• Title/Summary/Keyword: ScriptX

Search Result 33, Processing Time 0.02 seconds

3D Simulation of Maze Solver Micromouse using MEL Script (MAYA의 MEL Script로 구현한 미로찾기로봇 3D시뮬레이션)

  • Kim, Min-soo;Lee, Im-geun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.201-202
    • /
    • 2014
  • 본 논문에서는 3차원 공간을 시각적으로 표현이 가능한 MAYA의 MEL Script를 통해 미로 찾기 로봇을 3D시뮬레이션으로 구현하는 방법을 제안한다. MAYA에서는 생성된 개체에 대해 X-Y-Z 좌표정보를 적용하고 이 수치를 개체의 속성 값으로 제공한다. 이를 이용하여 랜덤한 미로 맵을 완성하기 위한 규칙으로 행렬을 생성하고 이 행렬의 인덱스와 값에 따라 X-Y-Z 좌표정보를 적용하여 개체를 생성하면 랜덤한 미로 맵이 완성된다. 그 후 길을 찾기 위한 규칙에 의해 이동하는 로봇의 X-Z좌표정보를 각 프레임 별로 저장하여 재생 시키면 미로 찾기 로봇 시뮬레이션을 눈으로 확인 가능하다. 사람이 직접 번거롭게 임의의 미로 맵 을 생성하지 않고 로봇이 없어도 간편하게 미로 찾기를 구현해 볼 수 있는 방법을 제시한다. 본 시뮬레이터는 미로 찾기 알고리즘을 테스트하는데 유용할 것이다.

  • PDF

An Analysis Technique for Encrypted Unknown Malicious Scripts (알려지지 않은 악성 암호화 스크립트에 대한 분석 기법)

  • Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.473-481
    • /
    • 2002
  • Decryption of encrypted malicious scripts is essential in order to analyze the scripts and to determine whether they are malicious. An effective decryption technique is one that is designed to consider the characteristics of the script languages rather than the specific encryption patterns. However, currently X-raying and emulation are not the proper techniques for the script because they were designed to decrypt binary malicious codes. In addition to that, heuristic techniques are unable to decrypt unknown script codes that use unknown encryption techniques. In this paper, we propose a new technique that will be able to decrypt malicious scripts based on analytical approach. we describe its implementation.

Establishment of Cosmetic Raw Material Weighing and Bulk Manufacturing Management System Using Bar Code, QR Code and Database (바코드, 큐알코드와 데이터베이스를 활용한 화장품 원료 칭량 및 벌크제조 관리시스템 구축)

  • Lee, Chung-Hee;Bae, Jun-Tae;Hong, Jin-Tae
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.45 no.3
    • /
    • pp.277-285
    • /
    • 2019
  • In this study, effective cosmetic raw material weighing and bulk manufacturing management system were constructed by using bar code or quick response code (QR code) and database. Raw material labels and weighing labels for bulk manufacturing were published in web environment using the information entered in the database using ScriptX, a print component of Medi&Co. By checking the weighing and manufacturing process by using scanner, tablet and PC, it was possible to remarkably improve the product error caused by erroneous amount or misapplication which is the most cause of error in the production of cosmetic bulk. In conclusion, applying a database that utilizes bar code and QR code to cosmetics manufacturing can reduce the various problems in the process, thereby improving quality control and productivity of cosmetics.

Design and Implementation of CPL Client for VoIP (VoIP를 위한 CPL 클라이언트 설계 및 구현)

  • Jeong, Ok-Jo;Lee, Il-Jin;Kang, Shin-Gak
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.501-508
    • /
    • 2003
  • VoIP that conveys voice in internet is getting into the spotlight as means to alternate existing PSTN in corporation as well as users. Current VoIP is furnishing voice efficiently, but it needs to support various services for VoIP acceleration. IETF is developing CPL standard which is call processing language for supporting various services. User has to store script to specific server for the use of CPL, therefore it is required client to support CPL. This paper describes about design and implementation of SP-based CPL client for various services. The CPL client was implemented using LINUX 2.4.x, C, and GTK1.2.

