• Title/Summary/Keyword: 소프트웨어 출시

Search Result 123, Processing Time 0.026 seconds

A Ligthtweight Experimental Frame based on Microservice Architecture (마이크로서비스아키텍처 기반 경량형 모의실험환경)

  • Gyu-Sik Ham;Hyeon-Gi Kim;Jin-Woo Kim;Soo-Young Jang;Eun-Kyung Kim;Chang-beom Choi
    • Journal of IKEEE
    • /
    • v.28 no.2
    • /
    • pp.123-130
    • /
    • 2024
  • As technology advances swiftly and the lifespan of products becomes increasingly short, there is a demand to fasten the pace of research outcomes, product development, and market introduction. As a result, the researchers and developers need a computational experiment environment that enables rapid verification of the experiment and application of research findings. Such an environment must efficiently harness all available computational resources, manage simulations across diverse test scenarios, and support the experimental data collection. This research introduces the design and implementation of an experimental frame based on a microservice architecture. The experimental frame leverages scripts to utilize computing resources optimally, making it more straightforward for users to conduct simulations. It features an experimental frame capable of automatically deploying scenarios to the computing components. This setup allows for the automatic configuration of both the computing environment and experiments based on user-provided scenarios and experimental software, facilitating effortless execution of simulations.

A Study of ePub-based Standard Framework Supporting Mutual Comparability of eBook DRM (전자책 DRM의 상호호환성을 지원하는 ePub 기반 표준 프레임워크에 관한 연구)

  • Kang, Ho-Gap;Kim, Tae-Hyun;Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.235-245
    • /
    • 2011
  • EBooks refer to electronic versions of books which are accessible via internet with forms of digital texts. In recent years, Amazon's Kindle digital eBooks has revealed the possibilities of success of the e-book market, which leads other companies to launch eBook service such as Google's eBook stores and Apple's iPad and eBook service. These reveal that the eBook market is finally showing a substantial amount of growth. Although the issue of technical support of eBook copyright protection emerges from the fast growing eBook marketplace, current technic of commercial DRM for protecting eBook copyright protection still has problems of non-comparability. Therefore, with the current technical status, DRM comparability problems, which have already occurred in music DRM environment, would also happen in eBook environment. This study suggests a standard framework to support eBook DRM comparability. When development of the standard reference software for eBook DRM comparability is completed, the sources will be registered as shareware to be open to public.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Effects of Exposure to Cooking Show Contents on the Consumption of Agricultural Products: Focused on Potato Consumption (쿡방 콘텐츠 노출이 농식품 소비에 미치는 효과: 감자 소비를 중심으로)

  • Rah, HyungChul;Kim, Hyeon-Woong;Ko, Hyeonseok;Shin, Jaehoon;Cho, Yongbeen;Nasridinov, Aziz;Yoo, Kwan-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.400-407
    • /
    • 2021
  • Recently, mukbang and cookbang or cooking shows on TV and YouTube channels have increased, and the influences of these broadcasts on food consumption have been gradually increasing. There were several news articles on 'Baek Jong-won effect', in which the consumption of the agri-food Mr. Jong-won Baek mentioned on his broadcast soared, and even foods named after him are on the market. In this study, Mr. Jong-won Baek, who produces influential cooking contents through various media, was taken as a representative example. We evaluated if 'Baek Jong-won effect' exists on potato consumption, which Mr. Jong-won Baek broadcasted potato cooking recipes on TV and YouTube. After the potato recipe was broadcasted for the first time on the TV show called HomeFoodRescue, the differences in the amount of money to purchase potatoes before and after the broadcast were estimated by using the money amount to purchase data of Agri-food consumers panel and the difference-in-differences method at 6 time points (3, 6, 9, 12, 24, and 36 months). Among the time points analyzed, the potato purchases at post-broadcast were less than those at pre-broadcast. No results were observed suggesting the existence of 'Baek Jong-won effect' on potato consumption through HomeFoodRescue show in the study.

