• Title/Summary/Keyword: Software Graph

Search Result 310, Processing Time 0.024 seconds

Application of KOMPSAT-5 SAR Interferometry by using SNAP Software (SNAP 소프트웨어를 이용한 KOMPSAT-5 SAR 간섭기법 구현)

  • Lee, Hoonyol
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.6_3
    • /
    • pp.1215-1221
    • /
    • 2017
  • SeNtinel's Application Platform (SNAP) is an open source software developed by the European Space Agency and consists of several toolboxes that process data from Sentinel satellite series, including SAR (Synthetic Aperture Radar) and optical satellites. Among them, S1TBX (Sentinel-1 ToolBoX)is mainly used to process Sentinel-1A/BSAR images and interferometric techniques. It provides flowchart processing method such as Graph Builder, and has convenient functions including automatic downloading of DEM (Digital Elevation Model) and image mosaicking. Therefore, if computer memory is sufficient, InSAR (Interferometric SAR) and DInSAR (Differential InSAR) perform smoothly and are widely used recently in the world through rapid upgrades. S1TBX also includes existing SAR data processing functions, and since version 5, the processing capability of KOMPSAT-5 has been added. This paper shows an example of processing the interference technique of KOMPSAT-5 SAR image using S1TBX of SNAP. In the open mine of Tavan Tolgoi in Mongolia, the difference between DEM obtained in KOMPSAT-5 in 2015 and SRTM 1sec DEM obtained in 2000 was analyzed. It was found that the maximum depth of 130 meters was excavated and the height of the accumulated ore is over 70 meters during 15 years. Tidal and topographic InSAR signals were observed in the glacier area near Jangbogo Antarctic Research Station, but SNAP was not able to treat it due to orbit error and DEM error. In addition, several DInSAR images were made in the Iraqi desert region, but many lines appearing in systematic errors were found on coherence images. Stacking for StaMPS application was not possible due to orbit error or program bug. It is expected that SNAP can resolve the problem owing to a surge in users and a very fast upgrade of the software.

Analysis of G3BP1 and VEZT Expression in Gastric Cancer and Their Possible Correlation with Tumor Clinicopathological Factors

  • Beheshtizadeh, Mohammadreza;Moslemi, Elham
    • Journal of Gastric Cancer
    • /
    • v.17 no.1
    • /
    • pp.43-51
    • /
    • 2017
  • Purpose: This study aimed to analyze G3BP1 and VEZT expression profiles in patients with gastric cancer, and examine the possible relationship between the expressions of each gene and clinicopathological factors. Materials and Methods: Expression of these genes in formalin-fixed paraffin embedded (FFPE) tissues, collected from 40 patients with gastric cancer and 40 healthy controls, was analyzed. Differences in gene expression among patient and normal samples were identified using the GraphPad Prism 5 software. For the analysis of real-time polymerase chain reaction products, GelQuantNET software was used. Results: Our findings demonstrated that both VEZT and G3BP1 mRNA expression levels were downregulated in gastric cancer samples compared with those in the normal controls. No significant relationship was found between the expression of these genes and gender (P-value, 0.4835 vs. 0.6350), but there were significant changes associated with age (P-value, 0.0004 vs. 0.0001) and stage of disease (P-value, 0.0019 vs. 0.0001). In addition, there was a direct relationship between VEZT gene expression and metastasis (P-value, 0.0462), in contrast to G3BP1 that did not demonstrate any significant correlation (P-value, 0.1833). Conclusions: The results suggest that expression profiling of VEZT and G3BP1 can be used for diagnosis of gastric cancer, and specifically, VEZT gene could be considered as a biomarker for the detection of gastric cancer progression.

A Risk-based System Analysis Model for Improving the Performance of Financial Solutions

  • Lee, Jong Yun;Kim, Jong Soo;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1367-1374
    • /
    • 2015
  • In this paper, we propose a model which can prioritize the performance improvement work by analyzing the major risks and their influence, which can cause performance degradation in the system and show an example of a performance improvement using this model. In presentation-tier, as a result of log data analysis before and after the performance improvement of key processes which handle financial transactions, this model brought the CPU utilization and memory enhancement in the performance improvement work of the financial system which was carried out by applying the proposed model. It has been confirmed that the entire end-user can be accommodated. In the web-tier, the available memory increased by 200MB and we were able to improve the server restart(Recycling) that was sustained in the existing system. In the business logic-tier, we have been able to see better figures after performance improvements through the graph which analyzes the log collected with the key performance counters such as CPU%, Batch Requests/sec. In the data-tier, it has been confirmed that CPU usage and standby operation were reduced and the throughput was found to increase.

The Specification Techniques of Component Interactions (컴포넌트 상호작용 명세기법)

  • Lee, Chang-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.929-936
    • /
    • 2004
  • A major limitation of available component-based platforms Is that they do not provide suitable means for describing and reasoning on the concurrent behaviour of interacting component-based system. Indeed while these platforms provide convenient ways to describe the typed signatures of components, e.g. like CORBA's IDL, they offer a quite low-level support to describe the concurrent behaviour of component. The ability to describe and verify the concurrent behaviour of interacting components is key aspect In the development of large component-based software system. This study propose a component interface specification using process algebra and configuration's role which allows one to prove correctness of software architecture generated at design level as well as to define compatibility relations by our evolution rule and $\pi$-graph. Also, we shown on an appropriateness of a specification techniques and definitions proposed in this paper by case-study.

