• Title/Summary/Keyword: program similarity

Search Result 309, Processing Time 0.023 seconds

A Study of CBIR(Content-based Image Retrieval) Computer-aided Diagnosis System of Breast Ultrasound Images using Similarity Measures of Distance (거리 기반 유사도 측정을 통한 유방 초음파 영상의 내용 기반 검색 컴퓨터 보조 진단 시스템에 관한 연구)

  • Kim, Min-jeong;Cho, Hyun-chong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.8
    • /
    • pp.1272-1277
    • /
    • 2017
  • To assist radiologists for the characterization of breast masses, Computer-aided Diagnosis(CADx) system has been studied. The CADx system can improve the diagnostic accuracy of radiologists by providing objective information about breast masses. Morphological and texture features were extracted from the breast ultrasound images. Based on extracted features, the CADx system retrieves masses that are similar to a query mass from a reference library using a k-nearest neighbor (k-NN) approach. Eight similarity measures of distance, Euclidean, Chebyshev(Minkowski family), Canberra, Lorentzian($F_2$ family), Wave Hedges, Motyka(Intersection family), and Cosine, Dice(Inner Product family) are evaluated by ROC(Receiver Operating Characteristic) analysis. The Inner Product family measure used with the k-NN classifier provided slightly higher performance for classification of malignant and benign masses than those with the Minkowski, $F_2$, and Intersection family measures.

Middle School Students' Analogical Transfer in Algebra Word Problem Solving (중학생을 대상으로 한 대수 문장제 해결에서의 유추적 전이)

  • 이종희;김진화;김선희
    • The Mathematical Education
    • /
    • v.42 no.3
    • /
    • pp.353-368
    • /
    • 2003
  • Analogy, based on a similarity, is to infer the properties of the similar object from properties of an object. It can be a very useful thinking tool for learning mathematical patterns and laws, noticing on relational properties among various situations. The purpose of this study, when manipulating hint condition, figure and table conditions and the amount of original learning by using algebra word problems, is to verify the effects of analogical transfer in solving equivalent, isomorphic and similar problems according to the similarity of source problems and target ones. Five study questions were set up for the above purpose. It was 354 first grade students of S and G middle schools in Seoul that were experimented for this study. The data was processed by MANOVA analysis of statistical program, SPSS 10.0. The results of this studies would indicate that most of the students would be poor at solving isomorphic and similar problems in the performance of analogical transfer according to the similarity of source and target problems. Hints, figure and table conditions did not facilitate the analogical transfer. Merely, on the condition that amount of teaming was increased, analogical transfer of the students was facilitated. Therefore, it is necessary to have students do much more analogical problem-solving experience to improve their analogical reasoning ability through the instruction program development in the educational fields.

  • PDF

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Infrared Image Simulation for Estimating the Effectiveness of Camouflage Measures (표적은폐도구의 유용도 평가를 위한 적외선화상 모사)

  • Jung, Jinsoo;Kauh, S. Ken;Yoo, Hoseon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.23 no.8
    • /
    • pp.1010-1021
    • /
    • 1999
  • Camouflage measures in military purpose utilize the apparent temperature difference between target and background, so it is essential to develop a thermal analysis program for apparent temperature predictions and to apply some camouflage measures to real military targets for camouflage purpose. In this study, a thermal analysis program including conduction, convection and radiation is developed and the validity of radiation heat transfer terms is examined. The results show that longwave radiation along with solar radiation should be included in order to predict the apparent temperature as well as the physical temperature precisely. Longwave emissivity variation as an effective camouflage measures is applied to a real M2 tank. From the simulation results, it is found that an effective surface treatment, such as painting of a less emissive material or camouflage clothing, may provide a temperature similarity or a spatial similarity, resulting in an effective camouflage.

Software Similarity Detection Using Highly Credible Dynamic API Sequences (신뢰성 높은 동적 API 시퀀스를 이용한 소프트웨어 유사성 검사)

  • Park, Seongsoo;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1067-1072
    • /
    • 2016
  • Software birthmarks, which are unique characteristics of the software, are used to detect software plagiarism or software similarity. Generally, software birthmarks are divided into static birthmarks or dynamic birthmarks, which have evident pros and cons depending on the extraction method. In this paper, we propose a method for extracting the API sequence birthmarks using a dynamic analysis and similarity detection between the executable codes. Dynamic birthmarks based on API sequences extract API functions during the execution of programs. The extracted API sequences often include all the API functions called from the start to the end of the program. Meanwhile, our dynamic birthmark scheme extracts the API functions only called directly from the executable code. Then, it uses a sequence alignment algorithm to calculate the similarity metric effectively. We evaluate the birthmark with several open source software programs to verify its reliability and credibility. Our dynamic birthmark scheme based on the extracted API sequence can be utilized in a similarity test of executable codes.

