• Title/Summary/Keyword: 로그 처리

Search Result 651, Processing Time 0.031 seconds

A Study on The MRA PWM Technique Using the Trapezoidal Waveform at Voltage Source Inverter(VSDI) (전압형 인버터(VSI)에서 사다리꼴파형을 이용한 MRA PWM 기법에 관한 연구)

  • 한완옥;원영진;이성백
    • The Proceedings of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.7 no.2
    • /
    • pp.36-40
    • /
    • 1993
  • In order to improve complicated construction and complex control which are disadvantage of optimal PWM technique aimed at harmonic elimination method, this paper presented MRA(Model Reference Adaptive) PWM technique that gatmg signal of inverter is generated by comparing the reference signal with the induced feedback signal at the reference model of load. Design of controller is composed of microprocessor and analog circuit. MRA PWM technique used in the paper is able to compensate the degradation of voltage efficiency to be generated by the ratio of the output voltage to the DC supply voltage being low for using conventional sinusoidal PWM technique. When the trapezoidal signal is employed as the reference signal. the low order harmonics of line current can be reduced and the switching pattern is made by on-line computation using comparatively simple numerical analysis.

  • PDF

Using the SIEM Software vulnerability detection model proposed (SIEM을 이용한 소프트웨어 취약점 탐지 모델 제안)

  • Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.961-974
    • /
    • 2015
  • With the advancement of SIEM from ESM, it allows deep correlated analysis using huge amount of data. By collecting software's vulnerabilities from assessment with certain classification measures (e.g., CWE), it can improve detection rate effectively, and respond to software's vulnerabilities by analyzing big data. In the phase of monitoring and vulnerability diagnosis Process, it not only detects predefined threats, but also vulnerabilities of software in each resources could promptly be applied by sharing CCE, CPE, CVE and CVSS information. This abstract proposes a model for effective detection and response of software vulnerabilities and describes effective outcomes of the model application.

Access Control Method for Software on Virtual OS Using the Open Authentication Protocol (개방형 인증 프로토콜을 이용한 가상 운영체제에 설치된 SW 접근통제 방안)

  • Kim, Sun-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.568-574
    • /
    • 2013
  • In recent years, IT companies offer various cloud services using hardware-based technologies or software-based technologies. User can access these cloud services without the constraints of location or devices. The technologies are virtualization, provisioning, and big data processing. However, security incidents are constantly occurring even with these techniques. Thus, many companies build and operate private cloud service to prevent the leak of critical data. If virtual environment are different according to user permission, many system are needed, and user should login several virtual system to execute an program. In this paper, I suggest the access control method for application software on virtual operating system using the Open Authentication protocol in the Cloud system.

An Authentication Protocol using Fuzzy Signature Vault Scheme (퍼지서명볼트스킴을 이용한 인증 프로토콜)

  • Moon, Hyun-Yi;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.4
    • /
    • pp.172-177
    • /
    • 2008
  • In this paper, we design an authentication protocol based on Fuzzy Signature Vault Scheme using a light signature feature extraction method for user convenience and efficiency of electronic commerce. The signature is used broadly in electronic commerce because it is one of the simple and low-cost biometric items. However, signature has a problem that there are few low-cost and safe protocols. To solve this problem, we design a feature extraction method which is adequate for characters of signature and Fuzzy Vault Scheme. In addition, we design and analyze an efficient authentication protocol with some parameters used in this procedure. The followings are advantages when this protocol is applied to authentication procedure; 1) using convenient and low-cost signatures, 2) being possible to verify users with spending only about second for signature processing and authentication, 3) one time on transmission for sign-in and verification and 4) getting user authentication with secret value at the same time.

Analyzing Exceptions for Embedded System Software Development using Aspect Oriented Programming (임베디드 시스템 소프트웨어 개발을 위한 관점지향프로그래밍 방식의 예외원인분석)

  • Ju, Jae-Ho;Kim, Tae-Hyung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.355-359
    • /
    • 2009
  • When an unexpected software exception arises, we programmers are to analyze what causes it. Precisely speaking, we need to analyze the cause and property of the unexpected exception. But if exceptions arise irregularly from unknown causes, it is even more difficult for us to handle them, especially in embedded system like mobile phone software development. In this paper, we propose a debugger-friendly analyzing method for exceptions using aspect oriented programming technique. What we need to know upon arising exceptions is the function call history in order to identify the reason for the exceptions. Since programmers used to spend their debugging time on unidentified exceptions, which arise irregularly our method would greatly improve the embedded software development productivity.

