• 제목/요약/키워드: code complexity

검색결과 594건 처리시간 0.022초

소스코드 취약성 분류를 위한 기계학습 기법의 적용 (Application of Machine Learning Techniques for the Classification of Source Code Vulnerability)

  • 이원경;이민주;서동수
    • 정보보호학회논문지
    • /
    • 제30권4호
    • /
    • pp.735-743
    • /
    • 2020
  • 시큐어코딩은 악의적인 공격 혹은 예상치 못한 오류에 대한 강인함을 제공해줄 수 있는 안전한 코딩 기법으로 정적분석도구의 지원을 통해 취약한 패턴을 찾아내거나 오염 데이터의 유입 가능성을 발견한다. 시큐어코딩은 정적기법을 적극적으로 활용하는 만큼 룰셋에 의존적이라는 단점을 가지며, 정적분석 도구의 복잡성이 높아지는 만큼 정확한 진단이 어렵다는 문제점을 안고 있다. 본 논문은 시큐어코딩을 지원하는 목적으로 기계학습 기법 중 DNN과 CNN, RNN 신경망을 이용하여 개발보안가이드 상의 주요 보안약점에 해당하는 패턴을 학습시키고 분류하는 모델을 개발하며 학습 결과를 분석한다. 이를 통해 기계학습 기법이 정적분석과 더불어 보안약점 탐지에 도움을 줄 수 있을 것으로 기대한다.

효율성과 정확도 향상을 위한 MR 영상에서의 뇌 외곽선 추출 기법 개발 (Development of an Extraction Method of Cortical Surfaces from MR Images for Improvement in Efficiency and Accuracy)

  • 안광옥;정현교
    • 대한의용생체공학회:의공학회지
    • /
    • 제28권4호
    • /
    • pp.549-555
    • /
    • 2007
  • In order to study cortical properties in human, it is necessary to obtain an accurate and explicit representation of the cortical surface in individual subjects. Among many approaches, surface-based method that reconstructs a 3-D model from contour lines on cross-section images is widely used. In general, however, medical brain imaging has some problems such as the complexity of the images, non-linear gain artifacts and so on. Due these limitations, therefore, extracting anatomical structures from imaging data is very a complicated and time-consuming task. In this paper, we present an improved method for extracting contour lines of cortical surface from magnetic resonance images that simplifies procedures of a conventional method. The conventional method obtains contour lines through thinning and chain code process. On the other hand, the proposed method can extract contour lines from comparison between boundary data and labeling image without supplementary processes. The usefulness of the proposed method has been verified using brain image.

삼단중유연소 버너에서 다단비가 연소현상에 미치는 영향에 대한 수치 연구 (Numerical study on the effects of air staging on combustion in the three air stage heavy oil fired combustion system)

  • 이승수;김혁주;박병식;김종진;최규성
    • 한국연소학회:학술대회논문집
    • /
    • 한국연소학회 2004년도 제28회 KOSCO SYMPOSIUM 논문집
    • /
    • pp.235-241
    • /
    • 2004
  • Computations were performed to investigate the effects of air staging on combustion in three stage heavy-oil fired combustion burner. The burner was designed for 3 MW. Different amounts of air are introduced into each 3 three stages by means of each dampers. The goal of the study is to understand combustion phenomena according to each air stage mass ratios through CFD. Air flow rates at three inlets are adjusted by dampers inside a burner. Here, injection conditions of liquid fuel are kept constant throughout all simulations. This assumption is made in order to limit the complexity of oil combustion though it may cause some disagreement. In case of cold flows, only longitudinal velocities arc considered, On the other hand, flow, temperature and NOx generations are taken into account for reactive flows. Simple parametric study was conducted by setting 1'st air stage mass ratio as a parameter. And an optimal operation condition was found. The computational study is based on k-e model, P-1 radiation model(WSGGM) and PDF, and is implemented on a commercial code, FLUENT.

