• Title/Summary/Keyword: 컴퓨터 자동화 시스템

Search Result 649, Processing Time 0.032 seconds

A Development of Analysis Tool and the Analysis of Vulnerabilities on the Program Source Code (프로그램 소스코드 취약성 분석 및 분석도구의 개발)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.27-34
    • /
    • 2004
  • The recent explosive use of the Internet and the development of computer communication technologies reveal serious computer security problem. Inspite of many studies on secure access to the system, generally, the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the Program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Study on the development of Algorithm for Removing Noise from Road Crack Image (도로면 크랙영상의 노이즈 제거 알고리즘에 관한 연구)

  • Kim Jung-Ryeol;Lee Se-Jun;Choi Hyun-Ha;Kim Young-Suk;Lee Jun-Bok;Cho Moon-Young
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.535-538
    • /
    • 2002
  • Machine vision algorithms, which are composed of noise elimination algorithm, crack detection and mapping algorithm, and path planning algorithm, are required for sealing crack networks effectively and automation of crack sealing.. Noise elimination algorithm is the first step so that computer take cognizance of cracks effectively. Noises should be removed because common road includes a lot of noises(mark of oil, tire, traffic lane, and sealed crack) that make it difficult the computer to acknowledge cracks accurately. The objective of this paper is to propose noise elimination algorithm, prove the efficiency of the algorithm through coding. The result of the coding is represented in this paper as well.

  • PDF

REffects of Surge Protective Devices with Respect to Types of System Grounding and Wiring Methods (전원계통의 접지방식 및 배선방식에 따른 서지보호기의 효과)

  • 이수봉;이복희;길형준
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.2
    • /
    • pp.90-99
    • /
    • 2004
  • High speed info-communications equipment are required with development of highly information-oriented society, the intelligent industrial facilities and social systems such as administrative, financial and traffic systems, are gradually becoming to automation, which are composed of the integrated circuits and micro-semiconductors, remote control and operation. Thus modern micro-electronic circuits can frequently be damaged by lightning surge. The protection of electronic circuits from lightning overvoltages is concentrated very interesting. In this paper, for the purpose of providing the effective protection method of electronic devices such micro-computers from lightning surges in a residential building, the protection effect of surge protective devices according to types of system groundings were experimentally analyzed. Also the effective installation method of surge protective devices was examined and proposed. The installation of SPDs in retrofits was a high remnant voltage across the protected device owing to the inductance in the long wires to the SPDs. Finally the method of installing the SPD by twisted pain wires is remarkably effective for fast rising transient overvoltages.

Design Automation of Slab System by the Finite Element Method (유한요소법을 이용한 슬래브 시스템의 설계자동화)

  • 이성우
    • Computational Structural Engineering
    • /
    • v.4 no.4
    • /
    • pp.79-89
    • /
    • 1991
  • New design method of R/C slab system based on finite element method has been presented. The proposed method can substitute inaccurate existing method, which has limitation in its application, and provide accurate and efficient design results for any type of slab system. Isoparametric plate element used in the slab design has been efficiently formulated to save computational time. Reinforcement has been determined by strength design method and compared with code minimum values. Graphical output through comprehensive contour map for resulting moments and designed steel areas has considerably facilitated design process. Accurate shear results from isoparametric plate element enabled to check punching shear in a proper manner. In addition to strength design criteria, serviceability has also been checked by utilizing newly developed inelastic deflection multiplier method. An example for circular slab with opening showed that the proposed method could be applied to design of irregular slab without any difficulty.

