• Title/Summary/Keyword: System Codes

Search Result 1,753, Processing Time 0.025 seconds

Possibility of Information Leakage through Analysis of Chinese Antivirus Software (중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구)

  • Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1369-1374
    • /
    • 2021
  • Recently, controversy has been raised over the security and safety of Chinese-made network equipment (Huawei 5G), apps (TikTok, etc.). In particular, according to the results of the Ministry of Defense investigation in 2020, malicious codes were found in CCTVs made in China that were delivered as military surveillance equipment used as a coast guard system, and specific information was remotely transmitted to a Chinese server. The safety issues of these Chinese security products can be questioned as being systematically led by the state rather than by companies or individuals. In this paper, we perform network and process level analysis of 360 Total Security(360 TS), a Chinese antivirus software. In addition, it compares and analyzes the domestic cloud-based vaccine V3 Lite product. Through this, the safety of Chinese security solutions is checked and information leakage and risks are suggested.

A Study On Effectiveness of Prevent Smoke Backflow in Apartment (계단식 공동주택 방연풍속 실효성에 대한 연구)

  • Lee, Kwang­Soo;Yoon, Myong­O;Lee, Jun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • Purpose: The purpose of this study is to analyze the differential pressure and velocity to prevent smoke backflow of Stairways Apartment House fire, and verified the effectiveness of smoke velocity standards proposed by NFSC 501A. Method: The smoke control design of the stairways apartment house of the real model and the performance of the velocity to prevent smoke backflow according to the window opening conditions of the living room were analyzed using the CONTAM program. Result: Although the differential pressure performance of the apartment's smoke control system was satisfactory, it was found that Performance of velocity to prevent smoke backflow did not come out according to the opening condition of the living room window. Conclusion: In the case of Stairways Apartment House, it is necessary to review the method of making exceptions to the 'velocity to prevent smoke backflow' standard required by the National Fire Safety Codes(NFSC 501A)

Development of an Improved Geometric Path Tracking Algorithm with Real Time Image Processing Methods (실시간 이미지 처리 방법을 이용한 개선된 차선 인식 경로 추종 알고리즘 개발)

  • Seo, Eunbin;Lee, Seunggi;Yeo, Hoyeong;Shin, Gwanjun;Choi, Gyeungho;Lim, Yongseob
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.2
    • /
    • pp.35-41
    • /
    • 2021
  • In this study, improved path tracking control algorithm based on pure pursuit algorithm is newly proposed by using improved lane detection algorithm through real time post-processing with interpolation methodology. Since the original pure pursuit works well only at speeds below 20 km/h, the look-ahead distance is implemented as a sigmoid function to work well at an average speed of 45 km/h to improve tracking performance. In addition, a smoothing filter was added to reduce the steering angle vibration of the original algorithm, and the stability of the steering angle was improved. The post-processing algorithm presented has implemented more robust lane recognition system using real-time pre/post processing method with deep learning and estimated interpolation. Real time processing is more cost-effective than the method using lots of computing resources and building abundant datasets for improving the performance of deep learning networks. Therefore, this paper also presents improved lane detection performance by using the final results with naive computer vision codes and pre/post processing. Firstly, the pre-processing was newly designed for real-time processing and robust recognition performance of augmentation. Secondly, the post-processing was designed to detect lanes by receiving the segmentation results based on the estimated interpolation in consideration of the properties of the continuous lanes. Consequently, experimental results by utilizing driving guidance line information from processing parts show that the improved lane detection algorithm is effective to minimize the lateral offset error in the diverse maneuvering roads.

A New Method to Detect Anomalous State of Network using Information of Clusters (클러스터 정보를 이용한 네트워크 이상상태 탐지방법)

  • Lee, Ho-Sub;Park, Eung-Ki;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.545-552
    • /
    • 2012
  • The rapid development of information technology is making large changes in our lives today. Also the infrastructure and services are combinding with information technology which predicts another huge change in our environment. However, the development of information technology brings various types of side effects and these side effects not only cause financial loss but also can develop into a nationwide crisis. Therefore, the detection and quick reaction towards these side effects is critical and much research is being done. Intrusion detection systems can be an example of such research. However, intrusion detection systems mostly tend to focus on judging whether particular traffic or files are malicious or not. Also it is difficult for intrusion detection systems to detect newly developed malicious codes. Therefore, this paper proposes a method which determines whether the present network model is normal or abnormal by comparing it with past network situations.

Information Structuring of Diagram Repository for UML Diagrams (UML 다이어그램을 위한 다이어그램 레포지토리의 정보구조화)

  • Kim, Yun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1588-1595
    • /
    • 2019
  • This paper presents the technique on structuring information of the diagram repository for UML diagrams. Because object interactions are the body of object-oriented programming, this paper handles especially the sequence diagrams and class diagrams among UML diagrams. Based on class diagrams, sequence diagrams represent the procedure of object interactions in run-time and then the corresponding codes are generated from the contents of those sequence diagrams. To do this work, this paper presents a method to construct the information repository for generating code from the contents of sequence diagrams. This paper classifies the five message types of sequence diagrams and then extracts the needed information including items and values on the corresponding message types for constructing message repositories. Because sequence diagram is composed of messages included, the final repository is constructed by collecting each of structured repositories on messages sequentially.

