• Title/Summary/Keyword: Virtual System

Search Result 4,633, Processing Time 0.034 seconds

A Detecting Method of Polymorphic Virus Using Advanced Virtual Emulator (개선된 가상 에뮬레이터를 이용한 다형성 바이러스 탐지 방법)

  • Kim, Du-Hyeon;Baek, Dong-Hyeon;Kim, Pan-Gu
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.149-156
    • /
    • 2002
  • Current vaccine program which scans virus code patterns has a difficult to detect the encrypted viruses or polymorphic viruses. The decryption part of polymorphic virus appears to be different every time it replicates. We must monitor the behavior of the decryption code which decrypts the body of the virus in order to detect these kinds of viruses. Specialty, it is not easy for the existing methods to detect the virus if the virus writer has modified the loop count of execution intentionally. In this paper, we propose an advanced emulator using a new algorithm so as to detect various kinds of polymorphic viruses. As a result of experiment using advanced emulator, we found that our proposed method has improved the virus detecting rate about 2%. In addition, our proposed system has a merit that it runs on not only MS-Windows but also Linux, and Unix-like Platform.

End-mill Modeling and Manufacturing Methodology via Cutting simulation (Cutting simulation을 이용한 End-milling cutter의 모델링 및 제작에 관한 연구)

  • Kim J.H.;Park S.J.;Kim J.H.;Park J.W.;Ko T.J.;Kim H.S.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.10a
    • /
    • pp.456-463
    • /
    • 2005
  • This paper describes a design process of end-milling cutters: solid model of the designed cutter is constructed along with computation of cutter geometry, and the wheel geometry as well as wheel positioning data fur fabricating end-mills with required cutter geometry is calculated. In the process, the main idea is to use the cutting simulation method by which the machined shape of an end-milling cutter is obtained via Boolean operation between a given grinding wheel and a cylindrical workpiece (raw stock). Major design parameters of a cutter such as rake angle, inner radius can be verified by interrogating the section profile of its solid model. We studied relations between various dimensional parameters and proposed an iterative approach to obtain the required geometry of a grinding wheel and the CL data fer machining an end-milling cutter satisfying the design parameters. This research has been implemented on a commercial CAD system by use of the API function programming, and is currently used by a tool maker in Korea. It can eliminate producing a physical prototype during the design stage, and it can be used fur virtual cutting test and analysis as well.

  • PDF

A Study on Demand Paging For NAND Flash Memory Storages (NAND 플래시 메모리 저장장치를 위한 요구 페이징 기법 연구)

  • Yoo, Yoon-Suk;Ryu, Yeon-Seung
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.583-593
    • /
    • 2007
  • We study the page replacement algorithms for demand paging, called CFLRU/C, CFLRU/E and DL-CFLRU/E, that reduce the number of erase operations and improve the wear-leveling degree of flash memory. Under the CFLRU/C and CFLRU/E algorithms, the victim page is the least recently used dean page within the pre-specified window. However, when there is not any dean page within the window, the CFLRU/C evicts the dirty page with the lowest frequency while the CFLRU/E evicts the dirty page with the highest number of erase operations. The DL-CFLRU/E algorithm maintains two page lists called the dean page list and the dirty page list, and first finds the page within the dean page list when it selects a victim. However, when it can not find any dean page within the dean page list, it evicts the dirty page with the highest number of erase operations within the window of the dirty page list. In this thesis, we show through simulation that the proposed schemes reduce the number of erase operations and improve the wear-leveling than the existing schemes like LRU.

  • PDF

Customer Recommendation Using Customer Preference Estimation Model and Collaborative Filtering (선호도 추정모형과 협업 필터링기법을 이용한 고객추천시스템)

  • Shin, Taeksoo;Chang, Kun-Nyeong;Park, Youjin
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.4
    • /
    • pp.1-14
    • /
    • 2006
  • This study proposed a customer preference estimation model for production recommendation and a method to enhance the performance of product recommendation using the estimated customer preference information. That is, we suggested customer preference estimation model to estimate exactly customer's product preference with his behavior. This model shows the relationship of customer's behaviors with his preferences. The proposed estimation model is optimized by learning the relative weights of customer's behavior variables to have an effect on his preference and enables to estimate exactly his preference. To validate our proposed models, we collected virtual book store data and then made a comparative analysis of our proposed models and a benchmark model in terms of performance results of collaborative filtering for product recommendation. The benchmark model means a prior preference weighting model. The results of our empirical analysis showed that our proposed model performed better results than the benchmark model.

  • PDF

Design And Implementation of WebDAV Virtual Storage System based on Android (안드로이드 기반의 WebDAV 가상 스토리지 시스템의 설계 및 구현)

  • Kim, Sang-Geon;Byun, Sung-Jun;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.669-671
    • /
    • 2010
  • IStorage is a technology, which can use resources of server PC by using Android Phone supporting wireless internet access. IStorage utilizes resources of server PC through WebDAV protocol. And with GUI interface, Users upload their resources to the server PC and They can perform various kinds of works like Opening, Searching, Deleting and Downloading files. Since it is possible for them to use resources of server PC as if they are originally stored in their mobile devices, there is no limit on using the functions such as watching movies, listening musics and opening document files in real time. We expect this study can to overcome the limitation of storage space and also be a useful technology in the smart phone market.

