• Title/Summary/Keyword: 정상 프로파일

Search Result 110, Processing Time 0.028 seconds

Acceleration and Deceleration Profile Development of Reflecting Road Design Consistency (설계일관성을 반영한 감가속도 프로파일 개발 - 지방부 다차로도로를 중심으로 -)

  • Choi, Jaisung;Lee, Jong-Hak;Chong, Sang Min;Cho, Won Bum;Kim, Sangyoup
    • International Journal of Highway Engineering
    • /
    • v.15 no.6
    • /
    • pp.103-111
    • /
    • 2013
  • PURPOSES : Previous Speed Profile reflects the patterns of speeds in sections of tangents to curves in the roads. However these patterns are uniform of speeds and Acceleration/Deceleration. In oder to supplement these shortcomings. this study made a new profile which can contain factors of Acceleration/Deceleration through theories of Previous Speed Profiles. METHODS : For sakes, this study developed the speed prediction model of Rural Multi-Lane Highways and calculated Acceleration/Deceleration by appling a Polynomial model based on developed speed prediction model. Polynomial model is based on second by second. Acceleration/Deceleration Profile is developed with the various scenarios of road geometric conditions. RESULTS : The longer an ahead tangent length is, The higher an acceleration rate in curve occurs due to wide sight distance. However when there are big speed gaps between two curves, the longer tangent length alleviate acceleration rate. CONCLUSIONS : Acceleration/Deceleration Profile can overview th patterns of speeds and Accelerations/Decelerations in the various road geometric conditions. Also this result will help road designer have a proper guidance to exam a potential geometric conditions where may occur the acceleration/deceleration states.

Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity (프로세스 가상 메모리 데이터 유사성을 이용한 프로세스 할로윙 공격 탐지)

  • Lim, Su Min;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.431-438
    • /
    • 2019
  • Fileless malware uses memory injection attacks to hide traces of payloads to perform malicious works. During the memory injection attack, an attack named "process hollowing" is a method of creating paused benign process like system processes. And then injecting a malicious payload into the benign process allows malicious behavior by pretending to be a normal process. In this paper, we propose a method to detect the memory injection regardless of whether or not the malicious action is actually performed when a process hollowing attack occurs. The replication process having same execution condition as the process of suspending the memory injection is executed, the data set belonging to each process virtual memory area is compared using the fuzzy hash, and the similarity is calculated.

Research of the Source Code Transformation Between Embedded Linux and uCOS-2 : The Thread Synchronization Example using Semaphore (임베디드 리눅스와 uCOS-2 간 소스코드 변환에 대한 연구 : 세마포어를 이용한 쓰레드 동기화 예제)

  • Lee, Jong-Deok;Lee, Min-Cheol;Maeng, Ji-Chan;Yu, Min-Soo;Ahn, Hyun-Sik;Jeong, Gu-Min
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.314-315
    • /
    • 2008
  • 본 논문에서는 임베디드 리눅스와 uCOS-2 간 소스코드 변환에 대한 연구를 위해 API 정변환/역변환기(API 변환기)를 이용하여 두 RTOS 간 소스코드 변환을 실험한다. API 변환기는 임베디드 소프트웨어의 개발을 돕기 위해 개발된 프로그램으로서, 정변환과 역변환 기능을 이용하여 이종 RTOS 간 소스코드를 자동으로 상호 변환한다. 정변환이란 중간형태의 C-코드인 CIC 파일에서 특정 RTOS를 위한 C-코드로 변환하는 것을 의미한다. 반대로 역변환은 특정 RTOS를 위한 C-코드로부터 CIC 파일로 변환하는 것을 가리킨다. 본 논문의 실험에서는 임베디드 리눅스와 uCOS-2의 동기화 소스코드 예제를 API 변환기를 이용하여 상호 변환해본다. 그리고 변환된 소스코드의 정상동작 여부를 확인하기 위해 각각의 타깃보드 위에 소스코드를 포팅한다.

  • PDF

Characteristics of the Factor Structure of the Child Behavior Checklist Dysregulation Profile for School-aged Children (학령기 아동의 CBCL 조절곤란프로파일(Child Behavior Checklist Dysregulation Profile)의 요인구조와 특성)

  • Kim, Eun-young;Ha, Eun-hye
    • Korean Journal of School Psychology
    • /
    • v.17 no.1
    • /
    • pp.17-38
    • /
    • 2020
  • This study examined the factor structure of the Child Behavior Checklist Dysregulation Profile(CBCL-DP) for school-aged children in Korea identified differences in the level of maladjustment and problematic behaviors between the clinical group which had characteristics of CBCL-DP and the control group which did not. Confirmative factor analysis was performed on three alternative models from the literature to determine which was the most appropriate factor structure for the CBCL-DP. The result showed that the bi-factor model fit the sample data better than both the one and second-factor models. To confirm that the bi-factor model was the most appropriate factor structure, regression paths with relevant variables examined. The showed that CBCL-DP with the bi-factor model was associated with executive function difficulty as reported by parents and with school adjustment and all sub-factors of strength and difficulty as reported by teachers. The results also showed that this model had a different relationship with anxiety/depression, aggressive behavior, and attention problems than the other models. The clinical group was shown to have more executive function difficulty, worse adjustment of school life and to be less likely to engage in desired behaviors than the control group. These results indicate the CBCL-DP is more related to negative outcomes than any other factor, and that the bi-factor model was found to best fit the sample data, consistent with other studies. The early discovery of CBCL-DP can be used to provide interventions for high-risk children who exhibit emotional and behavioral problems, making its detection a significant diagnostic tool. The implications of these result, the limitations of this study, and areas for future research are discussed in this paper.

