• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.024 seconds

Design of Application Module for the Excel File Security Management (엑셀 파일의 보안 관리를 위한 응용 프로그램 모듈 설계)

  • Jang, Seung Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1173-1178
    • /
    • 2019
  • In this paper, we design a security management application module for an Excel VBA password file. You will set a password for the important VBA program file. If this password is lost, you set a new password. If you forgot the password after setting the password in the Excel VBA file, you will not be able to change the VBA source code. In this paper, we design a function to modify VBA file passwords conveniently. The VBA password modification module extracts VBA files from Excel files. The password can be modified by modifying specific field information in the extracted VBA program file. This allows you to modify the password for the VBA program file. The experiments were performed by implementing the contents proposed in this paper. As a result of the experiment, we can confirm that the password can be used by modifying the VBA file password.

Comparative analysis of turbulence models in hydraulic jumps

  • Lobosco, Raquel J.;da Fonseca, David O.;Jannuzzia, Graziella M.F.;Costa, Necesio G.
    • Coupled systems mechanics
    • /
    • v.8 no.4
    • /
    • pp.339-350
    • /
    • 2019
  • A numerical simulation of the incompressible multiphase hydraulic jump flow was performed to compare the interface prediction through the use of the three RANS turbulence models: $k-{\varepsilon}$, $RNGk-{\varepsilon}$ and SST $k-{\omega}$. A three dimensional no submerged hydraulic jump and a two dimensional submerged hydraulic jump were modeled. Both the geometry and the mesh were created using the open source Gmsh code. The project's geometry consists of a rectangular channel with length and height differences between the two dimensional and three dimensional simulations. Uniform hexahedral cells were used for the mesh. Three refining meshes were constructed to allow to verify simulation convergence. The Volume of Fluid (abbr. VOF) method was used for treatment of the air-water surface. The turbulence models were evaluated in three distinct set up configurations to provide a greater accuracy in the flow representation. In the two-dimensional analysis of a submerged hydraulic jump simulation, the turbulence model RNG RNG $k-{\varepsilon}$ provided a better interface adjust with the experimental results than the model $k-{\varepsilon}$ and SST $k-{\omega}$. In the three-dimensional simulation of a no-submerged hydraulic jump the k-# showed better results than the SST $k-{\omega}$ and RNG $k-{\varepsilon}$ capturing the height and length of the ledge with a better fit with the experimental results.

A feasibility study on photo-production of 99mTc with the nuclear resonance fluorescence

  • Ju, Kwangho;Lee, Jiyoung;ur Rehman, Haseeb;Kim, Yonghee
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.176-189
    • /
    • 2019
  • This paper presents a feasibility study for producing the medical isotope $^{99m}Tc$ using the hazardous and currently wasted radioisotope $^{99}Tc$. This can be achieved with the nuclear resonance fluorescence (NRF) phenomenon, which has recently been made applicable due to high-intensity laser Compton scattering (LCS) photons. In this work, 21 NRF energy states of $^{99}Tc$ have been identified as potential contributors to the photo-production of $^{99m}Tc$ and their NRF cross-sections are evaluated by using the single particle estimate model and the ENSDF data library. The evaluated cross sections are scaled using known measurement data for improved accuracy. The maximum LCS photon energy is adjusted in a way to cover all the significant excited states that may contribute to $^{99m}Tc$ generation. An energy recovery LINAC system is considered as the LCS photon source and the LCS gamma spectrum is optimized by adjusting the electron energy to maximize $^{99m}Tc$ photo-production. The NRF reaction rate for $^{99m}Tc$ is first optimized without considering the photon attenuations such as photo-atomic interactions and self-shielding due to the NRF resonance itself. The change in energy spectrum and intensity due to the photo-atomic reactions has been quantified using the MCNP6 code and then the NRF self-shielding effect was considered to obtain the spectrums that include all the attenuation factors. Simulations show that when a $^{99}Tc$ target is irradiated at an intensity of the order $10^{17}{\gamma}/s$ for 30 h, 2.01 Ci of $^{99m}Tc$ can be produced.

Numerical Modeling for the Identification of Fouling Layer in Track Ballast Ground (자갈도상 지반에서의 파울링층 식별을 위한 수치해석연구)

  • Go, Gyu-Hyun;Lee, Sung-Jin
    • Journal of the Korean Geotechnical Society
    • /
    • v.37 no.9
    • /
    • pp.13-24
    • /
    • 2021
  • Recently, attempts have been made to detect fouling patterns in the ground using Ground Penetrating Radar (GPR) during the maintenance of gravel ballast railway tracks. However, dealing with GPR signal data obtained with a large amount of noise in a site where complex ground conditions are mixed, often depends on the experience of experts, and there are many difficulties in precise analysis. Therefore, in this study, a numerical modeling technique that can quantitatively simulate the GPR signal characteristics according to the degree of fouling of the gravel ballast material was proposed using python-based open-source code gprMax and RSA (Random sequential Absorption) algorithm. To confirm the accuracy of the simulation model, model tests were manufactured and the results were compared to each other. In addition, the identification of the fouling layer in the model test and analysis by various test conditions was evaluated and the results were analyzed.

