• Title/Summary/Keyword: computer software program

Search Result 807, Processing Time 0.026 seconds

An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering (Word2Vec과 가속화 계층적 밀집도 기반 클러스터링을 활용한 효율적 봇넷 탐지 기법)

  • Lee, Taeil;Kim, Kwanhyun;Lee, Jihyun;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.11-20
    • /
    • 2019
  • Numerous enterprises, organizations and individual users are exposed to large DDoS (Distributed Denial of Service) attacks. DDoS attacks are performed through a BotNet, which is composed of a number of computers infected with a malware, e.g., zombie PCs and a special computer that controls the zombie PCs within a hierarchical chain of a command system. In order to detect a malware, a malware detection software or a vaccine program must identify the malware signature through an in-depth analysis, and these signatures need to be updated in priori. This is time consuming and costly. In this paper, we propose a botnet detection scheme that does not require a periodic signature update using an artificial neural network model. The proposed scheme exploits Word2Vec and accelerated hierarchical density-based clustering. Botnet detection performance of the proposed method was evaluated using the CTU-13 dataset. The experimental result shows that the detection rate is 99.9%, which outperforms the conventional method.

A Study on the Abstraction of Movements Based on Laban's Space Theory "Choreutics" (라반의 공간조화이론 "코레우틱스(Choreutics)"를 활용한 움직임의 추상적 시각화 연구)

  • Kim, Hyeran;Lee, Sang Wook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.371-381
    • /
    • 2017
  • This paper presents a methodology for creating abstract animation based on the human movement theories originating from the work of dance theorist Rudolf von Laban. Laban Movement Analysis is a method and language for describing, visualizing, interpreting and documenting all varieties of human movement, and Choreutics is based on universal patterns of nature and of human as part of a universal design. Laban defines the space of movements in a profoundly dualistic way. Outwardly, his objective and scientific definitions provide a concrete base for generating human movements in computer graphics in terms of geometric and motion primitives such as points, lines, planes, polygons, linear and nonlinear movements. On the other hand, he also offers a system for understanding the subtle characteristics about the way a movement is dynamically done with respect to inner intention. Laban's interpretations of human motion can be utilized potentially in plastic arts and computer arts. Our work was inspired by those physical and psychological analyses and computer algorithms have been developed for creating abstract animation. We presented our computer animation works entitled "Choreography" in the exhibitions: a special section in "2015 Craft Trend Fair" and "Make Your Movement" held in the Korean Cultural Centre in UK, 2016. In this paper, we describe our ideas and methods for creating abstract object movements based on the Laban's motion representations.

Implementation of Git's Commit Message Classification Model Using GPT-Linked Source Change Data

  • Ji-Hoon Choi;Jae-Woong Kim;Seong-Hyun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.123-132
    • /
    • 2023
  • Git's commit messages manage the history of source changes during project progress or operation. By utilizing this historical data, project risks and project status can be identified, thereby reducing costs and improving time efficiency. A lot of research related to this is in progress, and among these research areas, there is research that classifies commit messages as a type of software maintenance. Among published studies, the maximum classification accuracy is reported to be 95%. In this paper, we began research with the purpose of utilizing solutions using the commit classification model, and conducted research to remove the limitation that the model with the highest accuracy among existing studies can only be applied to programs written in the JAVA language. To this end, we designed and implemented an additional step to standardize source change data into natural language using GPT. This text explains the process of extracting commit messages and source change data from Git, standardizing the source change data with GPT, and the learning process using the DistilBERT model. As a result of verification, an accuracy of 91% was measured. The proposed model was implemented and verified to ensure accuracy and to be able to classify without being dependent on a specific program. In the future, we plan to study a classification model using Bard and a management tool model helpful to the project using the proposed classification model.

Development and Effects of Intelligent CCTV Algorithm Creative Education Program Using Rich Picture Technique (리치픽처 기법을 적용한 지능형 CCTV 알고리즘 창의교육 프로그램 개발 및 효과)

  • Jung, Yu-Jin;Kim, Jin-Su;Park, Nam-Je
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.125-131
    • /
    • 2020
  • As technology advances, the importance of software education is increasing. Accordingly, interest in information subjects is increasing, but intending elementary learners to show algorithms only for specialized IT skills that could spoil the interest. In this paper for the elementary school students, through the four stages, 2015 revision curriculum analysis, creating of training program development operating plans, applying programs for the targeting students and analysis of results and evaluation, using Rich Picture technique which is various tools such as pictures and speech bubble symbols for the learners can express the intelligent CCTV algorithm freely and easily so they can understand fully about the algorithm of intelligent CCTV that uses artificial intelligence to extract faces from subjects. Suggest on this paper, the proposal of educational program can help the learner to grasp the principle of the algorithm by using the flowchart. As the result, Through the modification and development of the proposed program, we will conduct research on IT creative education that can be applied in various areas.

