• Title/Summary/Keyword: 자동생성 코드

Search Result 359, Processing Time 0.02 seconds

Automatic Music Summarization Method by using the Bit Error Rate of the Audio Fingerprint and a System thereof (오디오 핑거프린트의 비트에러율을 이용한 자동 음악 요약 기법 및 시스템)

  • Kim, Minseong;Park, Mansoo;Kim, Hoirin
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.4
    • /
    • pp.453-463
    • /
    • 2013
  • In this paper, we present an effective method and a system for the music summarization which automatically extract the chorus portion of a piece of music. A music summary technology is very useful for browsing a song or generating a sample music for an online music service. To develop the solution, conventional automatic music summarization methods use a 2-dimensional similarity matrix, statistical models, or clustering techniques. But our proposed method extracts the music summary by calculating BER(Bit Error Rate) between audio fingerprint blocks which are extracted from a song. But we could directly use an enormous audio fingerprint database which was already saved for a music retrieval solution. This shows the possibility of developing a various of new algorithms and solutions using the audio fingerprint database. In addition, experiments show that the proposed method captures the chorus of a song more effectively than a conventional method.

An Automatic ROI Extraction and Its Mask Generation based on Wavelet of Low DOF Image (피사계 심도가 낮은 이미지에서 웨이블릿 기반의 자동 ROI 추출 및 마스크 생성)

  • Park, Sun-Hwa;Seo, Yeong-Geon;Lee, Bu-Kweon;Kang, Ki-Jun;Kim, Ho-Yong;Kim, Hyung-Jun;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.93-101
    • /
    • 2009
  • This paper suggests a new algorithm automatically searching for Region-of-Interest(ROI) with high speed, using the edge information of high frequency subband transformed with wavelet. The proposed method executes a searching algorithm of 4-direction object boundary by the unit of block using the edge information, and detects ROIs. The whole image is splitted by $64{\times}64$ or $32{\times}32$ sized blocks and the blocks can be ROI block or background block according to taking the edges or not. The 4-directions searche the image from the outside to the center and the algorithm uses a feature that the low-DOF image has some edges as one goes to center. After searching all the edges, the method regards the inner blocks of the edges as ROI, and makes the ROI masks and sends them to server. This is one of the dynamic ROI method. The existing methods have had some problems of complicated filtering and region merge, but this method improved considerably the problems. Also, it was possible to apply to an application requiring real-time processing caused by the process of the unit of block.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

An Automated Approach to Determining System's Problem based on Self-healing (자가치유 기법을 기반한 시스템 문제결정 자동화 방법론)

  • Park, Jeong-Min;Jung, Jin-Soo;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.271-284
    • /
    • 2008
  • Self-healing is an approach to evaluating constraints defined in target system and to applying an appropriate strategy when violating he constrains. Today, the computing environment is very complex, so researches that endow a system with the self-healing's ability that recognizes problem arising in a target system are being an important issues. However, most of the existing researches are that self-healing developers need much effort and time to analyze and model constraints. Thus, this paper proposes an automated approach to determine problem arising in external and internal system environment. The approach proposes: 1) Specifying the target system through the models created in design phase of target system. 2) Automatically creating constraints for external and internal system environment, by using the specified contents. 3) Deriving a dependency model of a component based on the created internal state rule. 4) Translating the constraints and dependency model into code evaluating behaviors of the target system, and determinating problem level. 5) Monitoring an internal and external status of system based on the level of problem determination, and applying self-healing strategy when detecting abnormal state caused in the target system. Through these, we can reduce the efforts of self-healing developers to analyze target system, and heal rapidly not only abnormal behavior of target system regarding external and internal problem, but also failure such as system break down into normal state. To evaluate the proposed approach, through video conference system, we verify an effectiveness of our approach by comparing proposed approach's self-healing activities with those of the existing approach.