A Method of Test Case Generation Using BPMN-Based Path Search (BPMN 기반 경로 탐색을 이용한 테스트 케이스 생성 기법)

  • Park, JeJun;Kang, DongSu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.3
    • /
    • pp.125-134
    • /
    • 2017
  • The SOA (Service Oriented Architecture) based softwares are escalated because of quickly coping with business requirement. SOA can not apply to existing test method because of loosely coupled service and massage exchange architecture. In this paper, we suggest a method of test case generation using BPMN (Business Process Model and Notation). First we model processes, then make Business Flow Graph (BFG). After searching the euler path through symmetrized BFG about input and output degrees, we generate test cases. A method of test case generation using BPMN can apply at SOA-based system, and reduce the number of test cases.

A Study on the Object-Orient Program Slicing (객체지향 프로그램 슬라이싱에 관한 연구)

  • Bang, Geuk-In;Park, Young-Ok;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.461-465
    • /
    • 2002
  • When general software system wants to need continuous Dept of Software Engineering by discovery of specification imperative sentence in some program, programmer analyzes program through practice orbit chase of program about value of input data. This paper that see therefore applies object intention program Slicing to existent program Slicing method, and express practice orbit of program in object intention subordination graph and show process that become Slicing. Proposed algorithm defenses crab extension is possible and can be used advantageously in case program is developed gradually as well as.

  • PDF

Event Detection System Using Twitter Data (트위터를 이용한 이벤트 감지 시스템)

  • Park, Tae Soo;Jeong, Ok-Ran
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.153-158
    • /
    • 2016
  • As the number of social network users increases, the information on event such as social issues and disasters receiving attention in each region is promptly posted by the bucket through social media site in real time, and its social ripple effect becomes huge. This study proposes a detection method of events that draw attention from users in specific region at specific time by using twitter data with regional information. In order to collect Twitter data, we use Twitter Streaming API. After collecting data, We implemented event detection system by analyze the frequency of a keyword which contained in a twit in a particular time and clustering the keywords that describes same event by exploiting keywords' co-occurrence graph. Finally, we evaluates the validity of our method through experiments.

Applying probabilistic perspective to interpreting science graphs using a mathematics educational software (수학교육용 소프트웨어를 활용한 과학 그래프 해석에 대한 확률론적 관점의 적용)

  • Paik, Seoung-Hey;Choi, Kyeongsik;Kim, Sungki
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.319-321
    • /
    • 2019
  • 본 논문에서는 수학교육용 소프트웨어에서 확률적 현상을 경험한 이후 과학 그래프 해석에 있어 확률론적 관점을 도입하여 해석하는 학습자의 관점의 변화를 제시한다. 이 연구에서 11명의 고등학교 1학년 학생은 수학교육용 소프트웨어인 지오지브라(GeoGebra)를 활용하여 학습자가 평면 상에서 수직선이나 반원 위에 점을 찍는 활동을 통하여 기하학적 확률을 경험하였으며 이와 같은 경험을 토대로 물의 상평형 그래프를 해석하였다. 물의 상평형 그래프에 나타나는 얼음(고체), 물(액체), 수증기(기체)의 상태 변화에 대하여 각 상태가 나타나는 온도-압력의 영역 간의 경계에 대하여 학습자는 기하학적 확률을 적용하여 해석하려고 하였으나 경계선 위의 온도-압력의 물의 미시적 구조를 표현하는 과정에서 4명의 학생만 확률론적 관점으로 해석하고 그렇지 못한 학생들은 상태의 공존을 물질적 관점이나 과정적 관점으로 이해하였다.

  • PDF

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

Detecting TOCTOU Race Condition on UNIX Kernel Based File System through Binary Analysis (바이너리 분석을 통한 UNIX 커널 기반 File System의 TOCTOU Race Condition 탐지)

  • Lee, SeokWon;Jin, Wen-Hui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.701-713
    • /
    • 2021
  • Race Condition is a vulnerability in which two or more processes input or manipulate a common resource at the same time, resulting in unintended results. This vulnerability can lead to problems such as denial of service, elevation of privilege. When a vulnerability occurs in software, the relevant information is documented, but often the cause of the vulnerability or the source code is not disclosed. In this case, analysis at the binary level is necessary to detect the vulnerability. This paper aims to detect the Time-Of-Check Time-Of-Use (TOCTOU) Race Condition vulnerability of UNIX kernel-based File System at the binary level. So far, various detection techniques of static/dynamic analysis techniques have been studied for the vulnerability. Existing vulnerability detection tools using static analysis detect through source code analysis, and there are currently few studies conducted at the binary level. In this paper, we propose a method for detecting TOCTOU Race Condition in File System based on Control Flow Graph and Call Graph through Binary Analysis Platform (BAP), a binary static analysis tool.