• Title/Summary/Keyword: Open-Source Components

Search Result 84, Processing Time 0.024 seconds

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.

An Implementation of Priority Model of Real-Time CORBA (실시간 CORBA의 우선순위 모델 구현)

  • Park, Sun-Rei;Chung, Sun-Tae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.4
    • /
    • pp.59-71
    • /
    • 2001
  • The Current CORBA shows some limitations for its successful deployment in real time system applications. Recently, OMG adopted Real-Time CORBA specification, which is defined as an extension to CORBA. The goal of the Real-Time CORBA is to provide a standard for CORBA ORB implementations that support 'end to end predictability'. In order to support 'end-to-end predictability', Real Time CORBA specifies many components such as priority model, communication protocol configuration, thread management, and etc. Among them, 'priority model' is the most important mechanism for avoiding or bounding priority inversion in CORBA invocations. In this paper, we present our efforts on a design ,and implementation of the Priority Model in Real-Time CORBA specification. The implementation is done as an extension of omniORB2(v.3.0.0), a popular open source non real time ORB. Experiment results demonstrate that our priority model implementation shows better performance and predictability than the non real-time ORB.

  • PDF

An Efficient Log Data Management Architecture for Big Data Processing in Cloud Computing Environments (클라우드 환경에서의 효율적인 빅 데이터 처리를 위한 로그 데이터 수집 아키텍처)

  • Kim, Julie;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.1-7
    • /
    • 2013
  • Big data management is becoming increasingly important in both industry and academia of information science community. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used as information for qualification. This paper presents a big data management architecture specialized for log data. Specifically, it provides the aggregation of log messages sent from multiple clients and provides intelligent functionalities such as analyzing log data. The proposed architecture supports an asynchronous process in client-server architectures to prevent the potential bottleneck of accessing data. Accordingly, it does not affect the client performance although using remote data store. We implement the proposed architecture and show that it works well for processing big log data. All components are implemented based on open source software and the developed prototypes are now publicly available.

PyStudy : Python based Self-Study Helper Software (PyStudy : Python 학습 도우미 소프트웨어 개발)

  • Jo, YeongChang;Kim, HyeHyeon;Kim, HoonSik;Han, SeongUk;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.41-48
    • /
    • 2016
  • The Korea Internet of Things Society. In this paper, we developed 'PyStudy' system as a python based self-study helper software. Proposed PyStudy system is consisted with several components such as PyStudy console, self-study window, helper and self-coding window. User can refer helper function to find questionable python libraries at on-line connection quickly. And self-progress checking on python study also provided on integrated PyStudy IDE software. The PyStudy software provides the information necessary to learn the Python language efficiently. Proposed software can be applicable to an advanced Python language education course.

Architecture of Electrical Safety Management for High-Voltage Power Installations Based on IoT Platform (사물인터넷 기반의 자가용 전기설비 안전 관리 구조 연구)

  • Kang, Hyunjoo;An, Yoon-Young;Jeong, Sangjin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1077-1084
    • /
    • 2017
  • In this paper, we propose a electrical safety management architecture based on IoT (Internet of things) platform, especially IoTivity which is open source platform organized by OCF. With the advent of various ICT technologies, researches on convergence between power facilities and ICT technology are actively under way. The application of ICT technology to high voltage electrical equipment has been studied in terms of improving power efficiency and measuring accurate usage in real time. We focused on safety data and described the components of the electrical safety architecture, the requirement of reference interface, and available services. We defined the data profile for the electrical facilities subject to electrical safety management and examined feasibility through testing.

Design and Implementation of User Agent for Internet Telephony Services based on SW (SIP 기반 인터넷 전화 서비스를 위한 사용자 에이전트의 설계 및 구현)

  • Huh Mi Young;Han Jaechon;Hyun Wook;Park Sun Ok;Kang Shin Gak;Kim Dae Young
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.350-358
    • /
    • 2005
  • Recently, VoIP technology is being accepted as are the most promising Internet telephony service, due to the substitution effect of traditional telephony service. Two standards, i.e, . H.323 and SIP. have emerged for signaling and control for Intemet telephony, of which SIP provides far lower complexity and rich extensibility. It is important to secure components of SIP in order to develop various services. Generally, open source codes provide basic functions of SIP as well as complicated structure, but are difficult to extend. In this thesis, we focused on offering interface mechanism between application and SIP User Agent to easily extend for various VoIP services. This thesis describes what function is needed for SIP User Agent, how to define the internal data structure, and how to define the internal processing procedure. The check iist derived through participating the interoperability event for stabilized SIP User Agent is also suggested.

