• Title/Summary/Keyword: Trace Format

Search Result 24, Processing Time 0.023 seconds

GML Map Visualization on Mobile Devices

  • Song, Eun-Ha;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.33-42
    • /
    • 2010
  • GIS can only be applied to certain areas by storing format. It is subordinate to a system when displaying geographic information data. It is therefore inevitable for GIS to use GML that supports efficient usage of various geographic information data and interoperability for integration and sharing. The paper constructs VisualGML that translates currently-used geographic information such as DXF (Drawing Exchange Format), DWG (DraWinG), or SHP (Shapefile) into GML format for visualization. VisualGML constructs an integrated map pre-process module, which filters geographic information data according to its tag and properties, to provide the flexibility of a mobile device. VisualGML also provides two major GIS services for the user and administrator. It can enable visualizing location search. This is applied with a 3-Layer POI structure for the user. It has trace monitoring visualization through moving information of mobile devices for the administrator.

Trace Monitoring System of Mobile Devices based on GML (GML 기반 모바일 디바이스 추적 모니터링 시스템)

  • Jeon, Chang-Young;Park, Jun;Lee, Jin-Seok;Song, Eun-Ha;Jeong, Young-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.1
    • /
    • pp.19-27
    • /
    • 2007
  • Entering the 21st century, the demand on information service via mobile devices is skyrocketing along with the popularization of computers and mobile communication devices and the rapid development of wireless communication technology. In particular, as mobile device service such as LBS and Telematics becomes highlighted, the management of mobile devices is ever more drawing attention. However, since there is no fixed standard on geographical space data, many commercialized monitoring systems do not use common geographical space data but independent geographic information. Furthermore, as it is impossible to save location information of each mobile device by integrating such information after acquiring them, it is difficult to trace management. Therefore, in this paper, geographic data with DXF. DWG and SHP format, which are commonly used files, were created and visualized by GML format, OGC standard advice. And then, TMS(Trace Monitoring System of Mobile Device) that can trace and manage information after acquiring and saving space information that show the movement of users was implemented.

Attack Path and Intention Recognition System for detecting APT Attack (APT 공격 탐지를 위한 공격 경로 및 의도 인지 시스템)

  • Kim, Namuk;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.67-78
    • /
    • 2020
  • Typical security solutions such as intrusion detection system are not suitable for detecting advanced persistent attack(APT), because they cannot draw the big picture from trivial events of security solutions. Researches on techniques for detecting multiple stage attacks by analyzing the correlations between security events or alerts are being actively conducted in academic field. However, these studies still use events from existing security system, and there is insufficient research on the structure of the entire security system suitable for advanced persistent attacks. In this paper, we propose an attack path and intention recognition system suitable for multiple stage attacks like advanced persistent attack detection. The proposed system defines the trace format and overall structure of the system that detects APT attacks based on the correlation and behavior analysis, and is designed with a structure of detection system using deep learning and big data technology, etc.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Design and Implementation of Performance Analysis Tool For User-Defined Performance Analysis (사용자 정의 성능 분석을 지원하는 성능 감시 도구의 설계 및 구현)

  • Ma, Dai-Sung;Kim, Byung-Ki
    • Journal of The Korean Association of Information Education
    • /
    • v.2 no.2
    • /
    • pp.245-251
    • /
    • 1998
  • This paper designs RDL/PAL interface and performance monitoring tool with providing the Event Expressions. RDL/PAL suggests interface of instrumentation layer and performance analysis layer so that it can extract event data from various trace formats. Also, the Event Expressions is similar to the normal program language, which make possible to obtain result of performance analysis. The programmer can analyze performance regardless of trace format by using the performance monitoring tool which has so much merits.

  • PDF

A Study on the Create of CAD data using Image processing Method (화상처리 방법을 이용한 도면의 전산화에 관한 연구)

  • 이이선
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2000.04a
    • /
    • pp.133-137
    • /
    • 2000
  • In this paper, We study on converting data transfer using Image processing method. In the program's code consist of outline trace, noise filtering methode, pont data smoothing, algorithm. We use those Algorithm to create Vectorized data file format from image data. This result can be utilized as a base part for development of Automatic recognition for mechanical drawings.