A Study on Quality Evaluation Model of Mobile Device Management for BYOD (BYOD 환경의 MDM 보안솔루션의 품질평가모델에 관한 연구)

  • Rha, HyeonDae;Kang, SuKyoung;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.93-102
    • /
    • 2014
  • A mobile office environment using mobile devices, such as tablet PC, mobile phone is gradually increased in enterprises, banking and public institutions etc which is no limitation on places. It occurs advanced and persist security threats that are required effective security management policy and technical solution to be secure. For BYOD (Bring Your Own Device) environment, technical security management solutions of network control based, MDM (Mobile Device Management), MAM (Mobile Application Management), MCM (Mobile Contents Management) were released, evolved and mixed used. In perspective of integrated security management solution, mobile security product should be selected to consider user experience and environment and correct quality evaluation model of product is needed which is provided standards and guidance on the selection criteria when it was introduced. In this paper, the most widely used MDM solution is selected to take a look at its features and it was reviewed the product attributes with related international standard ISO/IEC25010 software quality attributes. And then it was derived evaluation elements and calculated the related metrics based on the quality analysis model. For the verification of quality evaluation model, security checks list and testing procedures were established; it applied metrics and analyzed the testing result through scenario based case study.

  • PDF

Development of An Automatic Classification System for Game Reviews Based on Word Embedding and Vector Similarity (단어 임베딩 및 벡터 유사도 기반 게임 리뷰 자동 분류 시스템 개발)

  • Yang, Yu-Jeong;Lee, Bo-Hyun;Kim, Jin-Sil;Lee, Ki Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.1-14
    • /
    • 2019
  • Because of the characteristics of game software, it is important to quickly identify and reflect users' needs into game software after its launch. However, most sites such as the Google Play Store, where users can download games and post reviews, provide only very limited and ambiguous classification categories for game reviews. Therefore, in this paper, we develop an automatic classification system for game reviews that categorizes reviews into categories that are clearer and more useful for game providers. The developed system converts words in reviews into vectors using word2vec, which is a representative word embedding model, and classifies reviews into the most relevant categories by measuring the similarity between those vectors and each category. Especially, in order to choose the best similarity measure that directly affects the classification performance of the system, we have compared the performance of three representative similarity measures, the Euclidean similarity, cosine similarity, and the extended Jaccard similarity, in a real environment. Furthermore, to allow a review to be classified into multiple categories, we use a threshold-based multi-category classification method. Through experiments on real reviews collected from Google Play Store, we have confirmed that the system achieved up to 95% accuracy.

A study on machine learning-based defense system proposal through web shell collection and analysis (웹쉘 수집 및 분석을 통한 머신러닝기반 방어시스템 제안 연구)

  • Kim, Ki-hwan;Shin, Yong-tae
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.87-94
    • /
    • 2022
  • Recently, with the development of information and communication infrastructure, the number of Internet access devices is rapidly increasing. Smartphones, laptops, computers, and even IoT devices are receiving information and communication services through Internet access. Since most of the device operating environment consists of web (WEB), it is vulnerable to web cyber attacks using web shells. When the web shell is uploaded to the web server, it is confirmed that the attack frequency is high because the control of the web server can be easily performed. As the damage caused by the web shell occurs a lot, each company is responding to attacks with various security devices such as intrusion prevention systems, firewalls, and web firewalls. In this case, it is difficult to detect, and in order to prevent and cope with web shell attacks due to these characteristics, it is difficult to respond only with the existing system and security software. Therefore, it is an automated defense system through the collection and analysis of web shells based on artificial intelligence machine learning that can cope with new cyber attacks such as detecting unknown web shells in advance by using artificial intelligence machine learning and deep learning techniques in existing security software. We would like to propose about. The machine learning-based web shell defense system model proposed in this paper quickly collects, analyzes, and detects malicious web shells, one of the cyberattacks on the web environment. I think it will be very helpful in designing and building a security system.