Development of an Verification System for Enhancing BIM Design Base on Usability (활용성을 고려한 BIM 설계 오류 검증시스템 개발)

  • Yang, Dong-Suk
    • Land and Housing Review
    • /
    • v.8 no.1
    • /
    • pp.23-29
    • /
    • 2017
  • The BIM design is expected to expand to the domestic and overseas construction industries, depending on the effect of construction productivity and quality improvement. However, with the obligation of Public Procurement Service to design the BIM design, it includes a design error and the problem of utilization of 3D design by choosing a simple 2D to 3D remodelling method that can not be modelled in 3D modeling or use of the construction and maintenance phases. The results reviewed by BIM design results were largely underutilized and were not even performed with the verification of the error. In order to resolve this, one must develop the check system that secures the quality of BIM design and ensure that the reliability of BIM results are available. In this study, it is designed to develop a program that can automatically verify the design of the BIM design results such as violation of the rules of the BIM design, design flaws, and improve the usability of the BIM design. In particular, this programs were developed not only to identify programmes that were not commercially available, but also to validate drawings in low-light computer environments. The developed program(LH-BIM) store the information of attribute extracted from the Revit file(ArchiCAD, IFC file included) in the integrated DB. This provides the ability to freely lookup the features and properties of drawings delivered exclusively by the LH-BIM Program without using the Revit tools. By doing so, it was possible to resolve the difficulties of using traditional commercial programs and to ensure that they operate only with traditional PC performance. Further, the results of the various BIM software can be readily validated, which can be solved the conversion process error of IFC in the case of SMC. Additionally, the developed program has the ability to automatically check the error and design criteria of the drawings, as well as the ability to calculate the area estimation. These functions allow businesses to apply simple and easy tasks to operate tasks of BIM modelling. The developed system(LH-BIM) carried out a verification test by reviewing the review of the BIM Design model of the Korea Land & Housing Corporation. It is hoped that the verification system will not only be able to achieve the Quality of BIM design, but also contribute to the expansion of BIM and future construction BIM.

Effects of Computerized Cognitive Training Program Using Artificial Intelligence Motion Capture on Cognitive Function, Depression, and Quality of Life in Older Adults With Mild Cognitive Impairment During COVID-19: Pilot Study (인공지능 동작 인식을 활용한 전산화인지훈련이 코로나-19 기간 동안 경도 인지장애 고령자의 인지 기능, 우울, 삶의 질에 미치는 영향: 예비 연구)

  • Park, Ji Hyeun;Lee, Gyeong A;Lee, Jiyeon;Park, Young Uk;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.12 no.2
    • /
    • pp.85-98
    • /
    • 2023
  • Objective : We investigated the efficacy of an artificial intelligence computerized cognitive training program using motion capture to identify changes in cognition, depression, and quality of life in older adults with mild cognitive impairment. Methods : A total of seven older adults (experimental group = 4, control group = 3) participated in this study. During the COVID-19 period from October to December 2021, we used a program, "MOOVE Brain", that we had developed. The experimental group performed the program 30 minutes 3×/week for 1 month. We analyzed patients scores from the Korean version of the Mini-Mental State Examination-2, the Consortium to Establish a Registry for Alzheimer's Disease Assessment Packet for Daily Life Evaluation, the short form Geriatric Depression Scale, and Geriatric Quality of Life Scale. Results : We observed positive changes in the mean scores of the Stroop Color Test (attention), Stroop Color/Word Test (executive function), SGDS-K (depression), and GQOL (QoL). However, these changes did not reach statistical significance for each variable. Conclusion : The study results from "MOOVE Brain" can help address cognitive and psychosocial issues in isolated patients with MCI during the COVID-19 pandemic or those unable to access in-person medical services.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Application of KOMPSAT-5 SAR Interferometry by using SNAP Software (SNAP 소프트웨어를 이용한 KOMPSAT-5 SAR 간섭기법 구현)

