• 제목/요약/키워드: Information Analysis Method

검색결과 15,628건 처리시간 0.048초

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.

Importance Analysis of In-Service Testing Components for Ulchin Unit 3 Using Risk-Informed In-Service Testing Approach

  • Kang, Dae-il;Kim, Kil-yoo;Ha, Jae-joo
    • Nuclear Engineering and Technology
    • /
    • 제34권4호
    • /
    • pp.331-343
    • /
    • 2002
  • We performed an importance analysis of In-Service Testing (157) components for Ulchin Unit 3 using the integrated evaluation method for categorizing component safety significance developed in this study. The developed method is basically aimed at having a PSA expert perform an importance analysis using PSA and its related information. The importance analysis using the developed method is initiated by ranking the component importance using quantitative PSA information. The importance analysis of the IST components not modeled in the PSA is performed through the engineering judgment, based on the expertise of PSA, and the quantitative and qualitative information for the 157 components. The PSA scope for importance analysis includes not only Level 1 and 2 internal PSA but also Level 1 external and shutdown/low power operation PSA. The importance analysis results of valves show that 167 (26.55%) of the 629 IST valves are HSSCs and 462 (73.45%) are LSSCs. Those of pumps also show that 28 (70%)of the 40157 pumps are HSSCs and 12 (30%) are LSSCs.

자동차 안전벨트 부품 제조공정에서의 효율적 공정품질정보 분석 모형 (An Efficient Analysis Model for Process Quality Information in Manufacturing Process of Automobile Safety Belt Parts)

  • 공명달
    • 대한설비관리학회지
    • /
    • 제23권4호
    • /
    • pp.29-38
    • /
    • 2018
  • Through process quality information, the time required for process quality analysis has been drastically shortened, the process defect rate has been reduced, and the manufacturing lead time has been shortened and the on-time delivery rate has been improved. Therefore, The purpose of this study is to develop a quality information analysis system model that effectively shortens the time required for process quality analysis in automobile safety belt parts manufacturing process. As a result of experiments on communication operation between manufacturing execution system (MES) quality server, injection machine control computer, injection machine programmable logic controller (PLC) and terminal, in analyzing quality information, the conventional handwriting input method took an average of 20 minutes, but the new multi-network method took about 2 minutes on average. In addition, the process defect rate was reduced by 13% and the manufacturing lead time was shortened from 28 hours to 20 hours. The delivery compliance rate improved from 96 to 99%.

이산시스템에서 RCF 해석법에 기초한 감도해석 (Eigenvalue sensitivity analysis of discrete system based on the RCF method)

  • 김덕영;박성주
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 제38회 하계학술대회
    • /
    • pp.602-603
    • /
    • 2007
  • In this paper, the RCF method is applied to analyze small signal stability of power systems including thyristor controlled FACTS equipments such as SVC. The eigenvalue sensitivity analysis algorithm in discrete systems by the RCF method are presented and applied to the power system including SVC. As a result of simulation, the RCF analysis method is very powerful to calculate the newly generated unstable oscillation modes precisely after periodic switching operations of SVC. Also the RCF analysis method enabled to precisely calculate eigenvalue sensitivity coefficients of dominant oscillation modes after periodic switching operations. These simulation results are very different from those of the conventional continuous system analysis method such as the state space equation method.

  • PDF

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption

  • Verma, Om Prakash;Nizam, Munazza;Ahmad, Musheer
    • Journal of Information Processing Systems
    • /
    • 제9권2호
    • /
    • pp.271-286
    • /
    • 2013
  • Recently, a pixel-chaotic-shuffling (PCS) method has been proposed by Huang et al. for encrypting color images using multiple chaotic systems like the Henon, the Lorenz, the Chua, and the Rossler systems. All of which have great encryption performance. The authors claimed that their pixel-chaotic-shuffle (PCS) encryption method has high confidential security. However, the security analysis of the PCS method against the chosen-plaintext attack (CPA) and known-plaintext attack (KPA) performed by Solak et al. successfully breaks the PCS encryption scheme without knowing the secret key. In this paper we present an improved shuffling pattern for the plaintext image bits to make the cryptosystem proposed by Huang et al. resistant to chosen-plaintext attack and known-plaintext attack. The modifications in the existing PCS encryption method are proposed to improve its security performance against the potential attacks described above. The Number of Pixel Change Rate (NPCR), Unified Average Changed Intensity (UACI), information entropy, and correlation coefficient analysis are performed to evaluate the statistical performance of the modified PCS method. The simulation analysis reveals that the modified PCS method has better statistical features and is more resistant to attacks than Huang et al.'s PCS method.

상권정보와 설문정보의 연계 분석 방법 (A Linked Analysis Method between Commercial district Information and Survey Information)

  • 이원철;강만수;김진호
    • 한국빅데이터학회지
    • /
    • 제5권2호
    • /
    • pp.29-42
    • /
    • 2020
  • 소상공인은 우리나라 서민경제의 중요한 부분을 담당하고 있으나, 과다경쟁, 수익성 악화, 생활밀착형 업종편중 등의 어려움에 직면하고 있다. 이를 위해, 정부는 소상공인을 위한 상권분석서비스를 제공하고 있다. 그러나 다양한 기관에서 제공받은 데이터는 표준화되지 않고, 제한된 데이터로 서비스의 구성에 한계가 있다. 본 논문에서는 데이터의 정합성 문제를 해결하고, 데이터 분석서비스 확장을 위해 설문정보와 상권정보를 연계하여 분석하는 방법을 제안한다. 제안하는 연계 방법은 상권정보와 설문정보를 업종과 영역을 기준으로 동일 영역 연계, 설문 정보의 개별업체 중심 연계, 설문정보의 작은 영역과 상권의 큰 영역 연계의 세 가지 방법이다. 연계된 상권정보와 설문정보는 다양한 방법으로 활용되거나 분석서비스를 확대할 수 있다. 본 논문은 기존 상권분석 서비스의 한계 를 설문정보로 극복할 수 있는 방법을 제안하여 소상공인에게 필요한 상권분석 서비스를 확대할 수 있는 기반을 마련하였다.

