• 제목/요약/키워드: HELP code

검색결과 298건 처리시간 0.024초

Which Code Changes Should You Review First?: A Code Review Tool to Summarize and Prioritize Important Software Changes

  • Song, Myoungkyu;Kwon, Young-Woo
    • Journal of Multimedia Information System
    • /
    • 제4권4호
    • /
    • pp.255-262
    • /
    • 2017
  • In recent software development, repetitive code fragments (i.e., clones) are common due to the copy-and-paste programming practice, the framework-based development, or the reuse of same design patterns. Such similar code fragments are likely to introduce more bugs but are easily disregarded by a code reviewer or a programmer. In this paper, we present a code review tool to help code reviewers identify important code changes written by other programmers and recommend which changes need to be reviewed first. Specifically, to identify important code changes, our approach detects code clones across revisions and investigates them. Then, to help a code reviewer, our approach ranks the identified changes in accordance with several software quality metrics and statistics on those clones and changes. Furthermore, our approach allows the code reviewer to express their preferences during code review time. As a result, the code reviewer who has little knowledge of a code base can reduce his or her effort by reviewing the most significant changes that require an instant attention. To evaluate our approach, we integrated our approach with a modern IDE (e.g., Eclipse) as a plugin and then analyzed two third-party open source projects. The experimental results indicate that our approach can improve code reviewer's productivity.

특징형상정보와 작업설계정보를 이용한 NC코드의 자동 생성 (Automatic generation of NC-code using Feature data and Process Planning data)

  • 박재민;노형민
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2002년도 추계학술대회 논문집
    • /
    • pp.591-594
    • /
    • 2002
  • Generating NC-code from 3D part model needs a lot of effort to make many decisions, including machining area, tool change data, tool data, cutting condition, etc., by using either manual or computer aided method. This effort can be reduced by integration of automated process planning and NC-code generation. In case of generating NC code with a help of the process planning system, many data mentioned from the process planning can be used. It means that we can create NC-code about a full part. In this study, integration of FAPPS(Feature based Automatic Process Planning) with a NC-code generating module is described and additional data to adapt NC-code for machine shop is discussed.

  • PDF

사전 소프트웨어 워터마크 기술 기반 (Dictionary Based Software Watermarking Technique)

  • 지샨 빠르웨즈;이승룡;구교호
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2009년도 추계학술발표대회
    • /
    • pp.241-242
    • /
    • 2009
  • As software is becoming increasing important to the human society, so does the effort to produce them is also increasing.. All of these efforts can be at risk when source code of the application is reverse engineered by the software pirate. Many attempts have been made to protect Intellectual Property Rights (IPR); one of the newest attempts to protect IPR is software watermarking. It is used to prove ownership right when IPR are violated, and also prevents the bandit from altering the code for his own use. In this paper we are presenting a new technique for software watermarking know as Dictionary Based Software Watermarking (DBSW). DBSW works by embedding dummy instructions in source code with the help of predefined mapping already available in the dictionary. These instructions are identical to the normal instructions of the program and are hard to identify or to extract from the watermarked program. With the help of DBSW we not only can stop source code alteration but can also identify the buyer how has distributed the pirated copy.

Implementation of Code Generator of Particle Filter

  • Lee, Yang-Weon
    • Journal of information and communication convergence engineering
    • /
    • 제8권5호
    • /
    • pp.493-497
    • /
    • 2010
  • This paper address the problem of tracking multiple objects encountered in many situation in developing condensation algorithms. The difficulty lies on the fact that the implementation of condensation algorithm is not easy for the general users. We propose an automatic code generation program for condensation algorithm using MATLAB tool. It will help for general user who is not familiar with condensation algorithm to apply easily for real system. The merit of this program is that a general industrial engineer can easily simulate the designed system and confirm the its performance on the fly.

건축전기설비 관련 규정의 국제화 동향 분석 (The Trand analysis of the International Standard of the Building Electrical Installations)

  • 이기홍
    • 한국조명전기설비학회:학술대회논문집
    • /
    • 한국조명전기설비학회 2003년도 학술대회논문집
    • /
    • pp.93-95
    • /
    • 2003
  • Owing to WTO/TBT, Many countries are trying to accord their own various national codes and standards with international standards. Also Korean electric power code is being made consistent with the new standards which include the international standards. The new code will affect the many aspects of building construction. In order to cope with the change of the electric power code, this paper analyzed the trend of the international standard(IEC 60364, IEC 61024) and we think this study will help engineers to understand the international electrical standards.

