• Title/Summary/Keyword: tool trace

Search Result 138, Processing Time 0.027 seconds

Implementation of Dynamic Event Analysis Tool for J2ME Programs (J2ME 프로그램의 동적 이벤트 분석기의 구현)

  • Choi Yoon-Jeong;Chang Byeong-Mo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.802-809
    • /
    • 2006
  • J2ME mobile programs have been widely used as mobile devices like mobile phones become popular. Efficient use of resources in mobile programs is very important because mobile programs are executed in mobile environment with insufficient resources. Moreover, most J2ME programs are event-driven, so effective event handling is important for reliability and efficient use of resource. In this research, we develop a dynamic event analysis system, which can show event handling in real-time. In this system, users can trace only interesting events by selecting some options, and can get event profile after execution.

The Contribution of Social Media Value to Company's Financial Performance: Empirical Evidence from Indonesia

  • MIQDAD, Muhammad;OKTAVIANI, Siska Aprilia
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.305-315
    • /
    • 2021
  • This article aims to explore the contribution of social media value to a company's financial performance in a digital environment economy since the awareness of companies and investors in the use of social media opens up new mechanisms for disseminating information. Quantitative method is used in this study with Multivariate Analysis of Variance as the analysis tool. The data used is secondary data gathered from Indonesia Stock Exchange (IDX) using 308 companies as samples. In the multivariate test, four kinds of multivariate significance tests were carried out, namely Pillai Trace, Wilk Lambda, Hotelling's Trace, and Roy's Largest Root. It was found that social media value has a small contribution in the difference of the level of profitability and the value of the company in Indonesia, but it doesn't have a contribution to the difference of the level of liquidity. The contribution was an implication of online Word of Mouth (WOM) motives which are interrelated with signal theory and as additional information for investors in relation to single-person decision theory. This study provides an insight into the importance of social media management considering that the world of digital economy will continue to develop, so companies in Indonesia need to take advantage of these opportunities.

Design and Implementation of a Scalable Framework for Parallel Program Performance Visualization (병렬 프로그램 성능가시화를 위한 확장성 있는 프레임워크 설계 및 구현)

  • Moon, Sang-Su;Moon, Young-Shik;Kim, Jung-Sun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.109-120
    • /
    • 2001
  • In this paper, we propose the design and implementation of a portable, extensible, and efficient performance visualization framework for high performance parallel program development. The framework adopts a layered architecture:consists of three independent layers instrumentation layer, trace interface layer and visualization layer. The instrumentation layer was constructed as an ECL which captures generated events, and the EDL/JPAL constitutes the trace interface layer to provide problem-oriented interfaces between visualization layer and instrumentation layer. Finally, the visualization layer was designed as plug-and-play style for easy elimination, addition and composition of various filters, views and view groups, The proposed performance visualization framework is expected to be used as an independent performance debugging and analysis tool and as a core component in an integrated parallel programming environment.

  • PDF

Automatic detection of discontinuity trace maps: A study of image processing techniques in building stone mines

  • Mojtaba Taghizadeh;Reza Khalou Kakaee;Hossein Mirzaee Nasirabad;Farhan A. Alenizi
    • Geomechanics and Engineering
    • /
    • v.36 no.3
    • /
    • pp.205-215
    • /
    • 2024
  • Manually mapping fractures in construction stone mines is challenging, time-consuming, and hazardous. In this method, there is no physical access to all points. In contrast, digital image processing offers a safe, cost-effective, and fast alternative, with the capability to map all joints. In this study, two methods of detecting the trace of discontinuities using image processing in construction stone mines are presented. To achieve this, we employ two modified Hough transform algorithms and the degree of neighborhood technique. Initially, we introduced a method for selecting the best edge detector and smoothing algorithms. Subsequently, the Canny detector and median smoother were identified as the most efficient tools. To trace discontinuities using the mentioned methods, common preprocessing steps were initially applied to the image. Following this, each of the two algorithms followed a distinct approach. The Hough transform algorithm was first applied to the image, and the traces were represented through line drawings. Subsequently, the Hough transform results were refined using fuzzy clustering and reduced clustering algorithms, along with a novel algorithm known as the farthest points' algorithm. Additionally, we developed another algorithm, the degree of neighborhood, tailored for detecting discontinuity traces in construction stones. After completing the common preprocessing steps, the thinning operation was performed on the target image, and the degree of neighborhood for lineament pixels was determined. Subsequently, short lines were removed, and the discontinuities were determined based on the degree of neighborhood. In the final step, we connected lines that were previously separated using the method to be described. The comparison of results demonstrates that image processing is a suitable tool for identifying rock mass discontinuity traces. Finally, a comparison of two images from different construction stone mines presented at the end of this study reveals that in images with fewer traces of discontinuities and a softer texture, both algorithms effectively detect the discontinuity traces.

