• Title/Summary/Keyword: 공개 소프트웨어

Search Result 436, Processing Time 0.022 seconds

Development and Verification Methodology for Small Civil Unmanned Aerial Vehicle System based on Open System Architecture (개방형 시스템 아키텍처 기반의 소형 민간 무인항공기 시스템 개발 및 검증 방법)

  • Jo, Hyun-Chul;Park, Keunyoung
    • Journal of Platform Technology
    • /
    • v.8 no.2
    • /
    • pp.32-43
    • /
    • 2020
  • The Unmanned Aerial Vehicle(UAV) system has been mainly used for military domains, but it also widely applied to used in the civilian domains. In civilian domains, low-cost and small-sized UAV systems are mainly applied in various industries. The software that operates UAV systems has a lot of common functions. However, even though there are many common functionalities of the software, changing the devices may cause a problem requiring software modification. These problems degrade interoperability, modularity and portability in UAV systems. In order to solve the problems, an Open System Architecture(OSA) has been proposed. In this paper, we propose a UAV system software architecture based on Future Airborne Capability Environment(FACE) standard. Our system can support UAV systems of various platforms in the civilian domains, which is supplied in small quantity batch production. And it has the advantages of software consolidation and portability. Finally, We describe the development and conformant methodology of the software based on the FACE standard using open development tools.

  • PDF

Research SW Development Integrated Framework to Support AI Model Research Environments (인공지능 모델 연구 환경 지원을 위한 연구소프트웨어 개발 통합 프레임워크)

  • Minhee Cho;Dasol Kim;Sa-kwang Song;Sang-Baek Lee;Mikyoung Lee;Hyung-Jun Yim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.97-99
    • /
    • 2023
  • 소프트웨어를 개발하거나 실행하는 환경은 매우 다양하다. 최근에 혁신을 이끌고 있는 인공지능 모델은 오픈소스 프로젝트룰 통해 공개되는 코드나 라이브러리를 활용하여 구현하는 경우가 많다. 하지만 실행을 위한 환경 설치 과정이 쉽지 않고, 데이터 혹은 기학습된 모델 사이즈가 대용량일 경우에는 로컬 컴퓨터에서 실행하는 것이 불가능한 경우도 발생하고, 동료와 작업을 공유하거나 수동 배포의 어려움 등 다양한 문제에 직면한다. 이러한 문제를 해결하기 위하여, 소프트웨어가 유연하게 동작할 수 있도록 효율적인 리소스를 관리할 수 있는 컨테이너 기술을 많이 활용한다. 이 기술을 활용하는 이유는 AI 모델이 시스템에 관계없이 정확히 동일하게 재현될 수 있도록 하기 위함이다. 본 연구에서는 인공지능 모델 개발과 관련하여 코드가 실행되는 환경을 편리하게 관리하기 위하여 소프트웨어를 컨테이너화하여 배포할 수 있는 기능을 제공하는 연구소프트웨어 개발 통합 프레임워크를 제안한다.

An Implementation of Security Key Management System by LDAP (LDAP을 이용한 보안 키 관리 시스템 구현)

  • Yoon, Sung-Jung;Kim, Geon-Ung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.437-445
    • /
    • 2006
  • The security key management function is a key element to secure network environment, and many protocols include IPSec, HIP, etc. demand this function. There are two solutions to provide the key management function in the network layer, one is a method for storing security key material in the directory, and the other is a method for storing security key material in DNS. In this paper we present an implementation of key management system by LDAP. We deployed the open source solutions for directory service(OpenLDAP), cryptographic algorithm (FLINT/C), IPSec(FreeS/WAN), and verified the key management system by the encrypted message exchange and the interoperability test by un daemon.

A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure (네트웍 환경에서 안전한 Kerberos 인증 메커니즘에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2002
  • In Network Environment, Kerberos certification mechanism to require Kerberos server in other area unconditionally belief. Also, Kerberos server in cooperation area must be share server of other area and secret key. To solve these two problems, this paper proposed safe security mechanism of doing to ably IETF CAT's PKINIT/PKCROSS a1gorithm with Public Key Infrastructure and use Directory System and service between realms do trust and prove each Kerberos trust center base. Also, Although Kerberos server of each area must be foreknowing each server's secret key and public key, Obtain through Trust center and acquire each area's public key and common symmetric key, Application server excluded process that must register key in Key Distribution Center.

