• Title/Summary/Keyword: external applications

Search Result 671, Processing Time 0.026 seconds

SAD : Web Session Anomaly Detection based on Bayesian Estimation (베이지언 추정을 이용한 웹 서비스 공격 탐지)

  • 조상현;김한성;이병희;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.115-125
    • /
    • 2003
  • As Web services are generally open for external uses and not filtered by Firewall, these result in attacker's target. Web attacks which exploit vulnerable web-applications and malicious users' requests cause economical and social problems. In this paper, we are modelling general web service usages based on user-web-session and detect anomal usages with Bayesian estimation method. Finally we propose SAD(Session Anomaly Detection) for detection unknown web attacks. To evaluate SAD, we made an experiment on attack simulation with web vulnerability scanner, whisker. The results show that the detection rate of SAD is over 90%, which is influenced by several features such as size of window or training set, detection filter method and web topology.

Implementation of Key Recovery Model based on XML for B2B (B2B를 위한 XML기반의 키 복구 구현)

  • 김주한;문기영;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.53-61
    • /
    • 2002
  • In this paper, we will introduce a design of key recovery based on XML can be used in B2B environment. XML Digital Signature and XML Encryption that are defied recently as standards by W3C(World Wide Web Consortium) are deployed to sign/verify or encrypt/decrypt documents for electronic commerce and keys to store/load at/from key recovery server. The result of signature or encryption is always an XML document and all messages used in this key recovery system are also XML documents. It enables to adapt transparently this key recovery system to legacy XML applications and electronic commerce platforms based on XML. And its method for key recovery is key escrow. One of the characteristics of this key recovery is that one enterprise can recover keys of some documents for electronic commerce from external key recovery system in other enterprises related with them and also recover keys from owns.

Effects of Menu Arrangement and User Script on Task Using Smartphone Applications (메뉴의 배열과 사용자 스크립트가 스마트폰 애플리케이션 과제 수행에 미치는 효과)

  • Min, Sungki;Park, Soo-Young;Lee, Sangil
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.67-76
    • /
    • 2021
  • Three research hypotheses expected when working with a mobile app were verified. As follows: (1) Usability varies depending on the external structure of the tree-view menu. (2) If the menu arrangement is different from the script expected by users, the usability is poor. And (3) the effects of each of these two hypotheses vary depending on the complexity of the task. To this end, a script for booking accommodations expected by undergraduate students was written, and an experiment was designed with the task completion time and error rate as dependent variables. The experiment was conducted by implementing a prototype for reservation system on a smartphone As a result, while the overall performance was unfavorable when the task was complicated, the superiority of sectional menu was prominent when the task was complicated, and positive responses were observed when the menu arrangement in a complicated task matched user expectations. By discussing these results, it was found that when designing a procedural menu on a mobile screen, we come up with measures to minimize the burden of working memory, consider what tree-views are for the task, and that in complex tasks, menus should be arranged according to the scripts expected by users.

Implementation of FPGA-based Accelerator for GRU Inference with Structured Compression (구조적 압축을 통한 FPGA 기반 GRU 추론 가속기 설계)

  • Chae, Byeong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.850-858
    • /
    • 2022
  • To deploy Gate Recurrent Units (GRU) on resource-constrained embedded devices, this paper presents a reconfigurable FPGA-based GRU accelerator that enables structured compression. Firstly, a dense GRU model is significantly reduced in size by hybrid quantization and structured top-k pruning. Secondly, the energy consumption on external memory access is greatly reduced by the proposed reuse computing pattern. Finally, the accelerator can handle a structured sparse model that benefits from the algorithm-hardware co-design workflows. Moreover, inference tasks can be flexibly performed using all functional dimensions, sequence length, and number of layers. Implemented on the Intel DE1-SoC FPGA, the proposed accelerator achieves 45.01 GOPs in a structured sparse GRU network without batching. Compared to the implementation of CPU and GPU, low-cost FPGA accelerator achieves 57 and 30x improvements in latency, 300 and 23.44x improvements in energy efficiency, respectively. Thus, the proposed accelerator is utilized as an early study of real-time embedded applications, demonstrating the potential for further development in the future.