  • PDF

A Countermeasure Technique for Attack of Reflection SSDP in Home IoT (홈 IoT에서 SSDP 반사체 공격에 대한 대응기법)

  • Park, Kwang-ok;Lee, Jong-Kun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the DDoS attack using the amplifier method makes it difficult to distinguish the normal traffic from the normal server and it is difficult to detect even the attack detection. Since the SSDP protocol is a common protocol widely used in IoT devices, it is used as a DDoS amplification attack. In this paper, we analyze the reflector attack of SSDP which is one of the DDoS and suggest a technical proposal to detect and defend against the attack by managing the Mac address of each device. Also, we propose a control structure to protect the reflection attack of SSDP in Home IoT. The efficiency of the proposed system has been verified by performing an experimental attack on the virtual environment.

The Target Detection and Classification Method Using SURF Feature Points and Image Displacement in Infrared Images (적외선 영상에서 변위추정 및 SURF 특징을 이용한 표적 탐지 분류 기법)

  • Kim, Jae-Hyup;Choi, Bong-Joon;Chun, Seung-Woo;Lee, Jong-Min;Moon, Young-Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.11
    • /
    • pp.43-52
    • /
    • 2014
  • In this paper, we propose the target detection method using image displacement, and classification method using SURF(Speeded Up Robust Features) feature points and BAS(Beam Angle Statistics) in infrared images. The SURF method that is a typical correspondence matching method in the area of image processing has been widely used, because it is significantly faster than the SIFT(Scale Invariant Feature Transform) method, and produces a similar performance. In addition, in most SURF based object recognition method, it consists of feature point extraction and matching process. In proposed method, it detects the target area using the displacement, and target classification is performed by using the geometry of SURF feature points. The proposed method was applied to the unmanned target detection/recognition system. The experimental results in virtual images and real images, we have approximately 73~85% of the classification performance.

A Study on User Presence and Satisfaction according to the Position and Height Difference of 360-degree VR Cameras in Exhibition/Performance VR Content (전시·공연 VR 콘텐츠에서 360도 VR 카메라의 위치와 높이 차이에 따른 사용자 프레즌스 및 만족도에 관한 연구)

  • Kim, Sang-il;Lee, Jae-Hyun
    • Journal of Broadcast Engineering
    • /
    • v.26 no.5
    • /
    • pp.508-518
    • /
    • 2021
  • Recently as a result of covid 19, it has emphasis on the importance of non-contact. VR content has been attracting attention as an alternative to visual arts, media art, new media exhibitions and performances with limited offline activities. Although interest in 360 VR video contents such as VR contents for exhibitions and performances is increasing, research on immersion and satisfaction is focused on games and animation VR contents. In this paper, it verified the effect of the difference in the position and height of the VR camera in exhibitions and performances on the user's presence and satisfaction. For this experiment, the presence and satisfaction were measured after experiencing the VR contents of the convergence exhibition and performance filmed at different locations and heights. As a result of the experiment, the difference of VR camera's position had a significant effect on presence and satisfaction, the difference of VR camera's height had a significant effect only Realistic immersion of the presence.

Ground Station Antenna Pattern Design for Network-Based UAV Command and Control Communication Systems (네트워크 기반 무인기 제어 통신시스템을 위한 지상국 안테나 패턴 설계)

  • Kim, Kyung-Ho;Kim, Hee Wook;Jung, Young-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.384-389
    • /
    • 2021
  • An optimal ground station (GS) antenna pattern design method for network-based UAV command and control communication systems considering complexity and performance is presented. The GS antenna consists of multiple side sectors and one upward sector. The antenna gain for each vertical/horizontal angle of the GS antenna according to the change of antenna design parameters such as the number of sectors, horizontal and vertical beam-width, and tilt-angle is modeled, and the effect of the parameter changes on the signal-to-noise ratio (SNR) distribution in the virtual three-dimensional space is analyzed. It is observed that the tilt-angle of the side sectors has the greatest effect on the performance, and the longer the distance between GSs, the higher the maximum altitude and the smaller the number of side sectors, the tilt-angle should be lower. In addition, it is observed that the wider vertical beam-width of the side sector is advantageous in maximizing the lowest SNR, but narrow vertical beam-width is advantageous in maximizing the average SNR.

Design of Distributed Hadoop Full Stack Platform for Big Data Collection and Processing (빅데이터 수집 처리를 위한 분산 하둡 풀스택 플랫폼의 설계)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.45-51
    • /
    • 2021
  • In accordance with the rapid non-face-to-face environment and mobile first strategy, the explosive increase and creation of many structured/unstructured data every year demands new decision making and services using big data in all fields. However, there have been few reference cases of using the Hadoop Ecosystem, which uses the rapidly increasing big data every year to collect and load big data into a standard platform that can be applied in a practical environment, and then store and process well-established big data in a relational database. Therefore, in this study, after collecting unstructured data searched by keywords from social network services based on Hadoop 2.0 through three virtual machine servers in the Spring Framework environment, the collected unstructured data is loaded into Hadoop Distributed File System and HBase based on the loaded unstructured data, it was designed and implemented to store standardized big data in a relational database using a morpheme analyzer. In the future, research on clustering and classification and analysis using machine learning using Hive or Mahout for deep data analysis should be continued.