Thrust Profile Prediction for a Vertical Launching Missile using Similarity Law (상사법칙을 이용한 수직발사 유도탄 추력곡선예측)

  • Cho, Sung-Jin;Kim, Eul-Gon;Ahn, Jo-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.1
    • /
    • pp.55-61
    • /
    • 2009
  • In this paper, a thrust prediction method for a developing vertical launching missile is proposed through considering a verified vertical launching missile(a baseline missile) as a model. In order to predict thrust profile of a developing vertical launching missile, both Similarity law and Pi theory are applied to the model. By comparing prediction results based on the 6-DOF program of a baseline missile with simulation results of a developing vertical launching missile, the proposed method has been indirectly verified.

Design of large-scale sodium thermal-hydraulic integral effect test facility, STELLA-2

  • Lee, Jewhan;Eoh, Jaehyuk;Yoon, Jung;Son, Seok-Kwon;Kim, Hyungmo
    • Nuclear Engineering and Technology
    • /
    • v.54 no.9
    • /
    • pp.3551-3566
    • /
    • 2022
  • The STELLA program was launched to support the PGSFR development in 2012 and for the 2nd stage, the STELLA-2 facility was designed to investigate the integral effect of safety systems including the comprehensive interaction among PHTS, IHTS and DHRS. In STELLA-2, the long-term transient behavior after accidents can be observed and the overall safety aspect can also be evaluated. In this paper, the basic design concept from engineering basis to specific design is described. The design was aimed to meet similarity criteria and requirements based on various non-dimensional numbers and the result satisfied the key features to explain the reasoning of safety evaluation. The result of this study was used to construct the facility and the experiment is on-going. In general, the final design meets the similarity criteria of the multidimensional physics inside the reactor pool. And also, for the conservation of natural circulation phenomena, the design meets the similarity requirements of geometry and thermo-dynamic behavior.

Detection of an Open-Source Software Module based on Function-level Features (함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지)

  • Kim, Dongjin;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.713-722
    • /
    • 2015
  • As open-source software (OSS) becomes more widely used, many users breach the terms in the license agreement of OSS, or reuse a vulnerable OSS module. Therefore, a technique needs to be developed for investigating if a binary program includes an OSS module. In this paper, we propose an efficient technique to detect a particular OSS module in an executable program using its function-level features. The conventional methods are inappropriate for determining whether a module is contained in a specific program because they usually measure the similarity between whole programs. Our technique determines whether an executable program contains a certain OSS module by extracting features such as its function-level instructions, control flow graph, and the structural attributes of a function from both the program and the module, and comparing the similarity of features. In order to demonstrate the efficiency of the proposed technique, we evaluate it in terms of the size of features, detection accuracy, execution overhead, and resilience to compiler optimizations.

A Program Similarity Evaluation using Keyword Extraction on Abstract Syntax Tree (구문트리에서 키워드 추출을 이용한 프로그램 유사도 평가)

  • Kim Young-Chul;Choi Jaeyoung
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.109-116
    • /
    • 2005
  • In this paper, we introduce the method that a user analyses the similarity of the two programs by using keyword from the syntactic tree, created after the syntax analysis, and its implementation. The main advantage of the method is the performance improvement through using only keyword of syntax tree. In the paper, we propose the similarity evaluation model and how we extract keyword from syntax tree. In addition, we also show the improvement in the performance in analysis and in the system's structure. We expect that our system will be utilized in the similarity evaluation in text and XML documents.

A Study on Finding the Rail Space in Elevators Using Matched Filter

  • Song, Myong-Lyol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.57-65
    • /
    • 2019
  • In this paper, we study on finding the rail space in elevators by analyzing each image captured with CCD camera. We propose a method that applies one-dimensional matched filter to the pixels of a selected search space in the vertical line at a horizontal position and decides the position with the thickness of the space being represented by a black thick line in captured images. The pattern similarity representing how strongly the associated image pixels resemble with the thick line is defined and calculated with respect to each position along the vertical line of pixels. The position and thickness of the line are decided from the point having the maximum in pattern similarity graph. In the experiments of the proposed method under different illuminational conditions, it is observed that all the pattern similarity graphs show similar shape around door area independent of the conditions and the method can effectively detect the rail space if the rails are illuminated with even weak light. The method can be used for real-time embedded systems because of its simple algorithm, in which it is implemented in simple structure of program with small amount of operations in comparison with the conventional approaches using Canny edge detection and Hough transform.