• Title/Summary/Keyword: call identification

Search Result 56, Processing Time 0.024 seconds

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

Page Logging System for Web Mining Systems (웹마이닝 시스템을 위한 페이지 로깅 시스템)

  • Yun, Seon-Hui;O, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.847-854
    • /
    • 2001
  • The Web continues to grow fast rate in both a large aclae volume of traffic and the size and complexity of Web sites. Along with growth, the complexity of tasks such as Web site design Web server design and of navigating simply through a Web site have increased. An important input to these design tasks is the analysis of how a web site is being used. The is paper proposes a Page logging System(PLS) identifying reliably user sessions required in Web mining system PLS consists of Page Logger acquiring all the page accesses of the user Log processor producing user session from these data, and statements to incorporate a call to page logger applet. Proposed PLS abbreviates several preprocessing tasks which spends a log of time and efforts that must be performed in Web mining systems. In particular, it simplifies the complexity of transaction identification phase through acquiring directly the amount of time a user stays on a page. Also PLS solves local cache hits and proxy IPs that create problems with identifying user sessions from Web sever log.

  • PDF

FunRank: Finding 1-Day Vulnerability with Call-Site and Data-Flow Analysis (FunRank: 함수 호출 관계 및 데이터 흐름 분석을 통한 공개된 취약점 식별)

  • Jaehyu Lee;Jihun Baek;Hyungon Moon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.305-318
    • /
    • 2023
  • The complexity of software products led many manufacturers to stitch open-source software for composing a product. Using open-source help reduce the development cost, but the difference in the different development life cycles makes it difficult to keep the product up-to-date. For this reason, even the patches for known vulnerabilities are not adopted quickly enough, leaving the entire product under threat. Existing studies propose to use binary differentiation techniques to determine if a product is left vulnerable against a particular vulnerability. Despite their effectiveness in finding real-world vulnerabilities, they often fail to locate the evidence of a vulnerability if it is a small function that usually is inlined at compile time. This work presents our tool FunRank which is designed to identify the short functions. Our experiments using synthesized and real-world software products show that FunRank can identify the short, inlined functions that suggest that the program is left vulnerable to a particular vulnerability.

Effect of Irradiation and Packaging Methods on the Oxidation of Cholesterol in Raw and Cooked Chicken Leg Meat (방사선 조사 및 포장방법이 생계육 및 조리계육의 콜레스테롤 산화에 미치는 영향)

  • Lee, J.I.;Shin, T.S.;Jin, S.K.;Kim, I.S.;Kim, Y.H.;Joo, S.T.;Park, G.B.
    • Journal of Animal Science and Technology
    • /
    • v.45 no.5
    • /
    • pp.825-834
    • /
    • 2003
  • Chicken thigh from a retail market were used as experimental samples. Some chicken samples of raw state were packaged with PVDC at an aerobic and vacuum condition. The other samples were cooked until core temperature arrived at 70$^{\circ}C$ and then packaged immediately in the same way of raw samples. After samples were irradiated by electron beam at 6 kGy, they were stored in a refrigerator. Identification and quantity of cholesterol oxides were made at 0 and 7 days of storage, respectively. During the early stage of storage, 7$\beta$-hydroxycholesterol, $\alpha$,$\beta$-epoxide, cholestanetriol and 7-ketocholesterol were produced from the raw meat samples, and the production of these chemicals were significantly higher(P〈0.05) from the samples with aerobic packaging than those with vacuum packaging. With storage time, 7$\alpha$-hydroxycholesterol, 6-ketocholesterol and some other chemicals, which were not found during the early stage of storage, were found. Also, the formation of these chemicals were significantly increased(P〈0.05) with storage time. Cholesterol and lipid oxidation products of cooked meat after irradiation and irradiated meat after cooking were significantly increased(P〈0.05) with storage time for all treatments, and vacuum packaging results in showed significantly lower value(P〈0.05) than aerobic packaging. Summarizing the aforementioned results, it was found that the formation of cholesterol and lipid oxides and lipid oxidation was more easily affected by packaging condition than irradiation.

Well-Aging: the Yeoheon Jang Hyun Kwang's meditation on the old age (웰에이징 : 노년의 삶에 대한 여헌 장현광의 성찰)

