• Title/Summary/Keyword: Source Code

Search Result 1,238, Processing Time 0.026 seconds

The Identification Framework for source code author using Authorship Analysis and CNN (작성자 분석과 CNN을 적용한 소스 코드 작성자 식별 프레임워크)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Hong, Sung-sam;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.33-41
    • /
    • 2018
  • Recently, Internet technology has developed, various programs are being created and therefore various codes are being made through many authors. On this aspect, some author deceive a program or code written by other particular author as they make it themselves and use other writers' code indiscriminately, or not indicating the exact code which has been used. Due to this makes it more and more difficult to protect the code. In this paper, we propose author identification framework using Authorship Analysis theory and Natural Language Processing(NLP) based on Convolutional Neural Network(CNN). We apply Authorship Analysis theory to extract features for author identification in the source code, and combine them with the features being used text mining to perform author identification using machine learning. In addition, applying CNN based natural language processing method to source code for code author classification. Therefore, we propose a framework for the identification of authors using the Authorship Analysis theory and the CNN. In order to identify the author, we need special features for identifying the authors only, and the NLP method based on the CNN is able to apply language with a special system such as source code and identify the author. identification accuracy based on Authorship Analysis theory is 95.1% and identification accuracy applied to CNN is 98%.

Investigation of the Fire Source in the Warehouse under Bridge using FDS Code (FDS code를 이용한 교량하부창고 화재발생원 영향분석)

  • Zi, Goang-Seup;Lee, Seung-Jung;Shin, Yeon-Ho;Shim, Jae-Won;Kim, Ji-Hwan
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.24 no.6
    • /
    • pp.663-673
    • /
    • 2011
  • In this study, we analysed the effect of the fire source in the warehouse under the bridge and the height of the bridge using FDS code. To compare accuracy of simulation results, we simulated the experimental result with unit combustibles which is heptane as well as the mock-up test. Using this method, we evaluated the fire safety of the bridge which contains spalling and strength damage of concrete as well as damage of reinforcements according to the fire source and the height of the bridge. Most of the bridges are vulnerable to spalling of concrete. The book combustion has the strongest fire intensity which is expected to damage the bridge less than 30m height in the three types of the fire sources. The bridge over the 30m height can ensure the fire safety in the case of the rubber combustion.

A Practical Study on Code Static Analysis through Open Source based Tool Chains (Open Source 기반 툴 체인화를 통한 코드 정적 분석 연구)

  • Kang, Geon-Hee;Kim, R. Young Chul;Yi, Geun Sang;Kim, Young Soo;Park, Yong. B.;Son, Hyun Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.148-153
    • /
    • 2015
  • In our domestic software industries, it is focused on such a high quality development/ testing process, maturity measurement, and so on. But the real industrial fields are still working on a code-centric development. Most of the existing legacy systems did not keep the design and highly increased the code complexity with more patching of the original codes. To solve this problem, we adopt a code visualization technique which is important to reduce the code complexity among modules. To do this, we suggest a tool chaining method based on the existing open source software tools, which extends NIPA's Software Visualization techniques applied to procedural languages. In addition, it should be refactored to fix bad couplings of the quality measurement indicators within the code visualization. As a result, we can apply reverse engineering to the legacy code, that is, from programming via model to architecture, and then make high quality software with this approach.

Extension of Code Refactoring Technique to Support Energy Efficiency and Language Conversion of Embedded Software (임베디드 소프트웨어의 에너지 효율성과 언어 변환 지원을 위한 코드 리팩토링 기법 확장)

  • Nam, Seungwoo;Hong, Jang-Eui
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.91-103
    • /
    • 2018
  • Refactoring is an engineering technique for securing the quality of existing legacy code, improving the internal structure without changing the functionality of the software. Along with the reuse of open source software, reuse of source code through programming language conversion is increasingly required due to technical or market requirements. In this situation, the refactoring technique including language conversion as well as energy efficiency is considered to be an important means for improving the productivity and the quality of embedded software development. This paper proposes a code refactoring technique that converts the grammar and structure of a programming language into those of a different language through comparison and mapping, in addition to the existing energy efficient refactoring technique. The use of the proposed refactoring technique can expect to improve the competitiveness of the product through rapid software development and quality improvement by coping with the environment change of the software development language and enhancing the reuse of the existing code.