Personal Information Detection and De-identification System using Sentence Intent Classification and Named Entity Recognition (문장 의도 분류와 개체명 인식을 활용한 개인정보 검출 및 비식별화 시스템)

  • Seo, Dong-Kuk;Kim, Gun-Woo;Kim, Jae-Young;Lee, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.1018-1021
    • /
    • 2020
  • 최근 개인정보가 포함된 비정형 텍스트 문서들이 유출되거나 무분별하게 공개됨으로써 정보의 주체는 물론 기업들까지 피해를 받고 있다. 데이터를 공개 및 활용하기 위해 개인정보 검출 및 비식별화 과정이 필수적이지만 정형 데이터와는 달리 비정형 데이터의 경우 해당 과정을 자동으로 처리하는 데 한계가 있다. 이를 위해 딥러닝 모델들을 사용하여 자동화하려는 연구들이 있었지만 문장 내 단어의 모호성에 대한 고려 없이 단어 개체명 정보에만 의존하여 개인정보를 검출하는 형태로 진행되었다. 따라서 문장 내 단어들 중 식별 대상인 단어들도 비식별화 되어 데이터에 대한 유용성을 저해할 수 있다는 문제점을 남겼다. 본 논문에서는 문장의 의도 정보를 단어의 개체명 학습 과정에 부가적인 정보로 활용하는 개인정보 검출 모델과 개인정보 데이터의 유용성을 고려한 비식별화 기법을 제안한다.

KPDS user interface and science data transfer sequence for scientists and public users in Korea Lunar Exploration Program

  • Kim, Joo Hyeon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.1
    • /
    • pp.59.2-59.2
    • /
    • 2021
  • 현재 우리나라는 달탐사 개발 사업을 통하여 2022년 8월 발사를 목표로 달 궤도선인 KPLO와 과학임무 및 기술검증 임무를 수행하게 될 임무 탑재체, 임무 수행을 위한 각종 소프트웨어의 개발, 궤도/궤적의 설계 등 일련의 개발 과정을 순조롭게 수행하고 있다. 또한 달 궤도선인 KPLO와 이들 탑재체에 대한 운영과 관제를 수행하는 KPLO 심우주 지상국도 일정에 따라 개발 막바지에 접어들고 있다. 특히 KPLO 심우주 지상국에는 우리나라 대학과 정부출연연구소에 의해서 개발되는 과학탑재체 4기가 달 궤도에서 과학임무를 수행하여 얻게되는 달 탐사 과학자료, 즉, 과학임무자료를 달 탐사에 직접 참여하는 과학자들뿐만 아니라 일반인들도 교육 및 연구에 활용할 수 있도록 달 탐사 과학자료의 저장, 공개, 관리를 위한 Archive system인 KARI Planetary Data System(KPDS)도 함께 개발되고 있다. KPDS는 전문 연구자와 일반인들이 별도의 교육없이 인터넷을 통하여 쉽게 접속하여 KPLO의 과학탑재체가 획득한 달 탐사 과학자료를 검색하여 내려받아 사용할 수 있도록 서비스를 제공할 예정이다. 본 논문에서는 과학탑재체 개발기관 소속의 연구자가 달 탐사 과학자료에 대한 검보정 처리와 과학적 분석을 수행하기 위해서 텔레메트리 형태의 원본형태의 과학자료를 KPDS로부터 다운로드 받는 과정과 검보정 처리가 된 과학자료를 일반 사용자들이 내려 받아 사용할 수 있도록 과학자료가 공개되기까지 일련의 과정을 설명하고, 연구자 및 일반사용자가 직접 접하게 되는 KPDS의 주요한 사용자 환경에 대해서 설명한다.

