• Title/Summary/Keyword: computer analysis

Search Result 18,415, Processing Time 0.041 seconds

Comparison of Tools for Static Analysis: Lexical Analysis and Semantic Analysis (정적 분석 툴의 비교: Lexical Analysis and Semantic Analysis)

  • Jang, Seongsoo;Choi, Young-Hyun;Lim, Hun-Jung;Eom, Jung-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1180-1182
    • /
    • 2010
  • 오늘날 소프트웨어를 대상으로 하는 악성코드로부터의 공격이 잦아지면서, 소프트웨어 개발 프로세스에서부터의 보안 취약성 점검이 중요시되고 있다. 본 논문에서는 소프트웨어 보안 취약점 분석 기법 중 하나인 정적 분석에 사용되는 도구들을 살펴보고 비교하여 그 구조 및 특성을 분석 파악한다. 그리하여 우리의 궁극적 목표인 향상된 성능의 새로운 정적 분석 툴 개발의 기반을 마련하고자 한다.

Computer-game Activities, Addiction and Aggression of Middle School Boys (남자청소년의 컴퓨터 게임이용과 게임 중독성 및 공격성)

  • Jung, Yu-Jung;Lee, Sook
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.8
    • /
    • pp.67-80
    • /
    • 2001
  • The purpose of this research was to find the relationships between use of computer games, computer game addiction and middle school boy's aggression. The subjects were 511 boys of 2 middle schools in Kwang-ju, Korea. The method was self-reporting questionnaire. For data analysis, frequency distribution, percentage, Cronbach's u coefficient were estimated. ANOVA, Duncan test, Pearson's coefficient, and multiple regression analysis were used. The major findings of the research are as follows ; First, most boys(91.4%) play computer game more than once in a week. And have over 2 years computer game experience. Second, computer game addiction score and aggression score, in general, tend to be below the mean scores. Third, boys who play computer game activities of high frequency, start play computer game at earner age, spent playing longer times of computer game, and like more on-line game were addicted to the computer game more than who don't. And boys who spent playing long times on computer game were more aggressive than who don't. Fourth, the influencies of computer game activities variables on aggression were not found significantly. But the influencies of computer game addiction were found significantly.'Negative sentiment $.$ sociality' was the most influencial variable on aggression. The influncies of 'Distortion of the reality'and 'Lost of self-control' was followed.

  • PDF

ERROR ANALYSIS USING COMPUTER ALGEBRA SYSTEM

  • Song, Kee-Hong
    • East Asian mathematical journal
    • /
    • v.19 no.1
    • /
    • pp.17-26
    • /
    • 2003
  • This paper demonstrates the CAS technique of analyzing the nature and the structure of the numerical error for education and research purposes. This also illustrates the CAS approach in experimenting with the numerical operations in an arbitrary computer number system and also in doing error analysis in a visual manner.

  • PDF

Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network

  • Li, Wei;Liao, Linfeng;Gu, Dawu;Ge, Chenyu;Gao, Zhiyong;Zhou, Zhihong;Guo, Zheng;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.476-496
    • /
    • 2018
  • With the advancement and deployment of wireless communication techniques, wireless body area network (WBAN) has emerged as a promising approach for e-healthcare that collects the data of vital body parameters and movements for sensing and communicating wearable or implantable healthful related information. In order to avoid any possible rancorous attacks and resource abuse, employing lightweight ciphers is most effective to implement encryption, decryption, message authentication and digital signature for security of WBAN. As a typical lightweight cryptosystem with an extended sponge function framework, the PHOTON family is flexible to provide security for the RFID and other highly-constrained devices. In this paper, we propose a differential fault analysis to break three flavors of the PHOTON family successfully. The mathematical analysis and simulating experimental results show that 33, 69 and 86 random faults in average are required to recover each message input for PHOTON-80/20/16, PHOTON-160/36/36 and PHOTON-224/32/32, respectively. It is the first result of breaking PHOTON with the differential fault analysis. It provides a new reference for the security analysis of the same structure of the lightweight hash functions in the WBAN.

Security Analysis of the Whirlpool Hash Function in the Cloud of Things

  • Li, Wei;Gao, Zhiyong;Gu, Dawu;Ge, Chenyu;Liao, Linfeng;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.536-551
    • /
    • 2017
  • With the advancement and deployment of leading-edge telecommunication technologies for sensing and collecting, computing related information, Cloud of Things (CoTs) has emerged as a typical application platform that is envisioned to revolutionize the daily activities of human society, such as intelligent transportation, modern logistics, food safety, environmental monitoring, etc. To avoid any possible malicious attack and resource abuse, employing hash functions is widely recognized as one of the most effective approaches for CoTs to achieve message integrity and data authentication. The Whirlpool hash function has served as part of the joint ISO/IEC 10118-3 International Standard by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). In this paper, we propose an effective differential fault analysis on Whirlpool in the byte-oriented random fault model. The mathematical analysis and experimental results show that 8 random faults on average are required to obtain the current 512-bit message input of whirlpool and the secret key of HMAC-Whirlpool. Our work demonstrates that Whirlpool and HMAC-Whirlpool are both vulnerable to the single byte differential fault analysis. It provides a new reference for the security analysis of the same structure of the hash functions in the CoTs.

