• Title/Summary/Keyword: Computer programming

Search Result 2,153, Processing Time 0.031 seconds

An Analysis of Façade Panel Characteristics of UN Studio's Office Projects (유엔스튜디오 업무시설 외피 패널의 형태적 특성 분석)

  • Ko, Sung Hak
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.8
    • /
    • pp.23-34
    • /
    • 2019
  • The façade, a fundamental function as a skin that protects human life from external environment such as cold and hot weather, snow, rain, and wind, etc, has served as a media for communication between indoor space of the building and outside space. From the media for communication point of view, the approach to envelope design, in which environmental elements are transmitted internally through the filtering of external environments, has been evolving in various ways from the past to the present. Today, modern architecture technologies including curtain wall systems and user-friendly computer programming and environmental analysis programs demonstrate a differentiated approach to envelope design related to the indoor environment. For this reason, it is worth noting that the envelope design factors and trends that appear variously in the UNStudio's projects before and after the 2000s. The factors reflected in the envelop design in conjunction with the indoor environment obtained through the case study of the UNStudio's office projects were daylight environment, thermal environment, ventilation, noise, privacy and view, and consideration for daylight environment and thermal environment was reflected in many cases through the case study. Looking at the changes in the diagrams in order of year, it can be seen that the envelope design using the environmental analysis tool has been performed since 2006. This is a clue to show the envelop design changes from the conceptual method to the data-based one. The diagrams and analysis results related to the envelop design showed that the thermal environment related to solar radiation was the most, and no diagrams and analysis related to the indoor illumination were found. Since 2010, PV panel installation has been shown in the envelope design, which can be found in the increased efficiency of PV panels due to the technological advances and the decrease in production cost.

Web Server Hacking and Security Risk using DNS Spoofing and Pharming combined Attack (DNS 스푸핑을 이용한 포털 해킹과 파밍의 위험성)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1451-1461
    • /
    • 2019
  • DNS spoofing is an attack in which an attacker intervenes in the communication between client and DNS server to deceive DNS server by responding to a fake IP address rather than actual IP address. It is possible to implement a pharming site that hacks user ID and password by duplicating web server's index page and simple web programming. In this paper we have studied web spoofing attack that combines DNS spoofing and pharming site implementation which leads to farming site. We have studied DNS spoofing attack method, procedure and farming site implementation method for portal server of this university. In the case of Kyungsung Portal, bypassing attack and hacking were possible even though the web server was SSL encrypted and secure authentication. Many web servers do not have security measures, and even web servers secured by SSL can be disabled. So it is necessary that these serious risks are to be informed and countermeasures are to be researched.

A Study on "Wittgenstein" Album (비트겐슈타인(Wittgenstein)앨범에 관한 고찰)

  • Kim, Jun-Soo;Cho, Tae-seon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.374-380
    • /
    • 2021
  • Band Wittgenstein is a relatively band-shaped team since Shin Hae-Chul's previous big band "Next." The album, which features Shin Hae-Chul's unique lyrics and specific concepts, is also similar to the Next albums. However, there is a difference in sounds used on the album that are properly fused sampling based work and computer music. This album is a low-budget home recording album produced at a total cost of 3 million won. Shin Hae-Chul was in charge of the main vocals and programming, and all of the works were done together by the band members. In this album, Shin Hae-Chul focused on teamwork rather than producing his own music. The low budget could have been a constraint on music production, but it must be highly appreciated for it being a novel attempt. Musicians who create music always create conflicts between their favorite music and popular ones. However, without creative efforts, there is no evolution or development in the music industry. It is clear that constant changes can continue to develop musical ability, which leads to the development of Korean pop music.

An Analysis Study of SW·AI elements of Primary Textbooks based on the 2015 Revised National Curriculum (2015 개정교육과정에 따른 초등학교 교과서의 SW·AI 요소 분석 연구)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.2
    • /
    • pp.317-325
    • /
    • 2021
  • In this paper, the degree of reflection of SW·AI elements and CT elements was investigated and analyzed for a total of 44 textbooks of Korean, social, moral, mathematics and science textbooks based on the 2015 revised curriculum. As a result of the analysis, most of the activities of data collection, data analysis, and data presentation, which are ICT elements, were not reflected, and algorithm and programming elements were not reflected among SW·AI content elements, and there were no abstraction, automation, and generalization elements among CT elements. Therefore, in order to effectively implement SW·AI convergence education in elementary school subjects, we will expand ICT utilization activities to SW·AI utilization activities. Training on the understanding of SW·AI convergence education and improvement of teaching and learning methods using SW·AI is needed for teachers. In addition, it is necessary to establish an information curriculum and secure separate class hours for substantial SW·AI education.

Information Structuring of Diagram Repository for UML Diagrams (UML 다이어그램을 위한 다이어그램 레포지토리의 정보구조화)

  • Kim, Yun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1588-1595
    • /
    • 2019
  • This paper presents the technique on structuring information of the diagram repository for UML diagrams. Because object interactions are the body of object-oriented programming, this paper handles especially the sequence diagrams and class diagrams among UML diagrams. Based on class diagrams, sequence diagrams represent the procedure of object interactions in run-time and then the corresponding codes are generated from the contents of those sequence diagrams. To do this work, this paper presents a method to construct the information repository for generating code from the contents of sequence diagrams. This paper classifies the five message types of sequence diagrams and then extracts the needed information including items and values on the corresponding message types for constructing message repositories. Because sequence diagram is composed of messages included, the final repository is constructed by collecting each of structured repositories on messages sequentially.

