• Title/Summary/Keyword: New Address Information

Search Result 682, Processing Time 0.023 seconds

On the Internet Securities Transaction (인터넷에 의한 증권거래에 관하여 - ILA. Committee on International Securities Regulation에서의 논의 -)

  • 박영길
    • Journal of Arbitration Studies
    • /
    • v.12 no.2
    • /
    • pp.221-262
    • /
    • 2003
  • In recent years, information technological revolution of using Internet in the Stock Market has shown reconsideration of Securities and Exchange Law. Since the 1998 Taipei Conference, ILA have studied upon it and presented 6th Interim Report during the 2000 London Conference. This paper summarizes a part of the 6th Interim Report. The Internet has created a medium to which traditional principles of jurisdiction may not have full relevance. To understand the jurisdictional issues posed by this new medium, we should first review the traditional principles of jurisdiction under international, U. S. law and Other Countries law. In previous reports, the general principles of jurisdiction in international law have been described. These principles are, however, difficult to apply in the context of Internet and other forms of computerized securities trading. Regulators all over the world are trying to address and solve jurisdictional issues raised by the Internet. The traditional rules of jurisdiction in international law, grounded as they are on a geography-based approach, may be in the process of being undermined by the Internet and other global networks allowing for remote access to information and to markets.

  • PDF

Performance Evaluation of Coordinated Multi-Point Transmission and Reception in Indoor Mobile Communication Systems

  • Lee, Woongsup;Lee, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.167-172
    • /
    • 2013
  • Recently, mobile communication systems are suffering from exponentially increasing data traffic. As a promising solution to the increase in data traffic, a coordinated multi-point transmission and reception (CoMP) scheme has been proposed. Although a great deal of research has been done on this new technology, the performance of mobile communication systems with CoMP has not been evaluated properly in a typical indoor environment. To address this, we have developed a system-level simulator and evaluated the performance of mobile communication systems with CoMP. Unlike previous works, we have used an actual antenna pattern in our simulator and link-level results are properly taken into account through link-level abstraction. By using a system-level simulator, we have evaluated the performance of mobile communication systems with CoMP in an indoor environment and found that unlike an outdoor cellular environment, CoMP may not improve the performance of overall mobile communication systems in an indoor environment.

Design of System Call Monitoring System for Command Execution Detection in Stack Memory Area (스택메모리상의 명령 수행 탐지를 위한 시스템콜 모니터링 도구 설계)

  • 최양서;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.772-775
    • /
    • 2004
  • After Morris' Internet Worm in 1988, the stack buffer overflow hacking became generally known to hackers and it has been used to attack systems and servers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that uses the system call monitoring mechanism and memory address where the system call is made.

  • PDF

New Defense Method Against Software Vulnerability Attack by Control Flow Address Validation (제어흐름주소 검증을 이용한 소프트웨어 취약점 공격 대응 기법)

  • 최명렬;김기한;박상서
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.343-345
    • /
    • 2004
  • 높은 효율성과 시스템 자원을 세일하게 제어할 수 있는 편리성을 제공하기 위해서 소프트웨어의 안전성에 대한 책임을 개발자가 지게하는 C 언어의 특성으로 인해서 버퍼 오버플로우, 포맷 스트링 기법 등을 이용한 소프트웨어 공격이 계속 나타나고 있다. 지금까지 알려진 소프트웨어 공격 기법의 다수가 버퍼 오버프로우 기법을 이용한 것이어서 지금까지의 연구는 주로 버퍼 오버플로우 공격 방지 및 탐지에 집중되어 있어 다른 공격 기법에 적용하는 데는 한계가 있었다. 본 논문에서는 소프트웨어 공격의 궁극적인 목적이 제어흐름을 변경시키는 것이라는 것을 바탕으로 프로그램의 제어흐름이 정상적인 범위를 벗어날 경우 이를 공격으로 탐지하는 새로운 기법을 제안하고 기존 연구 결과들과 비교하였다.

