• Title/Summary/Keyword: 함수수준 특징정보

Search Result 18, Processing Time 0.026 seconds

Detection of an Open-Source Software Module based on Function-level Features (함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지)

  • Kim, Dongjin;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.713-722
    • /
    • 2015
  • As open-source software (OSS) becomes more widely used, many users breach the terms in the license agreement of OSS, or reuse a vulnerable OSS module. Therefore, a technique needs to be developed for investigating if a binary program includes an OSS module. In this paper, we propose an efficient technique to detect a particular OSS module in an executable program using its function-level features. The conventional methods are inappropriate for determining whether a module is contained in a specific program because they usually measure the similarity between whole programs. Our technique determines whether an executable program contains a certain OSS module by extracting features such as its function-level instructions, control flow graph, and the structural attributes of a function from both the program and the module, and comparing the similarity of features. In order to demonstrate the efficiency of the proposed technique, we evaluate it in terms of the size of features, detection accuracy, execution overhead, and resilience to compiler optimizations.

인간의 시각 특성에 기반한 LCD 영역형 얼룩의 불량 수준 측정

  • Lee, Won-Hee;Park, No-Gap;Choi, Kyu-Nam;Yoo, Suk-In
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10b
    • /
    • pp.426-430
    • /
    • 2006
  • TFT-LCD의 생산 과정에서 나오는 불량 제품의 검출은 자동화 과정에 의해 선택된 잠재적 불량 제품의 선택에 이은 인간의 목시검사에 의한 판단을 통해 이루어진다. 이러한 목시검사를 자동화하기 위해서는 불량의 식별성에 영향을 미치는 각 요소들에 대한 정량적인 분석, 그리고 각 요소들과 실제 최종적인 불량 판단 여부 사이의 체계적인 함수 관계의 파악이 필요하다. 본 논문에서는 TFT-LCD의 영역형 얼룩을 구성하는 특징적인 요소들을 정의하고, 이를 통해 불량 수준을 정의하는 수치화 함수를 유도하는 과정과, 이를 영역형 얼룩의 불량 수준 수치화에 적용한 결과를 보여 준다.

  • PDF

Operational Semantics for Instruction List with Functions (함수를 포함한 IL 언어의 실행적 의미구조)

  • Shin, Seung-Cheol;Rho, Sang-Hoon
    • The KIPS Transactions:PartA
    • /
    • v.14A no.7
    • /
    • pp.457-466
    • /
    • 2007
  • IEC61131-3 is the standard of control languages in which special purpose controllers and motion controllers such as PLC can be programmed. IL(Instruction List), one of the standard languages, is in assembly level but has some high-level features. This paper describes a formal semantics of IL in operational style. Previous works on IL semantics do not include functions and function blocks, which is not so practical. We define IL semantics including functions and function blocks.

Analysis of Weight Factor and Hyperbox Overlapping Effects in FMM Neural Networks (FMM 신경망에서 가중치 요소와 하이퍼박스 중첩효과 분석)

  • Park, Hyun-Jung;Kim, Ho-Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.691-693
    • /
    • 2005
  • 본 연구에서는 FMM 신경망의 학습 알고리즘에서 하이퍼박스 확장과정에 수반되는 중첩현상을 분석하고, 이에 대한 축소 과정의 특성과 이를 보완하기 위한 새로운 활성화 함수에 관하여 고찰한다. 하이퍼박스 중첩 영역에 속하는 패턴 데이터는 그 분류 결과가 왜곡될 수 있다. 왜냐하면 학습과정에서 하이퍼박스상의 특징범위는 특징값의 빈도요소를 고려하지 않음으로 인하여 극소수의 비정상적 데이터에 관해서도 동일 수준으로 민감하게 확장되기 때문이다. 본 논문에서는 특징집합에서 가중치와 빈도요소를 반영하는 모델로서 이러한 중첩현상의 영향을 개선하는 방법론을 소개한다. 제안된 이론은 단순화된 패턴집합에 대하여 그 유용성을 이론적으로 고찰하며, 실제 패턴분류 문제에 적용하여 실험적으로 평가한다.

  • PDF

Survey on Hash-Based Post-Quantum Digital Signature Schemes (해시 기반 양자내성 전자서명 기법 연구 동향)

  • Lee, Jae-Heung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.683-688
    • /
    • 2021
  • Digital signature algorithms such as RSA and ECDSA are threatened by the development of quantum computer technology, which is attracting attention as a future technology. Alternatively, various post-quantum algorithms such as grid-based, multivariate-based, code-based, and hash-based are being studied. Among them, the hash-based is a fast and quantitative security level that can be calculated and its safety has been proven. So it is receiving a lot of attention. In this paper, we examine various hash-based digital signature algorithms that have been proposed so far, and analyze their features and their strengths and weaknesses. In addition, we emphasize the importance of reducing the size of the signature in order for the hash-based signature algorithm to be practically used.