  • Kim, Kyungho
    • (The)Study of the Eastern Classic
    • /
    • no.49
    • /
    • pp.109-136
    • /
    • 2012
  • 'Old man' or 'old age' was not the parts of academic discipline in the Joseon era but Yeoheon put it in the philosophical 'problematization' of the learning of the Confucianism. He was argued that the old man or old age is not merely biological decline but it has the goal to achieve. The completion of self is the meaning and end of the life throughout the subjective realization and procedure of attaining the goal step by step. Well-aged old man is affirming the getting old and making the positive changing of old life time in his one sake. This essay is showing the Yeoheon's thought of old aging as the self-realizing well-ageing. Next, it is argued that the predicament of old age or old man is not just social welfare or biological aspects but it is serious philosophical problems. If it was just social or biological aspects then it is just a social phenomenon to approach the view of scientists. However, this is not only life and death and flux of time and relativities but also it is problematizing the self-identification subjectivities. Obviously, it is the significant that the old and or old age is fundamentally philosophical subject rather than social or biological materials. In the third chapter, we are dealing with the views of the life and death of Yeoheon. He was insisted that quite interesting opinion that is the all the lives in the universe include himself is 'a wayfarer'. It looks like a time traveler in the universe; we are just one who stays in a body for awhile. When we follow him, we are living in this universe in a time (disposable) but the same theorem is applying to the whole universe as well myriad creatures. Therefore, man has a job to do as an entity of the universe. Yeoheon was called it is the business as a job and we have to do the Dao till you end. The fourth, Yeoheon was suggested that the old man has his work and business. There are two kind of works for an old man, the former is self control as an old age that is call the old man's job and the latter is staying with the Dao that is called the old man's business. According to Yeoheon, man has charged to realize the law of the universe that means we are the moral entity; therefore we are business to complete ourselves. Old age is decline of physical activities rather than vigorous, therefore, we have to follow our body and self-affirmation of declination is the Dao. The final, Yeoheon was advised that the old man better saved in the current of the Dao, because the physical function is declining but the shining Dao is within the mind in the body. It is motivation of the self-dignity of old man and one who recognizes the work to do even in the old body that he will be the significant among all the society not a lonely old man anymore. Old aging is biological twilight but the considerable real size expertise and self-affirmation is the Dao of old age. We are meditating nowadays in Yeoheon's philosophical context on old man or old aging. By him, the old age is man of dignity as long as he realizes in his Dao through the business and self-affirmation.

Counter-Piracy Cooperation to Strengthen New Southern Policy's "Peace": An Analysis of ROK and ASEAN's Counter-Piracy Practices (신남방정책의 "평화"를 강화하기 위한 해적행위 대응 협력: 한국과 아세안의 해적행위 대응 관행 분석)

  • Boo, Yerin;Kim, Sujin;Yeo, Mathew Jie Sheng
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.141-185
    • /
    • 2021
  • The growing U.S.-China rivalry has placed the countries of Southeast Asia in exceedingly precarious positions. The Republic of Korea (ROK) likewise has been tasked with the challenge of "navigating the waters" between deepening geopolitical divides. It is in this context that the "New Southern Policy" (hereafter NSP) has become a key word in Korea's foreign policy circles. Through NSP, ROK aims to diversify its economic and security interests by strengthening ties with its southern partners, focusing on three key areas (termed as the "3 Ps"): People, Prosperity, and Peace. At the same time, the NSP seeks cooperation with other key diplomatic agendas such as the U.S.'s "Free and Open Indo-Pacific," rendering it crucial for the overall stability of the region. Considering such strategic significance, deeper analysis of the policy is more timely than ever. A brief assessment of the policy's outcome so far, however, reveals that relatively, the "Peace" pillar has been insufficient in achieving satisfactory outcomes. Here, this paper asks the question of: 1) How can the "Peace" pillar of South Korea's New Southern Policy be strengthened? Based on an analysis on the causes of the "Peace" pillar's weakness, this paper identifies counter-piracy cooperation as a solution. This paper then proceeds to answer the next question of: 2) How can ROK and ASEAN cooperate on counter-piracy, and how can these efforts be integrated into ROK's NSP? To answer the above question, this paper conducts in-depth case studies on ASEAN's and ROK's approaches to counter-piracy and identifies specific mechanisms of cooperation. In Chapter I, the paper begins with an overview of the NSP's strategic significance and an evaluation of its "Peace" pillar. Chapter II conducts a literature review on the causes of, and prescriptions for, the weakness of the "Peace" pillar. The paper then justifies why counter-piracy may be a solution. Chapter III examines ASEAN's and ROK's approaches to counter-piracy. By analyzing the general framework and each region's cases, the paper displays the strengths and weaknesses of each region's piracy responses. Based on this analysis, Chapter IV suggests ways to incorporate counter-piracy cooperation into the "Peace" pillar of the NSP. This research bears significance in that it identifies a specific area of cooperation (counter-piracy) to strengthen the "Peace" pillar of ROK's NSP. Such identification is based on a comprehensive study into the two parties' past and current experience in counter-piracy, making it contextual in nature. Furthermore, the study suggests practical mechanisms of cooperation, and considers ways of incorporation into the existing framework of NSP. This approach differs from existing literature that failed to generate case-specific, policy-oriented solutions. The COVID-19 pandemic has exacerbated piracy issues and deepened geopolitical divides. Turbulent seas such as these call for careful navigation. When it comes to promoting "peace," the key lies in combating the pirates that sail those very waters.

  • PDF