• Title/Summary/Keyword: 특성정보 파일

Search Result 550, Processing Time 0.035 seconds

A Quantitative Analysis of the Cyclomatic Complexity of the Web Software (웹 소프트웨어의 순환복잡도에 대한 정량적 분석)

  • Kim, JeeHyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.183-191
    • /
    • 2014
  • In this study Cyclomatic Complexity of Web Software has been analyzed quantitatively by correlation between complexity and Number of Classes(NOC), and Number of Methods(NOM) which are object oriented programming measures. Based on the frequency distribution of complexity, NOC and NOM of software at the Web environment, correlation between complexity threshold and NOC threshold, and NOM threshold has been measured and more than 4,000 ASP files of 10 Web real projects have been used as the sample. The empirical result shows that NOC threshold is 21, NOM threshold is 40 and complexity threshold is 68 as high value, and 8 projects among of 10 except 2 projects with especially high frequency distribution shows that NOC threshold is 12, NOM threshold is 21 and complexity threshold is 52 with relatively low value, so correlation has been found out as exists. And also 8 projects with low threshold of complexity, NOC and NOM were internal management software, and the other 2 projects were external sales service software, Number of Classes and Number of Methods can be defined at the design stage according to business properties, and also the complexity can be estimated in order to improve the software quality.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Analysis and Prediction of Power Consumption Pattern Using Spatiotemporal Data Mining Techniques in GIS-AMR System (GIS-AMR 시스템에서 시공간 데이터마이닝 기법을 이용한 전력 소비 패턴의 분석 및 예측)

  • Park, Jin-Hyoung;Lee, Heon-Gyu;Shin, Jin-Ho;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.307-316
    • /
    • 2009
  • In this paper, the spatiotemporal data mining methodology for detecting a cycle of power consumption pattern with the change of time and spatial was proposed, and applied to the power consumption data collected by GIS-AMR system with an aim to use its resulting knowledge in real world applications. First, partial clustering method was applied for cluster analysis concerned with the aim of customer's power consumption. Second, the patterns of customer's power consumption data which contain time and spatial attribute were detected by 3D cube mining method. Third, using the calendar pattern mining method for detection of cyclic patterns in the various time domains, the meanings and relationships of time attribute which is previously detected patterns were analyzed and predicted. For the evaluation of the proposed spatiotemporal data mining, we analyzed and predicted the power consumption patterns included the cycle of time and spatial feature from total 266,426 data of 3,256 customers with high power consumption from Jan. 2007 to Apr. 2007 supported by the GIS-AMR system in KEPRI. As a result of applying the proposed analysis methodology, cyclic patterns of each representative profiles of a group is identified on time and location.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

An Application-Specific and Adaptive Power Management Technique for Portable Systems (휴대장치를 위한 응용프로그램 특성에 따른 적응형 전력관리 기법)

  • Egger, Bernhard;Lee, Jae-Jin;Shin, Heon-Shik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.367-376
    • /
    • 2007
  • In this paper, we introduce an application-specific and adaptive power management technique for portable systems that support dynamic voltage scaling (DVS). We exploit both the idle time of multitasking systems running soft real-time tasks as well as memory- or CPU-bound code regions. Detailed power and execution time profiles guide an adaptive power manager (APM) that is linked to the operating system. A post-pass optimizer marks candidate regions for DVS by inserting calls to the APM. At runtime, the APM monitors the CPU's performance counters to dynamically determine the affinity of the each marked region. for each region, the APM computes the optimal voltage and frequency setting in terms of energy consumption and switches the CPU to that setting during the execution of the region. Idle time is exploited by monitoring system idle time and switching to the energy-wise most economical setting without prolonging execution. We show that our method is most effective for periodic workloads such as video or audio decoding. We have implemented our method in a multitasking operating system (Microsoft Windows CE) running on an Intel XScale-processor. We achieved up to 9% of total system power savings over the standard power management policy that puts the CPU in a low Power mode during idle periods.

A Study of Various Filter Setups with FBP Reconstruction for Digital Breast Tomosynthesis (디지털 유방단층영상합성법의 FBP 알고리즘 적용을 위한 다양한 필터 조합에 대한 연구)

