• Title/Summary/Keyword: C Language

Search Result 1,642, Processing Time 0.033 seconds

A Design and Implementation of Hangul Spelling and Word-spacing Checker using Connectivity Information (접속정보를 이용한 한글 철자 및 띄어쓰기 검사기의 설계 및 구현)

  • Kang, J.W.;Song, C.H.;Kim, Y.B.;Choi, K.S.;Kwon, Y.R.;Kim, G.C.
    • Annual Conference on Human and Language Technology
    • /
    • 1989.10a
    • /
    • pp.3-9
    • /
    • 1989
  • 본 논문은 $UNIX^{TM}$ 환경에서의 한글 텍스트에 대해 일괄 처리 방식으로 한글 철자 및 띄어쓰기를 검사하는 시스템을 설계 및 구현하였다. 본 시스템은 접속 정보를 이용한 최단일치법을 사용하여 한 어절에 대해 형태론적인 분석을 하여 입력된 화일 내의 철자 및 띄어쓰기 오류를 찾아낸다.

  • PDF

Implementation of a function translator converting vulnerable functions for preventing buffer overflow attacks (버퍼 오버플로우 공격 방지를 위한 취약 함수 변환기 구현)

  • Kim, Ik Su;Cho, Yong Yun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.105-114
    • /
    • 2010
  • C language is frequently used to develop application and system programs. However, programs using C language are vulnerable to buffer overflow attacks. To prevent buffer overflow, programmers have to check boundaries of buffer areas when they develop programs. But vulnerable programs frequently result from improper programming habits and mistakes of programmers. Existing researches for preventing buffer overflow attacks only inform programmers of warnings about vulnerabilities and not remove vulnerabilities in advance so that the programs still include vulnerabilities. In this paper, we propose a function translator which prevents creating programs including buffer overflow vulnerabilities. To prevent creating binary from source including vulnerabilities, the proposed translator searches vulnerable functions which cause buffer overflows, and converts them into secure functions. Accordingly, developing vulnerable programs by programmers which lack in knowledge on security can be prevented.

An Experimental Approach to Multiple Case Constructions in Korean

  • Lee, Yong-Hun
    • Language and Information
    • /
    • v.17 no.2
    • /
    • pp.29-50
    • /
    • 2013
  • Multiple Nominative Constructions (MNCs) and Multiple Accusative Constructions (MACs) have been some of the hottest and interesting topics in Korean syntax. This paper took empirical approaches to these constructions and examined native speakers' grammaticality judgements of these constructions. Though there are lots of previous studies on these constructions, Ryu (2010, 2013a, 2013b, 2013c) recently tried to unify MNCs and MACs into Multiple Case Constructions (MCCs) and to classify them into 16 types based on the semantic relations. This paper includes experiments which were performed on these 16 different types. The experiments were designed following Johnson (2008); and the native speakers' intuition was measured with two scales, numerical estimates and line drawing, though the latter was adopted in the actual analyses. Through the experiment, the following facts were observed: (i) the grammaticality of the MCCs varies depending on their semantic relations, (ii) MNCs were more grammatical than MACs if both constructions occurred in similar environments, and (iii) the sentences in some MAC types had much lower grammaticality than those in the others, as Ryu (2013b, 2013c) mentioned.

  • PDF

An Operator Assisted Call Routing System

  • Lee, Chun-Jen;Jason S. Chang
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.02a
    • /
    • pp.271-280
    • /
    • 2002
  • A system to assist call routing task for telephone operators at the Directorate General of Telecommunications (DGT) in Taiwan is reported in this paper. The system was developed based on DGT organization profile with description of its six divisions instead of a corpus of recorded and transcribed call-routing dialogs. An acoustic module and an information retrieval module were built specifically for this task. The construction of IR module was based on term extraction and thesaurus discovery processes. By integrating acoustic and IR module, the system achieves satisfactory performance and provides a promising approach to call routing. Simulation results indicated that the proposed algorithm outperforms standard classification methods. A working system based on the proposed approach has been implemented and experimental results are presented.

  • PDF

A Role-Based Access Control Mechanism using Z language in Distributed System (분산시스템에서 Z언어를 이용한 역할기반 접근제어 메커니즘)