  • PDF

Series Resonant Type Sustain Driver for PDP Driving (PDP 구동을 위한 직렬공진형 서스테인 드라이버)

  • Kang, Feel-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.1
    • /
    • pp.115-121
    • /
    • 2008
  • This paper presents a new sustain driver employing energy recovery function to minimize power losses transpired during the operation of plasma display panel. The proposed circuit uses the resonance between the equivalent capacitance of panel and an external inductor to provide/recover energy to/from the panel. The proposed circuit can save the system cost compared with the conventional one, and has high-performance in energy recovery. To verify the validity of the proposed circuit, we implemented experiments based on 7.5 inch AC-PDP.

David II: A new architecture for parallel rendering processors with effective memory system (David II: 효과적인 메모리 시스템을 가지는 병렬 렌더링 프로세서)

  • Lee, Kil-Whan;Park, Woo-Chan;Kim, Il-San;Han, Tack-Don
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1655-1658
    • /
    • 2004
  • Current rendering processors are organized mainly to process a triangle as fast as possible and recently parallel 3D rendering processors, which can process multiple triangles in parallel with multiple rasterizers, begin to appear. For high performance in processing triangles, it is desirable for each rasterizer have its own local pixel cache. However, the consistency problem may occur in accessing the data at the same address simultaneously by more than one rasterizer. In this paper, we propose a parallel rendering processor architecture, called DAVID II, resolving such consistency problem effectively. Moreover, the proposed architecture reduces the latency due to a pixel cache miss significantly. The experimental results show that DAVID II achieves almost linear speedup at best case even in sixteen rasterizers.

  • PDF

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

Scaling Up Face Masks Classification Using a Deep Neural Network and Classical Method Inspired Hybrid Technique

  • Kumar, Akhil;Kalia, Arvind;Verma, Kinshuk;Sharma, Akashdeep;Kaushal, Manisha;Kalia, Aayushi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3658-3679
    • /
    • 2022
  • Classification of persons wearing and not wearing face masks in images has emerged as a new computer vision problem during the COVID-19 pandemic. In order to address this problem and scale up the research in this domain, in this paper a hybrid technique by employing ResNet-101 and multi-layer perceptron (MLP) classifier has been proposed. The proposed technique is tested and validated on a self-created face masks classification dataset and a standard dataset. On self-created dataset, the proposed technique achieved a classification accuracy of 97.3%. To embrace the proposed technique, six other state-of-the-art CNN feature extractors with six other classical machine learning classifiers have been tested and compared with the proposed technique. The proposed technique achieved better classification accuracy and 1-6% higher precision, recall, and F1 score as compared to other tested deep feature extractors and machine learning classifiers.

The computer power-saving system using DHCP (DHCP를 이용한 컴퓨터 절전 시스템)

  • Kim, Hong-Yoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.5
    • /
    • pp.75-82
    • /
    • 2009
  • It is possible that gain good effect for saving electric charges by power-saving education to organizer, instead of buying new energy saving computer in the company, school and public organization. But this kind of education needs time very much. And power management system for controling whole computer of organizer is released, but it is hard to set up. In this paper we prevent computers which do not have power shutdown software, from obtaining IP address by DHCP. So we induce organizer to setup power shutdown software.

Saliency-Assisted Collaborative Learning Network for Road Scene Semantic Segmentation

  • Haifeng Sima;Yushuang Xu;Minmin Du;Meng Gao;Jing Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.861-880
    • /
    • 2023
  • Semantic segmentation of road scene is the key technology of autonomous driving, and the improvement of convolutional neural network architecture promotes the improvement of model segmentation performance. The existing convolutional neural network has the simplification of learning knowledge and the complexity of the model. To address this issue, we proposed a road scene semantic segmentation algorithm based on multi-task collaborative learning. Firstly, a depthwise separable convolution atrous spatial pyramid pooling is proposed to reduce model complexity. Secondly, a collaborative learning framework is proposed involved with saliency detection, and the joint loss function is defined using homoscedastic uncertainty to meet the new learning model. Experiments are conducted on the road and nature scenes datasets. The proposed method achieves 70.94% and 64.90% mIoU on Cityscapes and PASCAL VOC 2012 datasets, respectively. Qualitatively, Compared to methods with excellent performance, the method proposed in this paper has significant advantages in the segmentation of fine targets and boundaries.