A Study on Web Vulnerability Risk Assessment Model Based on Attack Results: Focused on Cyber Kill Chain (공격 결과 기반의 웹 취약점 위험도 평가 모델 연구: 사이버 킬체인 중심으로)

  • Jin, Hui Hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.779-791
    • /
    • 2021
  • Common web services have been continuously targeted by hackers due to an access control policy that must be allowed to an unspecified number of people. In order to cope with this situation, companies regularly check web vulnerabilities and take measures according to the risk of discovered vulnerabilities. The risk of these web vulnerabilities is calculated through preliminary statistics and self-evaluation of domestic and foreign related organizations. However, unlike static diagnosis such as security setting and source code, web vulnerability check is performed through dynamic diagnosis. Even with the same vulnerability item, various attack results can be derived, and the degree of risk may vary depending on the subject of diagnosis and the environment. In this respect, the predefined risk level may be different from that of the actual vulnerability. In this paper, to improve this point, we present a web vulnerability risk assessment model based on the attack result centering on the cyber kill chain.

Telemedicine Software Application

  • UNGUREANU, Ovidiu Costica;POPESCU, Marius-Constantin;CIOBANU, Daniela;UNGUREANU, Elena;SARLA, Calin Gabriel;CIOBANU, Alina-Elena;TODINCA, Paul
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.171-180
    • /
    • 2021
  • Currently, hospitals and medical practices have a large amount of unstructured information, gathered in time at each ward or practice by physicians in a wide range of medical branches. The data requires processing in order to be able to extract relevant information, which can be used to improve the medical system. It is useful for a physician to have access to a patient's entire medical history when he or she is in an emergency situation, as relevant information can be found about the patient's problems such as: allergies to various medications, personal history, or hereditary collateral conditions etc. If the information exists in a structured form, the detection of diseases based on specific symptoms is much easier, faster and with a higher degree of accuracy. Thus, physicians may investigate certain pathological profiles and conduct cohort clinical trials, including comparing the profile of a particular patient with other similar profiles that already have a confirmed diagnosis. Involving information technology in this field will change so the time which the physicians should spend in front of the computer into a much more beneficial one, providing them with the possibility for more interaction with the patient while listening to the patient's needs. The expert system, described in the paper, is an application for medical diagnostic of the most frequently met conditions, based on logical programming and on the theory of probabilities. The system rationale is a search item in the field basic knowledge on the condition. The web application described in the paper is implemented for the ward of pathological anatomy of a hospital in Romania. It aims to ease the healthcare staff's work, to create a connection of communication at one click between the necessary wards and to reduce the time lost with bureaucratic proceedings. The software (made in PHP programming language, by writing directly in the source code) is developed in order to ease the healthcare staff's activity, being created in a simpler and as elegant way as possible.

The Process of Software Quality Assurance About Initial Product in Weapon System (무기체계 최초양산품 소프트웨어 품질보증 프로세스 연구)

  • Yu, Jiseon;Song, Chi-Hoon;Kwon, Soonmo;Park, Byeonghun;Oh, Jinwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.285-293
    • /
    • 2021
  • This study evaluated the process of software quality assurance about the initial product in a weapon system. The software quality assurance of the initial product was insufficient before this study. Therefore, the process of the software quality assurance about the initial product in a weapon system is suggested. The process has three parts. First, the completeness of computer files, such as source code and execute files, were checked. Second, the suitability of the software technical data was checked. Finally, the connectivity of software technical data and the Korean defense specification were assessed. Overall, there is a need to toughen the software quality assurance in the research and development step and achieve early stabilization of mass production by preventing the problems that prevent the production of a product due to the insufficient software technical data.

Development of teaching and learning materials using Arduino and piezo buzzer

  • Lee, Eun-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.349-357
    • /
    • 2020
  • In this paper, I propose a presentation examples of the development of teaching materials using Arduino. For this purpose, a six-step low-cost microcontroller teaching-learning development model was used, the steps being topic selection, exploration of implementation methods, experimentation, production of teaching and learning materials, implementing lesson plans, and improvement. After analyzing the composition of the source code and circuits introduced in the existing Arduino book, this content was reconstructed to fit the programming education context. A simple method of constructing a circuit using materials such as Arduino and a piezo buzzer is proposed to save time on circuit composition. Using this circuit, examples of use in teaching-learning activities for various programming content elements are presented. The core concept of this study is that it provides a direct experience of the content of C language programming exercises that can only be found on existing screens.

Real-time Phishing Site Detection Method (피싱사이트 실시간 탐지 기법)

  • Sa, Joon-Ho;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.819-825
    • /
    • 2012
  • Nowadays many phishing sites contain HTTP links to victim web-site's contents such as images, bulletin board etc. to make the phishing sites look more real and similar to the victim web-site. We introduce a real-time phishing site detection system which makes use of the characteristic that the phishing sites' URLs flow into the victim web-site via the HTTP referer header field when the phishing site is visited. The detection system is designed to adopt an out-of-path network configuration to minimize effect on the running system, and a phishing site source code analysis technique to alert administrators in real-time when phishing site is detected. The detection system was installed on a company's web-site which had been targeted for phishing. As result, the detection system detected 40 phishing sites in 6 days of test period.

Deterministic Parallelism for Symbolic Execution Programs based on a Name-Freshness Monad Library

  • Ahn, Ki Yung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we extend a generic library framework based on the state monad to exploit deterministic parallelism in a purely functional language Haskell and provide benchmarks for the extended features on a multicore machine. Although purely functional programs are known to be well-suited to exploit parallelism, unintended squential data dependencies could prohibit effective parallelism. Symbolic execution programs usually implement fresh name generation in order to prevent confusion between variables in different scope with the same name. Such implementations are often based on squential state management, working against parallelism. We provide reusable primitives to help developing parallel symbolic execution programs with unbound-genercis, a generic name-binding library for Haskell, avoiding sequential dependencies in fresh name generation. Our parallel extension does not modify the internal implementation of the unbound-generics library, having zero possibility of degrading existing serial implementations of symbolic execution based on unbound-genecrics. Therefore, our extension can be applied only to the parts of source code that need parallel speedup.