• Title/Summary/Keyword: Coding Rule

Search Result 93, Processing Time 0.03 seconds

DNA Coding Method for Evolution of Developmental Model (발생모델의 진화를 위한 DNA 코딩방법)

  • 심귀보;이동욱
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.464-467
    • /
    • 1999
  • Rapid progress in the modeling of biological structures and simulation of their development has occurred over the last few years. Cellular automata (CA) and Lindenmayer-system(L-system) are the representative models of development/morphogenesis of multicellular organism. L-system is applied to the visualization of biological plant. Also, CA are applied to the study of artificial life and to the construction of an artificial brain. To design the L-system and CA automatically, we make this model evolve. It is necessary to code the developmental rules for evolution. In this paper, we propose a DNA coding method for evolution the models of development/morphogenesis of biological multicellular organisms. DNA coding has the redundancy and overlapping of gene and is apt for the representation of the rule. In this paper, we propose the DNA coding method of CA and L-system.

  • PDF

A Design of Fuzzy Controllers Using Matrix Encoding Genetic Algorithm (행렬 표현 유전자 알고리즘을 이용한 퍼지 제어기의 설계)

  • 김동일;차성민;강전배;권기호
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.153-156
    • /
    • 2001
  • Fuzzy controllers also show good performance In case of the systems being nonlinear and difficult to solve. But these fuzzy controllers have problems which have to decide suitable rules and membership functions. In general we decide those using the heuristic methods or the experience of experts. Therefore, many researchers have applied genetic algorithms to make fuzzy rule automatically. In this paper, we suggest a new coding method and a new crossover method to maintain the good fuzzy rule base and the shape of membership

  • PDF

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

Consideration of CJK Joint Hanja Unicode when is used in AMI/HDB-3 Line Coding (AMI/HDB-3 회선부호화와 한·중·일 한자 유니코드 체계 고찰)

  • Tai, Dong-Zhen;Hong, Wan Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1011-1015
    • /
    • 2013
  • This paper analyses the violation rate of CJK joint Chines character Unicode to the source code rule. In the paper, Chinese character 150ea in Chinese Unicode which have relatively a higher frequency in use of a character was chosen to study. The frequency rate in use of the 150ea characters is about 50% of the total frequency rate of the Chinese characters. The study was applied the AMI/HDB-3 line coding/scrambling and HDLC protocol, According to the analyses, the number of violated characters were 77ea of 150 ea, frequency rate in use 29%. Therefore, when the violated 77ea characters are replaced to the matched character codes to the source coding rule, the processing rate of the line coder can be improved about 37%.

Nuclear-related Software analysis based on secure coding (시큐어 코딩 중심으로 본 원자력 관련 소프트웨어)

  • Jung, Da-Hye;Choi, Jin-Young;Lee, Song-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.243-250
    • /
    • 2013
  • We have entered into an era of smart software system where the many kinds of embedded software, especially SCADA and Automotive software not only require high reliability and safety but also high-security. Removing software weakness during the software development lifecycle is very important because hackers exploit weaknesses which are source of software vulnerabilities when attacking a system. Therefore the coding rule as like core functions of MISRA-C should expand their coding focus on security. In this paper, we used CERT-C secure coding rules for nuclear-related software being developed to demonstrate high-safety software, and proposed how to remove software weakness during development.

On a Performance Evaluation of the Pitch Alteration Techniques of speech waveform coding (피치 변경법의 성능평가)

  • Kim, Hong;Bae, Seong-Gyun;Jo, Wang-Rae;Bae, Myung-Jin
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06c
    • /
    • pp.103-106
    • /
    • 1994
  • Generally we are used to apply waveform coding method obtaining the high quality synthesized speech. But we have to solve the problems, memory capacity and pitch alteration, for applying the waveform coding method to speech synthesis by rule. The former problem is conquered by improving the integrated semiconductor technology, but the latter problem remains. In this paper, we compare the methods that have proposed for pitch alteration in our laboratory until now. These methods are not change properties of vocal tract formants and only altered the pitch halving method, 1.14% for cepstrum analysis method, and 2.36% for hamonics compensated with the phase method.

  • PDF

Compatibility of UTF-8 Encoding System to HDB-3 Scrambling Method (Unicode의 UTF-8 부호화 방식의 HDB-3 스크램블링 방식과의 적합성)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.2
    • /
    • pp.227-240
    • /
    • 2013
  • This paper studied how much influence UTF coded data is given to HDB-3 operation efficiency. This paper applied the Hangul Jamo and Compatability Hangul Jamo in Unicode to compare to its UTF-8 coded data. As a result of study, When Unicode is reformatted to UTF-8 code, the data code run counter to the source coding rule was very much increased.

A Study on the Korean Text-to-Speech Using Demisyllable Units (반음절단위를 이용한 한국어 음성합성에 관한 연구)

  • Yun, Gi-Sun;Park, Sung-Han
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.10
    • /
    • pp.138-145
    • /
    • 1990
  • This paper present a rule-based speech synthesis method for improving the naturalness of synthetic speech and using the small data base based on demisyllable units. A 12-pole Linear Prediction Coding method is used to analyses demisyllable speech signals. A syllable and vowel concatenation rule is developed to improve the naturalness and intelligibility of the synthetic speech. in addiion, phonological structure transform rule using neural net and prosody rules are applied to the synthetic speech.

  • PDF

A Study on Performance improvement Scheme for Source Coding using Rule Base (Rule Base를 이용한 시큐어코딩 프로그램 성능 향상 기법 연구)

  • Kang, Jungho;Jang, Jae-Youl;Kim, Do-moon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.859-861
    • /
    • 2015
  • 최근 소프트웨어는 IT 산업이 발달함에 따라 스마트 단말, 가전기기, 의료기기 등 다양한 분야에서 활용되고 있으며, 소프트웨어 사용이 증가함에 따라 이를 악용한 다양한 공격 사례가 발생하였다. 이를 위해 행정안전부에서는 2011년부터 시큐어코딩을 단계적으로 의무화 하였으며 이에 따라, 시큐어코딩 시장이 증가하고 있는 추세이다. 본 논문에서는 기존 시큐어코딩 프로그램에서 신규 취약점에 능동적으로 대응이 가능한 Rule Base를 기반으로 시큐어코딩 프로그램 성능 향상 방안을 제안한다.

A Study on a Secure Coding Library for the Battlefield Management System Software Development (전장정보체계 SW 개발을 위한 시큐어 코딩 라이브러리에 관한 연구)

  • Park, Sanghyun;Kim, Kwanyoung;Choi, Junesung
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.242-249
    • /
    • 2018
  • In this paper, we identify the code vulnerabilities that can be automatically detected through Visual Studio (VS) compiler and code analyzer based on a secure coding rule set which is optimized for development of battlefield information system. Then we describe a weak point item that can be dealt with at the implementation stage without depending on the understanding or ability of the individual programmer's secure coding through the implementation of the secure coding library. Using VS compiler and the code analyzer, the developers can detect only about 38% of security weaknesses. But with the help of the proposed secure coding library, about 48% of security weaknesses can be detected and prevented in the proactive diagnosis in the development stage.