• Title/Summary/Keyword: Pattern file

Search Result 155, Processing Time 0.032 seconds

Framework Architecture of Intrusion Detection System against Denial-of-Service Attack, especially for Web Server System (웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성)

  • Kim, Yoon-Jeong
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • The pattern matching part of Intrusion Detection System based on misuse-detection mechanism needs much processing time and resources, and it has become a bottleneck in system performance. Moreover, it derives denial-of-service attack. In this paper, we propose (1) framework architecture that is strong against denial-of-service attack and (2) efficient pattern matching method especially for web server system. By using both of these 2 methods, we can maintain web server system efficiently secure against attacks including denial-of-service.

  • PDF

A study on the development of CAD system for the design of lens of the turn signal lamp (자동차 방향지시등 렌즈설계를 우한 CAD 시스템의 개발에 관한 연구)

  • 이재원;이우용
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.15 no.3
    • /
    • pp.89-95
    • /
    • 1993
  • This paper presents the development of CAD system for the design of lens of the Turn Signal Lamp that can model and simulate its optical performance. The system consists of three main modules: skin surface modeling module, inner lens modeling module and optical performance simulation module. Skin surface geometry can be modeled by the input of data file and inner lens can be modeled by the input of only four parameter using its geometric characteristics. Also light distribution pattern, the barometer of optical performance is generated by means of finite ray tracing method. The system display modeled geometry, ray tracing and generated light distribution pattern.

  • PDF

A Study on Circuit Parameter Extraction from Mask Pattern Data (마스크 패턴데이타로 부터의 회로 파라미터 추출에 관한 연구)

  • Lee, Jae-Seong;Rho, Seung-Ryong;Kim, Chul-Ju
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.1532-1535
    • /
    • 1987
  • In this paper, we propose the algorithm for mask level simulation. The circuit parameters were extracted from the photomask data in format of bitmap. The extracted circuit parameter was transformed into the input file format of SPICE-16. And then the simulation of mask pattern data was carried out the SPICE-16. Thus the error operation of IC due to the mistake of photomask pattern could be prevented.

  • PDF

X-Ray Diffraction Analysis of Various Calcium Silicate-Based Materials

  • An, So-Youn;Lee, Myung-Jin;Shim, Youn-Soo
    • Journal of dental hygiene science
    • /
    • v.22 no.3
    • /
    • pp.191-198
    • /
    • 2022
  • Background: The purpose of this study was to evaluate the composition of the crystal phases of various calcium silicate-based materials (CSMs): ProRoot white MTA (mineral trioxide aggregate) (WMTA), Ortho MTA (OM), Endocem MTA (EM), Retro MTA (RM), Endocem Zr (EN-Z), BiodentineTM (BD), EZ-sealTM (EZ), and OrthoMTA III (OM3). Methods: In a sample holder, 5 g of the powder sample was placed and the top surface of the material was packed flat using a sterilized glass slide. The prepared slides were mounted on an X-ray diffraction (XRD) instrument (D8 Advance; Bruker AXS GmbH, Germany). The X-ray beam 2θ angle range was set at 10~90° and scanned at 1.2° per minute. The Cu X-ray source set to operate at 40 kV and 40 mA in the continuous mode. The peaks in the diffraction pattern of each sample were analyzed using the software Diffrac (version 2.1). Then, the peaks were compared and matched with those of standard materials in the corresponding Powder Diffraction File (PDF-2, JCPDS International Center for Diffraction Data). A powder samples of the materials were analyzed using XRD and the peaks in diffraction pattern were compared to the Powder Diffraction File data. Results: Eight CSMs showed a similar diffraction pattern because their main component was calcium silicate. Eight CSMs showed similar diffraction peaks because calcium silicate was their main component. Two components were observed to have been added as radiopacifiers: bismuth oxide was detected in WMTA, OM, and EM while zirconium oxide was detected in RM, EN-Z, BD, EZ, and OM3. Unusual patterns were detected for the new material, OM3, which had strong peaks at low angles. Conclusion: It was caused by the presence of Brushite, which is believed to have resulted in crystal growth in a particular direction for a specific purpose.

Development of Metacognitive-Based Online Learning Tools Website for Effective Learning (효과적인 학습을 위한 메타인지 기반의 온라인 학습 도구 웹사이트 구축)

  • Lee, Hyun-June;Bean, Gi-Bum;Kim, Eun-Seo;Moon, Il-Young
    • Journal of Practical Engineering Education
    • /
    • v.14 no.2
    • /
    • pp.351-359
    • /
    • 2022
  • In this paper, this app is an online learning tool web application that helps learners learn efficiently. It discusses how learners can improve their learning efficiency in these three aspects: retrieval practice, systematization, metacognition. Through this web service, learners can proceed with learning with a flash card-based retrieval practice. In this case, a method of managing a flash card in a form similar to a directory-file system using a composite pattern is described. Learners can systematically organize their knowledge by converting flash cards into a mind map. The color of the mind map varies according to the learner's learning progress, and learners can easily recognize what they know and what they do not know through color. In this case, it is proposed to build a deep learning model to improve the accuracy of an algorithm for determining and predicting learning progress.