Progressive occupancy network for 3D reconstruction (3차원 형상 복원을 위한 점진적 점유 예측 네트워크)

  • Kim, Yonggyu;Kim, Duksu
    • Journal of the Korea Computer Graphics Society
    • /
    • v.27 no.3
    • /
    • pp.65-74
    • /
    • 2021
  • 3D reconstruction means that reconstructing the 3D shape of the object in an image and a video. We proposed a progressive occupancy network architecture that can recover not only the overall shape of the object but also the local details. Unlike the original occupancy network, which uses a feature vector embedding information of the whole image, we extract and utilize the different levels of image features depending on the receptive field size. We also propose a novel network architecture that applies the image features sequentially to the decoder blocks in the decoder and improves the quality of the reconstructed 3D shape progressively. In addition, we design a novel decoder block structure that combines the different levels of image features properly and uses them for updating the input point feature. We trained our progressive occupancy network with ShapeNet. We compare its representation power with two prior methods, including prior occupancy network(ONet) and the recent work(DISN) that used different levels of image features like ours. From the perspective of evaluation metrics, our network shows better performance than ONet for all the metrics, and it achieved a little better or a compatible score with DISN. For visualization results, we found that our method successfully reconstructs the local details that ONet misses. Also, compare with DISN that fails to reconstruct the thin parts or occluded parts of the object, our progressive occupancy network successfully catches the parts. These results validate the usefulness of the proposed network architecture.

Estimation of residential electricity demand function using cross-section data (횡단면 자료를 이용한 주택용 전력의 수요함수 추정)

  • Lim, Seul-Ye;Lim, Kyoung-Min;Yoo, Seung-Hoon
    • Journal of Energy Engineering
    • /
    • v.22 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • This paper attempts to estimate the residential electricity demand function, using survey data of 521 households in Korea. As the residential electricity demand function provides us information on the pattern of consumer's electricity consumption, it can be usefully utilized in predicting the impact of policy variables such as electricity price and forecasting electricity demands. We apply least absolute deviation(LAD) estimation as a robust approach to estimating parameters. The results showed that price and income elasticities are -0.68 and 0.14 respectively, and statistically significant at the 10% levels. The price and income elasticities portray that residential electricity is price- and income-inelastic. This implies that the residential electricity is indispensable goods to human-being's life, thus the residential electricity demand would not be promptly adjusted to responding to price and/or income change.

Conditionally Traceable Pseudonym Protocol based on Oblivious Transfer (OT(Oblivious Transfer) 기반의 조건부 추적이 가능한 가명 프로토콜)

  • Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.33-42
    • /
    • 2009
  • Recently, there have been many researches about anonymous credential systems for supporting the user anonymity. However, these systems only hold a high security level, even though they must be able to be applied to various application that might require access control, conditional traceability, etc. As new challenges to these systems, some researches that several entities store the link information that associates identities and pseudonyms each other have been performed. In this paper, based on the oblivious transfer, we suggest a new pseudonym protocol that solves the pseudonym exhaustion problem which the original pseudonym retrieval protocol suffers from. By using the universal re-encryption and one-way function, we can also archive other requirements like the pseudonym unlinkability from the outside.

Integral Histogram-based Framework for Rapid Object Tracking (고속 객체 검출을 위한 적분 히스토그램 기반 프레임워크)

  • Ko, Jaepil;Ahn, Jung-Ho;Hong, Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.2
    • /
    • pp.45-56
    • /
    • 2015
  • In this paper we propose a very rapid moving object tracking method for an object-based auto focus on a smart phone camera. By considering the limit of non-learning approach on low-performance platforms, we use a sliding-window detection technique based on histogram features. By adapting the integral histogram, we solve the problem of the time-consuming histogram computation on each sub-window. For more speed up, we propose a local candidate search, and an adaptive scaling template method. In addition, we propose to apply a stabilization term in the matching function for a stable detection location. In experiments on our dataset, we demonstrated that we achieved a very rapid tracking performance demonstrating over 100 frames per second on a PC environment.

Distribution Characteristics of the Medical Services in Korea (한국 의료서비스의 분포 특징 분석)

  • Lee Keumsook
    • Journal of the Korean Geographical Society
    • /
    • v.40 no.2 s.107
    • /
    • pp.242-251
    • /
    • 2005
  • This study investigates the distribution characteristics of medical services in Korea. For the purpose this paper examines the spatial discordance between the provisions of the medical services and the need for them, and analyzes the spatial distribution patterns of medical service in both inter- and intra-regional levels. Disclosed is a severe regional disparity problem in the provision of medical facilities at both inter-regional and intra-regional levels. In recent years people's interest gets increased more in the social well-being of the community, and the resulting strong request makes it desirable to restructure the healthcare service system. This study has thus attempted to draw out the distribution function of the medical facilities, based on the examination of the real data. A particular attention has been paid to whether there exists any hierarchical structure in their size distribution. Quite remarkably, no appreciable hierarchical structure has been observed in the scale of the medical facilities in Korea, in sharp contrast to of the three-level hierarchical structure assumed in the three-level referral system adopted widely. Remarkably, it is revealed that medical facilities in Korea are described by scale-invariant distribution functions. Instead, scale-invariant power-law behavior has been found in the size distribution, which is expected to be rather generic and applicable to other countries as well.