• Title/Summary/Keyword: Automatic Updates

Search Result 22, Processing Time 0.021 seconds

Analysis of Design Error in Windows Update and Automatic Updates, and the Solutions (Windows Update 및 Automatic Updates의 설계 오류 분석 및 해결 방안)

  • Kim, Yun-Ju;Yun, Young-Tae;Kang, Sung-Moon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.107-115
    • /
    • 2006
  • It discovered a design error from the module to search required installing security patch of Windows Update and Automatic Updates that Microsoft supports it to install security patch easily and quickly. It explains and tests security patch-disguise attack by this error. Security patch-disguise attack is to maintains a vulnerability and to be not searched the security patch simultaneously. Also it composes an attack scenario. Is like that, it proposes the method which solves an design error of the module to search required installing security patch.

  • PDF

An Automated Projection Welding System using Vision Processing Technique (영상인식 기술을 이용한 프로젝션용접 자동화시스템)

  • Park, Ki-Jung;Song, Ha-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.517-522
    • /
    • 2011
  • Conventional projection welding systems suffer from lots of defective products caused by manual handling. In this paper, we introduce a projection welding system that performs automatic identification, welding and counting of components and products. The proposed system checks the existence and identifies placement of components to be welded by a vision camera. After welding of the components, it automatically updates product counts and dressing items. We show that the proposed welding system can reduce the defect rate and improve the productivity through experimental test with a existing system.

An Analysis of the Applicable Fields of UDC (UDC의 적용분야에 관한 연구)

  • Lee, Chang-Soo
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.4
    • /
    • pp.1-21
    • /
    • 2004
  • The purpose of this study is to investigate historical backgrounds, maintenance, revision and application areas of UDC(Universal Decimal Classification) in order to understand current issues of it systematically. Since 1905, n has been extensively developed and is now administered by UDC Consortium(UDCC). UDCC updates MRF(Master Reference File), an electronic form of the UDC schedules, once a year. UDC updates and publishes standard edition extended edition, and abridged edition according to the degrees of notion abridgement, and is available on the web. UDC can be now applicable to collection arrangement, SDI(Selective Dissemination of Information) service, searching subject bibliographies, switching language or subject gateway and metadata on the Internet, and automatic classification.

  • PDF

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.

Development of the web robot system for an efficient information delivery of portal sites classified by the business types (업종별 포탈 사이트의 효율적 정보제공을 위한 웹로봇 시스템 개발에 관한 연구)

  • Kim Gwang Myeong;Baek Sang Gyu;Kim Seon Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.98-104
    • /
    • 2003
  • While the impact or internet on our everyday life keeps increasing, the internet users are turning toward the value added information only that suits their purpose instead of just wandering over a sea (pool) or information. Although it is easy to locate the information using various search engines. we still finds it time and cost consuming to update the existing information or to add similar Information. There are several portal sites managed by each industrial types or associations/organizations for the purpose or strengthening the competitiveness or small and medium-sized enterprises And currently, tremendous manpower and expenses are put into the selection and quality improvement or information to satisfy the needs toward the high qualify information by the specialized users in their fields collection and updating or the information is partially available manually during He period or budget allocation by the government it becomes problematic, however, to continue this service when the project expires. This report presents the system for the information collection, analysis and classification of portal sites operated for the special purposes and automatic upload to the proper sites. In addition. expression or web robots and application of robots and several information types are suggested which will eventually accomplish currency or information and automatic updates and addition or documents with the least expenses or maintenance.

  • PDF

An Implementation of Image Security System Based oil Web (웹기반 화상 감시 시스템의 구현)

  • 조평기;박영석
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.49-52
    • /
    • 2000
  • In this paper we have developed an image security system based on Internet Web in order to overcome the problem of existing systems that use the dedicated network. The developed system resolves the safety problem of the centralized control model by adapting the distributed control model based on Web, and has the functions of remote control and automatic monitoring for grouped multiple sites on Web browser. And the system can operate various computers or operating system because it's operating software was designed by the concepts of Java Virtual Machine and Virtual Instrument. Also, our system has not need of additional cost for network construction by using Internet and can greatly improve the managemental efficiency of system because the maintenance and publishing of software updates can be performed through Web Server.

