• Title/Summary/Keyword: 소프트웨어 도용

Search Result 35, Processing Time 0.021 seconds

A Method for Detecting Program Plagiarism Comparing Class Structure Graphs (클래스 구조 그래프 비교를 통한 프로그램 표절 검사 방법)

  • Kim, Yeoneo;Lee, Yun-Jung;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.37-47
    • /
    • 2013
  • Recently, lots of research results on program comparison have been reported since the code theft become frequent as the increase of code mobility. This paper proposes a plagiarism detection method using class structures. The proposed method constructs a graph representing the referential relationship between the member variables and the methods. This relationship is shown as a bipartite graph and the test for graph isomorphism is applied on the set of graphs to measure the similarity of the programs. In order to measure the effectiveness of this method, an experiment was conducted on the test set, the set of Java source codes submitted as solutions for the programming assignments in Object-Oriented Programming course of Pusan National University in 2012. In order to evaluate the accuracy of the proposed method, the F-measure is compared to those of JPlag and Stigmata. According to the experimental result, the F-measure of the proposed method is higher than those of JPlag and Stigmata by 0.17 and 0.34, respectively.

Iris Recognition using Gabor Wavelet and Fuzzy LDA Method (가버 웨이블릿과 퍼지 선형 판별분석 기법을 이용한 홍채 인식)

  • Go Hyoun-Joo;Kwon Mann-Jun;Chun Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1147-1155
    • /
    • 2005
  • This paper deals with Iris recognition as one of biometric techniques which is applied to identify a person using his/her behavior or congenital characteristics. The Iris of a human eye has a texture that is unique and time invariant for each individual. First, we obtain the feature vector from the 2D Iris pattern having a property of size invariant and using the fuzzy LDA which is further through four types of 2D Gabor wavelet. At the recognition process, we compute the similarity measure based on the correlation values. Here, since we use four different matching values obtained from four different directional Gabor wavelet and select the maximum value, it is possible to minimize the recognition error rate. To show the usefulness of the proposed algorithm, we applied it to a biometric database consisting of 300 Iris Patterns extracted from 50 subjects and finally got more higher than $90\%$ recognition rate.

Hardware Implementation of the Fuzzy Fingerprint Vault System (지문 퍼지볼트 시스템의 하드웨어 구현)

  • Lim, Sung-Jin;Chae, Seung-Hoon;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.15-21
    • /
    • 2010
  • The user authentication using fingerprint information not only provides the convenience but also high security. However, the fingerprint information for user authentication can cause serious problems when it has been compromised. It cannot change like passwords, because the user only has ten fingers on two hands. Recently, there is an increasing research of the fuzzy fingerprint vault system to protect fingerprint information. The research on the problem of fingerprint alignment using geometric hashing technique carried out. This paper proposes the hardware architecture fuzzy fingerprint vault system based on geometric hashing. The proposed architecture consists of software and hardware module. The hardware module has charge of matching between enrollment hash table and verification hash table. Based on the experimental results, the execution time of the proposed system with 36 real minutiae is 0.2 second when 100 chaff minutiae, 0.53 second when 400 chaff minutiae.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

The Study of Reducing Radiation Exposure Dose and Comparing SUV According to Applied IRIS (Iterative Reconstruction in Image Space) for PET/CT (PET/CT 검사 시 IRIS (Iterative Reconstruction in Image Space) 적용에 따른 CT 피폭선량 감소와 PET SUV 비교 연구)

  • Do, Yong Ho;Song, Ho Jun;Lee, Hyung Jin;Lee, Hong Jae;Kim, Jin Eui
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.16 no.2
    • /
    • pp.29-34
    • /
    • 2012
  • Purpose : Presently, hardwares and softwares for reducing radiation exposure are continually developed for PET/CT examination. Purpose of this study is to evaluate effectiveness of reducing radiation exposure dose of CT and SUV changes of PET when applied each kernel to ACCT (Attenuation Correction Computed Tomography) according to adopted IRIS (Iterative Reconstruction in Image Space) software. Materials and Methods : Biograph mCT (Siemens, Germany) was used as a PET/CT scanner. Using AAPM CT performance phantom, from standard (120 kVp, 100 mAs), 7 scans were conducted by reducing 15 mAs each. After image reconstruction by FBP (Filtered Back Projection) and IRIS, noise and spatial resolution were evaluated. The same method was applied to anthropomorphic chest phantom and acquired images were compared. NEMA IEC body phantom was used for SUV evaluation. Injected dose rate for hot sphere (hot) and background cylinder (BKG) were 1:8. CT dose condition (120 kVp, 50 mAs) was the same for each scan and PET scan durations were 1, 2, 3 and 4min. After scanning, each kernel of IRIS was applied to ACCT. And PET images were reconstructed by ACCT adopted IRIS for comparing SUV changes. Results : AAPM phantom test for noise evaluation, SD for FBP 100 mAs, IRIS 55 mAs were 8.8 and 8.9. FBP 85 mAs, IRIS 40 mAs were 9.5 and 9.7. FBP 70 mAs, IRIS 25 mAs were 11.9 and 11.1. Above mAs condition for FBP and IRIS, SD showed similar values. And for spatial resolution test, there was no significant difference. For chest phantom test, when applied the same mAs and kernel to both of FBP and IRIS, every applied kernels showed reduced noise. Lower mAs and higher kernel value showed higher noise reduction. There was no considerable difference only except for I70 very sharp kernel for SUV comparison using NEMA IEC body phantom. Conclusion : In this study, low mAs (55 mAs) applied IRIS and standard mAs (100 mAs) applied FBP showed similar noise. And only except for I70 kernel, there was no significant SUV changes. It is possible to reduce needless radiation exposure and acquire better image quality than FBP's through applying appropriate kernel of IRIS to PET/CT.

  • PDF