  • Lee, Hoonyol
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.6_3
    • /
    • pp.1215-1221
    • /
    • 2017
  • SeNtinel's Application Platform (SNAP) is an open source software developed by the European Space Agency and consists of several toolboxes that process data from Sentinel satellite series, including SAR (Synthetic Aperture Radar) and optical satellites. Among them, S1TBX (Sentinel-1 ToolBoX)is mainly used to process Sentinel-1A/BSAR images and interferometric techniques. It provides flowchart processing method such as Graph Builder, and has convenient functions including automatic downloading of DEM (Digital Elevation Model) and image mosaicking. Therefore, if computer memory is sufficient, InSAR (Interferometric SAR) and DInSAR (Differential InSAR) perform smoothly and are widely used recently in the world through rapid upgrades. S1TBX also includes existing SAR data processing functions, and since version 5, the processing capability of KOMPSAT-5 has been added. This paper shows an example of processing the interference technique of KOMPSAT-5 SAR image using S1TBX of SNAP. In the open mine of Tavan Tolgoi in Mongolia, the difference between DEM obtained in KOMPSAT-5 in 2015 and SRTM 1sec DEM obtained in 2000 was analyzed. It was found that the maximum depth of 130 meters was excavated and the height of the accumulated ore is over 70 meters during 15 years. Tidal and topographic InSAR signals were observed in the glacier area near Jangbogo Antarctic Research Station, but SNAP was not able to treat it due to orbit error and DEM error. In addition, several DInSAR images were made in the Iraqi desert region, but many lines appearing in systematic errors were found on coherence images. Stacking for StaMPS application was not possible due to orbit error or program bug. It is expected that SNAP can resolve the problem owing to a surge in users and a very fast upgrade of the software.

Analysis of GPS Data between Precise Ephemeris and Broadcast Ephemeris Using GAMIT and LGO (GAMIT과 LGO를 사용한 방송궤도력과 정밀궤도력에 의한 GPS 자료 처리결과의 비교.분석)

  • Joo, Hyun-Seung;Han, Choon-Deuk;Yeu, Yeon;Choi, Seung-Pil
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.6
    • /
    • pp.761-768
    • /
    • 2009
  • GPS data acquired at CORS are widely and rapidly used in many application such as information technology industries. In acquisition of GPS data the establishment of standards of reliability and tolerance error range is necessary. This standards is regarded to contain the requirements of selection of using softwares, precise and broadcast ephemeris, duration of data acquisition, and etc. This study focused to present above standards of tolerance error. In long baseline GPS observation network the RMSE analysed in this study resulted little change when data acquired in 6-hour duration, but the less observation duration resulted less accuracy. Especially in 3-hour observation the accuracy of GPS data decreased rapidly. After analyses of data accuracy in the same observation condition using different computer program between academic and commercial purpose software, the RMSE of academic software resulted less than 1cm compared to 3 to 10cm from commercial software. RMSE analysis between precise ephemeris and broadcast ephemeris resulted similar quantity. Therefore this study regarded to present the reliable establishment of standards of error which can be used in required accuracy in GPS data observation.

System Software Design of Computed Tomography Radiation Dose Management (컴퓨터 단층촬영(CT) 방사선 노출 관리 시스템 소프트웨어 설계)

  • Yang, Yu-mi;Lee, Kil-hung;Cho, Sang-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.489-492
    • /
    • 2014
  • This thesis provides the design of system software for the management of radiation dose that is generated using computer tomography(CT). Because radiation exposure is different depending on the difference in sensitivity to each part for each of the patient's body, if we will be able to manage an appropriate amount of radiation, it is possible to estimate the radiation exposure of the patient as a result. Recently, radiation leakage incident of Japanese nuclear power plant was in the news internationally and there is a growing interest not only a nuclear power plant, to medical radiation exposure. In spite of the fact that currently safety management of radiation is under control only the workers of the radiation involved, exposure management of patients until now have been required. Surgery and inspection using the radiation in Korea will increase, due to this medical exposure has increased, but it is a reality that medical institution don't know the level of radiation exposure applied to the patient. Therefore a system for managing the radiation exposure of the patient from the medical institution is required. This paper proposes a design of a software program to manage the radiation exposure of CT is an typical imaging tool to use the radiation in the medical institution. By check the amount of radiation dose and set the limit of dose, we would help to optimize the medical exposure of the patient.

  • PDF