  • PDF

구조적 LDPC 부호의 효율적인 설계 (Efficient Design of Structured LDPC Codes)

  • 정비웅;김준성;송홍엽
    • 한국통신학회논문지
    • /
    • 제31권1C호
    • /
    • pp.14-19
    • /
    • 2006
  • LDPC 부호의 높은 부호화 복잡도는 구조적인 패리티 검사 행렬의 설계로 해결할 수 있다. 패리티 검사 행렬을 같은 유형의 블록으로 구성한다면 복호화기의 구현이 간단해지고 구조적 복호화가 가능하며 LDPC 부호를 저장하는데 필요한 메모리를 줄일 수 있는 장점이 있다. 본 논문에서는 부행렬 단위의 girth 조건과 PEG 알고리즘, 비트 노드의 connectivity를 이용하여 부행렬이 순환행렬이나 영행렬로 구성되는 짧은 길이를 갖는 구조적 LDPC 부호의 생성 알고리즘을 제안하였다. 이 알고리즘으로 생성된 부호는 구조적 제한이 없이 생성된 부호에 비하여 낮은 SNR에서는 비슷한 성능을, 높은 SNR에서는 더 좋은 성능을 내는 것을 모의 실험을 통해 확인하였다.

Energy Efficient Cooperative LEACH Protocol for Wireless Sensor Networks

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • Journal of Communications and Networks
    • /
    • 제12권4호
    • /
    • pp.358-365
    • /
    • 2010
  • We develop a low complexity cooperative diversity protocol for low energy adaptive clustering hierarchy (LEACH) based wireless sensor networks. A cross layer approach is used to obtain spatial diversity in the physical layer. In this paper, a simple modification in clustering algorithm of the LEACH protocol is proposed to exploit virtual multiple-input multiple-output (MIMO) based user cooperation. In lieu of selecting a single cluster-head at network layer, we proposed M cluster-heads in each cluster to obtain a diversity order of M in long distance communication. Due to the broadcast nature of wireless transmission, cluster-heads are able to receive data from sensor nodes at the same time. This fact ensures the synchronization required to implement a virtual MIMO based space time block code (STBC) in cluster-head to sink node transmission. An analytical method to evaluate the energy consumption based on BER curve is presented. Analysis and simulation results show that proposed cooperative LEACH protocol can save a huge amount of energy over LEACH protocol with same data rate, bit error rate, delay and bandwidth requirements. Moreover, this proposal can achieve higher order diversity with improved spectral efficiency compared to other virtual MIMO based protocols.

MIMO-OFDM 시스템에서 Walsh 부호화된 훈련 신호를 이용한 시간 영역 채널 추정 방식 (Walsh Coded Training Signal Aided Time Domain Channel Estimation Scheme In MIMO-OFDM Systems)

  • 전형구;장종욱;송형규
    • 한국통신학회논문지
    • /
    • 제32권3C호
    • /
    • pp.331-337
    • /
    • 2007
  • 본 논문에서는 MIMO-OFDM 시스템에서 월쉬 부호화된 훈련신호를 이용하는 새로운 채널 추정 방식을 제안하였다. 월쉬 부호화된 훈련신호는 시간 영역에서 서로 직교하도록 설계된다. 이러한 직교성을 이용하여 월쉬 디코딩을 수행하면 시간 영역에서 원하는 훈련 신호를 분리할 수 있고 채널 추정이 가능하다. 컴퓨터 시뮬레이션 결과 제안된 방법은 계산량 감소에도 불구하고 최적 훈련 신호를 사용하는Li의 원래 방법[4]과 비교했을 때 거의 동일한 mean square error (MSE) 성능을 보였다.

DEVELOPMENT OF GEOLGOCIAL SYMBOL MAPPING TOOL

  • Yeon, Young-Kwang;Han, Jong-Gyu;Chi, Kwang-Hoon
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2006년도 Proceedings of ISRS 2006 PORSEC Volume II
    • /
    • pp.896-898
    • /
    • 2006
  • Geological symbols are used for describing geological information. But it's not ease to represent them in commercial GIS s/w, because of their complexity and diversity. This study aims at developing the geological symbol mapping tool for representing geological symbol on user's geological information. Geological symbol mapping too is a web application which can handle SHP format and map geological symbols based on user's requests. It manages geological symbols and mapping codes and symbols are mapped within the geological boundary according to the corresponding non-spatial field that is a mapping code. The system has functions to upload a user's GIS file, and download the converted image file which is mapped geological patterns. The system displays converted images to be check mapping results. Because the symbols are simple bitmap files, user(system manager) can design and apply them rapidly without considering specific commercial S/W. Thus, it is expected that this system plays an important role to disseminate geological standards such as geological symbols. And the results of this study can be used for developing global geological symbols and applying them easily

