• Title/Summary/Keyword: New Address Information

Search Result 703, Processing Time 0.034 seconds

Improving Compiler to Prevent Buffer Overflow Attack (버퍼오버플로우 공격 방지를 위한 컴파일러 기법)

  • Kim, Jong-Ewi;Lee, Seong-Uck;Hong, Man-Pyo
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.453-458
    • /
    • 2002
  • Recently, the number of hacking, that use buffer overflow vulnerabilities, are increasing. Although the buffer overflow Problem has been known for a long time, for the following reasons, it continuos to present a serious security threat. There are three defense method of buffer overflow attack. First, allow overwrite but do not allow unauthorized change of control flow. Second, do not allow overwriting at all. Third, allow change of control flow, but prevents execution of injected code. This paper is for allowing overwrites but do not allow unauthorized change of control flow which is the solution of extending compiler. The previous defense method has two defects. First, a program company with overhead because it do much thing before than applying for the method In execution of process. Second, each time function returns, it store return address in reserved memory created by compiler. This cause waste of memory too much. The new proposed method is to extend compiler, by processing after compiling and linking time. To complement these defects, we can reduce things to do in execution time. By processing additional steps after compile/linking time and before execution time. We can reduce overhead.

Semantic Computing for Big Data: Approaches, Tools, and Emerging Directions (2011-2014)

  • Jeong, Seung Ryul;Ghani, Imran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2022-2042
    • /
    • 2014
  • The term "big data" has recently gained widespread attention in the field of information technology (IT). One of the key challenges in making use of big data lies in finding ways to uncover relevant and valuable information. The high volume, velocity, and variety of big data hinder the use of solutions that are available for smaller datasets, which involve the manual interpretation of data. Semantic computing technologies have been proposed as a means of dealing with these issues, and with the advent of linked data in recent years, have become central to mainstream semantic computing. This paper attempts to uncover the state-of-the-art semantics-based approaches and tools that can be leveraged to enrich and enhance today's big data. It presents research on the latest literature, including 61 studies from 2011 to 2014. In addition, it highlights the key challenges that semantic approaches need to address in the near future. For instance, this paper presents cutting-edge approaches to ontology engineering, ontology evolution, searching and filtering relevant information, extracting and reasoning, distributed (web-scale) reasoning, and representing big data. It also makes recommendations that may encourage researchers to more deeply explore the applications of semantic technology, which could improve the processing of big data. The findings of this study contribute to the existing body of basic knowledge on semantics and computational issues related to big data, and may trigger further research on the field. Our analysis shows that there is a need to put more effort into proposing new approaches, and that tools must be created that support researchers and practitioners in realizing the true power of semantic computing and solving the crucial issues of big data.

A Study on the Construction of CIS(Cooperative Information System) based on CBD (CBD 기반의 CIS 구성에 관한 연구)

  • Kim, Haeng-Gon;Sin, Ho-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.715-722
    • /
    • 2001
  • In recent years, we recognize a new paradigm in the development process:From object oriented development, to the development process which has focused on the use of standard components. In recent years a lot of research related to the component-based development has been done, especially in business domain. but still there are many open and unresolved problems in this area. such as established development process for a distributed environment, formal process, infrastructure for COTS, development and management tool considering maintenance to guarantee a proper treatment of components. It also required a service and an application integration for component. In this paper, we propose cooperative information systems (CIS) that supports component based development. It must address for component based systems to achieve their full potential. We identify a set of CIS organized 3-tier which is a presentation layer, business logic layer and data control layer. We also discuss the specific roles and activities for the layers. we also define the behavior and managed information for business logic layer as core level. As an illustration of the CIS, we present a successful considerations which is widely helpful to user when they make decision in component development and assemble. Also, we expect to component reusability and efficiency in business domain.

  • PDF

Information-Based Urban Regeneration for Smart Education Community (스마트 교육 커뮤니티 정보기반 도시재생)

  • Kimm, Woo-Young;Seo, Boong-Kyo
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.12
    • /
    • pp.13-20
    • /
    • 2018
  • This research is to analyze the public cases of information facilities in terms of central circulations in multi level volumes such as atrium or court which provide visual intervention between different spaces and physical connections such as bridges. Hunt Library design balances the understood pre-existing needs with the University's emerging needs to create a forward-thinking learning environment. While clearly a contemporary structure within a traditional context of the NCSU campus, the Hunt Library provides a positive platform for influencing its surroundings. Both technical and programmatic innovations are celebrated as part of the learning experience and provide a versatile and stimulating environment for students. Public library as open spaces connecting to an interactive social domain over communities can provide variety of learning environments, or technology based labs. There are many cases of the public information spaces with dynamic networks where participants can play their roles in physical space as well as in the intellectual stimulation. In the research, new public projects provide typologies of information spaces with user oriented media. The research is to address a creative transition between the reading space and the experimental links of the integration of state-of-the-art technology is highly visible in the building's design. The user-friendly browsing system that replaces the traditional browsing with the virtual shelves classified and archived by their form, is to reduce the storage space of the public library and it is to allow more space for collaborative learning. In addition to the intelligent robot of information storages, innovative features is the large-scale visualization space that supports team experiments to carry out collaborative online works and therefore the public library's various programs is to provide visitors with more efficient participatory environment.

