• Title/Summary/Keyword: Virtual Machine Tools

Search Result 42, Processing Time 0.026 seconds

Development of Three-dimensional CAD System for Die Design for Automotive Body Panels (자동차 프레스 금형 설계를 위한 3차원 CAD 시스템의 개발)

  • Lee, Sang-Hwa;Ryu, Seung-Woo;Lee, Sang-Hun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.1
    • /
    • pp.39-49
    • /
    • 2007
  • Recently three-dimensional (3-D) die design and production process has been widely introduced into the tooling shops of automotive manufacturers to reduce time-to-production of brand-new automobiles. 3-D solid models created in CAD systems are used not only for various simulations for design verification, but also for NC tool path generation to machine dies and their Styrofoam patterns. However, a lot of time and cost will be required to build solid models for dies if designers use only the generalized modeling capabilities of commercial 3-D CAD systems. To solve this problem, it is necessary to customize 3-D CAD system for the specific die design and manufacturing process. This paper describes a dedicated 3-D CAD system based on Unigraphics for die design for automotive body panels. The system provides not only 3-D design capabilities, but also standard part libraries, to enhance design productivity. The design process modeling technology has been introduced to facilitate redesign of the die for the modified panel. By introducing this system, dies can be designed more rapidly in the 3-D space, and their solid data can be directly transferred to CAM tools for NC tool path generation and simulation tools for virtual manufacturing.

Development of a Three-Dimensional CAD System for Design of Drawing Dies for Automotive Panels (자동차 패널 드로잉 금형 설계를 위한 3 차원 CAD 시스템의 개발)

  • Lee Sang-Hwa;Lee Sang-Hun
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.1424-1428
    • /
    • 2005
  • This paper describes a dedicated three-dimensional CAD system for design of drawing dies for automotive body panels. Since solid die models are useful not only for simulations for design verification, but also for NC tool path generation to machine dies and their Styrofoam patterns, 3-D CAD systems have been introduced in the tooling shop of automotive manufacturers. However, the work to build solid models requires a lot of time and effort if the designer uses only the general modeling capabilities of commercial 3-D CAD systems. To solve this problem, we customized a 3-D CAD system for the drawing die design. The system provides not only 3-D design capabilities, but also standard part libraries to enhance design productivity. By introducing this system, the drawing dies can be designed more rapidly in the 3-D space, and their solid data can be directly transferred to CAM tools for NC tool path generation and simulation tools for virtual manufacturing

  • PDF

LoGos: Internet-Explorer-Based Malicious Webpage Detection

  • Kim, Sungjin;Kim, Sungkyu;Kim, Dohoon
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.406-416
    • /
    • 2017
  • Malware propagated via the World Wide Web is one of the most dangerous tools in the realm of cyber-attacks. Its methodologies are effective, relatively easy to use, and are developing constantly in an unexpected manner. As a result, rapidly detecting malware propagation websites from a myriad of webpages is a difficult task. In this paper, we present LoGos, an automated high-interaction dynamic analyzer optimized for a browser-based Windows virtual machine environment. LoGos utilizes Internet Explorer injection and API hooks, and scrutinizes malicious behaviors such as new network connections, unused open ports, registry modifications, and file creation. Based on the obtained results, LoGos can determine the maliciousness level. This model forms a very lightweight system. Thus, it is approximately 10 to 18 times faster than systems proposed in previous work. In addition, it provides high detection rates that are equal to those of state-of-the-art tools. LoGos is a closed tool that can detect an extensive array of malicious webpages. We prove the efficiency and effectiveness of the tool by analyzing almost 0.36 M domains and 3.2 M webpages on a daily basis.

A Study on the Sliding Ball Joint of Parallel Kinematic Mechanism (병렬 운동 기구의 미끄럼 볼 조인트 개발에 관한 연구)

  • Yoo, Dae-Won;Lee, Jai-Hak
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.33 no.9
    • /
    • pp.982-989
    • /
    • 2009
  • Parallel Kinematic Mechanism (PKM) is a device to perform the various motion in three-dimensional space and it calls for six degree of freedom. For example, Parallel Kinematic Mechanism is applied to machine tools, medical equipments, MEMS, virtual reality devices and flight motion simulators. Recently, many companies have tried to develop new Parallel Kinematic Mechanism in order to improve the cycle time and the precisional tolerance. Parallel Kinematic Mechanism uses general universal joint and spherical joint, but such joints have accumulated tolerance problems. Therefore, it causes position control problem and dramatically life time reduction. This paper focused on the rolling element to improve sliding precision in new sliding ball joint development. Before the final design and production, it was confirmed that new sliding ball joint held a higher load and a good geometrical structure. FEM analysis showed a favorable agreement with tensile and compressive testing results by universal testing machine. In conclusions, a new sliding ball joint has been developed to solve a problem of accumulated tolerance and verified using tensile and compressive testing as well as FEM analysis.

A Study on Improvement Stability of Cloud Service using Attack Information Collection (공격정보 수집을 이용한 클라우드 서비스의 안전성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.73-79
    • /
    • 2013
  • Cloud computing is a form which provides IT resources through network and pays the cost as much as you used. And it has advantages that it doesn't need to construct infrastructure and can be offered a variety of environments. The main core of these computing is virtualization technology. Security mechanism about attacks using vulnerabilities of virtualization technology isn't provided right and existing security tools can't be applied as it is. In this paper, we proposed honeyVM structure that can cope actively by collecting the information about attacks using virtualization vulnerability. Mamdani fuzzy inference is used to adjust dynamically the number of formed honeyVM depending on the load of system. Security structure to protect actual virtual machine from attacks and threats is proposed. The performance of the proposed structure in this paper measured occurred attack detection rate and resource utilization rate.

