• Title/Summary/Keyword: Java Programs

Search Result 171, Processing Time 0.025 seconds

A Web Based Secure E-Mail System Using the PGP Algorithm (PGP 방식을 이용한 웹 기반 전자우편 보안 시스템)

  • 박동욱;박재희;김진상;김일민
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.16-22
    • /
    • 2001
  • There are several traditional factors of software quality. Some of them are such as correctness, reliability, efficiency, compatibility, portability, etc. In addition to them, security is required as another factor of software quality nowadays because some application programs are used as a way to attack information systems by stack frame manipulation. Each processor has its own peculiar stack frame mechanism and C language uses the characteristics of them. This paper explains the concept of security problem caused by stack frame manipulation, and the stack frame mechanism of Pentium, Alpha and SP ARC processor in detail. And then it examines the effect of stack frame mechanism on the security of programs in C language.

  • PDF

Formal Semantics for Lambda Expression of Java (자바 람다식에 대한 형식 의미론)

  • Han Jung Lan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.157-164
    • /
    • 2023
  • Specifying the semantic structure for functional interfaces and lambda expressions, which are the latest features of Java, can be referenced when designing similar functions in the future, and is also required in the process of standardizing or implementing an optimized translator. In this study, action equation 3.0 is newly proposed to express the static and dynamic semantic structure of functional interfaces and lambda expressions by modifying and upgrading the existing expressions to express the semantic structures of java functional interfaces and lambda expressions. Measure the execution time of java programs by implementing the semantic structure specified in action equation 3.0 in java, and prove that action equation 3.0 is a real semantic structure that can be implemented through simulation. The superiority of this action equation 3.0 is to be confirmed by comparing the action equation 3.0 specified in the four areas of readability, modularity, extensibility and flexibility with the existing representative semantic expression methods.

C2JNI: An Embedded C to JNI Translator (C2JNI: 내장 C 언어에서 JNI 코드를 생성하는 변환기)

  • 유재우;최종명;김영철
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1551-1559
    • /
    • 2004
  • Java, a platform independent object-oriented programming language, is widely used, however it should be integrated with JNI to use system services or to reuse legacy systems. Though JNI provides the standard APIs which allow Java to be combined with C/$C^{++}$, it is very hard and cumbersome for developers to use JNI APIs. In order to address this problem, we introduce a translator named C2JNI, which converts the embedded C program into a JNI compatible C program. With C2JNI, developers can Integrate Java and C programs without JNI APIs, and it will reduce the complexity caused by JNI APIs.

GoBean: a Java GUI application for visual exploration of GO term enrichments

  • Lee, Sang-Hyuk;Cha, Ji-Young;Kim, Hyeon-Jin;Yu, Ung-Sik
    • BMB Reports
    • /
    • v.45 no.2
    • /
    • pp.120-125
    • /
    • 2012
  • We have developed a biologist-friendly, Java GUI application (GoBean) for GO term enrichment analysis. It was designed to be a comprehensive and flexible GUI tool for GO term enrichment analysis, combining the merits of other programs and incorporating extensive graphic exploration of enrichment results. An intuitive user interface with multiple panels allows for extensive visual scrutiny of analysis results. The program includes many essential and useful features, such as enrichment analysis algorithms, multiple test correction methods, and versatile filtering of enriched GO terms for more focused analyses. A unique graphic interface reflecting the GO tree structure was devised to facilitate comparisons of multiple GO analysis results, which can provide valuable insights for biological interpretation. Additional features to enhance user convenience include built in ID conversion, evidence code-based gene-GO association filtering, set operations of gene lists and enriched GO terms, and user -provided data files. It is available at http://neon.gachon.ac.kr/GoBean/.

Development of a Real Time 3D Collaboration and Part Information Brokering System Using WWW(World Wide Web) (웹을 이용한 실시간 3차원 공동작업 부품정보중개시스템 개발)

  • 최영상;김영호
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.2
    • /
    • pp.87-99
    • /
    • 1999
  • We developed a Part Information Brokering System, namely PIBS, that can inter-link part suppliers and buyers using WWW(World Wide Web). The major contribution of this paper is that the system provides a 3D collaboration environment that enables multiple users to share the same workspace where they cooperatively manipulate part features in real time. PIBS carries out two major functions: one to maintain part data in a part library, and the other to provide the means for the clients to cooperate. An object-oriented database is used for the part library which stores apart information registered by part suppliers. VRML(Virtual Reality Modeling Language) the ISO standard for 3D visualization on WWW, is used to represent 3D part models. Several Java programs have been implemented to support synchronous and a synchronous communication of the 3D models. Once the users are interconnected through the system, a user's manipulation of part objects is transparently and instantaneously transmitted to the others. This means that all the participants can are the same view and movement of the 3D part models. Since the system is developed using a Java applet-server architecture, it requires no additional software other than standard web browser. The prototype system has been successfully implemented, and demonstrated its applicability to virtual 3D part information sharing.