  • Lee, Haeng-Hwa;Kim, Ye-Seul;Lee, Youngjin;Choi, Sunghoon;Lee, Seungwan;Park, Hye-Suk;Kim, Hee-Joung;Choi, Jae-Gu;Choi, Young-Wook
    • Progress in Medical Physics
    • /
    • v.25 no.4
    • /
    • pp.271-280
    • /
    • 2014
  • Recently, digital breast tomosynthesis (DBT) has been investigated to overcome the limitation of conventional mammography for overlapping anatomical structures and high patient dose with cone-beam computed tomography (CBCT). However incomplete sampling due to limited angle leads to interference on the neighboring slices. Many studies have investigated to reduce artifacts such as interference. Moreover, appropriate filters for tomosynthesis have been researched to solve artifacts resulted from incomplete sampling. The primary purpose of this study is finding appropriate filter scheme with FBP reconstruction for DBT system to reduce artifacts. In this study, we investigated characteristics of various filter schemes with simulation and prototype digital breast tomosynthesis under same acquisition parameters and conditions. We evaluated artifacts and noise with profiles and COV (coefficinet of variation) to study characteristic of filter. As a result, the noise with parameter 0.25 of Spectral filter reduced by 10% in comparison to that with only Ramp-lak filter. Because unbalance of information reduced with decreasing B of Slice thickness filter, artifacts caused by incomplete sampling reduced. In conclusion, we confirmed basic characteristics of filter operations and improvement of image quality by appropriate filter scheme. The results of this study can be utilized as base in research and development of DBT system by providing information that is about noise and artifacts depend on various filter schemes.

Status of the Constitutional Court Records Management and Improvement (헌법재판소 기록관리현황과 개선방안)

  • Lee, Cheol-Hwan;Lee, Young-Hak
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.75-124
    • /
    • 2013
  • This study aims, by paying attention to the special values of records of Constitutional Court, to discuss the characteristics of them and figuring out their present state, and to suggest some measures for improvement in the records management. First of all, I defined the concept of the records of Constitutional Court and its scope, and made an effort to comprehend their types and distinct features, and on the basis of which I tried to grasp the characteristics of the records. Put simply, the records of Constitutional Court are essential records indispensible to the application of Constitutional Court's documentation strategy of them, and they are valuable particularly at the level of the taking-root of democracy and the guarantee of human rights in a country. Owing to their characteristics of handling nationally important events, also, the context of the records is far-reaching to the records of other constitutional institutions and administrations, etc. In the second place, I analyzed Records Management Present State. At a division stage, I grasped the present state of creation, registration, and classification system of records. At an archives repository stage, I made efforts to figure out specifically the perseveration of records and the present of state of using them. On the basis of such figuring-outs of the present situation of records of Constitutional Court, I pointed at problems in how to manage them and suggested some measures to improve it in accordance with the problems, by dividing its process into four, Infrastructure, Process, Opening to the public and Application. In the infrastructure process, after revealing problems in its system, facilities, and human power, I presented some ways to improve it. In terms of its process, by focusing on classification and appraisal, I pointed out problems in them and suggested alternatives. In classification, I suggested to change the classification structure of trial records; in appraisal, I insisted on reconsidering the method of appropriating the retention periods of administration records, for it is not correspondent with reality in which, even in an file of a event, there are several different retention periods so it is likely for the context of the event worryingly to be segmented. In opening to the public and application, I pointed at problems in information disclosure at first, and made a suggestion of the establishment of a wide information disclosure law applicable to all sort of records. In application, I contended the expansion of the possibility of application of records and the scope of them through cooperation with other related-institutions.

A Study on the Characteristics of Enterprise R&D Capabilities Using Data Mining (데이터마이닝을 활용한 기업 R&D역량 특성에 관한 탐색 연구)

