• Title/Summary/Keyword: Rule-script

Search Result 25, Processing Time 0.025 seconds

A Compiler Based Rule Engine for Developing Changeable Component (가변적인 컴포넌트 개발을 위한 컴파일러 방식의 룰 엔진)

  • Lee, Yong-Hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.379-385
    • /
    • 2006
  • To improve reusability and adaptation of variable components, rule-based component development has been used. Rule engines usually need additional script languages for rule expression and have difficulty in expressing complex business rules. In this paper, we propose a compiler-based rule engine for rich rule expression and improving performance. This rule engine uses Java programming language to express conditions and action parts of rules and that it can easily express complex business rules. It creates and executes condition and action objects at run time. In view of Performance, the rule engine is better than a script based rule engine. According to our experiments, our compiler-based nile engine shows 2.5 times better performance that script-based JSR 94 rule engine.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (혼합형 침입차단시스템을 위한 통합 접근제어 규칙기술 언어 및 그래픽 사용자 인터페이스 구현)

  • 박찬정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.57-70
    • /
    • 1999
  • Since a hybrid firewall filters packets at a network layer along with providing gateway functionalities at an application layer, it has a better performance than an If filtering firewall. In addition, it provides both the various kinds of access control mechanisms and transparent services to users. However, the security policies of a network layer are different from those of an application layer. Thus, the user interfaces for managing a hybrid firewalls in a consistent manner are needed. In this paper, we implement a graphical user interface to provide access control mechanisms and management facilities for a hybrid firewall such as log analysis, a real-time monitor for network traffics, and the statisics on traffics. And we also propose a new rule script language for specifying access control rules. By using the script language, users can generate the various forma of access control rules which are adapted by the existing firewalls.

Development of Flood Routing Model in the Ara Waterway Applying HEC-RAS (HEC-RAS를 적용한 아라천 홍수위산정모형 구축)

  • Noh, Joon-Woo;Lee, Sang-Jin;Park, Myung-Ki;Shim, Myung-Geunl
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.409-413
    • /
    • 2012
  • 아라뱃길은 다양한 수리구조물의 조작을 통하여 선박운항 및 홍수처리가 이루어지며 유입홍수량, 한강수위, 그리고 서해조위 변동과 연계하여 귤현보, 서해배수문, 체절수문, 그리고 배수펌프장 등의 대표적인 구조물 운영을 지원할 수 있는 홍수위 계산모형이 필요하다. HEC-RAS모형은 이러한 수리구조물 운영을 효과적으로 경계조건으로 반영할 수 있는 장점이 있다. 특히 서해배수문의 경우 조위변동과 내수위를 동시에 고려한 수문운영이 필요하여 Rule-script기능을 적용하여 이러한 특성을 반영하였다. 모형의 검보정을 위하여 2010년 9월 홍수사상을 적용하였으며 모형으로부터 계산된 수위값과 관측된 수위값이 서로 잘 일치함을 확인하였다.

  • PDF

Development of Flood Routing Model in the Navigation Waterway to Support Operations of Weir and Flood Gate (가동보 및 배수문운영을 고려한 주운수로 홍수위 산정모형 구축)

  • Noh, Joon-Woo;Park, Myung-Ki;Shim, Myung-Geun;Lee, Sang-Jin
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.9
    • /
    • pp.959-968
    • /
    • 2012
  • HEC-RAS has been applied to simulate water level variation in the Ara waterway during the flood season. To support decision making necessary for operation of the hydraulic structures especially during the flood season, it is important to consider various factors such as water level of the Han River, Gulpo River, and tidal level of the west sea in conjunction with operation of the hydraulic structures such as the Gyulhyun Weir, the West sea gate, and pumping stations. Especially for operation of the west sea gate, the Rule-script option was employed to determine the opening height considering the variation of the water level in the waterway and the west sea simultaneously. For model verification, comparison of water level computed at the upstream and downstream of the regulation weir shows a good agreement with observed data measured during the flood event in September 2010. The HEC-RAS model developed in this study will contribute to support operation of the waterway during the flood season.

Design of Detection system against Security Tool Evasion Attack using a VDS(Vulnerability diagnostication Script) (취약점 진단 스크립트를 이용한 보안도구 우회공격 탐지 시스템 설계)

  • 박명호;육상조;이극
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.1-4
    • /
    • 2003
  • 최근에 침입 탐지 시스템은 네트워크 보안의 강화를 위해서 방화벽과 침입탐지 시스템 상호간의 연동으로 침입자의 연결 상태를 차단하는 방법도 개발되었다. 하지만 방화벽뿐만 아니라 침입탐지 시스템도 공격자에 의한 우회공격에 대해서는 아직 상당부분 방어할 수 없다. 또한 우회공격 탐지 모듈도 기존의 IDS와 Rule의 중복이 불가피하다. 본 논문은 취약점 진단 스크립트를 통해 IDS의 취약점 진단 후 IDS우회탐지공격 시스템의 Rule을 최적화 하여 우회공격을 효율적으로 탐지 해내는 시스템을 제안한다.

