• Title/Summary/Keyword: Machine-Tools

Search Result 1,299, Processing Time 0.027 seconds

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

On Developing a Semantic Annotation Tool for Managing Metadata of Web Documents based on XMP and Ontology (웹 문서의 메타데이터 관리를 위한 XMP 및 온톨로지 기반의 시맨틱 어노테이션 지원도구 개발)

  • Yang, Kyoung-Mo;Hwang, Suk-Hyung;Choi, Sung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.7
    • /
    • pp.1585-1600
    • /
    • 2009
  • The goal of Semantic Web is to provide efficient and effective semantic search and web services based on the machine-processable semantic information of web resources. Therefore, the process of creating and adding computer-understandable metadata for a variety of web contents, namely, semantic annotation is one of the fundamental technologies for the semantic web. Recently, in order to manage annotation metadata, direct approach for embedding metadata into the document is mainly used in semantic annotation. However, many semantic annotation tools for web documents have been mainly worked with HTML documents, and most of these tools do not support semantic search functionalities using the metadata. In this paper, based on these problems and previous works, we propose the Ontology-based Semantic Annotation tool(OSA) to efficiently support semantic annotation for web documents(such as HTML, PDF). We define a semantic annotation model that represents ontological-semantic information by using RDFS(RDF Schema). Based on XMP(eXtensible Metadata Platform) standard, the model is encoded directly into the document. By using OSA with XMP, user can perform semantic annotation on web documents which are able to keep compatibility for managing annotation metadata. Eventually, the integrated semantic annotation metadata can be used effectively in semantic search for a variety of web contents.

Study on predicting the commercial parts discontinuance using unstructured data and artificial neural network (상용 부품 비정형 데이터와 인공 신경망을 이용한 부품 단종 예측 방안 연구)

  • Park, Yun-kyung;Lee, Ik-Do;Lee, Kang-Taek;Kim, Du-Jeoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.277-283
    • /
    • 2019
  • Advances in technology have allowed the development and commercialization of various parts; however this has shortened the discontinuation cycle of the components. This means that repair and logistic support of weapon system which is applied to thousands of part components and operated over the long-term is difficult, which is the one of main causes of the decrease in the availability of weapon system. To improve this problem, the United States has created a special organization for this problem, whereas in Korea, commercial tools are used to predict and manage DMSMS. However, there is rarely a method to predict life cycle of parts that are not presented DMSMS information at the commercial tools. In this study, the structured and unstructured data of parts of a commercial tool were gathered, preprocessed, and embedded using neural network algorithm. Then, a method is suggested to predict the life cycle risk (LC Risk) and year to end of life (YTEOL). In addition, to validate the prediction performance of LC Risk and YTEOL, the prediction value is compared with descriptive statistics.

Guidelines for big data projects in artificial intelligence mathematics education (인공지능 수학 교육을 위한 빅데이터 프로젝트 과제 가이드라인)

  • Lee, Junghwa;Han, Chaereen;Lim, Woong
    • The Mathematical Education
    • /
    • v.62 no.2
    • /
    • pp.289-302
    • /
    • 2023
  • In today's digital information society, student knowledge and skills to analyze big data and make informed decisions have become an important goal of school mathematics. Integrating big data statistical projects with digital technologies in high school <Artificial Intelligence> mathematics courses has the potential to provide students with a learning experience of high impact that can develop these essential skills. This paper proposes a set of guidelines for designing effective big data statistical project-based tasks and evaluates the tasks in the artificial intelligence mathematics textbook against these criteria. The proposed guidelines recommend that projects should: (1) align knowledge and skills with the national school mathematics curriculum; (2) use preprocessed massive datasets; (3) employ data scientists' problem-solving methods; (4) encourage decision-making; (5) leverage technological tools; and (6) promote collaborative learning. The findings indicate that few textbooks fully align with these guidelines, with most failing to incorporate elements corresponding to Guideline 2 in their project tasks. In addition, most tasks in the textbooks overlook or omit data preprocessing, either by using smaller datasets or by using big data without any form of preprocessing. This can potentially result in misconceptions among students regarding the nature of big data. Furthermore, this paper discusses the relevant mathematical knowledge and skills necessary for artificial intelligence, as well as the potential benefits and pedagogical considerations associated with integrating technology into big data tasks. This research sheds light on teaching mathematical concepts with machine learning algorithms and the effective use of technology tools in big data education.

