches have used different UML models but very few works have been reported to show the generation of test cases that use events. Test cases that use events are an apt choice for these types of systems. However, these works have considered events that happen at a user interface level in a system while other events that happen in a system are not considered. Such works have limited applications in testing the GUI of a system. In this paper, a novel model-based testing approach is presented using business events, state events, and control events that have been captured directly from requirement specifications. The proposed approach documents events in event templates and then builds an event-flow model and a fault model for a system. Test coverage criterion and an algorithm are designed using these models to generate event sequence based test scenarios and test cases. Unlike other event based approaches, our approach is able to detect the proposed faults in a system. A prototype tool is developed to automate and evaluate the applicability of the entire process. Results have shown that the proposed approach and supportive tool is able to successfully derive test scenarios and test cases from the requirement specifications of safety critical systems, real time systems, and event based systems.

The Significance of Semiotics for Visual Web Interface (시각적 웹 인터페이스에 대한 기호학 의미)

  • Jang, Seung-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.795-802
    • /
    • 2018
  • This study describes the semantic theoretic interpretation through the extensive use of semantic metaphors for intensive web interface with information and the metaphoric value of metaphors for interface design. Common factors that influence web design are empirical establishment and verification for generating web symbols and these are have important elemental perspectives that are used to assess the usefulness and key elements of the site. In addition, the structure of the screen has begun to change dynamically from the application of web technological functions, and the media functions have become important to make web standards when implementing visual structuring from the perspective of semiotic. Instead of using a technical expression approach to examine semiotic, a semiotic approach is applied to create aesthetic codes through the human-computer interface in terms of semiotic in a variety of natural and universal fields. Based on this, it is used as means of communication to convey the intended meaning to users so as to highlight the importance of the usability issues and metaphors user interface.