• Title/Summary/Keyword: Abstract Syntax

Search Result 59, Processing Time 0.065 seconds

A Study on the Method of Space Analysis in the Contemporary Dwelling House by the Application of the Space Syntax (Space Syntax를 적용한 현대주거건축의 공간분석기법에 관한 연구)

  • 변창훈
    • Journal of the Korean housing association
    • /
    • v.6 no.2
    • /
    • pp.191-204
    • /
    • 1995
  • On this research. The method of space analysis(Space syntax) is used to investigate the relation between composition and configuration in the houses of four modern architects. Space analysis represent that the houses permutate the morphological properties of depth and rings to embed domestic fuctions within the hoe and to interface household memgers. Two of the house are judged to be well composite but banal: The other appear more inventive in relation compositinal principles to space configuration, to create a measure of subtlety and richness in life style which is lacking in the examples where form is manipulated in the abstract. On this research. It is discoverd that Knowledge of both the internal laws of form and the social logic of space is required to generate the practical conjunction of formal rigour with fuctional ease which we recognise in the houses of architects.

  • PDF

A Study on the Spatial Structure of Space Syntax in Frank Gehry's Museum Architecture (공간구문론을 이용한 프랭크 게리 뮤지엄 설계의 공간구조에 관한 연구)

  • Bae, Yi-Jin;Cho, Ja-Yeon
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2011
  • The goal of this research is to find the difference between F. Gehry's museum architecture's extremely abstract and chaotic space composition and that of other architect's. Gehry's four museum architectures built from late 1980s to 2000 were selected for analysis. Four more museums, built in the same era with the size of that (atypical) museums, were selected for comparative studies. Space Syntax, a quantitative analysis method for spatial configuration, is used to find the characteristics of internal spaces. The Result shows that Gehry's museum architectures' connectivity is 0.375 times bigger and integration is 0.731 times smaller than the compared museums. High connectivity suggests that their visitors could take diverse routes. Low integration implies that their routes are less efficient than the compared museums overall. Their intelligibility is slightly higher than the other museums. This means their visitors have comparatively high understanding of the internal space.

A Program Similarity Evaluation using Keyword Extraction on Abstract Syntax Tree (구문트리에서 키워드 추출을 이용한 프로그램 유사도 평가)

  • Kim Young-Chul;Choi Jaeyoung
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.109-116
    • /
    • 2005
  • In this paper, we introduce the method that a user analyses the similarity of the two programs by using keyword from the syntactic tree, created after the syntax analysis, and its implementation. The main advantage of the method is the performance improvement through using only keyword of syntax tree. In the paper, we propose the similarity evaluation model and how we extract keyword from syntax tree. In addition, we also show the improvement in the performance in analysis and in the system's structure. We expect that our system will be utilized in the similarity evaluation in text and XML documents.

Efficient method for finding patched vulnerability with code filtering in Apple iOS (코드 필터링 기법을 이용한 iOS 환경에서의 패치 분석 방법론)

  • Jo, Je-gyeong;Ryou, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1021-1026
    • /
    • 2015
  • Increasing of damage by phishing, government and organization response more rapidly. So phishing use malware and vulnerability for attack. Recently attack that use patch analysis is increased when Microsoft announce patches. Cause of that, researcher for security on defense need technology of patch analysis. But most patch analysis are develop for Microsoft's product. Increasing of mobile environment, necessary of patch analysis on mobile is increased. But ordinary patch analysis can not use mobile environment that there is many file and small size. So we suggest this research that use code filtering instead of Control Flow Graph and Abstract Syntax Tree.

Automatic Generation of MIB for Network Management (네트웍 관리를 위한 MIB의 자동생성)

  • 유재우;김영철;김성근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6A
    • /
    • pp.848-854
    • /
    • 2000
  • Network management in TMN concerns to the operating system and communication equipments in network, and defines them as objects. GDMO(guidelines for the Definition of Managed Objects) is used to describe those objects. GDMO is not directly used for managing the network, but translated into a language with object-oriented paradigm. And GDMO refers to ASN.1(Abstract Syntax Notation One) for manage objects. This paper presents design and implementation techniques for the translator which automatically translates the specification of ASN.1 and GDMO to the object-oriented language for generating MIB(Managed object Instance Base). This system, unlike the existing source code generator, is designed to generate various object-oriented languages automatically, which are used to generate Managed object Instance Base(MIB). And the system includes various graphic user interface to enhance the development environment of ASn.1 and GDMO

  • PDF

Tree-Pattern-Based Clone Detection with High Precision and Recall

  • Lee, Hyo-Sub;Choi, Myung-Ryul;Doh, Kyung-Goo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.1932-1950
    • /
    • 2018
  • The paper proposes a code-clone detection method that gives the highest possible precision and recall, without giving much attention to efficiency and scalability. The goal is to automatically create a reliable reference corpus that can be used as a basis for evaluating the precision and recall of clone detection tools. The algorithm takes an abstract-syntax-tree representation of source code and thoroughly examines every possible pair of all duplicate tree patterns in the tree, while avoiding unnecessary and duplicated comparisons wherever possible. The largest possible duplicate patterns are then collected in the set of pattern clusters that are used to identify code clones. The method is implemented and evaluated for a standard set of open-source Java applications. The experimental result shows very high precision and recall. False-negative clones missed by our method are all non-contiguous clones. Finally, the concept of neighbor patterns, which can be used to improve recall by detecting non-contiguous clones and intertwined clones, is proposed.

