• Title/Summary/Keyword: 소스공개

Search Result 264, Processing Time 0.031 seconds

Implementation of Multiplatform Game Application for Decorating The Lab (다중 플랫폼용 실습실 꾸미기 게임 앱 구현)

  • Rho, Wonbin;Won, Moonsook;Lee, Jihye;Ko, Eunbyul;Lee, Jongwoo
    • Journal of Digital Contents Society
    • /
    • v.15 no.2
    • /
    • pp.197-207
    • /
    • 2014
  • Many people are now enjoying mobile games using various smartphone platforms. However, we have to develop games separately for each smart device platforms so far. Cocos2d-x, a game development framework is released to solve this problem. As a multiplatform version of the existing Cocos2d, Cocos2d-x can make one source code run on various platforms. It is an open software that is able to be used by everyone, and when using it, mobile games can be developed easily based on C++ and OpenGL. In this paper, we implemented a PC laboratory decorating game application, named ILove501, using Cocos2d-x. The 501 is a room number of our PC lab. ILove501 includes an educational feature of solving quizzes in order to highlight positive effects of game. For implementation of a multiplatform game, ILove501 was developed in Windows and iOS environment at the same time, and we verified the results of the execution by porting on a variety of devices such as Android, iPhone, iPad and Galaxy Tab.

A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code (공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구)

  • Kim, Jeom-Goo;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection techniques disclosed web hacking years passed, but these are classified the most dangerous attac ks. Recent web programming data for efficient storage and retrieval using a DBMS is essential. Mainly PHP, JSP, A SP, and scripting language used to interact with the DBMS. In this web environments application does not validate the client's invalid entry may cause abnormal SQL query. These unusual queries to bypass user authentication or da ta that is stored in the database can be exposed. SQL Injection vulnerability environment, an attacker can pass the web-based authentication using username and password and data stored in the database. Measures against SQL Inj ection on has been announced as a number of methods. But if you rely on any one method of many security hole ca n occur. The proposal of four levels leverage is composed with the source code, operational phases, database, server management side and the user input validation. This is a way to apply the measures in terms of why the accident preventive steps for creating a phased step-by-step response nodel, through the process of management measures, if applied, there is the possibility of SQL Injection attacks can be.

TCP/IP Using Minimal Resources in IoT Systems

  • Lee, Seung-Chul;Shin, Dongha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.125-133
    • /
    • 2020
  • In this paper, we design 4-layer TCP/IP that utilizes minimal memory and processor resources in Internet of Things(IoT) systems. The TCP/IP designed in this paper has the following characteristics. First, memory resource is minimized by using minimal memory allocation. Second, processor resource is minimized by using minimal memory copy. Third, the execution time of the TCP/IP can be completed in a deterministic time. Fourth, there is no memory leak problem. The standard in minimal resources for memory and processor derived in this paper can be used to check whether the network subsystems of the already implemented IoT systems are efficiently implemented. As the result of measuring the amount of memory allocation and copy of the network subsystem of Zephyr, an open source IoT kernel recently released by the Linux Foundation, we found that it was bigger than the standard in minimal resources derived in this paper. The network subsystem of Zephyr was improved according to the design proposed in this paper, confirming that the amount of memory allocation and copy were decreased by about 39% and 67%, respectively, and the execution time was also reduced by about 28%.

Developing an Expert System for Close Combat using Decision Tree (의사결정나무를 이용한 근접전투전문가시스템)

  • Kim, Hyung-Se;Moon, Ho-Seok;Lee, Dong-Keun;Hwang, Myung-Sang;Kim, Young-Kuk
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.3
    • /
    • pp.83-93
    • /
    • 2010
  • In this paper, we propose a new expert system for close combat in military war game model for training. Simulation logic for damage assesment is one of the main simulation functions in military war game. In Changcho 21's model which is the war game model for Republic of Korea Army corps and division, the main function of close combat's damage assessment has not been calculated by Changcho 21's model, but by COBRA which was made by US Army and has been the expert system for close combat. Results which were calculated in COBRA were sent to Changcho 21's model through a cable network. And Changcho 21's model finally calculated the value of damage assessment with the results. In this paper, we develop an new expert system for close combat using decision tree. The experimental results show that the proposed expert system has similar performance to COBRA and has less computing complexity. And it can substitute for COBRA and be applicable to battlefield.

Visualization research based on hero tale stories in a fantasy movie (영웅서사구조 중심으로 하는 판타지영화의 시각화 연구)

  • Han, Myung-Hee
    • Journal of Digital Contents Society
    • /
    • v.11 no.2
    • /
    • pp.185-194
    • /
    • 2010
  • The digital contents industry already heads toward the OSMU(One Source Multi Use) method of media. In case the success of the original novel recreates to a movie, the success of a movie is again noticed with the original novel. For this reason, a novel and movie are open at the same time, In this paper, we analyze through the case study of three fantasy films having the narrative structure of the germane myth : The Lord of The Rings, Harry Potter, The Chronicles Of Narnia based on the analysis basis : Hero's Journey 12 steps by J. Campbell, The analysis of scenes of each film visualizing the narrative structure of a novel can be used as the basic materials in the process of visualizing the scale of the original and message of a writer, we consequently believe that these analysis will be able to be applied the appropriate visual techniques (the special effect, the scene tractions, and etc.)in visualization of films.

