• Title/Summary/Keyword: SW engineering

Search Result 832, Processing Time 0.025 seconds

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.

Design of High School Software AI Education Model in IoT Environment (사물인터넷 환경에서의 고등학교 SW·AI 교육 모델 설계)

  • Keun-Ho Lee;JungSoo Han
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.49-55
    • /
    • 2023
  • The evolution of new digital technologies is progressing rapidly. In particular, many changes in software and artificial intelligence are progressing rapidly in the field of education. The Ministry of Education is planning an educational program by linking software and artificial intelligence regular curriculum. Before applying it to regular subjects, various software and artificial intelligence related experience camps are being promoted. This study aims to construct an educational model for software and artificial intelligence education programs for high school students based on new digital technology. By expanding and distributing software and artificial intelligence education, we aim to enhance the basic capabilities of software and artificial intelligence for high school students. I would like to define the concept of software and artificial intelligence in high school and propose a model that links software and artificial intelligence learning factors to the regular curriculum.

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.

Effects of Programming Education using Visual Literacy: Focus on Arts Major (시각적 문해력을 활용한 프로그래밍 교육의 효과 : 예술계열 중심으로)

  • Su-Young Pi;Hyun-Sook Son
    • Journal of Practical Engineering Education
    • /
    • v.16 no.2
    • /
    • pp.105-114
    • /
    • 2024
  • Recently, with an emphasis on software proficiency, universities are providing software education to all students regardless of their majors. However, non-majors often lack motivation for software education and perceive the unfamiliar learning content as more challenging. To address this issue, tailored software education according to the learners' characteristics is essential. Art students, for instance, with their strong visual comprehension and expressive abilities, can benefit from utilizing visual literacy to enhance the effectiveness of programming education. In this study, we propose decomposing everyday problems into flowcharts and pseudocode to construct procedural and visual images. Using the educational programming language PlayBot, we aim to analyze the effectiveness of teaching by coding to solve problems. Through this approach, students are expected to grasp programming concepts, understand problem-solving processes through computational thinking, and acquire skills to apply programming in their respective fields.

Restoring Omitted Sentence Constituents in Encyclopedia Documents Using Structural SVM (Structural SVM을 이용한 백과사전 문서 내 생략 문장성분 복원)

  • Hwang, Min-Kook;Kim, Youngtae;Ra, Dongyul;Lim, Soojong;Kim, Hyunki
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.131-150
    • /
    • 2015
  • Omission of noun phrases for obligatory cases is a common phenomenon in sentences of Korean and Japanese, which is not observed in English. When an argument of a predicate can be filled with a noun phrase co-referential with the title, the argument is more easily omitted in Encyclopedia texts. The omitted noun phrase is called a zero anaphor or zero pronoun. Encyclopedias like Wikipedia are major source for information extraction by intelligent application systems such as information retrieval and question answering systems. However, omission of noun phrases makes the quality of information extraction poor. This paper deals with the problem of developing a system that can restore omitted noun phrases in encyclopedia documents. The problem that our system deals with is almost similar to zero anaphora resolution which is one of the important problems in natural language processing. A noun phrase existing in the text that can be used for restoration is called an antecedent. An antecedent must be co-referential with the zero anaphor. While the candidates for the antecedent are only noun phrases in the same text in case of zero anaphora resolution, the title is also a candidate in our problem. In our system, the first stage is in charge of detecting the zero anaphor. In the second stage, antecedent search is carried out by considering the candidates. If antecedent search fails, an attempt made, in the third stage, to use the title as the antecedent. The main characteristic of our system is to make use of a structural SVM for finding the antecedent. The noun phrases in the text that appear before the position of zero anaphor comprise the search space. The main technique used in the methods proposed in previous research works is to perform binary classification for all the noun phrases in the search space. The noun phrase classified to be an antecedent with highest confidence is selected as the antecedent. However, we propose in this paper that antecedent search is viewed as the problem of assigning the antecedent indicator labels to a sequence of noun phrases. In other words, sequence labeling is employed in antecedent search in the text. We are the first to suggest this idea. To perform sequence labeling, we suggest to use a structural SVM which receives a sequence of noun phrases as input and returns the sequence of labels as output. An output label takes one of two values: one indicating that the corresponding noun phrase is the antecedent and the other indicating that it is not. The structural SVM we used is based on the modified Pegasos algorithm which exploits a subgradient descent methodology used for optimization problems. To train and test our system we selected a set of Wikipedia texts and constructed the annotated corpus in which gold-standard answers are provided such as zero anaphors and their possible antecedents. Training examples are prepared using the annotated corpus and used to train the SVMs and test the system. For zero anaphor detection, sentences are parsed by a syntactic analyzer and subject or object cases omitted are identified. Thus performance of our system is dependent on that of the syntactic analyzer, which is a limitation of our system. When an antecedent is not found in the text, our system tries to use the title to restore the zero anaphor. This is based on binary classification using the regular SVM. The experiment showed that our system's performance is F1 = 68.58%. This means that state-of-the-art system can be developed with our technique. It is expected that future work that enables the system to utilize semantic information can lead to a significant performance improvement.

