• Title/Summary/Keyword: Java program

Search Result 342, Processing Time 0.023 seconds

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Constructing A Loop Tree in CTOC (CTOC에서 루프 트리 구성하기)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weong-Hee
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.197-206
    • /
    • 2008
  • The CTOC framework was implemented to efficiently perform analysis and optimization of the Java bytecode that is often being used lately. In order to analyze and optimize the bytecode from the CTOC, the eCFG was first generated. Due to the bytecode characteristics of difficult analysis, the existing bytecode was expanded to be suitable for control flow analysis, and the control flow graph was drawn. We called eCFG(extended Control Flow Graph). Furthermore, the eCFG was converted into the SSA Form for a static analysis. Many loops were found in the conversion program. The previous CTOC performed conversion directly into the SSA Form without processing the loops. However, processing the loops prior to the SSA Form conversion allows more efficient generation of the SSA Form. This paper examines the process of finding the loops prior to converting the eCFG into the SSA Form in order to efficiently process the loops, and exhibits the procedures for generating the loop tree.

Development of Walkability Search System (보행친화도 검색 시스템 개발)

  • Kim, Eun Jung;An, Donghyeok
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.12
    • /
    • pp.987-997
    • /
    • 2019
  • Walk score, walkablity index of built environmental condition, has developed and used in everyday life in United States. The purpose of this study is to produce walk score in Seoul, and to develop computer-based walk score system for improving it's usage. This study covers city of Seoul, and the unit of spatial analysis is 100m × 100m grid cell. This study uses same methodology with walk score in US, the Geographic Information Systems(GIS) is used for calculating the values of walk score(N=58,062). This study implemented Java-based system that utilizes walk score dataset(latitude, longitude, and walk score). This system provided search functions including both lat/long-based and address-based options. Meanwhile, this system was designed to provide the closest value of walk score in dataset if location did not match the certain points in dataset. This study has significance to provide walk score system being easily available to all.

Design and Implementation of Method Generation based Watermarking Technique for Android Copyright Protection (안드로이드 저작권 보호를 위한 메소드 생성 기반 워터마킹 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.61-69
    • /
    • 2019
  • As smartphones become widespread, numerous applications are developed and social issues related to software copyright are emerging. Software watermarking is digital watermarking technology applied to software and is a technology that can be used to recognize copyright owners. Generally, Java language is used to develop applications on the Android environment. The Java is an object-oriented language that supports method overloading and overriding. In this paper, we propose and implement a method generation based watermarking technique. As a result of evaluating the overhead due to the watermark, it was confirmed that the increase of the executable file size and the decrease of the execution speed are not large. Using the watermarking technique proposed in this paper, it is expected that copyright information can be verified when illegal copying is suspected or actual program is stolen, and piracy attempts will be prevented in advance.

Physical and Mechanical Properties of 20-Year-Old Clonal Teak Trees in Ngawi, East Java, Indonesia

  • Widyanto Dwi NUGROHO;Mohammad NA'IEM;Ganis LUKMANDARU;WIDIYATNO;Yogi FERIAWAN;Fanany Wuri PRASTIWI;Aris WIBOWO;Diana PUSPITASARI
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.5
    • /
    • pp.459-472
    • /
    • 2024
  • Teak tree breeding programs have been conducted over the last several decades in various locations throughout Indonesia. These programs have produced superior teak clones with growth increments > 3 cm diameter at breast height. The wood quality of this clonal teak must be evaluated to determine the final use of these trees and the success rate of the teak breeding programs. In this study we investigated the physical condition (reflected in wood color and heartwood percentage), physical properties (moisture content, basic density, shrinkage, and tangential/radial shrinkage ratio), and mechanical properties (modulus of elasticity, modulus of rupture, compressive strength parallel and perpendicular to grain, hardness, and cleavage strength) in 20-year-old clonal teak planted in Ngawi, East Java. The parameters were measured in the axial (bottom, middle, and top) and radial (near pith, middle, and near bark) directions and according to the British Standard 373:1957. The results showed that axial variation significantly affected the wood color (L*, a*, and b*), basic density, radial shrinkage, modulus of elasticity, and compressive strength parallel to the grain. Besides, the radial variation had a significant effect on wood color (L*), basic density, modulus of elasticity, modulus of rupture, compressive strength parallel and perpendicular to the grain, hardness, and cleavage strength. Based on these results, it can be concluded that the teak breeding program has been highly successful.