The Visualization of films for the stand on narrative of Germanic Mythology -Focused on "The Road of the Ring", "Harry Potter", and "The Chronicles Of Narnia"- (게르만신화의 서사구조를 바탕으로 한 영화의 시각화 -반지의 제왕, 해리포터, 나니아 연대기를 중심으로-)

  • Baek, Kwang-Ho;Han, Myung-Hee;Kim, Mi-Jin
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1129-1136
    • /
    • 2009
  • The digital contents industry already heads toward the OSMU(One Source Multi Use) method of media. In case the success of the original novel recreates to a movie, the success of a movie is again noticed with the original novel. For this reason, a novel and movie are open at the same time, In this paper, we analyze through the case study of three fantasy films having the narrative structure of the germane myth : The Lord of The Rings, Harry Potter, The Chronicles Of Narnia based on the analysis basis : Hero's Journey 12 steps by J. Campbell, The analysis of scenes of each film visualizing the narrative structure of a novel can be used as the basic materials in the process of visualizing the scale of the original and message of a writer, we consequently believe that these analysis will be able to be applied the appropriate visual techniques (the special effect, the scene tractions, and etc.)in visualization of films.

  • PDF

Single Trace Side Channel Analysis on NTRUEncrypt Implementation (NTRUEncrypt에 대한 단일 파형 기반 전력 분석)

  • An, Soojung;Kim, Suhri;Jin, Sunghyun;Kim, HanBit;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1089-1098
    • /
    • 2018
  • As the development of quantum computers becomes visible, the researches on post-quantum cryptography to alternate the present cryptography system have actively pursued. To substitute RSA and Elliptic Curve Cryptosystem, post-quantum cryptography must also consider side channel resistance in implementation. In this paper, we propose a side channel analysis on NTRU, based on the implementation made public in the NIST standardization. Unlike the previous analysis which exploits a thousands of traces, the proposed attack can recover the private key using a single power consumption trace. Our attack not only reduces the complexity of the attack but also gives more possibility to analyze a practical public key cryptosystem. Furthermore, we suggested the countermeasure against our attacks. Our countermeasure is much more efficient than existing implementation.

The Implementation of Stmart Phone Edition based on Embedded Linux (임베디드 리눅스 기반의 스마트폰 에디션 구현)

  • Kim Do-Hyung;Yun Min-Hong;Kim Sun-Ja;Lee Cheol-Hoon
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.597-604
    • /
    • 2005
  • The paper describes implementation of smartphone edition based on embedded Linux, which is composed of smartphone middleware and basic applications. Existing smartphone platforms entails loyalty expenses and has difficulties on customization due to the closed policy of their source codes. Although GPE - based on embedded Linux has solved the loyalty issues, other problems are remained unsolved. Since GPE has been designed for relatively large PDA-level devices, applications are generally inoperable under the condition of small LCD size and input methods without touch-screen; the condition is typical limitations of the smartphones. In the implemented smartphone edition of the paper no loyalty is required, because the smartphone edition is based on embedded Linux. It also supports keypad-only operating functionality such as moving between folders or running applications with operations. Besides, it provides more user-friendly environment to use the smartphone editionscreen interfaces and indicatorsto those of the regular cellular phones.

Design & Implementation of the RMMC and Global Time based on the RT-eCos 3.0 (RT-eCos 3.0 기반의 RMMC 및 글로벌 타임 설계 및 구현)

  • Han, Seoung-Yeon;Kim, Jung-Guk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.7
    • /
    • pp.759-767
    • /
    • 2010
  • RT-eCos 3.0 is a micro-sized embedded real-time kernel that has been developed based on the open source eCos 3.0 to support the basic task model of the well-known distributed real-time object model, TMO(Time-Triggered Message-triggered Object). In this paper, the design and implementation techniques of the RMMC(Real-time Multicast & Memory replication Channel) that is a standard distributed IPC model of the TMO is described based on the RT-eCos 3.0. And the support technique of the global time for using the same time in a distributed environment using the RMMC is also described. The developed global time based RMMC supports highly abstracted distributed IPC environment in a wide area distributed computing environment with the RT-eCos 3.0.

Construction and Service of a Web-based Simulation software management system for the Computational Science and Engineering (계산과학공학 분야를 위한 웹 기반 시뮬레이션 소프트웨어 관리 시스템 구축 및 서비스)

  • Jeon, Inho;Kwon, Yejin;Ma, Jin;Lee, Sik;Cho, Kum Won;Seo, Jerry
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.99-108
    • /
    • 2017
  • Open Science is evolving not only to share research results, but also to open the research process. We are developing the EDISON platform for the spread of open science in computational science and engineering. The EDISON platform provides online simulation services developed by computational science and engineering researchers. It also provides an environment for sharing source code, data, and related research publications. An effective simulation software registration management system is required for successful service on the EDISON platform. In this paper, we proposes a simulation software management system to provide online simulation service through EDISON platform. The proposed system allows the developer to register the simulation software on the EDISON platform without administrator intervention and effectively build a web-based simulation environment.