• Title/Summary/Keyword: 소스 코드 유사도

Search Result 73, Processing Time 0.023 seconds

A method of Feature - OWL Transformation using Ontology (온톨로지를 이용한 Feature - OWL 모델 변환기법)

  • Kim, Dong-Ri;Song, Chee-Yang;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.249-252
    • /
    • 2008
  • 소프트웨어 제품 개발에 있어서 생산성 증가와 비용 절감을 위해 기존 생성된 산출물의 재사용이 중요시 되고 있다. 이 재사용의 초점은 소스 코드의 재사용에서, 설계의 재사용, 도메인 공학에 초점을 둔 재사용으로 발전 되어 왔고, 재사용 자원을 만들기 위한 도메인 분석방법에 대한 연구가 이루어지고 있다. 현재 유사한 도메인에 대한 온톨로지 기반 feature 공통성과 가변성 분석 기법에 대한 연구가 있으나, feature 와 온톨로지에 대한 메타모델 차원의 명확한 분석과 모델들간의 매핑 프로파일이 없어서 일관성 있는 변환을 저해하고 있다. 본 논문에서는 메타모델 차원에서 온톨로지를 이용한 feature 모델과 OWL 간의 변환 방법을 제시한다. 이를 위해 feature 와 OWL 에 대한 메타모델을 정의하고, 이 속성들에 기반하여 feature 모델과 OWL 간 변환 프로파일과 알고리즘을 생성한다. 그리고 제시한 변환 규칙을 이용하여 전자결재 시스템을 통해 실제 적용함으로써 일관성 있는 모델 변환을 보여준다.

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

Implementation of JDAM virtual training function using machine learning

  • You, Eun-Kyung;Bae, Chan-Gyu;Kim, Hyeock-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.9-16
    • /
    • 2020
  • The TA-50 aircraft is conducting simulated training on various situations, including air-to-air and air-to-ground fire training, in preparation for air warfare. It is also used for pilot training before actual deployment. However, the TA-50 does not have the ability to operate smart weapon forces, limiting training. Therefore, the purpose of this study is to implement the TA-50 aircraft to enable virtual training of one of the smart weapons, the Point Direct Attack Munition (JDAM). First, JDAM functions implemented in FA-50 aircraft, a model similar to TA-50 aircraft, were analyzed. In addition, since functions implemented in FA-50 aircraft cannot be directly utilized by source code, algorithms were extracted using machine learning techniques(TensorFlow). The implementation of this function is expected to enable realistic training without actually having to be armed. Finally, based on the results of this study, we would like to propose ways to supplement the limitations of the research so that it can be implemented in the same way as it is.

Constructing an Open Source Based Software System for Reusable Module Extraction (재사용 모듈 추출을 위한 오픈 소스 기반 소프트웨어 시스템 구축)

  • Byun, Eun Young;Park, Bokyung;Jang, Woosung;Kim, R. Young Chul;Son, Hyun Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.535-541
    • /
    • 2017
  • Today, the scale of the computer software market has increased, and massive sized software has been developed to satisfy diverse requirements. In this context, software complexity is increasing and the quality of software is becoming more difficult to manage. In particular, software reuse is important for the improvement of the environments of legacy systems and new system development. In this paper, we propose a method to reuse modules that are certified by quality. Reusable levels are divided into code area (method, class, and component), project domain, and business levels. Based on the coupling and cohesion of software complexity, we propose a reusable module extraction mechanism with reusability metrics, which constructs a visualization of the "reusable module's chunk" based on the method and class levels. By applying reverse engineering to legacy projects, it is possible to identify reusable modules/objects/chunks. If these modules/objects/chunks are to be reused to develop an extension system or similar new system, we need to ensure software reliability in order to reduce the time and cost of software development.

