• Title/Summary/Keyword: Code checking

Search Result 130, Processing Time 0.031 seconds

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

  • Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4588-4603
    • /
    • 2014
  • In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

Mobile u-healthcare system in IEEE 802.15.4 WSN and CDMA network environments

  • Toh, Sing-Hui;Lee, Seung-Chul;Lee, Hoon-Jae;Do, Kyeong-Hoon;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.337-342
    • /
    • 2009
  • This paper describes a robust mobile u-healthcare system with multiple physiological signs measurement capability in real time with integration of WSN(wireless sensor network) technology and CDMA(code division multiple access) network. A cellular phone receives health data in WSN and performs local physiological signs analysis at a phone processor, and then transmits abnormal data to server for further detail or precise health signal evaluation by a medical doctor over a CDMA network. Physiological signs of the patients are continuously monitored, processed and analyzed locally at cellular phone process to produce useful medical information for diagnosis and tracking purposes. By local simple analysis in cellular phone processor we can save the data transmission cost in CDMA network. By using the developed integrate ubiquitous healthcare service architecture, patients can realize self-health checking so that the prevention actions can be taken earlier. Appropriate self-monitoring and self-management can cure disease and relieve pain especially for patients who suffer from chronic diseases that need long term observation.

Best Practices on Validation and Extraction of Object oriented Designs with Code Visualization Tool-chain (코드 가시화 툴체인 기반 UML 설계 추출 및 검증 사례)

  • Lee, Won-Young;Kim, Robert YoungChul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.79-86
    • /
    • 2022
  • This paper focuses on realizing design improvement and high quality through visualization of reverse engineering-based software. As new technologies and complex software emerge in various areas of the fourth industry in the future, software verification with both stability and reliability is becoming an issue. We propose a reverse engineering-based UML design extraction and visualization for high-quality software ranging from simple computational software to machine learning-based data-oriented software. Through this study, it is expected to improve software quality through design improvement by checking the accuracy of the target design and identifying the code complexity.

Improvement of BigCloneBench Using Tree-Based Convolutional Neural Network (트리 기반 컨볼루션 신경망을 이용한 BigCloneBench 개선)

  • Park, Gunwoo;Hong, Sung-Moon;Kim, Hyunha;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.43-53
    • /
    • 2019
  • BigCloneBench has recently been used for performance evaluation of code clone detection tool using machine learning. However, since BigCloneBench is not a benchmark that is optimized for machine learning, incorrect learning data can be created. In this paper, we have shown through experiments using machine learning that the set of Type-4 clone methods provided by BigCloneBench can additionally be found. Experimental results using Tree-Based Convolutional Neural Network show that our proposed method is effective in improving BigCloneBench's dataset.

QCELP Implementation on TMS320C30 DSP Board TMS320C30 DSP를 이용한 QCELP Codec의 실현

  • Han, Kyong-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.14 no.1E
    • /
    • pp.83-87
    • /
    • 1995
  • The implementation of the voice dodec is imjplemented by using TMS320C30, which is the floating point DSP chip from Texas Instrument. QCELP (Qualcomm Code Excited Linear Prediction) is used to encode and decode the voice. The QCELP code is implemented by the TMS320C30 C-dode. The DSP board is controlled by the PC. The PC program tranfors the voice file from and to the DSP board, which is also implemented by C-code. The voice is encoded by the DSP board and the encoded data is transferred to PC to be stored as a file. To hear the voice. the voice data file is sent to DSP board and decoded to synthesize audible voice. Two flags are used by both programs to notify the status of the operation. By checking the flags, DSP and PC decides when the voice data is transferred between them.