토사터널에서의 각부보강공법 적용성 연구 (A Case Study on Elephant Foot Method for Tunnelling in the Soft Ground)

  • 박치면;이호;박재훈;윤창기;황제돈
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2009년도 세계 도시지반공학 심포지엄
    • /
    • pp.863-874
    • /
    • 2009
  • The engineering characteristics and the reinforcement effect of the elephant foot method were discussed with parametric study. The elephant foot method is adopted to support the loads transferred from tunnel crown and improve bearing capacity of elephant foot in poor ground condition. The evaluation of reinforcement effect, which has the mechanical relationship between ground condition, footing size and reinforcement system, was carried out through the previous research and numerical analysis. In addition, the simple design chart was proposed to estimate the applicability of the elephant foot reinforcement method. It will be practical for the engineer to determine the optimum reinforcement method for safe tunnelling in soft ground condition.

  • PDF

비대면(Untact) 업무를 위한 화상인식 PCA 사용자 인증 시스템 연구 (A Study on the PCA base Face Authentication System for Untact Work)

  • 박종순;박찬길
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.67-74
    • /
    • 2020
  • As the information age develops, Online education and Non-face-to-face work are becoming common. Telecommuting such as tele-education and video conferencing through the application of information technology is also becoming common due to the COVID-19. Unexpected information leakage can occur online when the company conducts work remotely or holds meetings. A system to authenticate users is needed to reduce information leakage. In this study, there are various ways to authenticate remote access users. By applying burn authentication using a biometric system, a method to identify users is proposed. The method used in the study was studied the main component analysis method, which recognizes several characteristics in facial recognition and processes interrelationships. It proposed a method that can be easily utilized without additional devices by utilizing a camera connected to a computer by authenticating the user using the shape and characteristics of the face by using the PCA method.

Incomplete Cholesky Decomposition based Kernel Cross Modal Factor Analysis for Audiovisual Continuous Dimensional Emotion Recognition

  • Li, Xia;Lu, Guanming;Yan, Jingjie;Li, Haibo;Zhang, Zhengyan;Sun, Ning;Xie, Shipeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.810-831
    • /
    • 2019
  • Recently, continuous dimensional emotion recognition from audiovisual clues has attracted increasing attention in both theory and in practice. The large amount of data involved in the recognition processing decreases the efficiency of most bimodal information fusion algorithms. A novel algorithm, namely the incomplete Cholesky decomposition based kernel cross factor analysis (ICDKCFA), is presented and employed for continuous dimensional audiovisual emotion recognition, in this paper. After the ICDKCFA feature transformation, two basic fusion strategies, namely feature-level fusion and decision-level fusion, are explored to combine the transformed visual and audio features for emotion recognition. Finally, extensive experiments are conducted to evaluate the ICDKCFA approach on the AVEC 2016 Multimodal Affect Recognition Sub-Challenge dataset. The experimental results show that the ICDKCFA method has a higher speed than the original kernel cross factor analysis with the comparable performance. Moreover, the ICDKCFA method achieves a better performance than other common information fusion methods, such as the Canonical correlation analysis, kernel canonical correlation analysis and cross-modal factor analysis based fusion methods.

시나리오 기반의 정보화전략 계획 수립을 위한 환경 분석 방법 연구 (A Study of Environment Analysis Method for Information Strategy Planning based Scenarios)

  • 홍진우;박구락;김동현
    • 디지털융복합연구
    • /
    • 제14권10호
    • /
    • pp.195-203
    • /
    • 2016
  • 본 논문은 정보화전략계획 수립에서의 환경 분석 단계를 빠르게 수행하여, 결과물에 대한 품질을 향상시킬 수 있는 기반을 마련할 수 있는 방법을 제안한다. 기존의 환경 분석 방법은 외부 환경 분석, 내부 역량 분석, 정보화 방향 도출 활동으로 구성되어 있다. 환경 분석 첫 번째 단계에 현황파악, 주요 프로젝트 이해관계자와 인터뷰 준비, 인터뷰 수행을 통하여 초기 정보화 방향을 획득하기 위한 활동들을 추가하였다. 그리고 외부 환경 분석, 내부 역량 분석을 위한 핵심 질문 중심의 융복합 시나리오 기반 분석 모형을 적용하였다. 분석모형으로 외부 환경 분석, 내부 역량 분석 활동을 수행하여, 도출된 정보화 방향을 초기에 설정한 정보화 방향과 검증할 수 있도록 하였다. 연구 결과는 실제 프로젝트 현장에 적용하여, 빠르게 프로젝트를 수행할 수 있었고, 프로젝트 결과물에 대한 품질을 향상시킬 수 있었다.