Analysis of Fineblanking Forming using CAE (CAE를 이용한 파인블랭킹 성형 해석)

  • Lee, K.Y.;Nam, K.W.
    • Journal of Power System Engineering
    • /
    • v.15 no.4
    • /
    • pp.60-64
    • /
    • 2011
  • Computer-aided engineering (CAE) is the broad usage of computer software to aid in engineering tasks. It includes computer-aided design (CAD), computer-aided analysis (CAA), computer-integrated manufacturing (CIM), computer-aided manufacturing (CAM), material requirements planning (MRP), and computer-aided planning (CAP). In this study, the stress of mold analyzed using CAE technique. Punch loads were same difference between 0.5 % and 1.0 % of clearance, but punch load was decreased according to increasing of clearance. Punch load of pre-piercing process worked a little smaller than piercing process. Therefore, the hole of fine blanking process is also more efficient to manufacture the true size after pre-piercing.

Worm Virus Modeling and Simulation Methodology Using Artificial Life. (인공생명기반의 웜 바이러스 모델링 및 시뮬레이션 방법론)

  • Oh Ji-yeon;Chi Sung-do
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.171-179
    • /
    • 2005
  • Computer virus modeling and simulation research has been conducted with focus on the network vulnerability analysis. However, computer virus generally shows the biological virus characters such as proliferation, reproduction and evolution. Therefore it is necessary to research the computer virus modeling and simulation using Artificial Life. The approach of computer modeling and simulation using the Artificial Life technology Provides the efficient analysis method for the effects on the network by computer virus and the behavioral mechanism of the computer virus. Hence this paper proposes the methodology of computer virus modeling and simulation using Artificial Life, which may be contribute the research on the computer virus vaccine.

  • PDF

A Visualization Scheme with a Calendar Heat Map for Abnormal Pattern Analysis in the Manufacturing Process

  • Chankhihort, Doung;Lim, Byung-Muk;Lee, Gyu-Jung;Choi, Sungsu;Kwon, Sun-Ock;Lee, Sang-Hyun;Kang, Jeong-Tae;Nasridinov, Aziz;Yoo, Kwan-Hee
    • International Journal of Contents
    • /
    • v.13 no.2
    • /
    • pp.21-28
    • /
    • 2017
  • Abnormal data in the manufacturing process makes it difficult to find useful information that can be applied in data management for the manufacturing industry. It causes various problems in the daily process of production. An issue from the abnormal data can be handled by our method that uses big data and visualization. Visualization is a new technology that transforms data representation into a two-dimensional representation. Nowadays, many newly developed technologies provide data analysis, algorithm, optimization, and high efficiency, and they meet user requirements. We propose combined production of the data visualization approach that uses integrative visualization of sources of abnormal pattern analysis results. The perceived idea of the proposed approach can solve the problem as it also works for big data. It can also improve the performance and understanding by using visualization and solving issues that occur in the manufacturing process with a calendar heat map.

A Study on the Computer Aided Design and Process Planning (설계 및 가공공정계획 의 전산자동화 에 관한 연구)

  • 조선휘;이장무;이교일;정진태
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.9 no.5
    • /
    • pp.647-654
    • /
    • 1985
  • A computer aided design package is developed that can perform such functions as computer aided inputing/drafting/modifying/outputing, automatic determination of volumetric properties, finite element analysis and post processing for the design of axisymmetric shell with slight asymmetry. In order to make the design modification easy and to accelerate the computation time for analysis, developed is a new finite element analysis which utilizes an approximate solution method and a conical ring eleement with slight asymmetry. Also proposed is a computer aided process planning algorithm which is based on the axiomatic approach.

1H*-tree: An Improved Data Cube Structure for Multi-dimensional Analysis of Data Streams (1H*-tree: 데이터 스트림의 다차원 분석을 위한 개선된 데이터 큐브 구조)

  • XiangRui Chen;YuXiang Cheng;Yan Li;Song-Sun Shin;Dong-Wook Lee;Hae-Young Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.332-335
    • /
    • 2008
  • In this paper, based on H-tree, which is proposed as the basic data cube structure for multi-dimensional data stream analysis, we have done some analysis. We find there are a lot of redundant nodes in H-tree, and the tree-build method can be improved for saving not only memory, but also time used for inserting tuples. Also, to facilitate more fast and large amount of data stream analysis, which is very important for stream research, H*-tree is designed and developed. Our performance study compare the proposed H*-tree and H-tree, identify that H*-tree can save more memory and time during inserting data stream tuples.