An Algorithm Generating Edit Scripts for XML Documents (XML 문서에 대한 편집스크립트 생성 알고리즘)

  • Lee, Suk-Kyoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.80-89
    • /
    • 2011
  • While detecting changes in XML documents has emerged as a major research area, the level of research on edit scripts, which are the result of the change detection, is not far from satisfactory. In this paper, we present X-treeESgen, the algorithm generating edit scripts used in X-treeDiff+, a change detection algorithm for XML documents. X-treeESgen shows the time complexity of O(n), and support move and copy operations in addition to the basic set that is update, insert, and delete operations. Note that no other change detection algorithm provide all the operations. Also, since the process of generating edit scripts in X-treeESgen is designed independent of the process of matching, various tuning techniques may be applied.

The Study of technique to find and prove vulnerabilities in ActiveX Control (ActiveX Control 취약점 검사 및 검증 기법 연구)

  • Sohn, Ki-Wook;Kim, Su-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.3-12
    • /
    • 2005
  • To provide visitors with the various services, Many web sites distribute many ActiveX controls to them because ActiveX controls can overcome limits of HTML documents and script languages. However, PC can become dangerous if it has unsecure ActiveX controls, because they can be executed in HTML documents. Nevertheless, many web sites provide visitors with ActiveX controls whose security are not verified. Therefore, the verification is needed by third party to remove vulnerabilities in ActiveX controls. In this paper, we introduce the process and the technique to fad vulnerabilities. The existing proof codes are not valid because ActiveX controls are different from normal application and domestic environments are different from foreign environments. In this paper, we introduce the technique to prove vulnerabilities in ActiveX control.

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

Torque Profile Measuring and Sensibility Evaluation of a Haptic Device (햅틱 장치의 프로파일 측정 및 감성 평가)

  • Jun, Cha-Soo;Choo, Heon-Seong;Park, Se-Hyung;Kim, Lae-Hyun;Shin, Sang-Kyun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.15 no.3
    • /
    • pp.222-233
    • /
    • 2010
  • Developed in this research is a TP (tangible prototyping) system, which consists of two modules; (1) a virtual reality model to evaluate the functions and appearance of the product, and (2) a haptic device to emulate tactile and kinesthetic properties of mechanical dial knobs. As an example, a washing machine is modeled using a commercial CAD system and transformed in VRML and X3D formats. Some dynamic behaviors and kinematic characteristics are programmed using X3D script and Java. Various haptic behaviors of the dial are generated by modulating torque profile according to the rotation angle. A torque profile measuring system is developed to evaluate the behaviors of the haptic dial physically. Haptic sensibility evaluations are accomplished using the TP by semantic differential method.

Improving Performance of Change Detection Algorithms through the Efficiency of Matching (대응효율성을 통한 변화 탐지 알고리즘의 성능 개선)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartD
    • /
    • v.14D no.2
    • /
    • pp.145-156
    • /
    • 2007
  • Recently, the needs for effective real time change detection algorithms for XML/HTML documents and increased in such fields as the detection of defacement attacks to web documents, the version management, and so on. Especially, those applications of real time change detection for large number of XML/HTML documents require fast heuristic algorithms to be used in real time environment, instead of algorithms which compute minimal cost-edit scripts. Existing heuristic algorithms are fast in execution time, but do not provide satisfactory edit script. In this paper, we present existing algorithms XyDiff and X-tree Diff, analyze their problems and propose algorithm X-tree Diff which improve problems in existing ones. X-tree Diff+ has similar performance in execution time with existing algorithms, but it improves matching ratio between nodes from two documents by refining matching process based on the notion of efficiency of matching.

Program Plagiarism Detection based on X-treeDiff+ (X-treeDiff+ 기반의 프로그램 복제 탐지)

  • Lee, Suk-Kyoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.4
    • /
    • pp.44-53
    • /
    • 2010
  • Program plagiarism is a significant factor to reduce the quality of education in computer programming. In this paper, we propose the technique of identifying similar or identical programs in order to prevent students from reckless copying their programming assignments. Existing approaches for identifying similar programs are mainly based on fingerprints or pattern matching for text documents. Different from those existing approaches, we propose an approach based on the program structur. Using paring progrmas, we first transform programs into XML documents by representing syntactic components in the programs with elements in XML document, then run X-tree Diff+, which is the change detection algorithm for XML documents, and produce an edit script as a change. The decision of similar or identical programs is made on the analysis of edit scripts in terms of program plagiarism. Analysis of edit scripts allows users to understand the process of conversion between two programs so that users can make qualitative judgement considering the characteristics of program assignment and the degree of plagiarism.