A Library for Object-to-Graph Mapping with Annotations in Java

  • Ji-Woong Choi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.10
    • /
    • pp.219-228
    • /
    • 2024
  • In this paper, we propose a method for constructing RDF knowledge graphs from objects in OOP. RML mapping has been the de-facto way of generating RDF graphs from heterogeneous data. However, the input to an RML mapping is limited to the data in files or databases. Our new RML implementation, designed to overcome the limit, has two differences compared to existing RML implementations. First, our implementation provides a new way to specify mapping rules in the form of special comments known as annotations in the source code. It is because existing works do not provide a means to refer to specific program elements to which the mapping rules will be applied. Second, our work provides mapping engine as a library, whereas the engines in existing studies runs in an independent process. Therefore, our mapping engine can be easily embedded in other applications to access in-memory objects to be mapped. In this system paper, we describe the proposed system in detail and present the results of RML test cases execution to confirm the usefulness of the system.

Implementation of An Automatic Program Generator for Transforming CASE Data Format into CDIF Format (CASE 자료 형식으로부터 CDIF 형식으로 변환하는 프로그램 자동 생성기의 구현)

  • Bae, Sang-Hyun;Nam, Young-Kwang;Shin, Gyu-Sang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3840-3847
    • /
    • 2000
  • Electronic Industries Association has set a standard format called CDIF(CASE Data Interchange Format) for exchanging information between CASE tools from 1991. If data used on a CASE tool is represented in CDIF format, then any other CASE tools can use the data by translating CDlF format into their own format. In order to do so, each CASE vendor must provide a translator program from CDIF to its own data format or from its own data to CDIF format. In this thesis, we have implemented a source code generator for translating CASE data format into CDIF format only if they provide how data is stored. This automatic program generator generates CDIF statements using data format used in CASE tools, meta information about stored data and CDIF meta information. In the thesis, the automatic program generator has been implemented with Java and Oracle DBMS with JOBC interface in Sun O/S environment.

  • PDF

High participation in the Posyandu nutrition program improved children nutritional status

  • Anwar, Faisal;Khomsan, Ali;Sukandar, Dadang;Riyadi, Hadi;Mudjajanto, Eddy S.
    • Nutrition Research and Practice
    • /
    • v.4 no.3
    • /
    • pp.208-214
    • /
    • 2010
  • The objective of this research was to analyze nutritional status and food consumption of children participating in the Posyandu nutrition program. A total sample of 300 children under five years had been drawn. Sample was divided into two categories namely high participation and low participation in the Posyandu nutrition program. The sample was selected from two sub districts of Cianjur District, West Java. The districts were areas with a high proportion of poor people and many of them take the benefits of Posyandu nutrition program conducted by the government. The participation of children (under five years old) in visiting Posyandus was relatively good, namely, 92.4% (for the high participation group). However, for the low participation group, the number of participating children was relatively low (28.3%). The average consumption of energy for children under five years old was still below the recommended dietary allowance < 80% of RDA, whereas the protein consumption was already above the RDA. The prevalence of underweight, stunting, and wasting among children were respectively 30.0%, 43.7%, and 12.3%. The activities at Posyandus had a positive impact on the nutritional status of children under five years olds, measured in terms of weight for age (W/A) and weight for height (W/H). The more frequent the visit to Posyandus, the better the nutritional statuses would be.

Fuzzing Method for Web-Assembly Module Safety Validation (웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.275-285
    • /
    • 2019
  • Web-assemblies are a new binary standard designed to improve the performance of Web browser JavaScript. Web-assemblies are becoming a new web standard that can run at near native speed with efficient execution, concise representation, and code written in multiple languages. However, current Web-assembly vulnerability verification is limited to the Web assembly interpreter language, and vulnerability verification of Web-assembly binary itself is insufficient. Therefore, it is necessary to verify the safety of the web assembly itself. In this paper, we analyze how to operate the web assembly and verify the safety of the current web-assembly. In addition, we examine vulnerability of existing web -assembly and analyze limitations according to existing safety verification method. Finally, we introduce web-assembly API based fuzzing method to overcome limitation of web-assembly safety verification method. This verifies the effectiveness of the proposed Fuzzing by detecting crashes that could not be detected by existing safety verification tools.

Design Scheme and Analysis of Web-Based Statistics Program Types (웹 기반의 통계 프로그램의 유형 분석과 설계 방안 연구)

  • Jung, Nam-Cheol
    • Journal of Digital Contents Society
    • /
    • v.8 no.2
    • /
    • pp.149-156
    • /
    • 2007
  • In this paper, I discuss the development techniques and implemented type of DAVIS, a standalone JAVA-based application, by which statistics application can be downloaded from a web server, stored and installed to a client. Also I discuss both the server-based application and the client-based application that analyze statistics data. Considering the strengths and weaknesses of types discussed previously, I propose an advanced learning system of statistics that can execute an application in a client by client request. And data used in this system are loaded from a database server or input into a client by users.

  • PDF