  • PDF

Study on scheme for screening, quantification and interpretation of trace amounts of hazardous inorganic substances influencing hazard classification of a substance in REACH registration (REACH 물질 등록 시 분류에 영향을 주는 미량 유해 무기물질의 스크리닝·정량·해석을 위한 체계도 연구)

  • Kwon, Hyun-ah;Park, Kwang Seo;Son, Seung Hwan;Choe, Eun Kyung;Kim, Sanghun
    • Analytical Science and Technology
    • /
    • v.32 no.6
    • /
    • pp.233-242
    • /
    • 2019
  • Substance identification is the first step of the REACH registration. It is essential in terms of Classification, Labelling and Packaging (CLP) regulation and because even trace amounts of impurities or additives can affect the classification. In this study, a scheme for the screening, quantification, and interpretation of trace amounts of hazardous inorganic substances is proposed to detect the presence of more than 0.1% hazardous inorganic substances that have been affecting the hazard classification. An exemplary list of hazardous inorganic substances was created from the substances of very high concern (SVHCs) in REACH. Among 201 SVHCs, there were 67 inorganic SVHCs containing at least one or ~2-3 heavy metals, such as As, Cd, Co, Cr, Pb, Sb, and Sn, in their molecular formula. The inorganic SVHCs are listed in excel format with a search function for these heavy metals so that the hazardous inorganic substances, including each heavy metal and the calculated ratio of its atomic weight to molecular weight of the hazardous inorganic substance containing it, can be searched. The case study was conducted to confirm the validity of the established scheme with zinc oxide (ZnO). In a substance that is made of ZnO, Pb was screened by XRF analysis and measured to be 0.04% (w/w) by ICP-OES analysis. After referring to the list, the presence of Pb was interpreted just as an impurity, but not as an impurity relevant for the classification. Future studies are needed to expand on this exemplary list of hazardous inorganic substances using proper regulatory data sources.

A Design of Secure Audit/ Trace Module to Support Computer Forensics (컴퓨터 포렌식스를 지원하는 보안 감사/추적 모듈 설계)

  • 고병수;박영신;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.79-86
    • /
    • 2004
  • In general, operating system is offering the security function of OS level to support several web services. However, it is true that security side of OS level is weak from many parts. Specially, it is needed to audit/trace function in security kernel level to satisfy security more than B2 level that define in TCSEC(Trusted Computer System Evaluation Criteria). So we need to create audit data at system call invocation for this, and do to create audit data of equal format about almost event and supply information to do traceback late. This Paper Proposes audit/trace system module that use LKM(Loadable Kernel Module) technique. It is applicable without alteration about existing linux kernel to ensure safe evidence. It offers interface that can utilize external audit data such as intrusion detection system, and also offers safe role based system that is divided system administrator and security administrator These data will going to utilize to computer forensics' data that legal confrontation is Possible.

  • PDF

An Application-embedded method to trace OTT viewing patterns on smartphone (스마트폰에서의 OTT(Over The Top)서비스 시청패턴 추적 어플리케이션 설계 : 티빙(tving)을 중심으로)

  • Choi, Sun-Young;Kim, Min-Soo;Kim, Myoung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.1000-1006
    • /
    • 2014
  • This study focuses on the fact that a OTT service is vigorously used for smart phones, and suggests a design of method to trace the experiences of watching television contents. For this purpose, we developed logging functions and embedded them into existing OTT service application to record flow and pattern of watching context. This paper suggests a log file format which can accurately and precisely record watching actions of users per-second methodology rather than former per-minute methodology. Moreover, this study shows that the application can trace watching attitude according to occurring events by characteristics and playing modes of realtime broadcasting, VOD, advertisement contents. In addition, based on the result of the study, this paper discusses educational, operational meaning of the method such as methodological application in mobile ethnography field or survey for total screening rate.

A Study on Performance Analysis Layer of Parallel Program Performance Monitoring Tool (병렬 프로그램 성능 감시 도구의 성능 분석층에 관한 연구)

  • Kim, Byeong-Gi;Ma, Dae-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1263-1271
    • /
    • 1999
  • This paper designs the performance analysis layer for the various performance analysis of parallel programs using event expressions are similar to the normal program language to analyze the events which display a dynamic state exchange of a program. The event expressions suggest operations for overloading and functions which are needed in performance analysis, such as a filtering operation, data format translation functions, performance analysis, static functions, and etc. By using the event expressions, the programmer can modify the event trace data to analyze the performance and analyze more easily and variously than the pre-developed tools.

  • PDF