A Case Study on Combustion Instability of a Model Lean Premixed Gas Turbine Combustor with Open Source Code OSCILOS (온라인 개방코드 OSCILOS를 이용한 모델 희박 예혼합 가스터빈 연소기의 연소불안정 해석 사례)

  • Cha, Dong Jin;Song, Jin Kwan;Lee, Jong Geun
    • Journal of the Korean Society of Combustion
    • /
    • v.20 no.4
    • /
    • pp.10-18
    • /
    • 2015
  • Combustion instability is a major issue in design and maintenance of gas turbine combustors for efficient operation with low emissions. With the thermoacoustic view point the instability is induced by the interaction of the unsteady heat release of the combustion process and the change in the acoustic pressure in the combustion chamber. In an effort to study the combustion dynamics of gas turbine combustors, Morgans et al (2014) have developed OSCILOS (open source combustion instability low order simulator) code and it is currently available online. In this study the code has been utilized to predict the combustion instability of a reported case for lean premixed gas turbine combustion, and then its prediction results have been compared with the corresponding experimental data. It turned out that both the predicted and the experimental combustion instability results agree well. Further the effects of some typical inlet acoustic boundary conditions on the prediction have been investigated briefly. It is believed that the validity and effectiveness of the open source code is reconfirmed through this benchmark test.

(0, k) Run-Length Limited(RLL) Data Compression Codes for Digital Storage Systems (디지털 저장시스템을 위한 (0, k) RLL 데이터 압축토드)

  • 이재진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.2074-2079
    • /
    • 1997
  • Much recent work has been done in the two related areas of source coding for data compression, and channel coding for data storage, respectively. We propose two (0, k) run-lengh limited(RLL) data compression codes for the storage that combine source and channel coding. It was shown that the propsoed codes approach the maximum code rate of (0, k) code as k increase. Thus, the overall code rate of storage system can be increased by using the combined source/channel coding as compared to the conventional 8/9 code which is popular in hard drive systems Functhermore, one can also reduce the complexity of modulation coding procedure by using already RLL constrained data.

  • PDF

A Code Recommendation Method Using RNN Based on Interaction History (RNN을 이용한 동작기록 마이닝 기반의 추천 방법)

  • Cho, Heetae;Lee, Seonah;Kang, Sungwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.461-468
    • /
    • 2018
  • Developers spend a significant amount of time exploring and trying to understand source code to find a source location to modify. To reduce such time, existing studies have recommended the source location using statistical language model techniques. However, in these techniques, the recommendation does not occur if input data does not exactly match with learned data. In this paper, we propose a code location recommendation method using Recurrent Neural Networks and interaction histories, which does not have the above problem of the existing techniques. Our method achieved an average precision of 91% and an average recall of 71%, thereby reducing time for searching and exploring code more than the existing recommendation techniques.

Dictionary Based Software Watermarking Technique (사전 소프트웨어 워터마크 기술 기반)

  • Pervez, Zeeshan;Lee, Sungyoung;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.241-242
    • /
    • 2009
  • As software is becoming increasing important to the human society, so does the effort to produce them is also increasing.. All of these efforts can be at risk when source code of the application is reverse engineered by the software pirate. Many attempts have been made to protect Intellectual Property Rights (IPR); one of the newest attempts to protect IPR is software watermarking. It is used to prove ownership right when IPR are violated, and also prevents the bandit from altering the code for his own use. In this paper we are presenting a new technique for software watermarking know as Dictionary Based Software Watermarking (DBSW). DBSW works by embedding dummy instructions in source code with the help of predefined mapping already available in the dictionary. These instructions are identical to the normal instructions of the program and are hard to identify or to extract from the watermarked program. With the help of DBSW we not only can stop source code alteration but can also identify the buyer how has distributed the pirated copy.

Cross-Language Clone Detection based on Common Token (공통 토큰에 기반한 서로 다른 언어의 유사성 검사)

  • Hong, Sung-Moon;Kim, Hyunha;Lee, Jaehyung;Park, Sungwoo;Mo, Ji-Hwan;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.14 no.2
    • /
    • pp.35-44
    • /
    • 2018
  • Tools for detecting cross-language clones usually compare abstract-syntax-tree representations of source code, which lacks scalability. In order to compare large source code to a practical level, we need a similarity checking technique that works on a token level basis. In this paper, we define common tokens that represent all tokens commonly used in programming languages of different paradigms. Each source code of different language is then transformed into the list of common tokens that are compared. Experimental results using exEyes show that our proposed method using common tokens is effective in detecting cross-language clones.

An Accurate Estimation of Channel Loss Threshold Set for Optimal FEC Code Rate Decision (최적의 FEC 부호율 결정을 위한 정확한 채널손실 한계집합 추정기법)

  • Jung, Tae-Jun;Jeong, Yo-Won;Seo, Kwang-Deok
    • Journal of Broadcast Engineering
    • /
    • v.19 no.2
    • /
    • pp.268-271
    • /
    • 2014
  • Conventional forward error correction (FEC) code rate decision schemes using analytical source coding distortion model and channel-induced distortion model are usually complex, and require the typical process of model parameter training which involves potentially high computational complexity and implementation cost. To avoid the complex modeling procedure, we propose a simple but accurate joint source-channel distortion model to estimate channel loss threshold set for optimal FEC code rate decision.