Skin Disease Classification Technique Based on Convolutional Neural Network Using Deep Metric Learning (Deep Metric Learning을 활용한 합성곱 신경망 기반의 피부질환 분류 기술)

  • Kim, Kang Min;Kim, Pan-Koo;Chun, Chanjun
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.45-54
    • /
    • 2021
  • The skin is the body's first line of defense against external infection. When a skin disease strikes, the skin's protective role is compromised, necessitating quick diagnosis and treatment. Recently, as artificial intelligence has advanced, research for technical applications has been done in a variety of sectors, including dermatology, to reduce the rate of misdiagnosis and obtain quick treatment using artificial intelligence. Although previous studies have diagnosed skin diseases with low incidence, this paper proposes a method to classify common illnesses such as warts and corns using a convolutional neural network. The data set used consists of 3 classes and 2,515 images, but there is a problem of lack of training data and class imbalance. We analyzed the performance using a deep metric loss function and a cross-entropy loss function to train the model. When comparing that in terms of accuracy, recall, F1 score, and accuracy, the former performed better.

Photothermoelectric Effect of Graphene-polyaniline Composites (그래핀-폴리 아닐린 복합체의 광열전 효과 연구)

  • Choi, Jongwan
    • Composites Research
    • /
    • v.34 no.6
    • /
    • pp.434-439
    • /
    • 2021
  • Graphene and polyaniline with thermoelectric properties are one of the potential substitutes for inorganic materials for flexible thermoelectric applications. In this study, we studied the photo-induced thermoelectric effect of graphene-polyaniline composites. The graphene-polyaniline composites were synthesized by introducing an amine functional group to graphene oxide for covalently connecting graphene and polyaniline, reducing the graphene oxide, and then polymerizing the graphene oxide with aniline. Graphene-polyaniline composites were prepared by changing the aniline contents in order to expect an optimal photothermoelectric effect, and their structural properties were confirmed through FT-IR and Raman analysis. The photocurrent and photovoltage characteristics were analyzed by irradiating light asymmetrically without an external bias and the current and voltage with various aniline contents. While the photocurrent trends to the electrical conductivity of the graphene-polyaniline composites, the photovoltage was related to the temperature change of the graphene-polyaniline composite, which was converted into thermal energy by light.

Virtual Costume Creation Simplification Service Design - Focusing on Metaverse and ZEPETO - (가상 의상 제작 간략화 서비스 설계 - 메타버스, 제페토를 중심으로 -)

  • Ryu, Sang-Hyun;Sur, Da-Eun;Kim, Kyeong-Mok;Ban, Jae-Eun;Huh, Won-Whoi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.583-589
    • /
    • 2022
  • Due to COVID-19, which has thrown the whole world into chaos, it has become an era where many technologies and contents are made non-face-to-face. At the same time, the popularity of the metaverse service is also increasing day by day, and the virtual costume (avatar) industry, one of the sub-industries, is also growing. In this study, we designed and developed a system for creating virtual costumes to be uploaded to ZEPETO, a mobile metaverse service. Unlike the existing service that requires a program that operates in a PC environment, it can be produced only by shooting and simple operation through a mobile device. With the advantage of being able to process all tasks of this system in a mobile environment, small businesses and individual operators who are not familiar with external programs will be able to more easily access the 3D virtual clothing industry.