  • Kim, Sang-Gook;Lim, Jung-Sun;Park, Wan
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.1-21
    • /
    • 2021
  • As the global business environment changes, uncertainties in technology development and market needs increase, and competition among companies intensifies, interests and demands for R&D activities of individual companies are increasing. In order to cope with these environmental changes, R&D companies are strengthening R&D investment as one of the means to enhance the qualitative competitiveness of R&D while paying more attention to facility investment. As a result, facilities or R&D investment elements are inevitably a burden for R&D companies to bear future uncertainties. It is true that the management strategy of increasing investment in R&D as a means of enhancing R&D capability is highly uncertain in terms of corporate performance. In this study, the structural factors that influence the R&D capabilities of companies are explored in terms of technology management capabilities, R&D capabilities, and corporate classification attributes by utilizing data mining techniques, and the characteristics these individual factors present according to the level of R&D capabilities are analyzed. This study also showed cluster analysis and experimental results based on evidence data for all domestic R&D companies, and is expected to provide important implications for corporate management strategies to enhance R&D capabilities of individual companies. For each of the three viewpoints, detailed evaluation indexes were composed of 7, 2, and 4, respectively, to quantitatively measure individual levels in the corresponding area. In the case of technology management capability and R&D capability, the sub-item evaluation indexes that are being used by current domestic technology evaluation agencies were referenced, and the final detailed evaluation index was newly constructed in consideration of whether data could be obtained quantitatively. In the case of corporate classification attributes, the most basic corporate classification profile information is considered. In particular, in order to grasp the homogeneity of the R&D competency level, a comprehensive score for each company was given using detailed evaluation indicators of technology management capability and R&D capability, and the competency level was classified into five grades and compared with the cluster analysis results. In order to give the meaning according to the comparative evaluation between the analyzed cluster and the competency level grade, the clusters with high and low trends in R&D competency level were searched for each cluster. Afterwards, characteristics according to detailed evaluation indicators were analyzed in the cluster. Through this method of conducting research, two groups with high R&D competency and one with low level of R&D competency were analyzed, and the remaining two clusters were similar with almost high incidence. As a result, in this study, individual characteristics according to detailed evaluation indexes were analyzed for two clusters with high competency level and one cluster with low competency level. The implications of the results of this study are that the faster the replacement cycle of professional managers who can effectively respond to changes in technology and market demand, the more likely they will contribute to enhancing R&D capabilities. In the case of a private company, it is necessary to increase the intensity of input of R&D capabilities by enhancing the sense of belonging of R&D personnel to the company through conversion to a corporate company, and to provide the accuracy of responsibility and authority through the organization of the team unit. Since the number of technical commercialization achievements and technology certifications are occurring both in the case of contributing to capacity improvement and in case of not, it was confirmed that there is a limit in reviewing it as an important factor for enhancing R&D capacity from the perspective of management. Lastly, the experience of utility model filing was identified as a factor that has an important influence on R&D capability, and it was confirmed the need to provide motivation to encourage utility model filings in order to enhance R&D capability. As such, the results of this study are expected to provide important implications for corporate management strategies to enhance individual companies' R&D capabilities.

Automatic Speech Style Recognition Through Sentence Sequencing for Speaker Recognition in Bilateral Dialogue Situations (양자 간 대화 상황에서의 화자인식을 위한 문장 시퀀싱 방법을 통한 자동 말투 인식)

  • Kang, Garam;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.2
    • /
    • pp.17-32
    • /
    • 2021
  • Speaker recognition is generally divided into speaker identification and speaker verification. Speaker recognition plays an important function in the automatic voice system, and the importance of speaker recognition technology is becoming more prominent as the recent development of portable devices, voice technology, and audio content fields continue to expand. Previous speaker recognition studies have been conducted with the goal of automatically determining who the speaker is based on voice files and improving accuracy. Speech is an important sociolinguistic subject, and it contains very useful information that reveals the speaker's attitude, conversation intention, and personality, and this can be an important clue to speaker recognition. The final ending used in the speaker's speech determines the type of sentence or has functions and information such as the speaker's intention, psychological attitude, or relationship to the listener. The use of the terminating ending has various probabilities depending on the characteristics of the speaker, so the type and distribution of the terminating ending of a specific unidentified speaker will be helpful in recognizing the speaker. However, there have been few studies that considered speech in the existing text-based speaker recognition, and if speech information is added to the speech signal-based speaker recognition technique, the accuracy of speaker recognition can be further improved. Hence, the purpose of this paper is to propose a novel method using speech style expressed as a sentence-final ending to improve the accuracy of Korean speaker recognition. To this end, a method called sentence sequencing that generates vector values by using the type and frequency of the sentence-final ending appearing in the utterance of a specific person is proposed. To evaluate the performance of the proposed method, learning and performance evaluation were conducted with a actual drama script. The method proposed in this study can be used as a means to improve the performance of Korean speech recognition service.

Estimation on the Radius of Maximum Wind Speed using RSMC Best Track Data (RSMC 최적경로 자료를 이용한 태풍의 최대풍속반경 산정)

  • Ko, Dong Hui;Jeong, Shin Taek;Cho, Hongyeon;Jun, Ki Cheon;Kim, Yoon Chil
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.25 no.5
    • /
    • pp.291-300
    • /
    • 2013
  • Typhoon simulation method is widely used to estimate sea surface wind speeds during the typhoon periods. Holland (1980) model has been regarded to provide relatively better results for observed wind data. JTWC or RSMC best track data are available for typhoon modeling, but these data show slightly different because the data generation process are different. In this paper, a Newton-Raphson method is used to solve the two nonlinear equations based on the Holland model that is formed by the two typhoon parameters, i.e. the longest radius of 25 m/s and 15 m/s wind speeds, respectively. The solution is the radius of maximum wind speed which is of importance for typhoon modeling. This method is based on the typhoon wind profile of JMA and it shows that Holland model appears to fit better the characteristics of typhoons on the temporal and spatial changes than that of the other models. In case of using RSMC best track data, the method suggested in this study shows better and more reasonable results for the estimation of radius of maximum wind speed because the consistency of the input data is assured.