  • PDF

A Study on the Performance Improvement of Machine Translation Using Public Korean-English Parallel Corpus (공공 한영 병렬 말뭉치를 이용한 기계번역 성능 향상 연구)

  • Park, Chanjun;Lim, Heuiseok
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.271-277
    • /
    • 2020
  • Machine translation refers to software that translates a source language into a target language, and has been actively researching Neural Machine Translation through rule-based and statistical-based machine translation. One of the important factors in the Neural Machine Translation is to extract high quality parallel corpus, which has not been easy to find high quality parallel corpus of Korean language pairs. Recently, the AI HUB of the National Information Society Agency(NIA) unveiled a high-quality 1.6 million sentences Korean-English parallel corpus. This paper attempts to verify the quality of each data through performance comparison with the data published by AI Hub and OpenSubtitles, the most popular Korean-English parallel corpus. As test data, objectivity was secured by using test set published by IWSLT, official test set for Korean-English machine translation. Experimental results show better performance than the existing papers tested with the same test set, and this shows the importance of high quality data.

Security Verification of Korean Open Crypto Source Codes with Differential Fuzzing Analysis Method (차분 퍼징을 이용한 국내 공개 암호소스코드 안전성 검증)

  • Yoon, Hyung Joon;Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1225-1236
    • /
    • 2020
  • Fuzzing is an automated software testing methodology that dynamically tests the security of software by inputting randomly generated input values outside of the expected range. KISA is releasing open source for standard cryptographic algorithms, and many crypto module developers are developing crypto modules using this source code. If there is a vulnerability in the open source code, the cryptographic library referring to it has a potential vulnerability, which may lead to a security accident that causes enormous losses in the future. Therefore, in this study, an appropriate security policy was established to verify the safety of block cipher source codes such as SEED, HIGHT, and ARIA, and the safety was verified using differential fuzzing. Finally, a total of 45 vulnerabilities were found in the memory bug items and error handling items, and a vulnerability improvement plan to solve them is proposed.

An Empirical Study of Factors Influencing Diffusion of Open Source Software and the Moderating Effect of Government Supports (오픈소스 소프트웨어 확산에 영향을 주는 조직필요성 및 기술필요성 요인과 정부지원의 조절효과에 대한 실증연구)

  • Kim, Sang-Hyun;Song, Young-Mi
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.89-116
    • /
    • 2010
  • The development and accomplishment of Open Source Software(OSS) is one of the hottest, as well as the most recent topics in the software industry. Prior studies with respects to OSS have concentrated on discovering both developers and users' rationales of participating OSS projects, analyzing specific OSS solutions or OSS movement itself. However, the empirical study on identifying determinants that influence organizational adoption of OSS and further diffusion of the technology has been a scant. Thus, the main purpose of this study is to investigate the key determinants affecting organizational adoption of OSS. The proposed research model incorporates organizational needs(Evolutional Leadership, Adaptive performance, Readiness for Change) and technological needs(Job Relevance, Cost Benefits, Software Quality) in order to explain organizational OSS adoption. Further, this study assesses the impact organizational OSS adoption has on the OSS Performance and OSS Diffusion. Results from 366 adopting organizations in various industries show three constructs in organizational needs and two constructs in technological needs with exception of Job Relevance have a significant influence on OSS Adoption; and adoption impacts its performance, and diffusion. The implications of the results suggest not only a new theoretical model for OSS research, but also the important implications for OSS diffusion.

Constructing Software Structure Graph through Progressive Execution (점진적 실행을 통한 소프트웨어의 구조 그래프 생성)

  • Lee, Hye-Ryun;Shin, Seung-Hun;Choi, Kyung-Hee;Jung, Gi-Hyun;Park, Seung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.111-123
    • /
    • 2013
  • To verify software vulnerability, the method of conjecturing software structure and then testing the software based on the conjectured structure has been highlighted. To utilize the method, an efficient way to conjecture software structure is required. The popular graph and tree methods such as DFG(Data Flow Graph), CFG(Control Flow Graph) and CFA(Control Flow Automata) have a serious drawback. That is, they cannot express software in a hierarchical fashion. In this paper, we propose a method to overcome the drawback. The proposed method applies various input data to a binary code, generate CFG's based on the code output and construct a HCFG (Hierarchical Control Flow Graph) to express the generated CFG's in a hierarchical structure. The components required for HCFG and progressive algorithm to construct HCFG are also proposed. The proposed method is verified through constructing the software architecture of an open SMTP(Simple Mail Transfer Protocol) server program. The structure generated by the proposed method and the real program structure are compared and analyzed.