A Tools for Specification of Real-time Property centric Java Virtual Machine Components (실시간 속성 중심의 자바가상머신 명세도구의 설계 및 구현)

  • Ko, Jong-Won;Song, Young-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.257-260
    • /
    • 2004
  • 임베디드 시스템에 탑재될 자바가상머신을 기능별 모듈로 컴포넌트화 하여 이식될 플랫폼의 요구사항에 맞추어 재구성한다면 컴포넌트 기술의 장점인 소프트웨어의 재사용과 재구성을 통한 빠르고 신뢰성있는 자바가상머신 개발이 가능하다. 이러한 자바가상머신 컴포넌트 재구성을 위한 컴포넌트 모델의 정의 및 명세를 위한 지원도구가 필요하며, 명세도구의 지원 하에 보다 시각적인 컴포넌트 구성 및 각 명세요소 정의를 바탕으로 한 자바가상머신 컴포넌트의 재구성에 요구되는 여러 제약조건이나 각 컴포넌트 간의 관계정의 등이 명세 되어질 수 있다. 또한 임베디드 시스템이 가지는 실시간 속성에 대해서 정의하여 이를 명세도구를 통해서 속성명세 및 설계 시에 예측성을 지원하기 위한 WCET 계산이나 우선순위 정의 등을 명세할 수 있다. 따라서, 본 논문에서는 명세방법을 제안하고 실시간 속성 중심의 자바가상머신 컴포넌트 명세도구를 설계하고 구현하였으며, 기존에 제안된 내장형 실시간 컴포넌트 개발 도구와 비교하였다.

  • PDF

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

Classification of HDAC8 Inhibitors and Non-Inhibitors Using Support Vector Machines

  • Cao, Guang Ping;Thangapandian, Sundarapandian;John, Shalini;Lee, Keun-Woo
    • Interdisciplinary Bio Central
    • /
    • v.4 no.1
    • /
    • pp.2.1-2.7
    • /
    • 2012
  • Introduction: Histone deacetylases (HDAC) are a class of enzymes that remove acetyl groups from ${\varepsilon}$-N-acetyl lysine amino acids of histone proteins. Their action is opposite to that of histone acetyltransferase that adds acetyl groups to these lysines. Only few HDAC inhibitors are approved and used as anti-cancer therapeutics. Thus, discovery of new and potential HDAC inhibitors are necessary in the effective treatment of cancer. Materials and Methods: This study proposed a method using support vector machine (SVM) to classify HDAC8 inhibitors and non-inhibitors in early-phase virtual compound filtering and screening. The 100 experimentally known HDAC8 inhibitors including 52 inhibitors and 48 non-inhibitors were used in this study. A set of molecular descriptors was calculated for all compounds in the dataset using ADRIANA. Code of Molecular Networks. Different kernel functions available from SVM Tools of free support vector machine software and training and test sets of varying size were used in model generation and validation. Results and Conclusion: The best model obtained using kernel functions has shown 75% of accuracy on test set prediction. The other models have also displayed good prediction over the test set compounds. The results of this study can be used as simple and effective filters in the drug discovery process.

An Operating Software Architecture for PC-based (PC기반의 생산시스템을 위한 운용소프트웨어 구조)

  • Park, Nam-Jun;Kim, Hong-Seok;Park, Jong-Gu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.1
    • /
    • pp.1196-1204
    • /
    • 2001
  • In this paper, a new architecture of operating software associated with the component-based method is proposed. The proposed architecture comprises 문 execution module and a decision-making module. In order to make effective development and maintenance, the execution module is divided into three components. The components are referred to as Symbol, Gateway, and Control, respectively: The symbol component is for the GUI environments and the standard interfaces; the gateway component is for the network communication and the structure of asynchronous processes; the control component is for the asynchronous processing and machine setting or operations. In order to verify the proposed architecture, and off-line version of operating software is made, and its steps are as follows; I) Make virtual execution modules for the manufacturing devices such as dual-arm robot, handling robot, CNC, and sensor; ii) Make decision-making module; iii) Integrate the modules and GUI using a well-known development tools such as Microsofts Visual Basic; iv) Execute the overall operating software to validate the proposed architecture. The proposed software architecture in this paper has the advantages such as independent development of each module, easy development of network communication, and distributed processing of resources, and so on.

  • PDF

Design and Implementation of Server-based Resource Obfuscation Techniques for Preventing Copyrights Infringement to Android Contents (안드로이드 콘텐츠 저작권 침해 방지를 위한 서버 기반 리소스 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.13-20
    • /
    • 2016
  • Most software is distributed as a binary file format, so reverse engineering is not easy. But Android is based on the Java and running on virtual machine. So, Android applications can be analyzed by reverse engineering tools. To overcome this problem, various obfuscation techniques are developed. In android environment, the Proguard is most widely used because it is included in the Android SDK distribution package. The Proguard can protect the Java source code from reverse engineering analysis. But it has no function to protect resources like images, sounds and databases. In this paper, we proposed and implemented resource obfuscation framework to protect resources of android application. We expect that this framework can protect android resources effectively.