• Title/Summary/Keyword: 세계컴퓨터

Search Result 1,366, Processing Time 0.033 seconds

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

Design and Implementation of Private Folder Management Systems for the Security of User Data on Multi-user Environments (다중 사용자 환경에서 개인 데이터 보안을 위한 개인 폴더 관리 시스템의 설계 및 구현)

  • Park, Yong-Hun;Park, Hyeong-Soon;Kim, Hak-Chul;Lee, Hyo-Joon;Jang, Yong-Jin;Lim, Jong-Tae;Jang, Su-Min;Seo, Won-Seok;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.52-61
    • /
    • 2010
  • In recent, the interests of multi-user systems have been increased. Multi-user systems allow a number of users to access the system simultaneously. Security is one of the key issues to be addressed in a multi-user environment. We propose a solution based on the NTFS file system that provides the personal data security and considers the convenience of users. The system increases the convenience of users by simplifying the complexity of the security setting on NTFS. We also propose a variety of policies that prevent from the conflicts incurring when different users set up the personal folders simultaneously and do not set up the important folders such as the window system folders as personal folders. In addition, our system supports the function of setting up the prohibition folder lists so that no one can not set the folder to their personal folders.

A Big Data Learning for Patent Analysis (특허분석을 위한 빅 데이터학습)

  • Jun, Sunghae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.406-411
    • /
    • 2013
  • Big data issue has been considered in diverse fields. Also, big data learning has been required in all areas such as engineering and social science. Statistics and machine learning algorithms are representative tools for big data learning. In this paper, we study learning tools for big data and propose an efficient methodology for big data learning via legacy data to practical application. We apply our big data learning to patent analysis, because patent is one of big data. Also, we use patent analysis result for technology forecasting. To illustrate how the proposed methodology could be applied in real domain, we will retrieve patents related to big data from patent databases in the world. Using searched patent data, we perform a case study by text mining preprocessing and multiple linear regression of statistics.

The Effect on the Contents of Self-Disclosure Activities using Ubiquitous Home Robots (자기노출 심리를 이용한 유비쿼터스 로봇 콘텐츠의 효과)

  • Kim, Su-Jung;Han, Jeong-Hye
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.57-63
    • /
    • 2008
  • This study uses the identification which is one of the critical components of psychological mechanism and enables replacing one's own self because of the needs of self-expression(disclosure) and creation. The study aims to improve educational effects using the realistic by increasing sense of the virtual reality and the attention. After the computer-based contents were developed and converted to be applied into robot, and then the contents were combined the student's photo and the avatar using automatic loading. Finally each one of the contents was applied to the students. The results of the investigation indicated that there were significant effects of the contents based on identification. In other words, the contents effect on student's attention, but not their academic achievement. The study could find the effect of the identification's application using the educational robot. We suggested that improving technical ability of the augmented virtuality as a face-detection and sensitive interaction may lead to the specific suggestions for educational effects for further research.

  • PDF

V-NAND Flash Memory 제조를 위한 PECVD 박막 두께 가상 계측 알고리즘

  • Jang, Dong-Beom;Yu, Hyeon-Seong;Hong, Sang-Jin
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2014.02a
    • /
    • pp.236.2-236.2
    • /
    • 2014
  • 세계 반도체 시장은 컴퓨터 기능이 더해진 모바일 기기의 수요가 증가함에 따라 메모리반도체의 시장규모가 최근 빠른 속도로 증가했다. 특히 모바일 기기에서 저장장치 역할을 하는 비휘발성 반도체인 NAND Flash Memory는 스마트폰 및 태블릿PC 등 휴대용 기기의 수요 증가, SSD (Solid State Drive)를 탑재한 PC의 수요 확대, 서버용 SSD시장의 활성화 등으로 연평균 18.9%의 성장을 보이고 있다. 이러한 경제적인 배경 속에서 NAND Flash 미세공정 기술의 마지막 단계로 여겨지는 1Xnm 공정이 개발되었다. 그러나 1Xnm Flash Memory의 생산은 새로운 제조설비 구축과 차세대 공정 기술의 적용으로 제조비용이 상승하는 단점이 있다. 이에 따라 제조공정기술을 미세화하지 않고 기존의 수평적 셀구조에서 수직적 셀구조로 설계 구조를 다양화하는 기술이 대두되고 있는데 이 중 Flash Memory의 대용량화와 수명 향상을 동시에 추구할 수 있는 3D NAND 기술이 주목을 받게 되면서 공정기술의 변화도 함께 대두되고 있다. 3D NAND 기술은 기존라인에서 전환하는데 드는 비용이 크지 않으며, 노광장비의 중요도가 축소되는 반면, 증착(Chemical Vapor Deposition) 및 식각공정(Etching)의 기술적 난이도와 스텝수가 증가한다. 이 중 V-NAND 3D 기술에서 사용하는 박막증착 공정의 경우 산화막과 질화막을 번갈아 증착하여 30layer 이상을 하나의 챔버 내에서 연속으로 증착한다. 다층막 증착 공정이 비정상적으로 진행되었을 경우, V-NAND Flash Memory를 제조하기 위한 후속공정에 영향을 미쳐 웨이퍼를 폐기해야 하는 손실을 초래할 수 있다. 본 연구에서는 V-NAND 다층막 증착공정 중에 다층막의 두께를 가상 계측하는 알고리즘을 개발하고자 하였다. 증착공정이 진행될수록 박막의 두께는 증가하여 커패시터 관점에서 변화가 생겨 RF 신호의 진폭과 위상의 변화가 생긴다는 점을 착안하여 증착 공정 중 PECVD 장비 RF matcher와 heater에서 RF 신호의 진폭과 위상을 실시간으로 측정하여 데이터를 수집하고, 박막의 두께와의 상관성을 분석하였다. 이 연구 결과를 토대로 V-NAND Flash memory 제조 품질향상 및 웨이퍼 손실 최소화를 실현하여 제조 시스템을 효율적으로 운영할 수 있는 효과를 기대할 수 있다.