Potential Human Health and Fish Risks Associated with Hypothetical Contaminated Sediments Using a Risk Assessment Model ($TrophicTrace^{(R)}$) (위험평가모형($TrophicTrace^{(R)}$)을 이용한 가상 해양오염퇴적물의 쥐노래미와 인체 영향 예비평가)

  • Yang, Dong-Beom;Hong, Gi-Hoon;Kim, Kyung-Ryon
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.33 no.1
    • /
    • pp.60-70
    • /
    • 2011
  • The sediment removal index derived from the chemical contaminants, $CI_{HC}$, is currently in use to identify and define the spatial extent of the contaminated sediments in the sea. In order to analyze the sensitivity of the ecological and human risk associated with contaminated sediment, we evaluated five hypothetical contaminated sediments, whose $CI_{HC}$ values are identical but consisted of different contaminant contents, using $TrophicTrace^{(R)}$ model dedicated to evaluate sediment risk, against the resident greenling (Hexagrammos otakii) and humans by calculating No-Observed-Adverse-Effect-Level based Toxicity Quotient (NOAEL TQ) and Lowest-Observed-Adverse-Effect-Level based Toxicity Quotient (LOAEL TQ), and cancer risks and hazard indices (HI), respectively, based on the site conceptual model and exposure assumptions of fish ingestion to human receptor populations. NOAEL and LOAEL TQ values varied as much as a factor of 2 among 5 hypothetical sediments. Chemical element specific contribution to the carcinogenic risk and HI varied also greatly in these sediments. The reason for this significant dissimilarity in ecological and human risk stems from the different risk of each contaminant to the resident fish and human receptor. When the conceptual food web model is constructed for the target biological species for a given site, the ecological and human risk analysis considering trophic transfer of contaminants will add a ecosystem based tool for the management of contaminated sediments.

Analysis of Virtualization Obfuscated Executable Files and Implementation of Automatic Analysis Tool (가상화 난독화 기법이 적용된 실행 파일 분석 및 자동화 분석 도구 구현)

  • Suk, Jae Hyuk;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.709-720
    • /
    • 2013
  • Virtualization obfuscation makes hard to analyze the code by applying virtualization to code section. Protected code by common used virtualization obfuscation technique has become known that it doesn't have restored point and also it is hard to analyze. However, it is abused to protect malware recently. So, It is been hard to analyze and take action for malware. Therefore, this paper's purpose is analyze and take action for protected malware by virtualization obfuscation technique through implement tool which can extract virtualization structure automatically and trace execution process. Hence, basic structure and operation process of virtualization obfuscation technique will be handled and analysis result of protected malware by virtualization obfuscation utilized Equation Reasoning System, one kind of program analysis. Also, we implement automatic analysis tool, extract virtualization structure from protected executable file by virtualization obfuscation technique and deduct program's execution sequence.

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF

Implementation of Autonomous Intrusion Analysis Agent(AIAA) and Tool for using Intruder Retrace (인터넷 해킹피해 시스템자동분석에이젼트(AIAA) 및 침입자 역추적 지원도구 구현)

  • Im, Chae-Ho;Won, Yu-Heon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3410-3419
    • /
    • 1999
  • Autonomous Intrusion Analysis Agent(AIAA) is Incident Response Team staff's tool that scans, analyses, reports and alerts the traces of intrusion based on system logs and intruder's backdoors inside compromised system by IR staff after security incident is reported to the IR team. AIAA is intelligent to recognize to check out who is intruder from all the user accounts and to report the suspected candidates to the master control system in IR team. IR staff who controls AIAA with master system can pick up an intruder from the candidates reported by AIAA agent and review all related summary reports and details including source host's mane, finger information, all illegal behavior and so on. AIAA is moved to compromised system by the staff to investigate the signature of intrusion along the trace of victim hosts and it is also operated in secret mode to detect the further intrusion. AIAA is alive in all victim systems until the incident is closed and IR staff can control AIAA operation and dialogue with AIAA agent in Web interface.

  • PDF

Bytecode Simulator for Analyzing Java Programs (자바프로그램 분석을 위한 바이트코드 시뮬레이터)

  • Kim, Doo-Woo;Jung, Min-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2086-2094
    • /
    • 2000
  • It is not easy to analyze object-oriented programs, including those in Java, Because the control flows of he program is not visible to the users. The users, however, can utilize class files to trace the process of execution, since a lot of information related on control flow are store in the control flows. A Java virtual machine can then execute the bytecods included in classfiles. It means that understanding the execution process of the bytecodes leads users to comprehend and analyze source programs in Java. We design and implement a visual tool for bytecode execution that is an efficient and powerful tool to understand and analyze source programs in Java. It can aid users to thoroughly grasp not only the structure of a program but also the flow of controls among objects.

  • PDF

A Study on the Characteristics of Color for Peter Eisenman Architecture (피터 아이젠만 건축의 색채사용특성에 관한 연구)

  • Lee, Seon-Min;You, Yeon-Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.18 no.2
    • /
    • pp.61-70
    • /
    • 2009
  • Architectural color would be understood as a essential tool to be reflected the architect's value criteria, thinking process and the specific methodology. This study was established the characteristics of color use correlated with Eisenman's architectural features based on his point of view. At first, it could be organized with data and use the color in view points with the becomming process. Especially it would be expressed the color as a trace of unsynchronized formation. Second, it was introduced the color by graphics engaged with form, to be expressed the dividing, folding, reiteration for deliver of escape from graphic thinking process. Third, it was analyzed to be imported the color to have a multi-lateral space experience in center of user's space recognition and behavior by introduction of color. Finally, it could be inducted the consistent color by viewpoint of interfacial between interior and exterior environment, communicated with strong meaning by conversion from interior elements to color from these processes. A characteristics of Eisenman's architecture color is reflected his thinking process in architecture color as it is and can be understand of 'becomming process use of color' as a tool that is corresponded in form creation. Specially, it would be kept continuous viewpoint of interior and exterior space, giving user color as a viewpoint of linking space, enable many-sidedness experiences through space.