• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.035 seconds

A Plagiarism Detection Technique for Java Program Using Bytecode Analysis (바이트코드 분석을 이용한 자바 프로그램 표절검사기법)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.442-451
    • /
    • 2008
  • Most plagiarism detection systems evaluate the similarity of source codes and detect plagiarized program pairs. If we use the source codes in plagiarism detection, the source code security can be a significant problem. Plagiarism detection based on target code can be used for protecting the security of source codes. In this paper, we propose a new plagiarism detection technique for Java programs using bytecodes without referring their source codes. The plagiarism detection procedure using bytecode consists of two major steps. First, we generate the token sequences from the Java class file by analyzing the code area of methods. Then, we evaluate the similarity between token sequences using the adaptive local alignment. According to the experimental results, we can find the distributions of similarities of the source codes and that of bytecodes are very similar. Also, the correlation between the similarities of source code pairs and those of bytecode pairs is high enough for typical test data. The plagiarism detection system using bytecode can be used as a preliminary verifying tool before detecting the plagiarism by source code comparison.

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

Design and Implementation of Multimedia CAI Program for Learning about Electricity in the Mechanics Curriculum (기술과 전기 학습을 위한 멀티미디어 CAI 프로그램 설계 및 구현)

  • Lee, Hyae-Joung;Shin, Hyun-Cheul;Joung, Suck-Tae
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.9-16
    • /
    • 2007
  • In today's society, the paradigm is converted to information where both this and knowledge become the source of value added. In order to answer societies' needs school education is subject to a large change, that is 'from supplier-centered learners to demand-centered learners'. This study is the design and implementation of multimedia CAI program for learning about electricity in the meddle school the mechanics curriculum with a focus in generating electricity. Based on multimedia, software, educational utilization of the multimedia, CAI, learning theory and form, both technology and multimedia elements related to curriculum are analyzed. This title is composed of object, contents, evaluation and related sites every chapter for students to study. Also, it is designed for students to take interest and participate in the learning process actively by combining lots of media such as characters, sound, images and animation. Specially it is composed in a way of repetition according to the student's level.

  • PDF

A Development of Intelligent Pumping Station Operation System Using Deep Reinforcement Learning (심층 강화학습을 이용한 지능형 빗물펌프장 운영 시스템 개발)

  • Kang, Seung-Ho;Park, Jung-Hyun;Joo, Jin-Gul
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.33-40
    • /
    • 2020
  • The rainwater pumping station located near a river prevents river overflow and flood damages by operating several pumps according to the appropriate rules against the reservoir. At the present time, almost all of rainwater pumping stations employ pumping policies based on the simple rules depending only on the water level of reservoir. The ongoing climate change caused by global warming makes it increasingly difficult to predict the amount of rainfall. Therefore, it is difficult to cope with changes in the water level of reservoirs through the simple pumping policy. In this paper, we propose a pump operating method based on deep reinforcement learning which has the ability to select the appropriate number of operating pumps to keep the reservoir to the proper water level using the information of the amount of rainfall, the water volume and current water level of the reservoir. In order to evaluate the performance of the proposed method, the simulations are performed using Storm Water Management Model(SWMM), a dynamic rainfall-runoff-routing simulation model, and the performance of the method is compared with that of a pumping policy being in use in the field.

Development Software to Select Boundary Manikins for Product Evaluation: Applied to an Automobile Case (사용성 평가 전용 인체모델 선정 소프트웨어 개발 및 자동차 적용사례)

  • Lim, Young-Jae;Park, Sung-Joon;Park, Woo-Jin;Park, Jun-Soo;Jung, Eui-S.;Lim, Ik-Sung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.6
    • /
    • pp.831-841
    • /
    • 2010
  • Usability evaluation of physical products involves characterizing complex physical interactions between humans and products. Human models known as manikins have been widely utilized as usability evaluation tools for automobile interior package design. When combined with computer-aided design software programs, such manikins can be used to simulate driving postures and evaluate driver-interior fits early in the design process, and therefore, may greatly facilitate achieving high-quality design in a cost-efficient manner. The purpose of this study was to define a set of manikins for designing automobile interior packages for the South Korean male population. These manikins were conceptualized as "boundary" manikins, which represent individuals lacking in certain physical capacities or having usability-related issues (e.g., an individual with the 5th percentile forward reach capability, an individual with the 95th percentile shoulder width). Such boundary manikins can serve as an efficient tool for determining if an automobile interior design accommodates the majority of the population. The boundary manikins were selected from the large sample of Korean males whose anthropometric dimensions were described in the recent Size Korea anthropometric database. For each male in the database, his comfortable driving posture was represented using a kinematic body linkage model and various physical capacity measured and usability-related characteristics relevant to driver accommodation were evaluated. For each such measure, a boundary manikin was selected among the Korean males. The manikins defined in this study are expected to serve as tools for ergonomic design of automobile interior packages. The manikin selection method developed in this study was implemented as a generic software program useful for various product design applications.