Node.js Module Vulnerability Analysis: Based on AST and CFG (AST 와 CFG 에 기반한 Node.js 모듈 취약점 분석)

  • Kim, Hee Yeon;Oh, Ho Kyun;Kim, Ji Hoon;You, Jaewook;Shin, Jeong Hoon;Kim, Kyounggon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.475-478
    • /
    • 2019
  • 웹어플리케이션의 발전에 따라 자바스크립트 런타임 플랫폼인 Node.js 의 사용도 증가하고 있다. 개발자들은 Node.js 의 다양한 모듈을 활용하여 프로그래밍을 하게 되는데, Node.js 모듈 보안의 중요성에 비하여 모듈 취약점 분석은 충분히 이루어지지 않고 있다. 본 논문에서는 소스코드의 구조를 트리 형태로 표현하는 Abstract Syntax Tree 와 소스코드의 실행 흐름 및 변수의 흐름을 그래프로 나타내는 Control Flow Graph/Data Flow Graph 가 Node.js 모듈 취약점 분석에 효율적으로 활용될 수 있음을 서술하고자 한다. Node.js 모듈은 여러 스크립트 파일로 나누어져 있다는 점과 사용자의 입력이 분명하다는 특징이 있다. 또한 자바스크립트 언어를 사용하므로 선언된 변수들의 타입에 따라 적용되는 범위인 scope 가 다르게 적용된다는 특징이 있다. 본 논문에서는 이러한 Node.js 모듈의 특징을 고려하여 Abstract Syntax Tree 및 Control Flow Graph/Data Flow Graph 을 어떻게 생성하고 취약점 분석에 활용할 것인지에 대한 방법론을 제안하고, 실제 분석에 활용할 수 있는 코드 구현을 통하여 구체화시키고자 한다.

A Design of Ontology Parser for OWL Web Ontology Language (OWL Web Ontology Language를 위한 Ontology Parser의 설계)

  • Lee, Mi-Kyoung;Park, Shu-Cheon;Sohn, Joo-Chan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.573-576
    • /
    • 2004
  • 시맨틱 웹에 이용되는 웹 온톨로지 언어들로는 RDF/RDFS, DAML+OIL, OWL 등이 있으며, 현재 W3C에서는 OWL을 웹 온톨로지 표준 언어로 삼고 있다. 기존의 웹 온톨로지 문서들의 파서는 대부분 RDF를 기반으로 한 Triple 모델을 기반으로 하여 파싱한다. 그러나 OWL의 경우는 triple 형태로 변환시키면 OWL Full의 형태를 가지게 되고 OWL 온톨로지의 표현력과 데이터의 손실을 가져오게 된다. 따라서 OWL 문서의 파싱을 위하여 우리는 OWL Abstract Syntax를 이용하여 Tree 모델을 가지는 OWL 파서를 만들고자 한다. 본 논문에서는 시맨틱 웹에서 사용되는 웹 온톨로지들을 파싱하여 온톨로지 객체 모델을 생성해주는 기능을 가지는 온톨로지 파서를 설계, 구현하였다. 논문에서 설계한 온톨로지 파서는 RDF, DAML+OIL, OWL 웹 온톨로지 문서들을 파싱하여 온톨로지 객체 모델을 생성할 때, RDF 온톨로지의 경우는 Triple 모델 형태로 파싱을 하지만, OWL 온톨로지의 경우에는 OWL Abstract Syntax Tree 모델 형태로 파싱한 후, OOM으로 변환시켜준다. 이를 위해 웹 온톨로지 언어의 종류 구분과 OWL 온톨로지의 경우, OWL Full, OWL DL, OWL Lite의 서브 타입을 구별하는 기능도 추가하였다.

  • PDF

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.48-60
    • /
    • 2024
  • With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

On Study of Algebra using Technology (테크노로지를 사용한 대수학 강좌 연구)

  • Choi, Eun-Mi
    • Communications of Mathematical Education
    • /
    • v.23 no.4
    • /
    • pp.1131-1148
    • /
    • 2009
  • Algebra is one of the important subjects that not only mathematics but many science major students should know at least at the elementary level. Unfortunately abstract algebra, specially, is seen as an extremely difficult course to learn. One reason of difficulties is because of its very abstract nature, and the other is due to the lecture method that simply telling students about mathematical contents. In this paper we study about the teaching and learning abstract algebra in universities in corporation of a programming language such as ISETL. ISETL is a language whose syntax closely imitates that of mathematics. In asking students to read and write code in ISETL before they learn in class, we observe that students can much understand and construct formal statements that express a precise idea. We discuss about the classroom activities that may help students to construct and internalize mathematical ideas, and also discuss about some barriers we might overcome.

  • PDF