• Title/Summary/Keyword: Monitor Code

Search Result 126, Processing Time 0.026 seconds

Developing the Mobile GIS System Using CDMA Networking - Case Study of Forest Fire Ground Fighting Team - (CDMA 데이터망을 이용한 Mobile GIS 시스템 개발 - 산불발생시 지상진화대원 업무를 사례로 -)

  • Jo, Myung-Hee;Lee, Myung-Bo;Jo, Yun-Won;Kim, Dong-Hyun;Shin, Dong-Ho
    • Fire Science and Engineering
    • /
    • v.21 no.1 s.65
    • /
    • pp.60-68
    • /
    • 2007
  • In order to guide the safe extinguishment duty of forest fire ground fighting team and acquire its exact location information in case of a large scale of forest fire, it is very important to monitor the real time coordination data the forest fire ground fighting team. In this study the guidance for safe extinguishment duty of forest fire ground fighting team could be provided by monitoring the current location information and moving route information, which are received form GPS through CDMA (Code Division Multiple Access).

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

A Method Verifying Execution Environment Integrity for Secure Execution of Packed Android Application (패킹된 안드로이드 어플리케이션의 안전한 실행을 위한 실행 환경 무결성 검증 기법)

  • Ha, Dongsoo;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1553-1561
    • /
    • 2018
  • The source code for Android is open and easy to modify depending on the purpose. Recently, this charateristic has been exploited to bypass the runtime protection technique and extract the original executable code. Unfortunately, Android devices are so fragmented that it is difficult to verify the integrity of the system. To solve this problem, this paper proposes a technique to verify the integrity of the execution environment indirectly using the features of the application permission. Before executing the original executable code, it loads and executes the dummy DEX file to monitor for abnormal events and determine whether the system is intact. The proposed technique shows a performance overhead of about 2 seconds and shows that it can detect the bypassing technique that is currently disclosed.

Regulation of Attorney Ethics in International Arbitration (국제중재에서 변호사의 비윤리적 행위 규제에 대한 연구)

  • Hong, Seok-Mo
    • Journal of Arbitration Studies
    • /
    • v.25 no.2
    • /
    • pp.3-17
    • /
    • 2015
  • For many years commentators have requested more active regulation of attorney ethics in international arbitration. Gradual deterioration of ethical standards in international arbitration will bring disrepute and, once its reputation is lost, it could take decades to rebuild confidence. The first reason for increasing unethical behavior is that there is no ethical code generally applied to all lawyers participating in international arbitration. A second reason might be that nobody is actively regulating attorneys in international arbitration. The first step to solve this problem is that major arbitration institutions should cooperate to enact a uniform code of conduct to be generally applied to all attorneys representing parties in international arbitration. Recently, IBA and LCIA prepared guidelines on party representation in international arbitration, and the guidelines will help attorneys follow uniform standardsof ethics. However, this will not be sufficient. There should be a regulating body to monitor attorney ethics and take sanctions against unethical attorneys accordingly. Arbitrators, who can see unethical behavior by attorneys from the closest distance, are the most appropriate regulating force rather than courts of arbitration seat or an attorney's licensing country. Of course, arbitrators don't have powers to withdraw or suspend an attorney's license, but they have powers to control attorneys'behavior within arbitration proceedings such as an allocation of fees and costs, barring the assertion of claims or defenses, drawing adverse inferences, or precluding the submission of evidence or testimony. Furthermore, arbitrators should be provided with such obligation as active control of attorney ethics. Even arbitration institutions should participate by imposing on an attorney who is a repeat offender a suspension from appearing in future arbitrations. Unethical behavior will decrease through concerted actions among arbitrational institutions to introduce a uniform code of conduct and to empower arbitrators for more efficient regulation of attorney ethics.

Development and Assessment of Real-Time Quality Control Algorithm for PM10 Data Observed by Continuous Ambient Particulate Monitor (부유분진측정기(PM10) 관측 자료 실시간 품질관리 알고리즘 개발 및 평가)

  • Kim, Sunyoung;Lee, Hee Choon;Ryoo, Sang-Boom
    • Atmosphere
    • /
    • v.26 no.4
    • /
    • pp.541-551
    • /
    • 2016
  • A real-time quality control algorithm for $PM_{10}$ concentration measured by Continuous Ambient Particulate Monitor (FH62C14, Thermo Fisher Scientific Inc.) has been developed. The quality control algorithm for $PM_{10}$ data consists of five main procedures. The first step is valid value check. The values should be within the acceptable range limit. Upper ($5,000{\mu}g\;m^{-3}$) and lower ($0{\mu}g\;m^{-3}$) values of instrument detectable limit have to be eliminated as being unrealistic. The second step is valid error check. Whenever unusual condition occurs, the instrument will save error code. Value having an error code is eliminated. The third step is persistence check. This step checks on a minimum required variability of data during a certain period. If the $PM_{10}$ data do not vary over the past 60 minutes by more than the specific limit ($0{\mu}g\;m^{-3}$) then the current 5-minute value fails the check. The fourth step is time continuity check, which is checked to eliminate gross outlier. The last step is spike check. The spikes in the time series are checked. The outlier detection is based on the double-difference time series, using the median. Flags indicating normal and abnormal are added to the raw data after quality control procedure. The quality control algorithm is applied to $PM_{10}$ data for Asian dust and non-Asian dust case at Seoul site and dataset for the period 2013~2014 at 26 sites in Korea.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