Mobile exercise monitoring for personalized exercise prescription (맞춤형 운동처방을 위한 모바일 운동 모니터링)

  • Kang, Sunyoung;Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.23-28
    • /
    • 2015
  • This study was carried out the exercise monitoring utilizing mobile device which is easily accessible and personalized exercise prescription based on it. For this, a variety of exercise monitoring and status of those were investigated and suggested the potential of personalized exercise prescription. If individual users send their body and vital informations using a mobile device, all informations are collected in u-Fitness center. After then exercise expert provide a customized prescription based on the collected information and feed data into database of u-Fitness center. System of U-Fitness center will provide the best personalized exercise prescription by automatically connecting to the content providers. In the future, a variety of mobile devices and services will work together and it can be evolved as an open platform that can be used for multiple services according to the needs of individual users on a single platform.

Fingerprint Identification Algorithm using Pixel Direction Factor in Blocks (블록별 화소방향성분을 이용한 지문의 동일성 판별 알고리즘)

  • Cho Nam-Hyung;Lee Joo-Shin
    • The KIPS Transactions:PartB
    • /
    • v.12B no.2 s.98
    • /
    • pp.123-130
    • /
    • 2005
  • In this paper, fingerprint identification algorithm using pixel direction factor in blocks is proposed to minimize false acceptance ratio and to apply security system. The proposed algorithm is that a fingerprint image is divided by 16 blocks, then feature parameters which have direct factors of $0^{\circ},\;45^{\circ},\;90^{\circ}\;and\;135^{\circ}$ is extracted for each block. Membership function of a reference fingerprint and an input fingerprint for the extracted parameters is calculated, then identification of two fingerprint is distinguished using fuzzy inference. False acceptance ratio is evaluated about different fingerprints of In kinds regardless of sex and shape which are obtained from adults, and false rejection ratio is evaluated about fingerprints which are obtained by adding fingerprints of 10 kinds on different fingerprints of 100 kinds. The experiment results is that false acceptance ratio is average $0.34\%$ about experiment of 4,950 times, and false rejection ratio is average $3.7\%$ about experiment of 1,000 times. The proposed algerian is excellent for recognition rate and security.

LDCSIR: Lightweight Deep CNN-based Approach for Single Image Super-Resolution

  • Muhammad, Wazir;Shaikh, Murtaza Hussain;Shah, Jalal;Shah, Syed Ali Raza;Bhutto, Zuhaibuddin;Lehri, Liaquat Ali;Hussain, Ayaz;Masrour, Salman;Ali, Shamshad;Thaheem, Imdadullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.463-468
    • /
    • 2021
  • Single image super-resolution (SISR) is an image processing technique, and its main target is to reconstruct the high-quality or high-resolution (HR) image from the low-quality or low-resolution (LR) image. Currently, deep learning-based convolutional neural network (CNN) image super-resolution approaches achieved remarkable improvement over the previous approaches. Furthermore, earlier approaches used hand designed filter to upscale the LR image into HR image. The design architecture of such approaches is easy, but it introduces the extra unwanted pixels in the reconstructed image. To resolve these issues, we propose novel deep learning-based approach known as Lightweight deep CNN-based approach for Single Image Super-Resolution (LDCSIR). In this paper, we propose a new architecture which is inspired by ResNet with Inception blocks, which significantly drop the computational cost of the model and increase the processing time for reconstructing the HR image. Compared with the other state of the art methods, LDCSIR achieves better performance in terms of quantitively (PSNR/SSIM) and qualitatively.

Integrating ICT in the Sudanese Kindergartens by Means of Developing a Computerized Application for The Pre-School Education, In Order to Improve Cognitive Development:

  • MOHAMMED, AMGAD ATTA ABDELMAGEED;DRAR, SUHANDA SAFALDEEN MOHAMMED;HILAL, ANWER MUSTAFA;CHRISTENSEN, LARS RUNE
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.597-603
    • /
    • 2021
  • The current Sudanese preschool system depends on limited methods of education, children's education needs to be equipped to keep pace with technological development, also, the large gap that exists between the families and the Kindergartens, where many parents have no idea on how their child progresses in the KG context. The aim of this research is to integrate ICT in the preschool education to enhance and improve the preschool education, by building an Integrated Educational Application (Computerized Application for Preschool Education CAPE) which will help to improve the learning outcomes. The researchers used the Experimental Research Methodology, the characteristic of CAPE application is; suitable for children's age, the application style is more attractive to the children and contains a different way to help children get learning. Alawaeel and the Smart Child Kindergartens in Republic of Sudan were selected as a sample of the study, with sample size specifically, 50 children's. Also, the Central Bank of Sudan Kindergarten was selected as one of the institutional Kindergartens for easy communication with parents of children with a sample size 21 children. The study found that; using CAPE application in KG enables children to increase general learning effects and developing child's cognitive skills. Also, the children who were allowed to use CAPE by their parents are performed better in the overall evaluation of KG lessons. Also, using the CAPE in the Pre-School education helps the parents following their children's progress better and more reliable. The researcher recommends that to apply the computerized application and includes the second level. Also, converting the computerized program into an application to be used by children by their self, without the intervention of parents.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.