  • PDF

A study on the script of japan author names with chinese character in "Periodical's Index" (정기간행물기사색인'에 나타난 일본인명 표기에 관한 연구)

  • 김영귀
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.167-206
    • /
    • 1996
  • Some conclusions can be derived form the study : 1) The script of Japan author's name for 3 years(1960-1962, not published by the National Assembly Library but by Korea Library Association)and that of 1963's was arranged by their mother tongue although they had not the "author index". 2) "Periodical's Index" which the publication of National Assembly Library was not accept the principle that the person's name should be pronounce and script by one's mother tongue. It means that the Library was not accept the uniqueness of personal name. 3) Because the arrangement of the same person's name is mixed with one's mother tongue pronunciation and Korean one that they are scattered each another. 4) The same surname and the same Chinese character has different arrangement because of pronunciation rule of Korean language. 5) The same person's name was regarded as a different one because of nonaccurate name transcription. 6) A Japanese name was transcribed as Hangul with Korean pronunciation. 7) A Japanese name was transcribed as Hangul with Korean pronunciation and added Chinese Character in parenthesis. 8) A same Japanese name was regarded as a different one when it was transcribed with Chinese character and Hangul. 9) The arrangement of a same person's name was different when between the surname and forename has one space and has not. 10) "Author Index" is not playing as a role of name authority file.a role of name authority file.

  • PDF

A Survey of Representation Methods of Game Rules in Game Design (게임디자인에서 게임규칙 표현방법 조사연구)

  • Chang, Hee-Dong
    • Journal of Korea Game Society
    • /
    • v.6 no.4
    • /
    • pp.39-45
    • /
    • 2006
  • In game developments, the design results are often modified not only in the design phase but also in the implementation and test phases. The results of game design are consisted of the results of game rule design and the results of game contend design. The results of game rule design should be correctly understood to all the participants, be efficiently managed by the given configuration controls, and be accurately verified. In this study, we carry out a survey of representation methods of game rules in game design. We have the comparison analysis of the written representation, the UML representation, the Petri net representation, and script-language representation methods about the suitability of the representation method for game rule designs. The comparison analysis is about the representation scope, the visual representation, the automated verification, and the configuration management. The analysis results show that the UML representation is the best method but it needs more convenient automated verification method.

  • PDF

The Radical-rule and Arrangement System of Characters of Wu Jing Wen Zi: a Rebuttal of Yu Jiaxi's View (『오경문자(五經文字)』 부수 분류의 표준과 소속자의 귀속 체례 - 여가석(余嘉錫)의 『오경문자(五經文字)』 부수 평가에 대한 반박)

  • Lee, Kyeongwon
    • Cross-Cultural Studies
    • /
    • v.38
    • /
    • pp.385-404
    • /
    • 2015
  • Compiled in 776 by Zhang Shen, Wu Jing Wen Zi was regarded as the epitome of model book for standardized regular script in Tang Dynasty. Following early works like Shuo Wen Jie Zi, Zhang Shen adopted radical-rule for the compilation of this work. 3,250 characters were selected from the Five Classics and 160 radicals were established. Yu Jiaxi (1884-1955) harshly criticized the radical system of Wu Jing Wen Zi for being inconsistant and confusing. With careful review and analysis of examples from Wu Jing Wen Zi, this paper discusses the pupose of the compilation of this work, its unique radical-rule system, principles of arrangement of characters with the same or similar radicals, and the differentiation of variant characters. It further discusses the value of Wu Jing Wen Zi by its innovative radical-rule and effective differentiation of variant characters. It concludes with a rebuttal of Yu Jiaxi's argument and restate the necessity of reevaluation of this work even to this day.

A Malware Detection Method using Analysis of Malicious Script Patterns (악성 스크립트 패턴 분석을 통한 악성코드 탐지 기법)

  • Lee, Yong-Joon;Lee, Chang-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.613-621
    • /
    • 2019
  • Recently, with the development of the Internet of Things (IoT) and cloud computing technologies, security threats have increased as malicious codes infect IoT devices, and new malware spreads ransomware to cloud servers. In this study, we propose a threat-detection technique that checks obfuscated script patterns to compensate for the shortcomings of conventional signature-based and behavior-based detection methods. Proposed is a malicious code-detection technique that is based on malicious script-pattern analysis that can detect zero-day attacks while maintaining the existing detection rate by registering and checking derived distribution patterns after analyzing the types of malicious scripts distributed through websites. To verify the performance of the proposed technique, a prototype system was developed to collect a total of 390 malicious websites and experiment with 10 major malicious script-distribution patterns derived from analysis. The technique showed an average detection rate of about 86% of all items, while maintaining the existing detection speed based on the detection rule and also detecting zero-day attacks.

Automatic Generation of Web-based Expert Systems (웹 기반 전문가시스템의 자동생성체계)

  • 송용욱
    • Journal of Intelligence and Information Systems
    • /
    • v.6 no.1
    • /
    • pp.1-16
    • /
    • 2000
  • This paper analyzes the approaches of Web-based expert systems by comparing their pros and cons. and proposes a methodology of implementing the Web-based backward inference engines with reduced burden to Web servers. There are several alternatives to implement expert systems under the WWW environment : CGI, Web servers embedding inference engines external viewers Java Applets and HTML. Each of the alternatives have advantages and disadvantages of each own in terms of development and deployment testing scalability portability maintenance and mass service. Especially inference engines implemented using HTML possess relatively large number of advantages compared with those implemented using other techniques. This paper explains the methodology to present rules and variables for backward inference by HTML and JavaScript and suggests a framework for design and development of HTML-based Expert System. A methodology to convert a traditional rule base to an Experts Diagram and then generate a new HTML-based Expert System from the Experts Diagram is also addressed.

  • PDF