Trial manufacture of the underwater sound transmission system to measure the appearance frequency of cetacean at the fixed point (고정점에서 고래류의 출현빈도 측정을 위한 수중 음향 전송시스템의 시험 제작)

  • Shin, Hyeong-Il;Seo, Du-Ok;Kim, Seong-Ho;Kim, Byung-Yob;Lee, Yoo-Won
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.44 no.1
    • /
    • pp.31-36
    • /
    • 2008
  • The underwater sound transmission system(USTS) was experimentally made to monitor the cetacean's appearance by telemetry, and then its system was tested to evaluate its performance from July to October, 2007 at the Kimnyeong berth and the dolphin's breeding ground of Pacific Land in Jeju island, respectively. The results showed that the sweep sound in the trial experiment and the whistle sound of bottlenose dolphin(Tursiops truncatus) were favorably received by telemetry. Therefore, we could confirm the USTS is able to monitor the cetacean's appearance in real time without direct observation at sea within effective range of code division multiple access(CDMA) communication method.

Separate Signature Monitoring for Control Flow Error Detection (제어흐름 에러 탐지를 위한 분리형 시그니처 모니터링 기법)

  • Choi, Kiho;Park, Daejin;Cho, Jeonghun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.5
    • /
    • pp.225-234
    • /
    • 2018
  • Control flow errors are caused by the vulnerability of memory and result in system failure. Signature-based control flow monitoring is a representative method for alleviating the problem. The method commonly consists of two routines; one routine is signature update and the other is signature verification. However, in the existing signature-based control flow monitoring, monitoring target application is tightly combined with the monitoring code, and the operation of monitoring in a single thread is the basic model. This makes the signature-based monitoring method difficult to expect performance improvement that can be taken in multi-thread and multi-core environments. In this paper, we propose a new signature-based control flow monitoring model that separates signature update and signature verification in thread level. The signature update is combined with application thread and signature verification runs on a separate monitor thread. In the proposed model, the application thread and the monitor thread are separated from each other, so that we can expect a performance improvement that can be taken in a multi-core and multi-thread environment.

Light Collection Efficiency of Large-volume Plastic Scintillator for Radiation Portal Monitor (방사선 포털 모니터용 대용적 플라스틱 섬광체 내부 빛 수집 효율 평가)

  • Lee, Jin Hyung;Kim, Jong Bum
    • Journal of Radiation Industry
    • /
    • v.11 no.3
    • /
    • pp.157-165
    • /
    • 2017
  • In this paper, we calculate the light photons collection efficiency of large-volume plastic scintillation detector mainly used for radiation portal monitor (RPM). A Monte Carlo light photon transport code, DETECT2000, were used to quantitatively evaluate light collection efficiency of plastic scintillation detector. DETECT2000 calculated the placement of light collection efficiency based on the energy spectrum. We calculated the light collection efficiency relative to the position of the energy spectrum that proportional to the placement of the source. The $850{\times}285{\times}65mm^3$ size of polyvinyl toluene (PVT) scintillator was used for measurements. Through DETECT2000 simulation, the light collection efficiency of $5{\times}5$ arrays were calculated and verification was performed by comparing with experimentally measured. And then, the corrected MCNP simulation by applying the light collection efficiency in $21{\times}13$ arrays was compared and analyzed. Comparing the Monte Carlo simulation with measured results, it shows an average difference of 10.1% in $5{\times}5$ arrays. Particularly, about twice of the difference was found in the edge of first column, which coupled with PMT. In whole $5{\times}5$ array, the overall ratio was the same except for the first column. And then comparing the energy spectra of the $21{\times}13$ array with and without the light collection efficiency, it shows a difference of 6.69% in Compton edge area. The DETECT2000 based light collection efficiency simulation showed well agreement with the point source experiment. And comparing with measured energy spectra, we could compare the differences according to whether or not the light collection efficiency was applied. As a results, it is possible to increase the accuracy and reliability of Monte Carlo simulation results by pre-calculating the light collection efficiency according to the PVT geometry by using the DETECT2000.

Development of Debugging Tool for LEON3-based Embedded Systems (LEON3 기반 임베디드 시스템을 위한 디버깅 도구 개발)

  • Ryu, Sang-Moon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.4
    • /
    • pp.474-479
    • /
    • 2014
  • LEON3 is a 32-bit synthesizable processor based on the SPARC V8. It can be connected to AMBA 2.0 bus and has a 7- stage pipeline, IEEE-754 FPU and 256[KB] cache. It can be easily implemented using FPGA and used for a SoC design. DSU which comes with LEON3 can be used to control and monitor the operation of LEON3. And DSU makes it easy to set a debugging environment for the development of both hardware and software for an embedded systems based on LEON3. This paper presents the summary of the debugging tool for LEON3 based embedded systems. The debugging tool can initialize the target hardware, find out how the target hardware is configured, load application code to a specified memory space and run that application code. To provide users a debugging environment, it can set breakpoints and control the operation of LEON3 correspondingly. And function call trace is one of key functions of the debugging tool.