A Frequency Domain Analysis of Corneal Deformation by Air Puff (Air puff에 의한 각막 변형의 주파수 영역 분석)

  • Hwang, Ho-Sik;Lee, Byeong Ha;Lee, Chang Su
    • Journal of IKEEE
    • /
    • v.18 no.2
    • /
    • pp.240-247
    • /
    • 2014
  • Intraocular pressure is measured after a cornea air puff by observing biomechanical properties such as thickness or displacement of the cornea. In this paper, we deal with a frequency domain analysis of corneal deformation in the air puff tonometry that is used to diagnose glaucoma or lasik. We distinguish the patient from the normal by measuring the oscillation frequency in the neighborhood of the central cornea section. A binary image was obtained from the video images, and cornea vertical oscillation profile was extracted from the difference between the vertical displacement data and the curve fitting. In terms of Fourier transform, a vibration frequency of 479.2Hz for the patient was obtained as well as more higher 702.8Hz for the normal due to stiffness. Hilbert-Huang transform's empirical mode decomposition generally describes local, nonlinear, and nonstationary data. After the data were decomposed into intrinsic mode functions, a spectrum and power were analysed. Finally, we confirm that the patient has 6 times more higher power ratio for the specific intrinsic mode function between the patient and the normal.

Profile based Web Application Attack Detection and Filtering Method (프로파일기반 웹 어플리케이션 공격탐지 및 필터링 기법)

  • Yun Young-Tae;Ryou Jae-Cheol;Park Sang-Seo;Park Jong-Wook
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.19-26
    • /
    • 2006
  • Recently, web server hacking is trending toward web application hacking which uses comparatively vulnerable web applications based on open sources. And, it is possible to hack databases using web interfaces because web servers are usually connected databases. Web application attacks use vulnerabilities not in web server itself, but in web application structure, logical error and code error. It is difficult to defend web applications from various attacks by only using pattern matching detection method and code modification. In this paper, we propose a method to secure the web applications based on profiling which can detect and filter out abnormal web application requests.

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

Porting gcc Based eCos OS and PROFINET Communication Stack to IAR (gcc 기반 eCos 운영체제 및 PROFINET 통신 스택의 IAR 포팅 방법)

  • Jin Ho Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.127-134
    • /
    • 2023
  • This paper describes how to port the eCos operating system and PROFINET communication stack developed based on gcc to the IAR compiler. The eCos operating system provides basic functions such as multi-thread, TCP/IP, and device driver for PROFINET operation, so there is no need to change it when developing PROFINET applications. Therefore, in this study, we reuse an eCos library built with gcc and it link with PROFINET communication stack that are ported to IAR complier. Due to the different of the gcc and IAR linker, symbol definitions and address of the constructors should be changed using the external tool that generates symbol definitions and address of the constructors from MAP file. In order to verify the proposed method, it was confirmed that the actual I/O was operating normally through PROFINET IRT communication by connecting to the Siemens PLC. IAR compiler has better performance in both the compile time and the size of the generated binary. The proposed method in this study is expected to help port various open sources as well as eCos and PROFINET communication stacks to other compilers.

Design of a Closed-Loop Stepping Motor Drive based on Real-Time Ethernet (실시간 이더넷 기반 스테핑 모터 드라이브 개발)

  • Kim, Jin-Ho;Ha, Kyung-Jae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.45-52
    • /
    • 2019
  • This paper proposes the design of a closed-loop stepping motor drive for real-time Ethernet (RTE), which can be easily applied to a variety of RTE protocols. The proposed design is divided into a closed-loop step motor drive which can be reused for various types of RTE protocol and RTE module developed for each specific RTE protocol. It is based on a layered architecture so that the motion control algorithm can be easily reused independently of the RTE protocol and motion profile. To verify the proposed design, closed-loop motor drives based on EtherCAT and Mechatrolink III were developed and their performances were evaluated. Cycle time was measured to verify the real-time communication performance of the developed EtherCAT and Mechatrolink III based motor drive. As a result, the EtherCAT was 7.5 times faster than the Mechatrolink III when 32 motor drives were connected.

Protective effects of Jijang-kimchi extracts on diabetes mellitus and alcoholic liver injury in laboratory rats (랫드에서 김치가 당뇨병 및 알코올성 간 손상 예방에 미치는 효과)

  • Kim, Chang-Hyu;Park, Byung-Sung;Um, Kyung-Hwan
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.5
    • /
    • pp.1078-1087
    • /
    • 2020
  • The current study was carried out to investigate the effect of oral administration for 30 days of the Jijang kimchi extracts on prevention of diabetes, alcoholic liver injury and reduction of blood lipids in laboratory rats with alcoholic liver injury and diabetes induced by streptozotocin. In a diabetic model animals, the blood lipid profile, ALT, and AST levels were lower in kimchi extract groups compared to DC (diabetes control) group, and blood glucose level of DCJK (DC+oral administration with Jijang kimchi extracts) group was lower than that of DCCK (DC+oral administration with commercial kimchi extracts) group. Insulin levels were increased in order of NC (normal control), DCJK > DCCK > DC groups. In alcoholic liver injury model animals, ALT, AST and bilirubin were lowed in order of AC (alcohol group received 1 bottle of soju) > ACCK (1 bottle of soju plus oral administration with commercial kimchi extracts) ACJK (AC plus oral administration with Jijang kimchi extracts) > NC groups. In the clinical pathologic findings of liver tissue, AC group was severely injured, and tended to be improved in groups eating a 1 bottle of soju plus oral administration with kimchi extracts, especially Jijang kimchi extract group. The results suggest that eating Jijang kimchi can improve insulin secretion ability while lowering blood lipid profile, blood sugar and ALT, AST, and bilirubin levles in diabetic and alcoholic liver injury model animals.