Development of a Forensic Analyzing Tool based on Cluster Information of HFS+ filesystem

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.178-192
    • /
    • 2021
  • File system forensics typically focus on the contents or timestamps of a file, and it is common to work around file/directory centers. But to recover a deleted file on the disk or use a carving technique to find and connect partial missing content, the evidence must be analyzed using cluster-centered analysis. Forensics tools such as EnCase, TSK, and X-ways, provide a basic ability to get information about disk clusters, but these are not the core functions of the tools. Alternatively, Sysinternals' DiskView tool provides a more intuitive visualization function, which makes it easier to obtain information around disk clusters. In addition, most current tools are for Windows. There are very few forensic analysis tools for MacOS, and furthermore, cluster analysis tools are very rare. In this paper, we developed a tool named FACT (Forensic Analyzer based Cluster Information Tool) for analyzing the state of clusters in a HFS+ file system, for digital forensics. The FACT consists of three features, a Cluster based analysis, B-tree based analysis, and Directory based analysis. The Cluster based analysis is the main feature, and was basically developed for cluster analysis. The FACT tool's cluster visualization feature plays a central role. The FACT tool was programmed in two programming languages, C/C++ and Python. The core part for analyzing the HFS+ filesystem was programmed in C/C++ and the visualization part is implemented using the Python Tkinter library. The features in this study will evolve into key forensics tools for use in MacOS, and by providing additional GUI capabilities can be very important for cluster-centric forensics analysis.

Formal Semantics Based on Action Equation 2.0 for Python (작용식 2.0 기반 파이썬에 대한 형식 의미론)

  • Han, Jung Lan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.6
    • /
    • pp.163-172
    • /
    • 2021
  • To specify a formal semantics for a programming language is to do a significant part for design, standardization and translation of it. The Python is popular and powerful, it is necessary to do research for a formal semantics to specify a static and dynamic semantics for Python clearly in order to design a similar language and do an efficient translation. This paper presents the Action Equation 2.0 that specifies a formal semantics for Python to change and update Action Equation. To measure the execution time for Python programs, we implemented the semantic structure specified in Action Equation 2.0 in Java, and prove through simulation that Action Equation 2.0 is a real semantic structure that can be implemented. The specified Action Equation 2.0 is compared to other descriptions, in terms of readability, modularity, extensibility, and flexibility and then we verified that Action Equation 2.0 is superior to other formal semantics.

Puzzle Rule Algorithm of Euler Square Game (오일러 방진 게임 퍼즐 규칙 알고리즘)

  • Lee, Sang-Un
    • Journal of Industrial Convergence
    • /
    • v.19 no.4
    • /
    • pp.23-28
    • /
    • 2021
  • This paper finds the regular pattern of n = [3, ∞] for Euler square game related with n = 6(6×6=36) thirty-six officer problem that is still unsolved problem. The solution of this problem is exists for n = [3, 10] without n = 6. Also, previous researchers finds the random assigned solution for specific number using computer programming. Therefore, the solution of n = [11, ∞] Euler squares are unsolved problem because of anything but easy. This paper attempts to find generalized patterns for domains that have been extended to n = [3, ∞], while existing studies have been limited to n = [3, 10]. This paper classify the n = [3, ∞] into n = odd, 4k even, 4k+2 even of three classes. Then we find the simple regular pattern solution for n = odd and 4k even(n/2 = even). But we can't find the regular pattern for 4k+2 even(n/2 = odd).

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

Method to Use the Augmented Reality for Construction Planning and Management

  • Nam, Keong-Woo;Kang, Chulung;Jang, Myunghoun
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1067-1074
    • /
    • 2022
  • An architect creates his/her design to meet owner's requirements. Floor plans, perspective drawings, and scale models are used in order for the owner to choose the design. The tools are a little helpful for communication between the architect and the owner in case the owner does not know architecture. The scale models are good, but it is hard to make scale models while design is in progress. 3D CAD is a good tool for communication, but it is time-consuming and requires high-performance computer hardware. Augmented reality is able to show 3D virtual models that are updated by the architect with smart devices such as a smart phone and a tablet PC. The owner frequently reviews the updated design anytime anywhere. This study proposes a method to use augmented reality for architectural design and construction management. The method supports the communication between the owner, the architect and the contractor to review updated designs, and to complete the building project. 3D models expressed in augmented reality are created using SketchUp with 2D drawings for building construction. An Android application implementing augmented reality is developed by Qualcomm Vuforia and Unity on smart devices. Drawings as markers and 3D models are connected in Unity. And functions that temporarily hide unnecessary parts can be implemented in C# programming language. If an owner, an architect, or a contractor looks at a smart phone on a 2D drawing, he/she can identify building elements such as 3D buildings or columns on a screen. This can help communication between them.

  • PDF