  • PDF

스마트폰에서의 QR-Code 보안기법에 대한 연구 (A Study of QR-Code Security Method for Smart Phone)

  • 변진영;안요한;이재웅;이기영
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 추계학술대회
    • /
    • pp.699-700
    • /
    • 2011
  • 본 논문에서는 현재 스마트폰에서 자주 사용하고 있는 QR-Code에 대해서 악의적인 변형 코드 및 올바르지 않은 URL로의 접속 등에 의해 개인정보 유출 등의 피해를 막기 위한 방법을 연구한다. QR-Code를 디코딩하여 URL 접속 시에 직접적인 필터링은 어려우므로 접속하기 전 해당 QR-Code를 디코딩하여 나온 결과와 원래의 URL을 비교할 수 있는 서버를 만들어 그 서버에 접속하여 스마트폰 사용자에게 접속 여부를 통지해주는 시스템을 구축해보아 스마트폰 사용자들에게 도움이 되고자 한다.

  • PDF

DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)

  • Jang, Sung-Soon;Kwan, Sung-Woo;Yoo, Ho-Sik;Kim, Jung-Soo;Yoon, Wan-Ki
    • Nuclear Engineering and Technology
    • /
    • 제41권5호
    • /
    • pp.747-752
    • /
    • 2009
  • A vulnerability assessment is essential for the efficient operation of a physical protection system (PPS). Previous assessment codes have used a simple model called an adversary sequence diagram. In this study, the use of a two-dimensional (2D) map of a facility as a model for a PPS is suggested as an alternative approach. The analysis of a 2D model, however, consumes a lot of time. Accordingly, a generalized heuristic algorithm has been applied to address this issue. The proposed assessment method was implemented to a computer code; Systematic Analysis of physical Protection Effectiveness (SAPE). This code was applied to a variety of facilities and evaluated for feasibility by applying it to various facilities. To help upgrade a PPS, a sensitivity analysis of all protection elements along a chosen path is proposed. SAPE will help to accurately and intuitively assess a PPS.

Efficient secret sharing scheme with cheater identification based on QR code

  • Huang, Peng-Cheng;Chang, Chin-Chen;Li, Yung-Hui;Liu, Yanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권10호
    • /
    • pp.5144-5160
    • /
    • 2019
  • Secret sharing is an effective way of protecting secret messages. However, the traditional secret sharing schemes are considered meaningless due to malicious people attention which might raise risks. To overcome the weakness, this paper presents an effective secret sharing scheme with the functionality of cheater identification, based on meaningful QR code. The secret message will be split and concealed in the padding region of cover QR codes with the assistance of Latin square and it can be completely restored when all the involved participants cooperate. The concealing strategy exploits the characteristic of Reed-Solomon (RS) code to ensure the strong robustness of generated QR code pseudo-shares. The meaningful QR code pseudo-shares help to reduce the curious of unrelated persons. Some experiments were done to evaluate the performance of proposed scheme. The results showed that the proposed scheme is feasible, efficient and secure compared to the other existing schemes. It also achieves a higher secret payload and maintains stronger robustness.

소스코드의 보안성 메트릭 설계에 관한 연구 (A Study on the Design of Security Metrics for Source Code)

  • 서동수
    • 정보보호학회논문지
    • /
    • 제20권6호
    • /
    • pp.147-155
    • /
    • 2010
  • 소스코드의 정적분석 기술은 소스코드 자체에 내재된 취약성을 찾는데 활용되는 중요한 기술로 인식되고 있다. 본 논문은 정보시스템의 소스코드 보안성 수준을 평가하는 방법으로 정적분석 결과인 소스코드의 취약성 정보와 프로그램이 처리하는 정보의 중요도를 활용하는 평가 메트릭의 설계 및 활용을 소개한다. 소스코드 보안성 메트릭은 소스코드의 취약점 수준을 개발 과정에서 미리 파악할 수 있도록 도움을 준다는 측면에서 평가자와 개발자 모두가 활용할 수 있다. 특히 평가자는 보안 메트릭을 통해 소스코드의 성격과 요구되는 정보의 보안수준에 따라 소스코드의 보안 수준을 점검하며, 코드 검수에 활용할 수 있다.

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • 제19권2호
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.