  • PDF

Checking Security of Information Flow on Java Byte Code (자바 바이트 코드에서 정보흐름 보안성 검사)

  • 박사천;이정림;권기현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.316-318
    • /
    • 2004
  • 현재 정보보호시스템의 에러로 않은 피해를 입고 있다. 특히 고 보안성이 요구되는 시스템에서의 정보 누출이 심각한 문제가 되고 있는데 이러한 시스템의 예로 스마트카드가 있다. 스마트카드는 오랜 시간 축적된 경험과 연구로써 그 보안성이 특히 우수하다고 할 수 있다. 그러나 애플리케이션 내에서 그리고 애플리케이션간의 정보흐름의 보안성은 보장되지 않는다. 따라서 개인 정보 누출의 위협이 존재한다. 소스프로그램 차원에서 보안적 정보흐름을 검사하는 연구들이 많이 진행되어 왔고 자동도구인 모델체커를 이용하는 연구들도 정차 증가하고 있다. 이런 연구들의 연장선상에서 본 논문에서는 SMV 모델체커를 이용해 자바 바이트 코드에 대한 정보흐름의 보안성을 검사하는 방법을 보인다.

  • PDF

Using DSP Algorithms for CRC in a CAN Controller

  • Juan, Ronnie O. Serfa;Kim, Hi Seok
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2016
  • A controller area network (CAN) controller is an integral part of an electronic control unit, particularly in an advanced driver assistance system application, and its characteristics should always be advantageous in all aspects of functionality especially in real time application. The cost should be low, while maintaining the functionality and reliability of the technology. However, a CAN protocol implementing serial operation results in slow throughput, especially in a cyclical redundancy checking (CRC) unit. In this paper, digital signal processing (DSP) algorithms are implemented, namely pipelining, unfolding, and retiming the CAN controller in the CRC unit, particularly for the encoder and decoder sections. It must attain a feasible iteration bound, a critical path that is appropriate for a CAN system, and must obtain a superior design of a high-speed parallel circuit for the CRC unit in order to have a faster transmission rate. The source code for the encoder and decoder was formulated in the Verilog hardware description language.

Verifying Code toward Trustworthy Software

  • Kim, Hyong-Soon;Lee, Eunyoung
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.309-321
    • /
    • 2018
  • In the conventional computing environment, users use only a small number of software systems intensively. So it had been enough to check and guarantee the functional correctness and safety of a small number of giant systems in order to protect the user systems and their information inside the systems from outside attacks. However, checking the correctness and safety of giant systems is not enough anymore, since users are using various software systems or web services provided by unskilled developers. To prove or guarantee the safety of software system, a lot of research has been conducted in diverse areas of computer science. We will discuss the on-going approaches for guaranteeing or verifying the safety of software systems in this paper. We also discuss the future research challenge which must be solved with better solutions in the near future.

Software for application of Newton-Raphson method in estimation of strains in prestressed concrete girders

  • Gocic, Milan;Sadovic, Enis
    • Computers and Concrete
    • /
    • v.10 no.2
    • /
    • pp.121-133
    • /
    • 2012
  • Structures suffer from damages in their lifetime due to time-dependant effects, such as fatigue, creep and shrinkage, which can be expressed by concrete strains. These processes could be seen in the context of strain estimation of pre-stressed structures in two phases by using numerical methods. Their aim is checking and validating existing code procedures in determination of deformations of pre-tensioned girders by solving a system of nonlinear equations with strains as unknown parameters. This paper presents an approach based on the Newton-Raphson method for obtaining the stresses and strains in middle span section of pre-stressed girders according the equilibrium state.

Seismic vulnerability evaluation of a 32-story reinforced concrete building

  • Memari, A.M.;Motlagh, A.R. Yazdani;Akhtari, M.;Scanlon, A.;Ashtiany, M. Ghafory
    • Structural Engineering and Mechanics
    • /
    • v.7 no.1
    • /
    • pp.1-18
    • /
    • 1999
  • Seismic evaluation of a 32-story reinforced concrete framed tube building is performed by checking damageability, safety, and toughness limit states. The evaluation is based on Standard 2800 (Iranian seismic code) which recommends equivalent lateral static force, modal superposition, or time history dynamic analysis methods to be applied. A three dimensional linearly elastic model checked by ambient vibration test results is used for the evaluation. Accelerograms of three earthquakes as well as linearly elastic design response spectra are used for dynamic analysis. Damageability is checked by considering story drift ratios. Safety is evaluated by comparing demands and capacities at the story and element force levels. Finally, toughness is studied in terms of curvature ductility of members. The paper explains the methodology selected and various aspects in detail.