  • PDF

빠른 레일리 페이딩채널에서 MTCM 부호와 STBC를 결합한 시스템의 성능평가 (Performance of the Concatenated System of MTCM Codes with STBC on Fast Rayleigh Fading Channels)

  • 진익수
    • 한국ITS학회 논문지
    • /
    • 제8권6호
    • /
    • pp.141-148
    • /
    • 2009
  • STBC는 부호이득을 얻을 수 없지만, 비교적 적은 부호기와 복호기의 복잡도를 가지고 완전한 다이버시티 이득을 얻을 수 있다. 따라서 STBC는 부호이득이 없기 때문에 부호이득을 얻을 수 있는 외부 부호와 결합되어 사용하여야 한다. 본 논문에서는 완전한 다이버시티 이득과 함께 상당한 부호이득을 얻기 위하여, MTCM부호와 STBC를 결합한 시스템을 고려하였다. 공정한 성능 비교를 위하여 동일한 전송 전력, 동일한 대역폭 효율 그리고 동일한 상태 수를 전제하고, 고려한 시스템과 기존에 알려진 STTC부호와 FER 성능 비교를 실시하였다. 모의실험 결과, MTCM부호와 STBC를 결합한 시스템의 성능은 빠른 레일리 페이딩 채널에서 2개의 송신기 안테나와 1개의 수신기 안테나를 사용하는 STTC부호 보다 우수한 성능을 보여주었다.

  • PDF

Novel Multiple Access Schemes for IEEE 802.15.4a Low-rate Ultra-wide Band Systems

  • 휘빙;장홍;장경희
    • 한국통신학회논문지
    • /
    • 제35권7A호
    • /
    • pp.682-687
    • /
    • 2010
  • The IEEE 802.15.4a specification targets the low-rate (LR) Impulse-radio (IR) ultra-wideband (UWB) system which is now widely applied in the WPANs considering rather short distance communications with low complexity and power consumption. The physical (PHY) layer uses concatenated coding with mixed binary phase-shift keying and binary pulse-position modulation (BPSK-BPPM), and direct sequence spreading with time hopping in order that both coherent and non-coherent receiver architectures are supported. In this paper, the performances of multiple access schemes compliant with IEEE 802.15.4a specification are investigated with energy detection receiver, which allow avoiding the complex channel estimation needed by a coherent receiver. However, the performance of energy detection receiver is severely degraded by multi-user interference (MUI), which largely diminishes one of the most fascinating advantages of UWB, namely robustness to MUI as well as the possibility to allow parallel transmissions. So as to improve the performance of multiple access schemes, we propose to apply the novel TH sequences as well as to increase the number of TH positions. The simulation results show that our novel multiple access schemes significantly improve the performance against MUI.

전자상거래를 위한 128비트 블록 암호 알고리즘의 구현 (An Implementation of 128bit Block Cipher Algorithm for Electronic Commerce)

  • 서장원;전문석
    • 한국전자거래학회지
    • /
    • 제5권1호
    • /
    • pp.55-73
    • /
    • 2000
  • Recently; EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done on the cyber space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher algorithm. NC(Nonpolynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 128bits key length for input, output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption. The result of simulation by the comparison with other cipher algorithm for capacity evaluation of proposed NC cipher algorithm is that the speed of encryption and decryption is 7.63 Mbps per block and the speed of subkey generation is 2,42 μ sec per block. So, prosed NC cipher algorithm is regarded as proper level for encryption. Furthermore, speed of subkey generation shows that NC cipher algorithm has the probability used to MAC(Message Authentication Code) and block implementation of Hash function.

  • PDF