Testing Android Applications Considering Various Contexts Inferred from Permissions (안드로이드 어플리케이션 개발에서 퍼미션 분석을 사용한 다양한 테스트 환경 조건 생성 기법)

  • Song, Kwangsik;Han, Ah-Rim;Jeong, Sehun;Cha, Sungdeok
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1022-1030
    • /
    • 2015
  • The context-awareness of mobile applications yields several issues for testing, since mobile applications should be able to be tested in any environment and under any contextual input. In previous studies of testing for Android applications as an event-driven system, many researchers have focused on using generated test cases considering only Graphical User Interface (GUI) events. However, it is difficult to find failures that could be detected when considering the changes in the context in which applications run. It is even more important to consider various contexts since the mobile applications adapt and use the new features and sensors of mobile devices. In this paper, we provide a method of systematically generating various executing contexts from permissions. By referring to the lists of permissions, the resources used by the applications for running Android applications can be easily inferred. To evaluate the efficiency of our testing method, we applied the method on two open source projects and showed that it contributes to improve the statement code coverage.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Test of Fault Detection to Solar-Light Module Using UAV Based Thermal Infrared Camera (UAV 기반 열적외선 카메라를 이용한 태양광 모듈 고장진단 실험)

  • LEE, Geun-Sang;LEE, Jong-Jo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.4
    • /
    • pp.106-117
    • /
    • 2016
  • Recently, solar power plants have spread widely as part of the transition to greater environmental protection and renewable energy. Therefore, regular solar plant inspection is necessary to efficiently manage solar-light modules. This study implemented a test that can detect solar-light module faults using an UAV based thermal infrared camera and GIS spatial analysis. First, images were taken using fixed UAV and an RGB camera, then orthomosaic images were created using Pix4D SW. We constructed solar-light module layers from the orthomosaic images and inputted the module layer code. Rubber covers were installed in the solar-light module to detect solar-light module faults. The mean temperature of each solar-light module can be calculated using the Zonalmean function based on temperature information from the UAV thermal camera and solar-light module layer. Finally, locations of solar-light modules of more than $37^{\circ}C$ and those with rubber covers can be extracted automatically using GIS spatial analysis and analyzed specifically using the solar-light module's identifying code.

Development of the program automating regression test of dynamic test of weapon system software (무기체계 SW 동적시험 회귀시험 자동화 프로그램 개발)

  • Cha, Sang-Cheol;Kim, Jeong-Yeol
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.10
    • /
    • pp.892-897
    • /
    • 2017
  • As the weapon system SW development and management manual of the DAPA, which is the regulation for the overall weapon system SW development, is revised, the level and scope of SW reliability test are upgraded to improve the reliability and quality of SW. It is a big burden for SW developers. In particular, the dynamic test requires a schedule and manpower required to implement the weapon system SW, and should be performed every time the source code changes, not just one time. In this paper, we propose a regression test automation program(VectorCast Environment Manager) that performs a dynamic test using VectorCast, a dynamic test tool, and then performs a regression test automatically by minimizing human intervention in the regression test of dynamic test due to the change of the source code.

MDA(Model Driven Architecture) based Design for Multitasking of Heterogeneous Embedded System (이종 임베디드 시스템의 멀티태스킹을 위한 MDA(Model Driven Architecture) 기반의 설계)

  • Son, Hyun-Seung;Kim, Woo-Yeol;Kim, R. Young-Chul
    • The KIPS Transactions:PartD
    • /
    • v.15D no.3
    • /
    • pp.355-360
    • /
    • 2008
  • The complicated embedded system for multi-tasking requires RTOS(real-time operating system). It uses the optimal OS and processor to each embedded system on the heterogeneous development environment. This paper is proposed to use UML profile of OS API and Processor Configuration, instead of cross-compiling for developing the heterogeneous embedded system. This reduces the development time and cost through generating the automatic source code with the profile information of each embedded system. We generate and port the code after modeling the two heterogeneous real time operating systems (brickOS and uC/OS-II) and the processors (Hitachi H8 and Intel PXA255) with our proposed profile of the heterogeneous embedded system.

Design and Development of an Interactive Tool for Developing Multi-platform Software (멀티 플랫폼 소프트웨어 개발을 위한 대화형 도구의 설계 및 구현)

  • 최진우;황선태;우종우
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.95-102
    • /
    • 2002
  • A continuous development of new hardware and operating systems brings the importance of portable programming, which can be imported into multi-platform environment. Also, the recent development of computer communication technology brings us many choices of accessing into the other platforms, which also becomes a burden for the programmers who should consider developing software fitting into diverse platforms The present GNU system tools creates a part of the source code automatically, and suggests a direction towards a new platform. but the source code must be prepared by the programmer at the source level. In this paper, we describe design and implementation of on interactive tool for developing multi-platform software, The tool is designed to help a programmer to build a portable program for multi-platform, even though the programmer does not know very well about various UNIX platforms, And, the tool uses existing GNU system tools, such as autoconf, autoheader, automake and etc, and is able to insert a portable code into a right position by interacting with a programmer.

  • PDF