• Title/Summary/Keyword: 제품식별코드

Search Result 18, Processing Time 0.023 seconds

Design of National Product Identifier and its Encoding based on RFID (RFID기반의 국가물품식별코드체계 및 인코딩 방안 설계)

  • Kim, Jin-Yong;Park, Jung-Jae;Song, Joo-Hyung;Kim, Hyun-Min;Ann, Chong-Hwan;Kim, Sun-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.25-40
    • /
    • 2007
  • As memory-extended RFID tags are recently developed, various types of item identification structures can be stored in the tags. In this paper, we propose a new national product identifier(NPI) which accepts not only ISO item identification standards but also the memory capacity of ISO tags. First of all, item identification structures of ISO/IEC 15459 and EPC, and memory structures of ISO/IEC 18000-6C and EPC tags are analyzed. Based on these analyses, the NPI currently used is analyzed and its problems are described from the viewpoint of standardization. To overcome the problems, a new NPI structure suitable for ISO/IEC 15459 is proposed. Finally, data related to the NPI is designed for encoding to tags.

  • PDF

A Code Clustering Technique for Unifying Method Full Path of Reusable Cloned Code Sets of a Product Family (제품군의 재사용 가능한 클론 코드의 메소드 경로 통일을 위한 코드 클러스터링 방법)

  • Kim, Taeyoung;Lee, Jihyun;Kim, Eunmi
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.1
    • /
    • pp.1-18
    • /
    • 2023
  • Similar software is often developed with the Clone-And-Own (CAO) approach that copies and modifies existing artifacts. The CAO approach is considered as a bad practice because it makes maintenance difficult as the number of cloned products increases. Software product line engineering is a methodology that can solve the issue of the CAO approach by developing a product family through systematic reuse. Migrating product families that have been developed with the CAO approach to the product line engineering begins with finding, integrating, and building them as reusable assets. However, cloning occurs at various levels from directories to code lines, and their structures can be changed. This makes it difficult to build product line code base simply by finding clones. Successful migration thus requires unifying the source code's file path, class name, and method signature. This paper proposes a clustering method that identifies a set of similar codes scattered across product variants and some of their method full paths are different, so path unification is necessary. In order to show the effectiveness of the proposed method, we conducted an experiment using the Apo Games product line, which has evolved with the CAO approach. As a result, the average precision of clustering performed without preprocessing was 0.91 and the number of identified common clusters was 0, whereas our method showed 0.98 and 15 respectively.

An Identification System Using QR Codes for Production and Disposal Information of Internet of Things Devices (QR코드 기반 사물인터넷 디바이스의 생산/폐기 정보 식별체계)

  • Lim, Jae-Hyun;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.664-665
    • /
    • 2016
  • This paper proposes an identification system based on QR (Quick Response) code for production and disposal information of Internet of Things (IoT) devices. Three thousands and five hundreds of electronic devices have replaced and discarded in South Korea in a year, and twenty millions to fifty millions tons of e-wastes have happened throughout the world every year. According to Gartner, market research institution, the number of IoT devices will increase from 2.3 billions in 2013 to 30 billions in 2020, however, the regulations and systems which take into account environment were not prepared. The identification systems for reflecting information of devices, which are produced or discarded, are required to resolve the problem. The proposed identification system based on QR code can store much more massive data such as the producer, product's model, serial number, recycling rate, recovering rate, recyclability rate, recoverability rate than RFID (Radio-Frequency Identification). Also, users can immediately recognize production and disposal information by a QR code application in a smartphone.

  • PDF

Efficient Code-based Software Product Line Regression Testing (효율적인 소프트웨어 제품라인 회귀시험을 위한 자동화된 코드 기반 시험 방법)

  • Jung, Pilsu;Kang, Sungwon
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.1-6
    • /
    • 2020
  • Software product line development is a development paradigm that efficiently develops a product family by avoiding redundant development based on separation of the common part and the variable part of the product family. In software product line development, the source code that is used to produce a product family is called a product line code base, and when the product line code base is changed and the products of the product family are affected by the change, the activity of testing the affected products is called a product line regression testing. For product line regression testing, instead of conducting regression testing individually on each product of the product family, a more efficient regression testing would be possible if unnecessary testing that are irrelevant to the change can be avoided. This paper introduces SRTS, which is an automated method to efficiently perform software product line regression testing. SRTS divides the product line code base and test cases based on commonality and variability. Then SRTS identifies and selects the test cases affected by the change. Finally, it reduces unnecessary testing by rerunning only the selected test cases.

A universal infrared remote controller implementation for custom code identification systems (커스텀 코드 식별 방식의 만능 적외선 리모컨 구현)

  • Kim, Jin Young;Moon, Sangook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.11
    • /
    • pp.621-628
    • /
    • 2016
  • Recently, remote controls for home appliances have been produced as many as the number of home appliances per household, and new home appliances are being released, but the number of new remote controls is continuously increasing due to their separate functions. Therefore, it is not inconvenient for first time users to use many remote controls because it is difficult and bulky. In recent years, the practical use of a universal remote control, such as large companies such as SAMSUNG and LG are producing a variety of forms. In this paper, we explain how to transmit and receive data format and infrared remote control through custom code identification method used in IR remote control for each company, and to see the size, characteristics and difference with ordinary remote control through ATmega128 remote control experiment. The ATmega128 can be used to control various home appliances displayed on the LCD. As a result, it can be seen that the number of remote controllers having only each function is reduced, and the integrated remote controller using ATmega128 Can handle household appliances.