The Implementation of Stmart Phone Edition based on Embedded Linux (임베디드 리눅스 기반의 스마트폰 에디션 구현)

  • Kim Do-Hyung;Yun Min-Hong;Kim Sun-Ja;Lee Cheol-Hoon
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.597-604
    • /
    • 2005
  • The paper describes implementation of smartphone edition based on embedded Linux, which is composed of smartphone middleware and basic applications. Existing smartphone platforms entails loyalty expenses and has difficulties on customization due to the closed policy of their source codes. Although GPE - based on embedded Linux has solved the loyalty issues, other problems are remained unsolved. Since GPE has been designed for relatively large PDA-level devices, applications are generally inoperable under the condition of small LCD size and input methods without touch-screen; the condition is typical limitations of the smartphones. In the implemented smartphone edition of the paper no loyalty is required, because the smartphone edition is based on embedded Linux. It also supports keypad-only operating functionality such as moving between folders or running applications with operations. Besides, it provides more user-friendly environment to use the smartphone editionscreen interfaces and indicatorsto those of the regular cellular phones.

Interactive Statistics Laboratory using R and Sage (R을 활용한 '대화형 통계학 입문 실습실' 개발과 활용)

  • Lee, Sang-Gu;Lee, Geung-Hee;Choi, Yong-Seok;Lee, Jae Hwa;Lee, Jenny Jyoung
    • Communications of Mathematical Education
    • /
    • v.29 no.4
    • /
    • pp.573-588
    • /
    • 2015
  • In this paper, we introduce development process and application of a simple and effective model of a statistics laboratory using open source software R, one of leading language and environment for statistical computing and graphics. This model consists of HTML files, including Sage cells, video lectures and enough internet resources. Users do not have to install statistical softwares to run their code. Clicking 'evaluate' button in the web page displays the result that is calculated through cloud-computing environment. Hence, with any type of mobile equipment and internet, learners can freely practice statistical concepts and theorems via various examples with sample R (or Sage) codes which were given, while instructors can easily design and modify it for his/her lectures, only gathering many existing resources and editing HTML file. This will be a resonable model of laboratory for studying statistics. This model with bunch of provided materials will reduce the time and effort needed for R-beginners to be acquainted with and understand R language and also stimulate beginners' interest in statistics. We introduce this interactive statistical laboratory as an useful model for beginners to learn basic statistical concepts and R.

Study on MPI-based parallel sequence similarity search in the LINUX cluster (클러스터 환경에서의 MPI 기반 병렬 서열 유사성 검색에 관한 연구)

  • Hong, Chang-Bum;Cha, Jeoung-Ho;Lee, Sung-Hoon;Shin, Seung-Woo;Park, Keun-Joon;Park, Keun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.69-78
    • /
    • 2006
  • In the field of the bioinformatics, it plays an important role in predicting functional information or structure information to search similar sequence in biological DB. Biolrgical sequences have been increased dramatically since Human Genome Project. At this point, because the searching speed for the similar sequence is highly regarded as the important factor for predicting function or structure, the SMP(Sysmmetric Multi-Processors) computer or cluster is being used in order to improve the performance of searching time. As the method to improve the searching time of BLAST(Basic Local Alighment Search Tool) being used for the similarity sequence search, We suggest the nBLAST algorithm performing on the cluster environment in this paper. As the nBLAST uses the MPI(Message Passing Interface), the parallel library without modifying the existing BLAST source code, to distribute the query to each node and make it performed in parallel, it is possible to easily make BLAST parallel without complicated procedures such as the configuration. In addition, with the experiment performing the nBLAST in the 28 nodes of LINUX cluster, the enhanced performance according to the increase in the number of the nodes has been confirmed.