Analysis of Image Processing Characteristics in Computed Radiography System by Virtual Digital Test Pattern Method (Virtual Digital Test Pattern Method를 이용한 CR 시스템의 영상처리 특성 분석)

  • Choi, In-Seok;Kim, Jung-Min;Oh, Hye-Kyong;Kim, You-Hyun;Lee, Ki-Sung;Jeong, Hoi-Woun;Choi, Seok-Yoon
    • Journal of radiological science and technology
    • /
    • v.33 no.2
    • /
    • pp.97-107
    • /
    • 2010
  • The objectives of this study is to figure out the unknown image processing methods of commercial CR system. We have implemented the processing curve of each Look up table(LUT) in REGIUS 150 CR system by using virtual digital test pattern method. The characteristic of Dry Imager was measured also. First of all, we have generated the virtual digital test pattern file with binary file editor. This file was used as an input data of CR system (REGIUS 150 CR system, KONICA MINOLTA). The DICOM files which were automatically generated output files by the CR system, were used to figure out the processing curves of each LUT modes (THX, ST, STM, LUM, BONE, LIN). The gradation curves of Dry Imager were also measured to figure out the characteristics of hard copy image. According to the results of each parameters, we identified the characteristics of image processing parameter in CR system. The processing curves which were measured by this proposed method showed the characteristics of CR system. And we found the linearity of Dry Imager in the middle area of processing curves. With these results, we found that the relationships between the curves and each parameters. The G value is related to the slope and the S value is related to the shift in x-axis of processing curves. In conclusion, the image processing method of the each commercial CR systems are different, and they are concealed. This proposed method which uses virtual digital test pattern can measure the characteristics of parameters for the image processing patterns in the CR system. We expect that the proposed method is useful to analogize the image processing means not only for this CR system, but also for the other commercial CR systems.

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

Prefetching Policy based on File Acess Pattern and Cache Area (파일 접근 패턴과 캐쉬 영역을 고려한 선반입 기법)

  • Lim, Jae-Deok;Hwang-Bo, Jun-Hyeong;Koh, Kwang-Sik;Seo, Dae-Hwa
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.447-454
    • /
    • 2001
  • Various caching and prefetching algorithms have been investigated to identify and effective method for improving the performance of I/O devices. A prefetching algorithm decreases the processing time of a system by reducing the number of disk accesses when an I/O is needed. This paper proposes an AMBA prefetching method that is an extended version of the OBA prefetching method. The AMBA prefetching method will prefetching blocks continuously as long as disk bandwidth is enough. In this method, though there were excessive data request rate, we would expect efficient prefetching. And in the AMBA prefetching method, to prevent the cache pollution, it limits the number of data blocks to be prefetched within the cache area. It can be implemented in a user-level File System based on a Linux Operating System. In particular, the proposed prefetching policy improves the system performance by about 30∼40% for large files that are accessed sequentially.

  • PDF

A Pattern Matching Extended Compression Algorithm for DNA Sequences

  • Murugan., A;Punitha., K
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.196-202
    • /
    • 2021
  • DNA sequencing provides fundamental data in genomics, bioinformatics, biology and many other research areas. With the emergent evolution in DNA sequencing technology, a massive amount of genomic data is produced every day, mainly DNA sequences, craving for more storage and bandwidth. Unfortunately, managing, analyzing and specifically storing these large amounts of data become a major scientific challenge for bioinformatics. Those large volumes of data also require a fast transmission, effective storage, superior functionality and provision of quick access to any record. Data storage costs have a considerable proportion of total cost in the formation and analysis of DNA sequences. In particular, there is a need of highly control of disk storage capacity of DNA sequences but the standard compression techniques unsuccessful to compress these sequences. Several specialized techniques were introduced for this purpose. Therefore, to overcome all these above challenges, lossless compression techniques have become necessary. In this paper, it is described a new DNA compression mechanism of pattern matching extended Compression algorithm that read the input sequence as segments and find the matching pattern and store it in a permanent or temporary table based on number of bases. The remaining unmatched sequence is been converted into the binary form and then it is been grouped into binary bits i.e. of seven bits and gain these bits are been converted into an ASCII form. Finally, the proposed algorithm dynamically calculates the compression ratio. Thus the results show that pattern matching extended Compression algorithm outperforms cutting-edge compressors and proves its efficiency in terms of compression ratio regardless of the file size of the data.

A Study on Classification of CNN-based Linux Malware using Image Processing Techniques (영상처리기법을 이용한 CNN 기반 리눅스 악성코드 분류 연구)

  • Kim, Se-Jin;Kim, Do-Yeon;Lee, Hoo-Ki;Lee, Tae-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.634-642
    • /
    • 2020
  • With the proliferation of Internet of Things (IoT) devices, using the Linux operating system in various architectures has increased. Also, security threats against Linux-based IoT devices are increasing, and malware variants based on existing malware are constantly appearing. In this paper, we propose a system where the binary data of a visualized Executable and Linkable Format (ELF) file is applied to Local Binary Pattern (LBP) image processing techniques and a median filter to classify malware in a Convolutional Neural Network (CNN). As a result, the original image showed the highest accuracy and F1-score at 98.77%, and reproducibility also showed the highest score at 98.55%. For the median filter, the highest precision was 99.19%, and the lowest false positive rate was 0.008%. Using the LBP technique confirmed that the overall result was lower than putting the original ELF file through the median filter. When the results of putting the original file through image processing techniques were classified by majority, it was confirmed that the accuracy, precision, F1-score, and false positive rate were better than putting the original file through the median filter. In the future, the proposed system will be used to classify malware families or add other image processing techniques to improve the accuracy of majority vote classification. Or maybe we mean "the use of Linux O/S distributions for various architectures has increased" instead? If not, please rephrase as intended.