Wavelet Based Non-Local Means Filtering for Speckle Noise Reduction of SAR Images (SAR 영상에서 웨이블렛 기반 Non-Local Means 필터를 이용한 스펙클 잡음 제거)

  • Lee, Dea-Gun;Park, Min-Jea;Kim, Jeong-Uk;Kim, Do-Yun;Kim, Dong-Wook;Lim, Dong-Hoon
    • The Korean Journal of Applied Statistics
    • /
    • v.23 no.3
    • /
    • pp.595-607
    • /
    • 2010
  • This paper addresses the problem of reducing the speckle noise in SAR images by wavelet transformation, using a non-local means(NLM) filter originated for Gaussian noise removal. Log-transformed SAR image makes multiplicative speckle noise additive. Thus, non-local means filtering and wavelet thresholding are used to reduce the additive noise, followed by an exponential transformation. NLM filter is an image denoising method that replaces each pixel by a weighted average of all the similarly pixels in the image. But the NLM filter takes an acceptable amount of time to perform the process for all possible pairs of pixels. This paper, also proposes an alternative strategy that uses the t-test more efficiently to eliminate pixel pairs that are dissimilar. Extensive simulations showed that the proposed filter outperforms many existing filters terms of quantitative measures such as PSNR and DSSIM as well as qualitative judgments of image quality and the computational time required to restore images.

Construction of an Hybrid Firewall for School Networks and Implementation of a Graphical Interface for Access Control Rules (학교망을 위한 혼합방화벽 구축 및 접근제어 규칙을 위한 그래픽 인터페이스 구현)

  • Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.3 no.2
    • /
    • pp.67-75
    • /
    • 2000
  • Due to the advantages of Internet, many teachers use Internet as an educational tool and due to the computerized works in schools, the usages of the Internet increase. However, because of the openness of the Internet, the sensitive data of an organization are exposed to outsiders and the Internet-based working has some problems such as the corruptions of instructional data or on-line assessment results. The need for protecting a school network from outsiders increases but the school networks with firewalls rarely exist. In this paper, in order to solve the security problem of a school network, we construct a hybrid firewall for school networks. In addition, we implement a graphical user interface for teachers to set up the access control rules of a hybrid firewall easily. The interface also provides the facilities such as log analysis, a real-time monitor for network traffics, and the statistic on traffics.

  • PDF

Mobile Client-Server System for Realtime Continuous Query of Moving Objects (이동 객체의 실시간 연속 질의를 위한 모바일 클라이언트-서버 시스템)

  • Joo, Hae-Jong;Park, young-Bae;Choi, Chang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.289-298
    • /
    • 2006
  • Many researches are going on with regard to issues and problems related to mobile database systems, which are caused by the weak connectivity of wireless networks, the mobility and the portability of mobile clients. Mobile computing satisfies user's demands for convenience and performance to use information at any time and in any place, but it has many problems to be solved in the aspect of data management. The purpose of our study is to design Mobile Continuous Query Processing System(MCQPS) to solve problems related to database hoarding, the maintenance of shared data consistency and the optimization of logging, which are caused by the weak connectivity and disconnection of wireless networks inherent in mobile database systems under mobile client server environments. We proved the superiority of the proposed MCQPS by comparing its performance to the C I S(Client-Intercept-Slaver) model. In Addition, we experiment on proposed index structure and methodology in various methods.

  • PDF

Fast Modulation Classifier for Software Radio (소프트웨어 라디오를 위한 고속 변조 인식기)

  • Park, Cheol-Sun;Jang, Won;Kim, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4C
    • /
    • pp.425-432
    • /
    • 2007
  • In this paper, we deals with automatic modulation classification capable of classifying incident signals without a priori information. The 7 key features which have good properties of sensitive with modulation types and insensitive with SNR variation are selected. The numerical simulations for classifying 9 modulation types using the these features are performed. The numerical simulations of the 4 types of modulation classifiers are performed the investigation of classification accuracy and execution time to implement the fast modulation classifier in software radio. The simulation result indicated that the execution time of DTC was best and SVC and MDC showed good classification performance. The prototype was implemented with DTC type. With the result of field trials, we confirmed the performance in the prototype was agreed with the numerical simulation result of DTC.

Analysis of Network Log based on Hadoop (하둡 기반 네트워크 로그 시스템)

  • Kim, Jeong-Joon;Park, Jeong-Min;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.125-130
    • /
    • 2017
  • Since field control equipment such as PLC has no function to log key event information in the log, it is difficult to analyze the accident. Therefore, it is necessary to secure information that can analyze when a cyber accident occurs by logging the main event information of the field control equipment such as PLC and IED. The protocol analyzer is required to analyze the field control device (the embedded device) communication protocol for event logging. However, the conventional analyzer, such as Wireshark is difficult to process the data identification and extraction of the large variety of protocols for event logging is difficult analysis of the payload data based and classification. In this paper, we developed a system for Big Data based on field control device communication protocol payload data extraction for event logging of large studies.