  • PDF

Generating Object Diagrams from Java Class Files : A Practical Approach (자바 클래스 파일로부터 객체 다이어그램 얻기 : 실제적인 방법)

  • Yang, Chang-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.1-13
    • /
    • 2008
  • Gestwicki et. al. proposed the technique that detects and predicts the structure of object diagrams from class diagrams to get the improved drawing of object graphs. Their approach finds two predictable structures - recursive clusters and leaf clusters from class diagrams. Their approach is not practical to be applied to real programs, because the starting point is class diagram. In this work, we improve and implement their technique to apply to Java classes. We obtain the structure and relationships of classes and clusters extracted from class files. This information can be provided and used as a template of object graphs for Java execution visualization tools like JIVE.

  • PDF

A Study On The Development Of a Home Networking System Using An Embedded Linux Board (임베디드 리눅스 보드를 이용한 홈 네트워킹 시스템 구현에 관한 연구)

  • Lee, Heon-Joo;Lee, Jong-Su;Choi, Kyung-Sam
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.592-595
    • /
    • 2003
  • In this paper, we have designed a Home Networking System using an embedded linux board. The system based on the World-Wide-Web is composed of three parts - a Server, a Client and a Simulator. The Home Networking Server is built in an embedded board using an embedded linux kernel. A web-server and Home Networking Server Seryice Demon programming with a Jaya-Language is included in the board. Clients can connect to the server board using a web-browser in the desktop computer, PDA or any other machines which include a web-browser. For this purpose, we made the client program using a Java-Applet. So, the clients who connect to the server for the control of the applications, download the class-file and execute the client-program in the web-browser. So, the clients don't need any other programs to control the applications from a remote place. The size of server board is very small (86.3$\times$74mm), which makes it very useful not only for the Home-Networking-System but also in many other fields, e.g., embedded robot control system, etc. Using an embedded board instead of a desktop computer is good for a simple network environment and it occupies only a small space to make the system.

  • PDF

Detection of Malicious PDF based on Document Structure Features and Stream Objects

  • Kang, Ah Reum;Jeong, Young-Seob;Kim, Se Lyeong;Kim, Jonghyun;Woo, Jiyoung;Choi, Sunoh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.85-93
    • /
    • 2018
  • In recent years, there has been an increasing number of ways to distribute document-based malicious code using vulnerabilities in document files. Because document type malware is not an executable file itself, it is easy to bypass existing security programs, so research on a model to detect it is necessary. In this study, we extract main features from the document structure and the JavaScript contained in the stream object In addition, when JavaScript is inserted, keywords with high occurrence frequency in malicious code such as function name, reserved word and the readable string in the script are extracted. Then, we generate a machine learning model that can distinguish between normal and malicious. In order to make it difficult to bypass, we try to achieve good performance in a black box type algorithm. For an experiment, a large amount of documents compared to previous studies is analyzed. Experimental results show 98.9% detection rate from three different type algorithms. SVM, which is a black box type algorithm and makes obfuscation difficult, shows much higher performance than in previous studies.

A Implementation of Web-based Education Contents for 8051 MicroController

  • Kim Hyun Keu;Jun Heung Gu;Choi Kwan Sun
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.690-692
    • /
    • 2004
  • This paper describes Web based education technique. We implemented a remote compile system with 8051 micro controller. It implemented the system in this paper so that a learner compiled 8051 control programs to the remote. Most big restriction subject is the control of the hardware in an engineering field even though it implements a remote education system. We download the Java Application to Java Web Start and execute in this system. In this paper the learner controls 8051 executions in Web to the remote and implemented so that we confirmed the action. The supplementary problem will be the construction of a remote education system which offeres existing text and sound information, flash animation.

  • PDF

JACE: A Reliable Group Communication System over the Internet (JACE: 인터넷 환경을 지원하는 신뢰성 있는 그룹통신 시스템)

  • Mun, Nam-Du;An, Geon-Tae;Yu, Yang-U;Lee, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3379-3389
    • /
    • 1999
  • Important network application services have been rapidly increased along with the growth of the Internet. So, it is desirable for such applications to serve transparently, continuously and safely even if the network is temporally disconnected or certain hosts running those services are crashed down. To satisfy such requirementes, many group communication systems have been developed; but, those systems restrict its range within a single LAN or directly interconnected LAN environments since the communication through the Internet is too slow and too unreliable to support group communication. As of now, it is expected the Internet is going to e sufficiently fast and reliable in the near communication system, named FACE(Java Advanced Communication Environment), supporting Extended Virtual which is a basic communication layer, RPGS(Reliable Process Group Service) which manages application process groups, and JACE API for developing Java application services and clients programs. In addition, an experimental replicated object space is developed as an application of the JACE system.

  • PDF