  • PDF

Ransomware Analysis and Method for Minimize the Damage (랜섬웨어 분석과 피해 최소화 방안)

  • Moon, Jaeyeon;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.1
    • /
    • pp.79-85
    • /
    • 2016
  • Ransomware was a malicious code that active around the US, but now it spreads rapidly all over the world and emerges in korea recently because of exponential computer supply and increase in users. Initially ransomware uses e-mail as an attack medium in such a way that induces to click a file through the spam mail Pam, but it is now circulated through the smart phone message. The current trend is an increase in the number of damage, including attacks such as the domestic large community site by ransomware hangul version. Ransomware outputs a warning message to the user to encrypt the file and leads to monetary damages and demands for payment via bitcoin as virtual currency is difficult to infer the tracking status. This paper presents an analysis and solutions to damage cases caused by ransomware.

A Framework for Quality Evaluation of Geospatial Data (Geospatial Data의 품질평가를 위한 Framework)

  • Cho, Gi-Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.4 no.2 s.8
    • /
    • pp.123-136
    • /
    • 1996
  • Lately, the demand for data standardization become increased to obtain various data jointly along with development of information technology and diversity of society. Thus the research on tile definition and evaluation of data quality indicating accuracy and confidence of geospatial data, is required for this standardization. In this study, by virtue of comparison of definitions and evaluation methods of data quality element being selected from representative countries, the following results were obtained: (1) Application of ISO/TC211's Draft having accepted evaluation standard to KSDTS(Korea Spatial Data Transfer Standard) is desirable for definitions of data quality elements. (2) This study presented the quality evaluation of much more resonable geospatial data accompaning with quality element. Furthermore, this study suggests that this evaluation be applicable to KSDTS and be contained in the digital map product specification of National Geography Institute with more clearness of a report form of data quality evaluation result. (3) Studies on various sampling methods, establishment of AQL(Acceptable Quality Level) suitable for our country, and computer programming which can rapidly and automatically evaluate mass much of data are required.

  • PDF

Visual textuality of stereoscopic 3D animation (3D 입체 애니메이션의 영상 특징에 대한 연구)

  • Jeon, Gyong-Ran
    • Cartoon and Animation Studies
    • /
    • s.20
    • /
    • pp.31-45
    • /
    • 2010
  • Stereoscopic 3D animation contents are in the rise as a key part of contents market. Major animation studios are planning to produce 3D animations in a stereoscopic process. This study aims at understanding the visual textuality of 3D animation contents at its early stage. To understand 3D animation, , are analyzed. Stereoscopic 3D animations are exploring the new visual aesthetics using the specific storytelling, sequence ordering, camera working, shot size and camera angles etc. Based on these visual textualities, stereoscopic 3D animations are constructing telepresence, multi-senses of individual spectators. Stereoscopic 3D animations have formed their own aesthetics and cultural meanings in the digital age.

  • PDF

Implementation of Secure E-Mail System based on lava (자바기반의 안전한 전자 메일 시스템 구현)

  • 이원구;김성준;이희규;조한진;이재광
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.51-62
    • /
    • 2001
  • Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.

  • PDF

Design and Implementation of Interface between the Database and the Application Program (데이터베이스와 응용프로그램 사이의 인터페이스 설계 및 구현)

  • Jung, In-Sook;Lee, Chang-Sup;Cho, Chung-Ho
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.34 no.4
    • /
    • pp.139-147
    • /
    • 1997
  • Most of the existing applications developed undter the DOS environment exchange information with the exterior world through reading and writing files in ASCII format. A package program consisting of numerous modules has to exchange data not only between module program and the input/output files but also between module themselves, and hence information exchange via ASCII file is increasingly inefficient and less accurate as the number of modules increases. The present paper describes the design and the implementation of the interface between the module program and the database which stores all the information necessary for the execution of the application. The interface program is then applied to the existing Propeller Design and Analysis System to show that the interface functions smoothly. The development is performed on the personal computer operating under Windows 95 rather than the workstation under Unix operating system to prove that the design and analysis work can be carried out without limit in time and space.

  • PDF