The Pruning Works Efficiency of Manual Pruning Saw (인력고지톱을 이용한 가지치기 작업능률)

  • Cho, Koo-Hyun;Oh, Jae-Heun;Park, Mun-Sueb;Cha, Du-Song
    • Journal of Forest and Environmental Science
    • /
    • v.24 no.1
    • /
    • pp.47-51
    • /
    • 2008
  • The first pruning works of planted trees on forest area carry out when tree height reached at 6 meters. And the second works carry out when it grow to 12~13 meters of tree height. Pruning works are necessary for producing straight log without knar by tool or machine. Generally, the mechanized pruning works Self-propelled pruning machine, chain pruning saw and other tools are used in mechanized pruning works. However, manual pruning saw which is usually using pruning tool was for this study. To investigate the pruning works efficiency, Pinus densiflora, Pinus koraiensis and Pinus rigida which were distributed in Kangwon-Do was surveyed. Height of surveyed the trees were 10~16 meters and its pruning works range were 6.2~6.7 meters of tree height. As results, pruning works efficiency of Pinus densiflora, Pinus koraiensis and Pinus rigida were 3.14 min/tree, 5.06 min/tree and 4.44 min/tree, respectively. Also, possible pruning works of man-day for Pinus densiflora, Pinus koraiensis and Pinus rigida was 104, 64, and 81 trees, respectively.

  • PDF

Experiencing with Splunk, a Platform for Analyzing Machine Data, for Improving Recruitment Support Services in WorldJob+ (머신 데이터 분석용 플랫폼 스플렁크를 이용한 취업지원 서비스 개선에 관한 연구 : 월드잡플러스 사례를 중심으로)

  • Lee, Jae Deug;Rhee, MoonKi Kyle;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.201-210
    • /
    • 2018
  • WorldJob+, being operated by The Human Resources Development Service of Korea, provides a recruitment support services to overseas companies wanting to hire talented Korean applicants and interns, and support the entire course from overseas advancement information check to enrollment, interview, and learning for young job-seekers. More than 300,000 young people have registered in WorldJob+, an overseas united information network, for job placement. To innovate WorldJob+'s services for young job-seekers, Splunk, a powerful platform for analyzing machine data, was introduced to collate and view system log files collected from its website. Leveraging Splunk's built-in data visualization and analytical features, WorldJob+ has built custom tools to gain insight into the operation of the recruitment supporting service system and to increase its integrity. Use cases include descriptive and predictive analytics for matching up services to allow employers and job seekers to be matched based on their respective needs and profiles, and connect jobseekers with the best recruiters and employers on the market, helping job seekers secure the best jobs fast. This paper will cover the numerous ways WorldJob+ has leveraged Splunk to improve its recruitment supporting services.

Artificial Intelligence and College Mathematics Education (인공지능(Artificial Intelligence)과 대학수학교육)

  • Lee, Sang-Gu;Lee, Jae Hwa;Ham, Yoonmee
    • Communications of Mathematical Education
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2020
  • Today's healthcare, intelligent robots, smart home systems, and car sharing are already innovating with cutting-edge information and communication technologies such as Artificial Intelligence (AI), the Internet of Things, the Internet of Intelligent Things, and Big data. It is deeply affecting our lives. In the factory, robots have been working for humans more than several decades (FA, OA), AI doctors are also working in hospitals (Dr. Watson), AI speakers (Giga Genie) and AI assistants (Siri, Bixby, Google Assistant) are working to improve Natural Language Process. Now, in order to understand AI, knowledge of mathematics becomes essential, not a choice. Thus, mathematicians have been given a role in explaining such mathematics that make these things possible behind AI. Therefore, the authors wrote a textbook 'Basic Mathematics for Artificial Intelligence' by arranging the mathematics concepts and tools needed to understand AI and machine learning in one or two semesters, and organized lectures for undergraduate and graduate students of various majors to explore careers in artificial intelligence. In this paper, we share our experience of conducting this class with the full contents in http://matrix.skku.ac.kr/math4ai/.