  • PDF

A Sender-oriented Automatic Rate Adaptation Scheme in IEEE 802.11 WLANs (IEEE 802.11 WLAN에서 송신단 기반 전송률 적응기법)

  • Lee, Sun-Hun;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.143-152
    • /
    • 2009
  • IEEE 802.11 WLANs provide multiple transmission rates to improve the system throughput by adapting the transmission rate to the current wireless channel conditions. Many rate adaptation schemes have been proposed because IEEE 802.11 standard does not contain any specifications for the rate adaptation scheme. In this paper, in order to overcome limitations of the previous research, we propose a new rate adaptation scheme called SARA(Sender-oriented Automatic Rate Adaptation). The SARA scheme, a proposed rate adaptation scheme, appropriately adjusts the data transmission rate based on the estimated wireless channel conditions, specifically the measured RSSI at the sender-side. Moreover it continuously updates the thresholds for selecting the transmission rate and selectively enforces the RTS/CTS exchanges to adapt the changes in the wireless channel conditions. Through the performance evaluations, we prove that the SARA scheme overcomes the limitations of the previous research and improves the wireless link utilization.

Software Architecture of KHU Automatic Observing Software for McDonald 30-inch telescope (KAOS30)

  • Ji, Tae-Geun;Byeon, Seoyeon;Lee, Hye-In;Park, Woojin;Lee, Sang-Yun;Hwang, Sungyong;Choi, Changsu;Gibson, Coyne A.;Kuehne, John W.;Prochaska, Travis;Marshall, Jennifer;Im, Myungshin;Pak, Soojong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.69.4-70
    • /
    • 2018
  • KAOS30 is an automatic observing software for the wide-field 10-inch telescope as a piggyback system on the 30-inch telescope at the McDonald Observatory in Texas, US. The software has four packages in terms of functionality and is divided into communication with Telescope Control System (TCS), controlling of CCD camera and filter wheel, controlling of focuser, and script for automation observing. Each interconnect of those are based on exe-exe communication. The advantage of this distinction is that each package can be independently maintained for further updates. KAOS30 has an integrated control library that combines function library connecting each device and package. This ensures that the software can extensible interface because all packages are access to the control devices independently. Also, the library includes the ASCOM driver platform. ASCOM is a standard general purpose library that supports Application Programming Interface (API) of astronomical devices. We present the software architecture of KAOS30, and structure of interfacing between hardware and package or package and package.

  • PDF

Crawling algorithm design and experiment for automatic deep web document collection (심층 웹 문서 자동 수집을 위한 크롤링 알고리즘 설계 및 실험)

  • Yun-Jeong, Kang;Min-Hye, Lee;Dong-Hyun, Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Deep web collection means entering a query in a search form and collecting response results. It is estimated that the information possessed by the deep web has about 450 to 550 times more information than the statically constructed surface web. The static method does not show the changed information until the web page is refreshed, but the dynamic web page method updates the necessary information in real time and provides real-time information without reloading the web page, but crawler has difficulty accessing the updated information. Therefore, there is a need for a way to automatically collect information on these deep webs using a crawler. Therefore, this paper proposes a method of utilizing scripts as general links, and for this purpose, an algorithm that can utilize client scripts like regular URLs is proposed and experimented. The proposed algorithm focused on collecting web information by menu navigation and script execution instead of the usual method of entering data into search forms.

Development of an Automatic Updated System for Underground Structures (지하구조물 자동갱신 시스템 개발)

  • LEE, Min-Kyu;HAN, Sang-Hoon;KIM, Sung-Su
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.4
    • /
    • pp.82-98
    • /
    • 2021
  • In recent years, as the number of ground subsidence has increased nationwide, the latest and usefulness of underground information for underground space development and underground safety management has become more important than ever. However, the 3D Underground Geospatial Map project, which started in 2015, has a problem with the manual-based long-term update system. This research paper overcomes these limitations and automatically updates the 3D CAD/GIS-based integrated management of underground structures that can be managed automatically from a full-cycle perspective of underground structure data management such as processing, transformation, updating, management, and visualization of 2D/3D underground structure data. If this technology is applied, it is possible to integrate processing and update management of the existing complex 3D construction logic of underground structures in one system, and it is expected that it can be used for underground space development and underground safety management as a foundation technology for automatic update of underground structures data.