A study on the Revitalization of Traditional Market with Smart Platform (스마트 플랫폼을 이용한 전통시장 활성화 방안 연구)

  • Park, Jung Ho;Choi, EunYoung
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.127-143
    • /
    • 2023
  • Currently, the domestic traditional market has not escaped the swamp of stagnation that began in the early 2000s despite various projects promoted by many related players such as the central government and local governments. In order to overcome the crisis faced by the traditional market, various R&Ds have recently been conducted on how to build a smart traditional market that combines information and communication technologies such as big data analysis, artificial intelligence, and the Internet of Things. This study analyzes various previous studies, users of traditional markets, and application cases of ICT technology in foreign traditional markets since 2012 and proposes a model to build a smart traditional market using ICT technology based on the analysis. The model proposed in this study includes building a traditional market metaverse that can interact with visitors, certifying visits to traditional markets through digital signage with NFC technology, improving accuracy of fire detection functions using IoT and AI technology, developing smartphone apps for market launch information and event notification, and an e-commerce system. If a smart traditional market platform is implemented and operated based on the smart traditional market platform model presented in this study, it will not only draw interest in the traditional market to MZ generation and foreigners, but also contribute to revitalizing the traditional market in the future.

Deriving Usability Evaluation Criteria for Threat Modeling Tools (위협 모델링 도구의 사용성 평가기준 도출)

  • In-no Hwang;Young-seop Shin;Hyun-suk Cho;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.763-780
    • /
    • 2024
  • As the domestic and international landscape undergoes rapid changes, the importance of implementing security measures in response to the growing threats that businesses face is increasing. In this context, the need for Security by Design (SbD), integrating security from the early design stages, is becoming more pronounced, with threat modeling recognized as a fundamental tool of SbD. Particularly, to save costs and time by detecting and resolving security issues early, the application of the Shift Left strategy requires the involvement of personnel with limited security expertise, such as software developers, in threat modeling. Although various automated threat modeling tools have been released, their lack of user-friendliness for personnel lacking security expertise poses challenges in conducting threat modeling effectively. To address this, we conducted an analysis of research related to threat modeling tools and derived usability evaluation criteria based on the GQM(Goal-Question-Metric) approach. An expert survey was conducted to validate both the validity and objectivity of the derived criteria. We performed usability evaluations of three threat modeling tools (MS TMT, SPARTA, PyTM), and the evaluation results led to the conclusion that MS TMT exhibited superior usability compared to other tools. This study aims to contribute to the creation of an environment where personnel with limited security expertise can effectively conduct threat modeling by proposing usability evaluation criteria.

A Study on the Decision Factors for AI-based SaMD Adoption Using Delphi Surveys and AHP Analysis (델파이 조사와 AHP 분석을 활용한 인공지능 기반 SaMD 도입 의사결정 요인에 관한 연구)

  • Byung-Oh Woo;Jay In Oh
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.111-129
    • /
    • 2023
  • With the diffusion of digital innovation, the adoption of innovative medical technologies based on artificial intelligence is increasing in the medical field. This is driving the launch and adoption of AI-based SaMD(Software as a Medical Device), but there is a lack of research on the factors that influence the adoption of SaMD by medical institutions. The purpose of this study is to identify key factors that influence medical institutions' decisions to adopt AI-based SaMDs, and to analyze the weights and priorities of these factors. For this purpose, we conducted Delphi surveys based on the results of literature studies on technology acceptance models in healthcare industry, medical AI and SaMD, and developed a research model by combining HOTE(Human, Organization, Technology and Environment) framework and HABIO(Holistic Approach {Business, Information, Organizational}) framework. Based on the research model with 5 main criteria and 22 sub-criteria, we conducted an AHP(Analytical Hierarchy Process) analysis among the experts from domestic medical institutions and SaMD providers to empirically analyze SaMD adoption factors. The results of this study showed that the priority of the main criteria for determining the adoption of AI-based SaMD was in the order of technical factors, economic factors, human factors, organizational factors, and environmental factors. The priority of sub-criteria was in the order of reliability, cost reduction, medical staff's acceptance, safety, top management's support, security, and licensing & regulatory levels. Specifically, technical factors such as reliability, safety, and security were found to be the most important factors for SaMD adoption. In addition, the comparisons and analyses of the weights and priorities of each group showed that the weights and priorities of SaMD adoption factors varied by type of institution, type of medical institution, and type of job in the medical institution.