• Title/Summary/Keyword: program similarity

Search Result 309, Processing Time 0.022 seconds

Reproducibility of Virtual Power Shoulder Jacket by Silhouette Variation (파워숄더 재킷의 실루엣에 따른 가상착의 재현)

  • Park, Jeongah;Lee, Jeongran
    • Fashion & Textile Research Journal
    • /
    • v.24 no.3
    • /
    • pp.315-324
    • /
    • 2022
  • This study aims to verify the sewing technology and the expression of the virtual garment program by comparing the appearance similarity between the real and the virtual power shoulder jacket. To this end, the H and the X silhouettes of the power shoulder jacket were selected as the reference designs. After making the reference designs into real jackets by applying the human body dimensions of women in their twenties, virtual avatars and jackets were produced using CLO 3D programs. The results showed that the H-type with only expanded shoulders and less design variation had a high similarity between the reference photo and real garment, the real and virtual garment, and the reference photo and virtual garment. The power shoulder jacket of the reference picture was well reproduced in the real and virtual garments. Conversely, the X-type jacket, which is a tight fit and has many design variations, showed somewhat low similarity in the circumference items and the basic construction line. Especially in tight-fitted power shoulder jackets, the fact that shoulder angles and the essential items for pattern making cannot be reflected in reproducing virtual models was found to be a limitation in increasing the similarity of virtual clothing. Furthermore, the sewing system gap between the real and the virtual clothing exposed a difference in the appearance of virtual clothing.

Plagiarism Detection among Source Codes using Adaptive Methods

  • Lee, Yun-Jung;Lim, Jin-Su;Ji, Jeong-Hoon;Cho, Hwaun-Gue;Woo, Gyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1627-1648
    • /
    • 2012
  • We propose an adaptive method for detecting plagiarized pairs from a large set of source code. This method is adaptive in that it uses an adaptive algorithm and it provides an adaptive threshold for determining plagiarism. Conventional algorithms are based on greedy string tiling or on local alignments of two code strings. However, most of them are not adaptive; they do not consider the characteristics of the program set, thereby causing a problem for a program set in which all the programs are inherently similar. We propose adaptive local alignment-a variant of local alignment that uses an adaptive similarity matrix. Each entry of this matrix is the logarithm of the probabilities of the keywords based on their frequency in a given program set. We also propose an adaptive threshold based on the local outlier factor (LOF), which represents the likelihood of an entity being an outlier. Experimental results indicate that our method is more sensitive than JPlag, which uses greedy string tiling for detecting plagiarism-suspected code pairs. Further, the adaptive threshold based on the LOF is shown to be effective, and the detection performance shows high sensitivity with negligible loss of specificity, compared with that using a fixed threshold.

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

A Study on Similarity Analysis of SNMP MIB File (SNMP MIB 파일의 유사도 분석에 관한 연구)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2019
  • Many similarity analysis methods, one of the dispute resolution methods for computer programs, have been studied. This paper is about quantitative similarity analysis of MIB (Management Information Base) file. Quantitative similarity means that the source codes of two computers are analyzed and the results are compared with a certain standard. The source code to analyze is a program that provides network device management functions such as configuration management, fault management, and performance management using SNMP protocol for WiMAX CPE devices. Here, WiMAX refers to the IEEE 802.16 wireless network standard protocol and can be classified into fixed WiMAX and mobile WiMAX. WiMAX CPE is a wireless Internet terminal that is fixedly used in a customer's home or office. In this paper, we analyze the similarity between MIB file of company A and company B. We will analyze whether the MIB file leaked from the damaged company is not just a list to describe the product specifications, but whether the property value can be recognized.

Selection of Environmentally Conscious Manufacturing's Program Using Multi-Criteria Decision Making: A Case Study in Electronic Company

  • Sutapa, I. Nyoman;Panjaitan, Togar W.S.
    • Industrial Engineering and Management Systems
    • /
    • v.10 no.2
    • /
    • pp.123-127
    • /
    • 2011
  • Nowadays, green purchasing, stop global warming, love the mother earth, and others that related to environment become hot issues. Manufactures industries tend to more active and responsive to those issues by adopting green strategies or program like Environmentally Conscious Manufacturing (ECM). In this article, an electronic company had applied 12 ECM Program and tries to choose one of those programs using 6 criteria, such as total cost involved, quality, recyclable material, process waste reduction, packaging waste reduction, and regulation compliance. By using multi-criteria decision making model, i.e. Analytical Hierarchy Process (AHP), Technique for Order Preference by Similarity to Ideal Solution (TOPSIS), and Modified TOPSIS methods, the ECM Program 9 (Open pit) is the best option.