  • PDF

Implementation of PersonalJave™ AWT using Light-weight Window Manager (경량 윈도우 관리기를 이용한 퍼스널자바 AWT 구현)

  • Kim, Tae-Hyoun;Kim, Kwang-Young;Kim, Hyung-Soo;Sung, Min-Young;Chang, Nae-Hyuck;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.240-247
    • /
    • 2001
  • Java is a promising runtime environment for embedded systems because it has many advantages such as platform independence, high security and support for multi-threading. One of the most famous Java run-time environments, Sun's ($PersonalJave^{TM}$) is based on Truffle architecture, which enables programmers to design various GUIs easily. For this reason, it has been ported to various embedded systems such as set-top boxes and personal digital assistants(PDA's). Basically, Truffle uses heavy-weight window managers such as Microsoft vVin32 API and X-Window. However, those window managers are not adequate for embedded systems because they require a large amount of memory and disk space. To come up with the requirements of embedded systems, we adopt Microwindows as the platform graphic system for Personal] ava A WT onto Embedded Linux. Although Microwindows is a light-weight window manager, it provides as powerful API as traditional window managers. Because Microwindows does not require any support from other graphics systems, it can be easily ported to various platforms. In addition, it is an open source code software. Therefore, we can easily modify and extend it as needed. In this paper, we implement Personal]ava A WT using Microwindows on embedded Linux and prove the efficiency of our approach.

  • PDF

Three-dimensional Simulation of Wave Reflection and Pressure Acting on Circular Perforated Caisson Breakwater by OLAFOAM (OLAFOAM에 기초한 원형유공케이슨 방파제의 반사율 및 작용파압에 관한 3차원시뮬레이션)

  • Lee, Kwang-Ho;Bae, Ju-Hyun;Kim, Sang-Gi;Kim, Do-Sam
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.29 no.6
    • /
    • pp.286-304
    • /
    • 2017
  • In this study, we proposed a new-type of circular perforated caisson breakwater consisting of a bundle of latticed blocks that can be applied to a small port such as a fishing port, and numerically investigated the hydraulic characteristics of the breakwater. The numerical method used in this study is OLAFOAM which newly added wave generation module, porous media analysis module and reflected wave control module based on OpenFOAM that is open source CFD software published under the GPL license. To investigate the applicability of OLAFOAM, the variations of wave pressure acting on the three-dimensional slit caisson were compared to the previous experimental results under the regular wave conditions, and then the performance for irregular waves was examined from the reproducibility of the target irregular waves and frequency spectrum analysis. As a result, a series of numerical simulations for the new-type of circular perforated caisson breakwaters, which is similar to slit caisson breakwater, was carried out under the irregular wave actions. The hydraulic characteristics of the breakwater such as wave overtopping, reflection, and wave pressure distribution were carefully investigated respect to the significant wave height and period, the wave chamber width, and the interconnectivity between them. The numerical results revealed that the wave pressure acting on the new-type of circular perforated caisson breakwaters was considerably smaller than the result of the impermeable vertical wall computed by the Goda equation. Also, the reflection of the new-type caisson breakwater was similar to the variation range of the reflection coefficient of the existing slit caisson breakwater.

DCT-domain MPEG-2/H.264 Video Transcoder System Architecture for DMB Services (DMB 서비스를 위한 DCT 기반 MPEG-2/H.264 비디오 트랜스코더 시스템 구조)

  • Lee Joo-Kyong;Kwon Soon-Young;Park Seong-Ho;Kim Young-Ju;Chung Ki-Dong
    • The KIPS Transactions:PartB
    • /
    • v.12B no.6 s.102
    • /
    • pp.637-646
    • /
    • 2005
  • Most of the multimedia contents for DBM services art provided as MPEG-2 bit streams. However, they have to be transcoded to H.264 bit streams for practical services because the standard video codec for DMB is H.264. The existing transcoder architecture is Cascaded Pixel-Domain Transcoding Architecture, which consists of the MPEG-2 dacoding phase and the H.264 encoding phase. This architecture can be easily implemented using MPEG-2 decoder and H.264 encoder without source modifying. However. It has disadvantages in transcoding time and DCT-mismatch problem. In this paper, we propose two kinds of transcoder architecture, DCT-OPEN and DCT-CLOSED, to complement the CPDT architecture. Although DCT-OPEN has lower PSNR than CPDT due to drift problem, it is efficient for real-time transcoding. On the contrary, the DCT-CLOSED architecture has the advantage of PSNR over CPDT at the cost of transcoding time.