• Title/Summary/Keyword: Symbolic-Execution

Search Result 34, Processing Time 0.016 seconds

Real-Time Recognition Method of Counting Fingers for Natural User Interface

  • Lee, Doyeob;Shin, Dongkyoo;Shin, Dongil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2363-2374
    • /
    • 2016
  • Communication occurs through verbal elements, which usually involve language, as well as non-verbal elements such as facial expressions, eye contact, and gestures. In particular, among these non-verbal elements, gestures are symbolic representations of physical, vocal, and emotional behaviors. This means that gestures can be signals toward a target or expressions of internal psychological processes, rather than simply movements of the body or hands. Moreover, gestures with such properties have been the focus of much research for a new interface in the NUI/NUX field. In this paper, we propose a method for recognizing the number of fingers and detecting the hand region based on the depth information and geometric features of the hand for application to an NUI/NUX. The hand region is detected by using depth information provided by the Kinect system, and the number of fingers is identified by comparing the distance between the contour and the center of the hand region. The contour is detected using the Suzuki85 algorithm, and the number of fingers is calculated by detecting the finger tips in a location at the maximum distance to compare the distances between three consecutive dots in the contour and the center point of the hand. The average recognition rate for the number of fingers is 98.6%, and the execution time is 0.065 ms for the algorithm used in the proposed method. Although this method is fast and its complexity is low, it shows a higher recognition rate and faster recognition speed than other methods. As an application example of the proposed method, this paper explains a Secret Door that recognizes a password by recognizing the number of fingers held up by a user.

An Improvement in Loading Speed Using RAM-based Java Card Installer (RAM기반 자바카드 인스톨러를 이용한 로딩속도 개선)

  • Jin, Min-Sik;Choi, Won-Ho;Lee, Dong-Wook;Kim, Han-Na;Jung, Min-Soo;Park, Kyoo-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.604-611
    • /
    • 2007
  • Java Card has gained genera1 acceptance with standard for smart card and (U)SIM technology, and it is in distinction from native card by its post-issuance of an application and independence from hardware platforms. However, a main weak point of Java Card is its low execution speed caused by the hardware limitation and Java programming language itself. In this paper, we propose a new Java Card Installer to improve the download speed during the post-issuance of an application by resolving symbolic references to physical references in HAM. Our Resolution_In_RAM is based on the improved new RAM writing is 100,000 times faster than EEPROM writing and PageBuffer that is operated as block mode, rather than cell mode is used to write to EEPROM. Consequently, the total number of EEPROM writing are reduced 37%, and the times of downloading are reduced over 30% by using the Resolution_In_RAM-based Java Card Installer.

  • PDF

A Study on Hybrid Fuzzing using Dynamic Analysis for Automatic Binary Vulnerability Detection (바이너리 취약점의 자동 탐색을 위한 동적분석 정보 기반 하이브리드 퍼징 연구)

  • Kim, Taeeun;Jurn, Jeesoo;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.541-547
    • /
    • 2019
  • Recent developments in hacking technology are continuing to increase the number of new security vulnerabilities. Approximately 80,000 new vulnerabilities have been registered in the Common Vulnerability Enumeration (CVE) database, which is a representative vulnerability database, from 2010 to 2015, and the trend is gradually increasing in recent years. While security vulnerabilities are growing at a rapid pace, responses to security vulnerabilities are slow to respond because they rely on manual analysis. To solve this problem, there is a need for a technology that can automatically detect and patch security vulnerabilities and respond to security vulnerabilities in advance. In this paper, we propose the technology to extract the features of the vulnerability-discovery target binary through complexity analysis, and select a vulnerability-discovery strategy suitable for the feature and automatically explore the vulnerability. The proposed technology was compared to the AFL, ANGR, and Driller tools, with about 6% improvement in code coverage, about 2.4 times increase in crash count, and about 11% improvement in crash incidence.

Railway Governance and Power Structure in China

  • Lee, Jinjing
    • International Journal of Railway
    • /
    • v.1 no.4
    • /
    • pp.129-133
    • /
    • 2008
  • Over the last $15{\sim}20$years, many countries have adopted policies of railway privatization to keep up with increasing competition from road and air transport. Although each country and case has its own history, market characteristics, political context as well as administrative process, railway privatizations (including railway restructure, concession etc.) in the west usually are accompanied with the establishment of new regulatory regimes. Therefore, railway governance has been innovating towards an interaction of government, regulator, industry bodies, user groups, trade unions and other interested groups within the regulatory framework. However, it is not the case in China. Although China had seen a partial privatization in some branch lines and is experiencing a much larger-scale privatization by establishing joint-ventures to build and operate high-speed passenger lines and implementing an asset-based securitization program, administrative control still occupies absolutely dominant position in the railway governance in China. Ministry of Railway (MOR) acts as the administrator, operator as well as regulator. There is no national policy that clearly positions railway in the transportation network and clarifies the role of government in railway development. There is also little participation from interested groups in the railway policy making, pricing, service standard or safety matter. Railway in China is solely governed by the mere executive agency. Efficiency-focused economic perspective explanation is far from satisfaction. A wider research perspective from political and social regime is of great potential to better explain and solve the problem. In the west, separation and constrains of power had long been established as a fundamental rule. In addition to internal separation of political power(legislation, execution and jurisdiction), rise of corporation in the 19th century and association revolution in the 20th century greatly fostered the growth of economic and social power. Therefore, political, social and economic organizations cooperate and compete with each other, which leads to a balanced and resonable power structure. While in China, political power, mainly party-controlled administrative power has been keeping a dominated position since the time of plan economy. Although the economic reform promoted the growth of economic power of enterprises, it is still not strong enough to compete with political power. Furthermore, under rigid political control, social organizations usually are affiliated to government, independent social power is still too weak to function. So, duo to the limited and slow reform in political and social regime in China, there is an unbalanced power structure within which political power is dominant, economic power expanding while social power still absent. Totally different power structure in China determines the fundamental institutional environment of her railway privatization and governance. It is expected that the exploration of who act behind railway governance and their acting strength (a power theory) will present us a better picture of railway governance as a relevant transportation mode. The paper first examines the railway governance in China and preliminarily establishes a linkage between railway governance and its fundamental institutional environment, i.e. power structure in a specific country. Secondly, the reason why there is no national policy in China is explored in the view of political power. In China, legislative power is more symbolic while party-controlled administrative power dominates political process and plays a fundamental role in Chinese railway governance. And then, in the part three railway finance reform is analyzed in the view of economic power, esp. the relationship of political power and economic power.

  • PDF