Techniques for Location Mapping and Querying of Geo-Texts in Web Documents (웹 문서상의 공간 텍스트 위치 맵핑과 질의 기법)

  • Ha, Tae Seok;Nam, Kwang Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • With the development of web technology, large amounts of web documents are being produced. This web document contains various spatial texts, and by converting these texts into spatial information, it is the basis for searching for text documents with spatial query. These spatial texts consist of a wide range of areas, including postal codes and local phone numbers, as well as administrative place names and POI names. This paper presents algorithms that can map locations based on spatial text information existing within web documents. Through these algorithms, web documents can be searched for documents describing the region on a map rather than a general web search. In this paper, we demonstrated the presented algorithms are useful by implementing a web geo-text query system.

A Study on the Effect of the Shape of the Exhaust Port on the Flow and Temperature Distribution in the Drying Part of the MRG(Mechanical Rubber Goods) Reinforcing Yarn Manufacturing System (MRG(Mechanical Rubber Goods) 보강사 제조시스템의 건조부에서의 배기구 형상이 유동 및 온도 분포에 미치는 영향에 관한 연구)

  • Kim, Hwan Kuk;Kwon, Hye In;Do, Kyu Hoi
    • Textile Coloration and Finishing
    • /
    • v.34 no.2
    • /
    • pp.109-116
    • /
    • 2022
  • Tire codes are made of materials such as hemp, cotton, rayon, nylon, steel, polyester, glass, and aramid are fiber reinforcement materials that go inside rubber to increase durability, driveability, and stability of vehicle tires. The reinforcement of the tire cord may construct a composite material using tires such as automobiles, trucks, aircraft, bicycles, and fibrous materials such as electric belts and hoses as reinforcement materials. Therefore, it is essential to ensure that the adhesive force between the rubber and the reinforced fiber exhibits the desired physical properties in the rubber composite material made of a rubber matrix with reinforced fibers. This study is a study on the heat treatment conditions for improving the adhesion strength of the tire cord and the reinforced fiber for tires. The core technology of the drying process is a uniform drying technology, which has a great influence on the quality of the reinforcement. Therefore, the uniform airflow distribution is determined by the geometry and operating conditions of the dryer. Therefore, this study carried out a numerical analysis of the shape of a drying nozzle for improving the performance of hot air drying in a dryer used for drying the coated reinforced fibers. In addition, the flow characteristics were examined through numerical analysis of the study on the change in the shape of the chamber affecting drying.

Measuring Trends in the Socioeconomic Burden of Disease in Korea, 2007-2015

  • Kim, Tae Eung;Lee, Ru-Gyeom;Park, So-Youn;Oh, In-Hwan
    • Journal of Preventive Medicine and Public Health
    • /
    • v.55 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • This study estimated the direct and indirect socioeconomic costs of 238 diseases and 22 injuries from a social perspective in Korea from 2007 to 2015. The socioeconomic cost of each disease group was calculated based on the Korean Standard Disease Classification System. Direct costs were estimated using health insurance claims data provided by the National Health Insurance Service. The numbers of outpatients and inpatients with the main diagnostic codes for each disease were selected as a proxy indicator for estimating patients' medical use behavior by disease. The economic burden of disease from 2007 to 2015 showed an approximately 20% increase in total costs. From 2007 to 2015, communicable diseases (including infectious, maternal, pediatric, and nutritional diseases) accounted for 8.9-12.2% of the socioeconomic burden, while non-infectious diseases accounted for 65.7-70.7% and injuries accounted for 19.1-22.8%. The top 5 diseases in terms of the socioeconomic burden were self-harm (which took the top spot for 8 years), followed by cirrhosis of the liver, liver cancer, ischemic heart disease, and upper respiratory infections in 2007. Since 2010, the economic burden of conditions such as low back pain, falls, and acute bronchitis has been included in this ranking. This study expanded the scope of calculating the burden of disease at the national level by calculating the burden of disease in Koreans by gender and disease. These findings can be used as indicators of health equality and as useful data for establishing community-centered (or customized) health promotion policies, projects, and national health policy goals.

CNN-Based Malware Detection Using Opcode Frequency-Based Image (Opcode 빈도수 기반 악성코드 이미지를 활용한 CNN 기반 악성코드 탐지 기법)

  • Ko, Seok Min;Yang, JaeHyeok;Choi, WonJun;Kim, TaeGuen
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.933-943
    • /
    • 2022
  • As the Internet develops and the utilization rate of computers increases, the threats posed by malware keep increasing. This leads to the demand for a system to automatically analyzes a large amount of malware. In this paper, an automatic malware analysis technique using a deep learning algorithm is introduced. Our proposed method uses CNN (Convolutional Neural Network) to analyze the malicious features represented as images. To reflect semantic information of malware for detection, our method uses the opcode frequency data of binary for image generation, rather than using bytes of binary. As a result of the experiments using the datasets consisting of 20,000 samples, it was found that the proposed method can detect malicious codes with 91% accuracy.

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.