Correlation between Meteorological Factors and Water Discharge from the Nakdong River Barrage, Korea (낙동강 하구역 해양물리환경에 미치는 영향인자 비교분석(I) - 하구둑 방류량과 기상인자 -)

  • Park, San;Yaan, Han-Sam;Lee, In-Cheal;Kim, Hean-Tae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.2
    • /
    • pp.111-117
    • /
    • 2008
  • We estirmted the yearly and monthly variation in discharge from the Nakdong River Barrage. We studied the total monthly discharge, the mean daily discharge, and the maximum daily discharge based on the observational discharge data for the 11-year period 1996-2006. We also examined the correlation between the discharge and the meteorologiml factors that influence the river inflow. The results from this study are as follows. (1) The total monthly discharge for 11 years at the Nakdong River Barrage was $224,576.8{\times}10^6\;m^3$: The daily maximum was in 2003, with $56,292.3{\times}10^6\;m^3$. The largest daily mean release discharges occurred in August with $52,634.2{\times}10^6\;m^3$ (23.4% of the year), followed by July and September in that order with 23.1 and 17%, respectively. (2) The monthly pattern of discharge could be divided into the flood season for the period July-September (discharge =$1000{\times}10^6\;m^3$/day), the normal season from April to June and October (discharge=$300{\times}10^6\;m^3$/day), and the drought season from December to March (discharge < $300{\times}10^6\;m^3$/day). (3) Periods of high temperature, low evaporation loss, and short sunshine duration produced a much higher discharge in general. Conditions of low rainfall and high evaporation loss, as was the rose in 2003, tended to reduce the discharge, but high rainfall and low evaporation loss tended to increase the discharge as it did in 200l. (4) The dominant wind directions during periods of high discharge were NNE (15.5%), SW and SSW (13.1%), S(12.1%), and NE (10.8%) This results show that it run bring on accumulation of fresh water when northern winds are dominant, and it run flow out fresh water toward offslwre when southern winds are dominant.

  • PDF

Implementation of a Counterfeit Notes Detection Method using IR Sensor (적외선(IR) 센서를 이용한 위폐 감별 방법 구현)

  • Kim, Sun-Gu;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.11 no.8
    • /
    • pp.191-197
    • /
    • 2013
  • In this paper, we implemented a paper currency recognition system using IR(infrared) sensor. The system has 32 channel IR sensor to measure the reflection and penetration quantity of light. The IR image of paper currency of 10-bit gray scale is used to differentiate the real and counterfeit paper currency with image information from 0 to 4095. The characteristics of IR image are recognized by brightness and darkness and the positions of bright and dark portions are different between real and counterfeit paper currency. The price of IR sensors were relatively high, however, it is good price in these days due to mass production to apply to counterfeit detection area. We used a software table having the IR characteristics of real paper currency to compare with the IR images of the input paper currency. The performance of the implemented system shows 1-2% error rates for Euro real paper currency and 0% error rates for various counterfeit paper currencies of several countries.

Effectiveness analysis based on computational thinking of a computing course for non-computer majors (컴퓨팅 사고력 관점에서 본 컴퓨터 비전공자 대상 교양 컴퓨팅 수업의 효과성 분석 연구)

  • Kim, MinJa;Kim, HyeonCheol
    • The Journal of Korean Association of Computer Education
    • /
    • v.21 no.1
    • /
    • pp.11-21
    • /
    • 2018
  • Given the background of so-called 'the 4th industrial revolution', universities practice computing education for non-majors to equip them with computational thinking(CT). Universities apply different courses but researches analyzing effectiveness of the courses based on CT are limited. This research is conducted to understand a computing course for non-majors is effective in terms of CT. A CT based evaluation framework is designed referring to AP Computer Science Principles. Questionnaires are developed based on the framework and applied to the course participants. As results, students' post scores are significantly higher than pre scores. In addition, there are significant differences in pre-test scores by major category while there is no difference in post-test. Humanity & social science group showed the largest difference between pre and post results with science & engineering and computer in order. In sum, it is found that this course is effective to facilitate students abilities in terms of CT, particularly for the non-computer majors.

Mesochronous Clock Based Synchronizer Design for NoC (위상차 클럭 기반 NoC 용 동기회로 설계)

  • Kim, Kang-Chul;Chong, Jiang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1123-1130
    • /
    • 2015
  • Network on a chip(NoC) is a communication subsystem between intellectual property(IP) cores in a SoC and improves high performance in the scalability and the power efficiency compared with conventional buses and crossbar switches. NoC needs a synchronizer to overcome the metastability problem between data links. This paper presents a new mesochronous synchronizer(MS) which is composed of selection window generator, selection signal generator, and data buffer. A delay line circuit is used to build selection window in selection window generator based on the delayed clock cycle of transmitted clock and the transmitted clock is compared with local clock to generate a selection signal in the SW(selection window). This MS gets rid of the restriction of metastability by choosing a rising edge or a falling edge of local clock according to the value of selection signal. The simulation results show that the proposed MS operates correctly for all phase differences between a transmitted clock and a local clock.

Geological Survey in a Construction Area of Taegu-Pohang Highway (대구-포항간 고속도로 7공구의 지질조사 연구)

  • 이병주;선우춘;한공창
    • Tunnel and Underground Space
    • /
    • v.10 no.4
    • /
    • pp.497-505
    • /
    • 2000
  • The surveyed area is mainly distributed by the sedimentary rocks, tuffs, and esites in Cretaceous age and acidic and basic dikes are intruded in these rocks. The principle discontinuities are represented by beddings, joints and faults. The trends of the beddings of sedimentary rocks develop as E-W direction in the start area. However, they are gradually bending and finally their trends are N-S direction in terminal area. In the sedimentary rocks the 3∼4 joint sets are distributed and in dikes joints are more scattered. The majority of joints are highly dipped. Sampo fault which has NE-SW trend makes a valley and NW trending normal faults are well developed at 50k+600 to 51k+000 area. During the construction of tunnel the orientation of discontinuities will not significantly influence on the stability of excavation. Since the rock mass is extensively jointed, the overbreak in tunnel wall may be placed.

  • PDF