• Title/Summary/Keyword: Zmap

Search Result 3, Processing Time 0.017 seconds

An Effective Modeling of Artificial Teeth Single Cores Prostheses (인공 치아 단일 코아 보철물의 효과적인 모델링)

  • Yoo, Kwan-Hee
    • Journal of the Korea Computer Graphics Society
    • /
    • v.8 no.1
    • /
    • pp.13-20
    • /
    • 2002
  • Recently, there is a great demand for artificial teeth prostheses made of the materials which are sintered at $1500^{\circ}C$ such as zirconia ceramic. Since degree of strength of the materials is very high, however, it is very difficult for technicians to manually fabricate the prostheses for these ceramics. So the prostheses have been fabricated by using CNC(computer numerical control) machines. In doing them by using CNC, it is very important that the prostheses satisfying dentists's requirements are accurately modeled into 3D objects. In this paper, we propose an effective method for modeling single cores such as single caps and Conus cores, which are the main those of artificial teeth prostheses. And we also present the visual examples of 3D models for these single cores modeled by the proposed methods. In special, the method has used Minkowski sum and ZMap for modeling the single cores.

  • PDF

Study on Collecting Server Information through Banner Grabbing (배너 그래빙을 통한 서버 정보 수집에 관한 연구)

  • Kang, HongGoo;Kim, HyeonHak;Lee, HyunSeung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1317-1330
    • /
    • 2017
  • To collect server information and construct network map enable us to prevent security breach, prepare for national cyber warfare and make effective policies. In this paper, we analyze well-known network scanners, Nmap and ZMap, and construct network map using banner grabbing. We use multiple threads in order to increase scanning speed and arrange IP lists by specific order to reduce the load on information gathering targets. Also, we applied performance tests to compare the real-time banner grabbing tool with the existing network scanners. As a result, we gathered server information from domestic and overseas servers and derived a risk index based on the collected database. Although there are slight differences among countries, we can identify the risky situation that many users in every country are exposed to several security breaches.

Scan Modeling and Performance Analysis for Extensive Terminal Information Identification (광범위한 단말 정보 식별을 위한 스캔 모델링 및 성능 분석)

  • Im, Sun-young;Shin, Seung-hun;Roh, Byeong-hee;Lee, Jung-tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.785-790
    • /
    • 2017
  • Network scanning tools typically use port scans to steal information from network terminals and identify vulnerabilities. In particular, Shodan and Censys use a network scanning tool to gather a wide range of terminal information, store it in their database and provide it to the users. In order to prevent such information gathering, it is required to know the scanning methods of Shodan and Censys. However, the scanning model used by Shodan and Censys is not known exactly. Therefore, this paper estimates scanning models of Shodan and Censys and analyzes the performance of each models.