Experimental Study of Strength Degradation according to Fixed Knot Method and Outdoor Exposure Environment of Auxiliary Rope for High Altitude Work (추락 방지용 보조로프의 고정 매듭법과 옥외 노출 환경에 따른 강도저하 평가에 관한 연구)

  • Sang Min Song;Tae Sun Kim;Keon Yeob Kim;Song Mi Kim;Oh Heon Kwon;Woo Rim Park
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.3
    • /
    • pp.10-19
    • /
    • 2023
  • Fall accidents account for the highest accident fatality rate in the construction industry. In addition, wearing and using a safety belt is the most realistic and important preventive measure to reduce fall accidents. Safety belts are protective devices worn by individual workers; they prevent workers from falling and allow for time to rescue the workers. However, the legal standards for safety belts only stipulate the materials, specifications, and strength of parts; there is no provision for an auxiliary rope fixing method to fix the safety belts safely. Due to this reason, workers in industrial sites arbitrarily fix and use the auxiliary rope. Currently, the most used method to fix the auxiliary rope is to tie a knot, which significantly lowers the strength of the material compared to the standard strength. Moreover, many construction sites are located outdoors, so the strength of the materials used in the auxiliary rope is inevitably reduced due to various external environmental conditions. Therefore, to solve this problem, this study was conducted to evaluate the strength of the material of the auxiliary rope for fixing the safety belt and the knot-tying method for the auxiliary rope. In this study, the exposure conditions for the effects of temperature and moisture were set to reflect the characteristics of the construction industry. The results of this study are expected to be used for standards establishment and the safe use of the auxiliary rope for safety belts in actual field applications.

A Study on the Primary Factors of Internal and External Competency for Improving Performance of Small and Medium Software Company (중.소 소프트웨어 기업의 성과 향상을 위한 내.외부 역량 요인에 관한 연구)

  • Yoo, Sang-Jun;Ki, Byoung-Gun;Choi, Jong-Hwa;Leem, Choon-Seong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.1
    • /
    • pp.17-31
    • /
    • 2009
  • The importance of software has been growing rapidly owing to the development of various Internet and e-business applications. The traditional approaches to software evaluation are based on the development process perspective, and their major concerns are no strongly related to use or customer-oriented evaluation of software. According to resource-based theory, company's resource is consisted of human, technology, market value, and finance. Customer satisfaction improved by product satisfaction and service satisfaction. Based on the previous studies the factors of human resources, technology, customer satisfaction are selected to evaluate software company's competence This research suggests the factor effecting on sales performance. And then statistical methods are used for verifying relationship between the factor and sales performance.

Estimation of critical current density of a YBCO coated conductor from a measurement of magnetization loss (자화손실 측정값으로부터 추정한 YBCO CC의 임계전류밀도 평가)

  • Lee, S.;Park, S.H.;Kim, W.S.;Lee, J.K.;Choi, K.
    • Progress in Superconductivity and Cryogenics
    • /
    • v.12 no.3
    • /
    • pp.16-20
    • /
    • 2010
  • For large scale power applications of HTS conductor, it is getting more important to have a stacked HTS coated conductor with low loss and large current capacity. But it was not easy to measure some electric properties. Stabilizer free YBCO CC for striated/ stacked conductors is easily burned out during the measurement of the critical current density because it has no stabilizer and it is difficult to set-up the current lead and voltage taps because it has many pieces of YBCO CC in a conductor. Instead of direct measuring the critical current of a stacked HTS coated conductor, indirect estimation from measuring a magnetization loss of HTS coated conductor could be useful for practical estimation of the critical current. The magnetization loss of a superconductor is supposed to be affected by a full penetrating magnetic field, and it tends to show an inflection point at the full penetrating magnetic field when we generate the graph of magnetization loss vs. external magnetic field. The full penetrating magnetic field depends on the shape of the conductor and its critical current density, so we can estimate the effective critical current density from measuring the magnetization loss. In this paper, to prove the effectiveness of this indirect estimation of the critical current, we prepared several different kinds of YBCO CC(coated conductor) including a stacked conductor short samples and measured the magnetization losses and the critical currents of each sample by using linked pick up coils and direct voltage measurement with transport current respectively.