Research on text mining based malware analysis technology using string information (문자열 정보를 활용한 텍스트 마이닝 기반 악성코드 분석 기술 연구)

  • Ha, Ji-hee;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.45-55
    • /
    • 2020
  • Due to the development of information and communication technology, the number of new / variant malicious codes is increasing rapidly every year, and various types of malicious codes are spreading due to the development of Internet of things and cloud computing technology. In this paper, we propose a malware analysis method based on string information that can be used regardless of operating system environment and represents library call information related to malicious behavior. Attackers can easily create malware using existing code or by using automated authoring tools, and the generated malware operates in a similar way to existing malware. Since most of the strings that can be extracted from malicious code are composed of information closely related to malicious behavior, it is processed by weighting data features using text mining based method to extract them as effective features for malware analysis. Based on the processed data, a model is constructed using various machine learning algorithms to perform experiments on detection of malicious status and classification of malicious groups. Data has been compared and verified against all files used on Windows and Linux operating systems. The accuracy of malicious detection is about 93.5%, the accuracy of group classification is about 90%. The proposed technique has a wide range of applications because it is relatively simple, fast, and operating system independent as a single model because it is not necessary to build a model for each group when classifying malicious groups. In addition, since the string information is extracted through static analysis, it can be processed faster than the analysis method that directly executes the code.

Interface of Tele-Task Operation for Automated Cultivation of Watermelon in Greenhouse

  • Kim, S.C.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.28 no.6
    • /
    • pp.511-516
    • /
    • 2003
  • Computer vision technology has been utilized as one of the most powerful tools to automate various agricultural operations. Though it has demonstrated successful results in various applications, the current status of technology is still for behind the human's capability typically for the unstructured and variable task environment. In this paper, a man-machine interactive hybrid decision-making system which utilized a concept of tole-operation was proposed to overcome limitations of computer image processing and cognitive capability. Tasks of greenhouse watermelon cultivation such as pruning, watering, pesticide application, and harvest require identification of target object. Identifying water-melons including position data from the field image is very difficult because of the ambiguity among stems, leaves, shades. and fruits, especially when watermelon is covered partly by leaves or stems. Watermelon identification from the cultivation field image transmitted by wireless was selected to realize the proposed concept. The system was designed such that operator(farmer), computer, and machinery share their roles utilizing their maximum merits to accomplish given tasks successfully. And the developed system was composed of the image monitoring and task control module, wireless remote image acquisition and data transmission module, and man-machine interface module. Once task was selected from the task control and monitoring module, the analog signal of the color image of the field was captured and transmitted to the host computer using R.F. module by wireless. Operator communicated with computer through touch screen interface. And then a sequence of algorithms to identify the location and size of the watermelon was performed based on the local image processing. And the system showed practical and feasible way of automation for the volatile bio-production process.

Milling Cutter Selection in Machining Center Using AHP (AHP를 활용한 머시닝센터의 밀링커터 선정)

  • Lee, Kyo-Sun;Park, Soo-Yong;Lee, Dong-Hyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.164-170
    • /
    • 2017
  • The CNC machine tool field is showing a growing trend with the recent rapid development of manufacturing industries such as semiconductors, automobiles, medical devices, various inspection and test equipment, mechanical metal processing equipment, aircraft, shipbuilding and electronic equipment. However, small and medium-sized machining companies that use CNC machine tools are experiencing difficulties in increasingly intense competition. Especially, small companies which are receiving orders from 3rd or 4th venders are very difficult in business management. In recent years, company S experienced difficulty to make product quality and delivery time due to the ignorance of the processing method when manufacturing cooling plate jig made of SUS304 material used for cell phone liquid crystal glass processing. In order to solve these problems, we redesigned the process according to the size of our company and tried to manage all processes with quantified data. In the meantime, we have found that there is a need to improve the cutter process, which accounts for most of the machining process. Therefore, we have investigated the correlation between RPM and FEED of three cutters that have been used in the past. As a result, we found that it is the most urgent problem to solve the roughing process during the cutter operation which occupies more than 70% of the total machining. In order to shorten the machining time and improve the quality in machining of SUS304 cooling plate jig, we select the main factors such as price, tool life, maintenance cost, productivity, quality, RPM, and FEED and use AHP to find the most suitable milling cutter. We also tried to solve the problem of delivery, quality and production capacity which was a big problem of S company through experiment operation with selected cutter tool. As a result, the following conclusions were drawn. First, the most efficient of the three cutters currently available in the machining center has proven to be an M-cutter. Second, although one additional facility was required, it was possible to produce the existing facilities without additional investment by supplementing the lack of production capacity due to productivity improvement. Third, the Company's difficulties in delivery and capacity shortfalls have been resolved. Fourth, annual sales increased by KRW 109 million and profits increased by KRW 32 million annually. Fifth, it can confirm the usefulness of AHP method in corporate decision making and it can be utilized in various facility investment and process improvement in the future.