• Title/Summary/Keyword: Code checking

Search Result 130, Processing Time 0.03 seconds

Recommendation and current status in exposure assessment using monitoring data in ship building industry - focused on the similar exposure group(SEG) (조선업의 작업환경측정결과를 이용한 노출평가의 문제점과 해결방향 - 유사노출군을 중심으로 -)

  • Roh, Youngman;Yim, Hyeon Woo;Kim, Suk Il;Park, Hyo Man;Jung, Jae Yeol;Park, Sook Kyung;Kim, Hyun-Wook;Chung, Chee Kyung;Lee, Won Chul;Kim, Jung Man;Kim, Soo Keun;Koh, Sang Baek;Karl, Sieber;Kim, Euna;Choi, Jung Keun
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.11 no.2
    • /
    • pp.126-134
    • /
    • 2001
  • Statistical approaches for analysis of data from the limited number of samples in ship building industry(SBI) collected by an industrial hygienist for checking compliance to an occupational standard were considered. Sampling for compliance usually has been guided by judgment selection, rather than true randomness, resulting in the creation of compliance samples which approximate a censored sample from the upper tail of the exposure distribution. Similar exposure groups(SEGs) including welding and painting process were established to assess representative values in each groups after reviewing the whole production line in SBI. For the convenient statistical approaches, the code has assigned to each SEGs. The descriptive statistics and probability plotting were used to yield the representative values in each SEGs. In the first step, SEGs of 558 were established from 5 ship building companies. The 38 SEGs showed the uncertainty are divided into each 5 companies and assessed the representative values again. The 44 SEGs in each companies was not showed the normal and lognormal distribution was analyzed each data. And also, recommendation was suggested to resolve the uncertainty in each groups.

  • PDF

FPGA Mapping Incorporated with Multiplexer Tree Synthesis (멀티플렉서 트리 합성이 통합된 FPGA 매핑)

  • Kim, Kyosun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.37-47
    • /
    • 2016
  • The practical constraints on the commercial FPGAs which contain dedicated wide function multiplexers in their slice structure are incorporated with one of the most advanced FPGA mapping algorithms based on the AIG (And-Inverter Graph), one of the best logic representations in academia. As the first step of the mapping process, cuts are enumerated as intermediate structures. And then, the cuts which can be mapped to the multiplexers are recognized. Without any increased complexity, the delay and area of multiplexers as well as LUTs are calculated after checking the requirements for the tree construction such as symmetry and depth limit against dynamically changing mapping of neighboring nodes. Besides, the root positions of multiplexer trees are identified from the RTL code, and annotated to the AIG as AOs (Auxiliary Outputs). A new AIG embedding the multiplexer tree structures which are intentionally synthesized by Shannon expansion at the AOs, is overlapped with the optimized AIG. The lossless synthesis technique which employs FRAIG (Functionally Reduced AIG) is applied to this approach. The proposed approach and techniques are validated by implementing and applying them to two RISC processor examples, which yielded 13~30% area reduction, and up to 32% delay reduction. The research will be extended to take into account the constraints on the dedicated hardware for carry chains.

A Study on the Temperature Distribution of Rock Mass at KAERI Underground Research Tunnel: Verification on the Result of Borehole Heater Test (지하처분연구시설(KURT) 내 암반의 온도 분포에 관한 연구 : 시추공히터시험 결과의 검증)

  • Yoon, Chan-Hoon;Choi, Young-Chul;Kwon, Sang-Ki;Choi, Heui-Joo
    • Tunnel and Underground Space
    • /
    • v.23 no.4
    • /
    • pp.297-307
    • /
    • 2013
  • In this study, the thermal analysis is carried out for a result of borehole heater test using ABAQUS ver 6.10 based on finite element analysis code. Thermal-mechanical rock properties as determined by laboratory tests before the in situ test and characteristics of the atmosphere at the test section are used as the initial condition. When comparing the results of the in situ test and thermal analysis, the temperature of C3 observation hole that is 0.9 m away from the heater showed very similar patterns and figures (about $1.3^{\circ}C$ difference). But the results of the A and B observation hole showed a significant difference around $15^{\circ}C{\sim}20^{\circ}C$. To find the reason for these results, the over-coring is carried out for the A1 and B1 observation holes. As a result of checking the excavated rock core with the naked eye, there is no problem on the number and position of the sensor as the test plan. However the state of cement injection in the observation hole is poor.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

Acceleration sensor, and embedded system using location-aware (가속센서를 이용한 위치인식과 임베디드시스템)