NBLAST: a graphical user interface-based two-way BLAST software with a dot plot viewer

  • Choi, Beom-Soon;Choi, Seon Kang;Kim, Nam-Soo;Choi, Ik-Young
    • Genomics & Informatics
    • /
    • v.20 no.3
    • /
    • pp.36.1-36.6
    • /
    • 2022
  • BLAST, a basic bioinformatics tool for searching local sequence similarity, has been one of the most widely used bioinformatics programs since its introduction in 1990. Users generally use the web-based NCBI-BLAST program for BLAST analysis. However, users with large sequence data are often faced with a problem of upload size limitation while using the web-based BLAST program. This proves inconvenient as scientists often want to run BLAST on their own data, such as transcriptome or whole genome sequences. To overcome this issue, we developed NBLAST, a graphical user interface-based BLAST program that employs a two-way system, allowing the use of input sequences either as "query" or "target" in the BLAST analysis. NBLAST is also equipped with a dot plot viewer, thus allowing researchers to create custom database for BLAST and run a dot plot similarity analysis within a single program. It is available to access to the NBLAST with http://nbitglobal.com/nblast.

A Program-Plagiarism Checker using Abstract Syntax Tree (구문트리 비고를 통한 프로그램 유형 복제 검사)

  • 김영철;김성근;염세훈;최종명;유재우
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.7_8
    • /
    • pp.792-802
    • /
    • 2003
  • Earlier program plagiarism check systems are performed by using simple text, attribute or token string base on match techniques. They have difficulties in checking program styles which have nothing to do with program syntax such as indentation, spacing and comments. This paper introduces a plagiarism check model which compares syntax-trees for the given programs. By using syntax-trees, this system can overcome the weekness of filtering program styles and have advantage of comparing the structure of programs by syntax and semantic analysis. Our study introduces syntactic tree creation, unparsing and similarity check algorithms about C/C++ program plagiarism checking for internet cyber education and estimate plagiarism pattern.

Air Similarity Test for the Evaluation of Aerodynamic Performance of Steam Turbine (스팀터빈의 공력성능 평가를 위한 공기 상사실험)

  • Lim, Byeung-Jun;Lee, Eun-Seok;Lee, Ik-Hyoung;Kim, Young-Sang;Kwon, Gee-Bum
    • 유체기계공업학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.73-79
    • /
    • 2003
  • The steam turbine efficiency is an important factor in power plant. Accurate evaluation of steam turbine performance is essential. However, it is not easy to evaluate the steam turbine performance due to its high temperature and high pressure circumstance. Therefore most steam turbine performance tests were conducted by air similarity test. This paper described a test program for air similarity test of steam turbine at Korea Aerospace Research Institute. A test facility has been designed and built to evaluate aerodynamic performance of turbines. The test facility consists of air supply system, single stage test section, power absorption system, instrumentation and auxiliary system. For evaluation of steam turbine performance, the test of single stage axial turbine air similarity performance was conducted and uncertainty analysis was performed.

  • PDF

Verification of Flight Control Law Similarity and HILS Environment Reliability for Fighter Aircraft (전투기급 비행제어법칙 상사성 및 HILS 환경 신뢰성 검증)

  • Ahn, Seong-Jun;Kim, Chong-Sup;Cho, In-Je;Lee, Eun-Yong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.7
    • /
    • pp.701-708
    • /
    • 2009
  • The flight control law of developed flight control computer(DFLCC) is developed based on operation flight program of advanced trainer aircraft full scale development final configuration. The flight control law design is used common use development tool in GUI(Graphic User Interface) environment. The flight control law transformed to C-Code is reflected in OFP. The OFP is verified by the standardized verification process. But, before standardized verification process, we need preliminary verification process such as similarity of flight control law and reliability of developed HILS. Similarity of flight control law is verified by comparing the aircraft response of advanced trainer aircraft and those of the developed control law. Also, reliability of developed HILS is verified by comparing the aircraft response of HILS and Non-real time simulation result. This paper verifies similarity of developed control law and reliability of HILS environment as comparing aircraft response.

Analysis Method for Revision and Addition of the Specification to Appraisal (감정 대상 규격서의 수정 및 추가에 대한 분석 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.37-44
    • /
    • 2020
  • As the information society develops, various cases of copyright infringement have occurred. In many disputes between companies, software similarity appraisal is dominated. This thesis is a study on the method of calculating the similarity of the standards subject to appraisal. In other words, it is a study to calculate the amount of revision and addition of the specification to be assessed. The analysis method compares the table of contents of both specifications and finds the same or similar part. The similarity weight is determined according to the degree of similarity. Weights identify and assign the degree of similarity between the expert's expertise and the specification. If it is completely newly added, the similarity weight is 1, if it is partially modified, the similarity weight is 0.4, and if it is almost the same as before, it is calculated by giving a weight of 0.05. Through this paper, it was found that the result of calculating the similarity to the specification is 21.2 pages.