Implementation of Object Identifier, Mobile RFID and QR Code Exploiting End-of-Life Treatment Information of Internet of Things Devices (사물인터넷 디바이스의 폐기 처리 정보를 활용한 객체 식별자, 모바일 RFID 및 QR 코드 구현)

  • Seo, Jeongwook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.441-447
    • /
    • 2020
  • In a situation in which around 50 million metric tons of electrical and electronic products is generated globally per year, the total installed base of Internet of Things (IoT) devices is projected to amount to around 75 billion worldwide by 2025. However, there is very little research on identification schemes for end-of-life treatment (EoLT) of IoT devices. To address this issue, this paper proposes new identifiers including EoLT information such as recyclability rate (Rcyc) and recoverability rate (Rcov) of an IoT device, recycling rate (RCR) and recovery rate (RVR) of each part in the IoT device, etc. and implements them by using object identifier (OID), mobile radio frequency identification (RFID) and quick response (QR) code. The implemented OID and mobile RFID can be used with cooperation of a remote server via communication networks and the implemented QR code can be used simply with a smartphone app.

Gaussian Blending: Improved 3D Gaussian Splatting for Model Light-Weighting and Deep Learning-Based Performance Enhancement

  • Yeong-In Lee;Jin-Nyeong Heo;Ji-Hwan Moon;Ha-Young Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.23-32
    • /
    • 2024
  • NVS (Novel View Synthesis) is a field in computer vision that reconstructs new views of a scene from a set of input views. Real-time rendering and high performance are essential for NVS technology to be effectively utilized in various applications. Recently, 3D-GS (3D Gaussian Splatting) has gained popularity due to its faster training and inference times compared to those of NeRF (Neural Radiance Fields)-based methodologies. However, since 3D-GS reconstructs a 3D (Three-Dimensional) scene by splitting and cloning (Density Control) Gaussian points, the number of Gaussian points continuously increases, causing the model to become heavier as training progresses. To address this issue, we propose two methodologies: 1) Gaussian blending, an improved density control methodology that removes unnecessary Gaussian points, and 2) a performance enhancement methodology using a depth estimation model to minimize the loss in representation caused by the blending of Gaussian points. Experiments on the Tanks and Temples Dataset show that the proposed methodologies reduce the number of Gaussian points by up to 4% while maintaining performance.

Maximizing Utilization of Bandwidth using Multiple SSID in Multiple Wireless Routers Environment (다중 무선 공유기 환경에서 Multiple SSID를 이용한 대역폭 이용률 극대화)

  • Kwak, Hu-Keun;Yoon, Young-Hyo;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.384-394
    • /
    • 2008
  • A wireless router is a device which allows several wireless clients to share an internet line using NAT (Network Address Translation). In a school or a small office environment where many clients use multiple wireless routers, a client may select anyone of wireless routers so that most clients can be clustered to a small set of the wireless routers. In such a case, there exists load unbalancing problem between clients and wireless routers. One of its result is that clients using the busiest router get poor service. The other is that the resource utilization of the whole wireless routers becomes very low. In order to resolve the problems, we propose a load sharing scheme to maximize network bandwidth utilization based on multiple SSID. In a time internal, the proposed scheme keeps to show the available bandwidth information of all the possible wireless routers to clients through multiple SSID. A new client can select the most available band with router. This scheme allows to achieve a good load balancing between clients and routers in terms of bandwidth utilization. We implemented the proposed scheme with ASUS WL 500G wireless router and performed experiments. Experimental results show the bandwidth utilization improvement compared to the existing method.

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

An End-to-End Mobility Support Mechanism based on mSCTP (mSCTP를 이용한 종단간 이동성 지원 방안)

  • 장문정;이미정;고석주
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.393-404
    • /
    • 2004
  • Recently, mSCTP (Mobile SCTP) has been proposed as a transport layer approach for supporting mobility. mSCTP is based on the ‘multi-homing’ feature of Stream Control Transmission Protocol(SCTP), and utilize the functions to dynamically add or delete IP addresses of end points to or from the existing connectionin order to support mobility. In this paper, we propose a mechanism to determine when to add or delete an W address, utilizing the link layer radio signal strength information in order to enhance the performance of mSCTP We also propose a mechanism for a mobile node to initiate the change of data delivery path based on link layer radio signal strength information. In addition, if it takes long time to acquire new data path, we propose an approach for reducing handover latency. The simulation results show that the performance of proposed transport layer mobility support mechanism is competitive compared to the traditional network layer mobility supporting approach. Especially, when the moving speed of mobile node is fast, it shows better performance than the traditional network layer approaches.

Modeling and Analysis of Vehicle Detection Using Roadside Ultrasonic Sensors in Wireless Sensor Networks (WSN 기반 노변 초음파 센서를 이용한 차량인식에 대한 모델링 및 분석)

  • Jo, Youngtae;Jung, Inbum
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.745-761
    • /
    • 2014
  • To address the problems of existing traffic information acquisition systems such as high cost and low scalability, wireless sensor networks (WSN)-based traffic information acquisition systems have been studied. WSN-based systems have many benefits including high scalability and low maintenance cost. Recently, various sensors are studied for traffic surveillance based on WSN, such as magnetic, acoustic, and accelerometer sensors. However, ultrasonic sensor based systems have not been studied. There are many issues for WSN-based systems, such as battery driven operation and low computing power. Thus, power saving methods and specific algorithms with low complexity are necessary. In this paper, we introduce optimal methodologies for power saving of ultrasonic sensors based on the modeling and analysis in detail. Moreover, a new vehicle detection algorithm for low complexity using ultrasonic data is presented. The proposed methodologies are implemented in a tiny microprocessor. The evaluation results show that our algorithm has high detection accuracy.