  • Roh, Chang-Bae;Na, Won-Shik
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.51-56
    • /
    • 2013
  • Real-time processing of sensor data network, is one of the important factors. Each node in the detected data are required to be transmitted within a certain time since the accurate processing is possible. Thus, the data nodes are successfully delivered within a specified time, it is very important to check whether the. Recently more and more accurate real-time embedded systems are reliable and haejyeoseo been able to provide sophisticated services. Because of the inherent complexity of embedded systems in the physical world and the difficulty of predicting the difficulty of a safe design constraints on the runtime violation of system as to cause unexpected causes. Each node data in time detected by the time required to be passed in the appropriate processing is possible because the data transfer time in this paper, the monitoring of the sensor network through a node are allowed to exist within the time range and transmits data to the server Analysis of the data transfer time for checking whether the system was implemented. Implementation of the data transmission time to the process for analyzing and presenting, according to the procedure suggested by the transit time required for analysis a time difference analysis method, a data collection method and a data transmission time and transmission time calculating method presented.

  • PDF

A study of collection evaluation using conspectus methodology (컨스펙터스방법을 이용한 장서평가연구)

  • 박진희
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.2
    • /
    • pp.163-191
    • /
    • 1998
  • The im of the present study is to introduce and develop the concept and theory of conspectus for the first time in Korea, and to propose a new evaluation model for book collection by actually applying the developed methodology to the collection of a special library dedicated to Biblical Studies. Conspectus is a standardized and objective evaluation method that classifies the main collection according to the division, category, subject, and then gives each collection ots appropriate collection level code by analyzing the classified collection in terms of three different dimensions, which are Current Collection Level(CL), Acquisition Commitment Level(AC), and Collection Goal Level(GL). To evaluate the collection of the sample library, shelflist analysis, list checking, acquisition data in ordering process by their main subject, and survey of its users have been carried out, and all of their results ahve been indicated in terms of eleven collection level codes developed by WLN Conspectus. T e collection of sample library was evaluated as '3cW' for CL, '4W' for AC, and '4W' for GL when the Conspectus methodology was applied for evaluation. This study could be utilized as an collection evaluation model for theological libraries, and become a basis to bring about more active cooperative collection development among related libraries.

  • PDF

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Development of Graph based Deep Learning methods for Enhancing the Semantic Integrity of Spaces in BIM Models (BIM 모델 내 공간의 시멘틱 무결성 검증을 위한 그래프 기반 딥러닝 모델 구축에 관한 연구)

  • Lee, Wonbok;Kim, Sihyun;Yu, Youngsu;Koo, Bonsang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.3
    • /
    • pp.45-55
    • /
    • 2022
  • BIM models allow building spaces to be instantiated and recognized as unique objects independently of model elements. These instantiated spaces provide the required semantics that can be leveraged for building code checking, energy analysis, and evacuation route analysis. However, theses spaces or rooms need to be designated manually, which in practice, lead to errors and omissions. Thus, most BIM models today does not guarantee the semantic integrity of space designations, limiting their potential applicability. Recent studies have explored ways to automate space allocation in BIM models using artificial intelligence algorithms, but they are limited in their scope and relatively low classification accuracy. This study explored the use of Graph Convolutional Networks, an algorithm exclusively tailored for graph data structures. The goal was to utilize not only geometry information but also the semantic relational data between spaces and elements in the BIM model. Results of the study confirmed that the accuracy was improved by about 8% compared to algorithms that only used geometric distinctions of the individual spaces.

Analysis Program for Offshore Wind Energy Substructures Embedded in AutoCAD (오토캐드 환경에서 구현한 해상풍력 지지구조 해석 프로그램)

  • James Ban;Chuan Ma;Sorrasak Vachirapanyakun;Pasin Plodpradit;Goangseup Zi
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.27 no.4
    • /
    • pp.33-44
    • /
    • 2023
  • Wind power is one of the most efficient and reliable energy sources in the transition to a low-carbon society. In particular, offshore wind power provides a high-quality and stable wind resource compared to onshore wind power while both present a higher installed capacity than other renewables. In this paper, we present our new program, the X-WIND program well suitable for the assessment of the substructure of offshore wind turbines. We have developed this program to increase the usability of analysis programs for offshore wind energy substructures by addressing the shortcomings of existing programs. Unlike the existing programs which cannot solely perform the substructure analyses or lack pre-post processors, our X-WIND program can complete the assessment analysis for the offshore wind turbines alone. The X-WIND program is embedded in AutoCAD so that both design and analysis are performed on a single platform. This also performs static and dynamic analysis for wind, wave, and current loads, essential for offshore wind power structures, and includes pre/post processors for designs, mesh developments, graph plotting, and code checking. With this expertise, our program enhances the usability of analysis programs for offshore wind energy substructures, promoting convenience and efficiency.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.