  • Choe, Eun-Bok;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.2
    • /
    • pp.113-121
    • /
    • 2001
  • 접근제어의 목적은 컴퓨팅 자원 및 통신 정보자원 등을 부당한 사용자로부터 사용되거나, 수정, 노출, 파괴와 같은 비합법적인 행위로부터 보호하는데 있다. 대표적인 보안 정책 중에서 Biba 모델은 정보의 무결성을 보장하지만 상업적인 환경에 적용되기는 다소 미흡하며, 역할기반 접근제어 정책은 상업적인 측면의 보안정책에 적용이 가능하지만 접근되는 객체의 중요도에 따른 보안등급이 고려되지 않았다. 본 논문에서는 Biba 모델의 보안등급을 역할기반접근제어 모델에 적용함으로써 주체가 해당 객체를 부당하게 변경하는 것을 방지함과 동시에 수많은 접근권한을 관리하는데 융통성을 제공한다. 그리고 제안한 접근제어 모델의 제약조건들을 정형 명세 언어인 Z언어를 통해 명확히 표현함으로써 정책 입안자나 프로그래머가 접근제어정책을 설계하고 구현하고자 할 때 프로그램 개발에 소요되는 시간을 단축할 수 있다. 또한, 제안한 모델을 망관리 객체의 연산과 등급을 갖는 역할과 제약조건을 사용하여 실제 운영되는 통신망 관리에 적용하여 봄으로써 정보의 무결성이 보장됨을 보였다.

  • PDF

A Study on the Consonant Classification Using Fuzzy Inference (퍼지추론을 이용한 한국어 자음분류에 관한 연구)

  • 박경식
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1992.06a
    • /
    • pp.71-75
    • /
    • 1992
  • This paper proposes algorithm in order to classify Korean consonant phonemes same as polosives, fricatives affricates into la sounds, glottalized sounds, aspirated sounds. This three kinds of sounds are one of distinctive characters of the Korean language which don't eist in language same as English. This is thesis on classfication of 14 Korean consonants(k, t, p, s, c, k', t', p', s', c', kh, ph, ch) as a previous stage for Korean phone recognition. As feature sets for classification, LPC cepstral analysis. The eperiments are two stages. First, using short-time speech signal analysis and Mahalanobis distance, consonant segments are detected from original speech signal, then the consonants are classified by fuzzy inference. As the results of computer simulations, the classification rate of the speech data was come to 93.75%.

  • PDF

심전계(ECG)의 제작설계

  • 서병설
    • Journal of Biomedical Engineering Research
    • /
    • v.9 no.2
    • /
    • pp.247-250
    • /
    • 1988
  • Laboratory information system (LIS) is a key tool to manage laboratory data in clinical pathology. Our department has developed an information system for routine hematology using down-sized computer system. We have used an IBM 486 compatible PC with 16MB main memory, 210 MB hard disk drive, 9 RS-232C port and 24 pin dot printer. The operating system and database management system were SCO UNIX and SCO foxbase, respectively. For program development, we used Xbase language provided by SCO foxbase. The C language was used for interface purpose. To make the system use friendly, pull-down menu was used. The system connected to our hospital information system via application program interface (API), so the information related to patient and request details is automatically transmitted to our computer. Our system interfaced with fwd complete blood count analyzers(Sysmex NE-8000 and Coulter STKS) for unidirectional data tansmission from analyzer to computer. The authors suggests that this system based on down-sized computer could provide a progressive approach to total LIS based on local area network, and the implemented system could serve as a model for other hospital's LIS for routine hematology.

  • PDF

Query Language Extension and Implementation of MM Presentation System using SMIL in MMDB (멀티미디어 데이터베이스에서 SMIL을 이용한 질의어 확장 및 프리젠테이션 시스템의 구현)

  • 이중화;이종환;유영호;김경석
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.44-53
    • /
    • 2001
  • It is very important how users query MM data and how the query results are presented in MMDB systems. Also, the query results are represented as the generalized form so as to be used in various applications. In this paper, we propose a generalized method for querying and presenting MM data by extending query language based on presentation elements of SMIUSMIL is W3C recommendation for synchronized MM presentation). Our system provides the query results for users as SMIL format in order to be used for various applications.

  • PDF

An Implementation of Data and State Table Generator for Digital System (디지털 시스템의 데이터 및 상태표 생성기 구현)

  • 조성국;이명호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.2
    • /
    • pp.19-27
    • /
    • 1998
  • The digital system is consisted of control subsystem and data subsystem. On this Thesis, after defining the hardware description languages and hardware compiler based on this, We have designed the tools which created data and state table using of register transfer algorithm. As a major language selected C and then as subtools, developed all these making use of Lex and YACC of Unix.

  • PDF

Java Native Method Generating System (자바 네이티브 메소드 생성 시스템)

  • 김도영;김상훈
    • The Journal of Information Technology
    • /
    • v.3 no.2
    • /
    • pp.13-21
    • /
    • 2000
  • Java native method is proposed for the efficient execution of time-critical code, running of platform dependent job, and reuse of established libraries. If the writing of the Java native method is the speedup of execution time, you must use a compiled language not java language to write native method. Also, you must know the usage of the Java native interface to use native method. To reduce these difficulties, we proposed java native method generator that changes java method into native method automatically. Also, NMG helps programmer to write C implementation for the native method because there Is no need for the concept of JNI.

  • PDF