Improving development environment for embedded software (내장 소프트웨어를 위한 개발 환경의 개선)

  • AHN, ILSOO
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • RFID systems have been widely used in various fields such as logistics, distribution, food, security, traffic and others. A RFID middleware, one of the key components of the RFID system, perform an important role in many functions such as filtering, grouping, reporting tag data according to given user specifications and so on. However, manual test data generation is very hard because the inputs of the RFID middleware are generated according to the RFID middleware standards and complex encoding rules. To solve this problem, in this paper, we propose a black box test technique based on RFID middleware standards. Firstly, we define ten types of input conversion rules to generate new test data from existing test data based on the standard specifications. And then, using these input conversion rules, we generate various additional test data automatically. To validate the effectiveness of generated test data, we measure coverage of generated test data on actual RFID middleware. The results show that our test data achieve 78% statement coverage and 58% branch coverage in the classes of filtering and grouping, 79% statement coverage and 64% branch coverage in the classes of reporting.

  • PDF

Performance comparison of various deep neural network architectures using Merlin toolkit for a Korean TTS system (Merlin 툴킷을 이용한 한국어 TTS 시스템의 심층 신경망 구조 성능 비교)

  • Hong, Junyoung;Kwon, Chulhong
    • Phonetics and Speech Sciences
    • /
    • v.11 no.2
    • /
    • pp.57-64
    • /
    • 2019
  • In this paper, we construct a Korean text-to-speech system using the Merlin toolkit which is an open source system for speech synthesis. In the text-to-speech system, the HMM-based statistical parametric speech synthesis method is widely used, but it is known that the quality of synthesized speech is degraded due to limitations of the acoustic modeling scheme that includes context factors. In this paper, we propose an acoustic modeling architecture that uses deep neural network technique, which shows excellent performance in various fields. Fully connected deep feedforward neural network (DNN), recurrent neural network (RNN), gated recurrent unit (GRU), long short-term memory (LSTM), bidirectional LSTM (BLSTM) are included in the architecture. Experimental results have shown that the performance is improved by including sequence modeling in the architecture, and the architecture with LSTM or BLSTM shows the best performance. It has been also found that inclusion of delta and delta-delta components in the acoustic feature parameters is advantageous for performance improvement.

Software Metric for CBSE Model

  • Iyyappan. M;Sultan Ahmad;Shoney Sebastian;Jabeen Nazeer;A.E.M. Eljialy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.187-193
    • /
    • 2023
  • Large software systems are being produced with a noticeably higher level of quality with component-based software engineering (CBSE), which places a strong emphasis on breaking down engineered systems into logical or functional components with clearly defined interfaces for inter-component communication. The component-based software engineering is applicable for the commercial products of open-source software. Software metrics play a major role in application development which improves the quantitative measurement of analyzing, scheduling, and reiterating the software module. This methodology will provide an improved result in the process, of better quality and higher usage of software development. The major concern is about the software complexity which is focused on the development and deployment of software. Software metrics will provide an accurate result of software quality, risk, reliability, functionality, and reusability of the component. The proposed metrics are used to assess many aspects of the process, including efficiency, reusability, product interaction, and process complexity. The details description of the various software quality metrics that may be found in the literature on software engineering. In this study, it is explored the advantages and disadvantages of the various software metrics. The topic of component-based software engineering is discussed in this paper along with metrics for software quality, object-oriented metrics, and improved performance.

The TANDEM Euratom project: Context, objectives and workplan

  • C. Vaglio-Gaudard;M.T. Dominguez Bautista;M. Frignani;M. Futterer;A. Goicea;E. Hanus;T. Hollands;C. Lombardo;S. Lorenzi;J. Miss;G. Pavel;A. Pucciarelli;M. Ricotti;A. Ruby;C. Schneidesch;S. Sholomitsky;G. Simonini;V. Tulkki;K. Varri;L. Zezula;N. Wessberg
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.993-1001
    • /
    • 2024
  • The TANDEM project is a European initiative funded under the EURATOM program. The project started on September 2022 and has a duration of 36 months. TANDEM stands for Small Modular ReacTor for a European sAfe aNd Decarbonized Energy Mix. Small Modular Reactors (SMRs) can be hybridized with other energy sources, storage systems and energy conversion applications to provide electricity, heat and hydrogen. Hybrid energy systems have the potential to strongly contribute to the energy decarbonization targeting carbon-neutrality in Europe by 2050. However, the integration of nuclear reactors, particularly SMRs, in hybrid energy systems, is a new R&D topic to be investigated. In this context, the TANDEM project aims to develop assessments and tools to facilitate the safe and efficient integration of SMRs into low-carbon hybrid energy systems. An open-source "TANDEM" model library of hybrid system components will be developed in Modelica language which, by coupling, will extend the capabilities of existing tools implemented in the project. The project proposes to specifically address the safety issues of SMRs related to their integration into hybrid energy systems, involving specific interactions between SMRs and the rest of the hybrid systems; new initiating events may have to be considered in the safety approach. TANDEM will study two hybrid systems covering the main trends of the European energy policy and market evolution at 2035's horizon: a district heating network and power supply in a large urban area, and an energy hub serving energy conversion systems, including hydrogen production; the energy hub is inspired from a harbor-like infrastructure. TANDEM will provide assessments on SMR safety, hybrid system operationality and techno-economics. Societal considerations will also be encased by analyzing European citizen engagement in SMR technology safety.