  • PDF

A Study on Utilizing Smartphone for CMT Object Tracking Method Adapting Face Detection (얼굴 탐지를 적용한 CMT 객체 추적 기법의 스마트폰 활용 연구)

  • Lee, Sang Gu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.588-594
    • /
    • 2021
  • Due to the recent proliferation of video contents, previous contents expressed as the character or the picture are being replaced to video and growth of video contents is being boosted because of emerging new platforms. As this accelerated growth has a great impact on the process of universalization of technology for ordinary people, video production and editing technologies that were classified as expert's areas can be easily accessed and used from ordinary people. Due to the development of these technologies, tasks like that recording and adjusting that depends on human's manual involvement could be automated through object tracking technology. Also, the process for situating the object in the center of the screen after finding the object to record could have been automated. Because the task of setting the object to be tracked is still remaining as human's responsibility, the delay or mistake can be made in the process of setting the object which has to be tracked through a human. Therefore, we propose a novel object tracking technique of CMT combining the face detection technique utilizing Haar cascade classifier. The proposed system can be applied to an effective and robust image tracking system for continuous object tracking on the smartphone in real time.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

Massive Electronic Record Management System using iRODS (iRODS를 이용한 대용량 전자기록물 관리 시스템)

  • Han, Yong-Koo;Kim, Jin-Seung;Lee, Seung-Hyun;Lee, Young-Koo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.825-836
    • /
    • 2010
  • The advancement of electronic records brought great changes of the records management system. One of the biggest changes is the transition from passive to automatic management system, which manages massive records more efficiently. The integrated Rule-Oriented Data System (iRODS) is a rule-oriented grid system S/W which provides an infrastructure for building massive archive through virtualization. It also allows to define rules for data distribution and back-up. Therefore, iRODS is an ideal tool to build an electronic record management system that manages electronic records automatically. In this paper we describe the issues related to design and implementation of the electronic record management system using iRODS. We also propose a system that serves automatic processing of distribution and back-up of records according to their types by defining iRODS rules. It also provides functions to store and retrieve metadata using iRODS Catalog (iCAT) Database.

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.

Design of Multi-agent System for Course Scheduling of Learner-oriented using Weakness Analysis Algorithm (취약성 분석 알고리즘을 이용한 학습자 중심의 코스 스케쥴링 멀티 에이전트 시스템의 설계)

  • Kim, Tae-Seog;Lee, Jong-Hee;Lee, Keun-Wang;Oh, Hae-Seok
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.517-522
    • /
    • 2001
  • The appearance of web technology has accelerated a role of the development of the multimedia technology, the computer communication technology and the multimedia application contents. And serveral researches of WBI (Web-based Instruction) system have combined the technology of the digital library and LOD. Recently WBI (Web-based Instruction) model which is based on web has been proposed in the part of the new activity model of teaching-learning. And the demand of the customized coursewares which is required from the learners is increased, the needs of the efficient and automated education agents in the web-based instruction are recognized. But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose "Design of Multi-agent System for Course Scheduling of Learner-oriented using Weakness Analysis Algorithm". First proposed system monitors learner's behaviors constantly, evaluates them, and calculates his accomplishment. From this accomplishment the multi-agent schedules the suitable course for the learner. And the learner achieves a active and complete learning from the repeated and suitable course.le course.

  • PDF

Quality Improvement Method on Grammatical Errors of Information System Audit Report (정보시스템 감리보고서의 문법적 오류에 대한 품질 향상 방안)

  • Lee, Don Hee;Lee, Gwan Hyung;Moon, Jin Yong;Kim, Jeong Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.211-219
    • /
    • 2019
  • Accomplishing information system, techniques, methodology have been studied continuously and give much help to auditors who are using them. Additionally audit report which is the conclusion of accomplishing ISA(information system audit), has law of a basis and phase with ITA/EA Law(Electronic Government Law). This paper is for better quality of ISA report. But it has more errors about sentence and Grammatical structures. In this paper, to achieve quality improvement objectives, it is necessary to recognize the importance of an audit report by investigating on objectives, functionality, structures and usability of a report firstly, and a legal basis, the presence of report next. Several types of audit reports were chosen and the reports errors were divided into several categories and analyzed. After grasping reasons of those errors, the methods for fixing those errors and check-lists model was provided. And based on that foundation, the effectiveness validation about real audit reports was performed. The necessity for efforts to improve the quality of audit reports was emphasized and further research subject(AI Automatic tool) of this paper conclusion. We also expect this paper to be useful for the organization to improve on ISA in the future.