IoT 장비에 대한 악성 프로세스 실행 제어 제품 시험방법 연구

  • Park, Myungseo;Kim, Jongsung
    • Review of KIISC
    • /
    • v.27 no.6
    • /
    • pp.29-32
    • /
    • 2017
  • 현대 사회에서 주요 사회적 이슈가 되는 CCTV, 네트워크 프린터, 스마트 가전기기 등 IoT 장비 해킹 사고의 발생 횟수 및 피해 규모는 지속적으로 증가하고 있다. 최근 침해사고 사례를 살펴보면, 엔드포인트에 해당하는 IoT 장비의 허술한 보안대책으로 인하여 악성코드 설치 및 실행을 탐지하지 못한 피해가 대부분이다. 이로 인해 IoT 장비에 대한 악성 프로세스 실행 제어 제품이 개발되어 도입되는 추세이지만, 아직까지 안전성 평가에 대한 연구가 부족한 실정이다. 따라서 본 논문에서는 IoT 장비에 대한 악성 프로세스 실행 제어 제품의 기본 보안요구사항을 식별하고, 필요한 시험항목과 시험 시 유의사항에 대해 제안한다.

A Feature-Oriented Method for Extracting a Product Line Asset from a Family of Legacy Applications (레거시 어플리케이션 제품군으로부터 제품라인 자산을 추출하는 휘처 기반의 방법)

  • Lee, Hyesun;Lee, Kang Bok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.7
    • /
    • pp.337-352
    • /
    • 2017
  • Clone-and-own reuse is an approach to creating new software variants by copying and modifying existing software products. A family of legacy software products developed by clone-and-own reuse often requires high maintenance cost and tends to be error-prone due to patch-ups without refactoring and structural degradation. To overcome these problems, many organizations that have used clone-and-own reuse now want to migrate their legacy products to software product line (SPL) for more systematic reuse and management of software asset. However, with most of existing methods, variation points are embedded directly into design and code rather than modeled and managed separately; variation points are not created ("engineered") systematically based on a variability model. This approach causes the following problems: it is difficult to understand the relationships between variation points, thus it is hard to maintain such code and the asset tends to become error-prone as it evolves. Also, when SPL evolves, design/code assets tend to be modified directly in an ad-hoc manner rather than engineered systematically with appropriate refactoring. To address these problems, we propose a feature-oriented method for extracting a SPL asset from a family of legacy applications. With the approach, we identify and model variation points and their relationships in a feature model separate from implementation, and then extract and manage a SPL asset from legacy applications based on the feature model. We have applied the method to a family of legacy Notepad++ products and demonstrated the feasibility of the method.

An Implementation of QR Code based On-line Mobile Augmented Reality System (QR코드 기반의 온라인 모바일 증강현실 시스템의 구현)

  • Park, Min-Woo;Park, Jung-Pil;Jung, Soon-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1004-1016
    • /
    • 2012
  • This paper proposes a mobile augmented reality system to provide detail information of the products using QR code included in them. In the proposed system, we perform the estimation of the camera pose using both of marker-based and markerless-based methods. If the camera can see the QR code, we perform the estimation of the camera pose using the set of rectangles in the QR code. However, if the QR code is out of sight, we perform the estimation of the camera pose based homography between consecutive frames. Moreover, the content of the augmented reality in the proposed system is made by using meta-data. Therefore, the user can make contents of various scenario using only meta-data file without modification of our system. Especially, our system maintains the contents as newly updated state by the on-line server. Thus, it can reduce the unnecessary update of the program.

FunRank: Finding 1-Day Vulnerability with Call-Site and Data-Flow Analysis (FunRank: 함수 호출 관계 및 데이터 흐름 분석을 통한 공개된 취약점 식별)

  • Jaehyu Lee;Jihun Baek;Hyungon Moon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.305-318
    • /
    • 2023
  • The complexity of software products led many manufacturers to stitch open-source software for composing a product. Using open-source help reduce the development cost, but the difference in the different development life cycles makes it difficult to keep the product up-to-date. For this reason, even the patches for known vulnerabilities are not adopted quickly enough, leaving the entire product under threat. Existing studies propose to use binary differentiation techniques to determine if a product is left vulnerable against a particular vulnerability. Despite their effectiveness in finding real-world vulnerabilities, they often fail to locate the evidence of a vulnerability if it is a small function that usually is inlined at compile time. This work presents our tool FunRank which is designed to identify the short functions. Our experiments using synthesized and real-world software products show that FunRank can identify the short, inlined functions that suggest that the program is left vulnerable to a particular vulnerability.

Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 리얼머신 기반의 바이너리 자동실행 환경)

  • Cho, Homook;Yoon, KwanSik;Choi, Sangyong;Kim, Yong-Min
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • There exist many threats in cyber space, however current anti-virus software and other existing solutions do not effectively respond to malware that has become more complex and sophisticated. It was shown experimentally that it is possible for the proposed approach to provide an automatic execution environment for the detection of malicious behavior of active malware, comparing the virtual-machine environment with the real-machine environment based on user interaction. Moreover, the results show that it is possible to provide a dynamic analysis environment in order to analyze the intelligent malware effectively, through the comparison of malicious behavior activity in an automatic binary execution environment based on real-machines and the malicious behavior activity in a virtual-machine environment.