• Title/Summary/Keyword: Open Source SW

Search Result 40, Processing Time 0.019 seconds

Convergence CCTV camera embedded with Deep Learning SW technology (딥러닝 SW 기술을 이용한 임베디드형 융합 CCTV 카메라)

  • Son, Kyong-Sik;Kim, Jong-Won;Lim, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.103-113
    • /
    • 2019
  • License plate recognition camera is dedicated device designed for acquiring images of the target vehicle for recognizing letters and numbers in a license plate. Mostly, it is used as a part of the system combined with server and image analysis module rather than as a single use. However, building a system for vehicle license plate recognition is costly because it is required to construct a facility with a server providing the management and analysis of the captured images and an image analysis module providing the extraction of numbers and characters and recognition of the vehicle's plate. In this study, we would like to develop an embedded type convergent camera (Edge Base) which can expand the function of the camera to not only the license plate recognition but also the security CCTV function together and to perform two functions within the camera. This embedded type convergence camera equipped with a high resolution 4K IP camera for clear image acquisition and fast data transmission extracted license plate area by applying YOLO, a deep learning software for multi object recognition based on open source neural network algorithm and detected number and characters of the plate and verified the detection accuracy and recognition accuracy and confirmed that this camera can perform CCTV security function and vehicle number plate recognition function successfully.

Plug-in Diverse Parsers Within Code Visualization System with Redefining the Coupling and Cohesion in the Object-Oriented Paradigm (객체지향 관점의 결합도 & 응집도 재정의와 코드 가시화 시스템내 파서 플러그인화 구현)

  • Lee, Jin Hyub;Park, Ji Hun;Byun, Eun Young;Son, Hyun Seung;Seo, Chae Yun;Kim, R. Young Chul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.229-234
    • /
    • 2017
  • Because of the invisible nature of software and the bad coding habits (bad smell) of the existing developers, there are many redundant codes and unnecessary codes, which increases the complexity and makes it difficult to upgrade software. Therefore, it is required a code visualization so that developers can easily and automatically identify the complexity of the source code. To do this, it is necessary to construct SW visualization tool based on open source software and redefine the coupling and cohesion according to the object oriented viewpoint. Specially to identify a bad smell code pattern, we suggest how to plug-in diverse parsers within our tool. In this paper, through redefining coupling and cohesion from an object oriented perspective, we will extract bad smell code patterns within source code from inputting any pattern into the tool.

Selfie-stick Analysis through Ansys and New Design Proposal (Ansys를 이용한 셀카봉 해석 및 새로운 설계 제안)

  • Lee, JungHyeok;Jang, Hoik
    • Proceeding of EDISON Challenge
    • /
    • 2015.03a
    • /
    • pp.467-475
    • /
    • 2015
  • In this paper, the FREECAD 0.14 was used for modeling conventional Selfie-stick and the newly proposed Selfie-stick design. The purpose of this paper is to demonstrate the utility of FREECAD 0.14, which is open-source and still in development for further use. After modeling the conventional Selfie-stick, CatiyaV5 was used to assemble FREECAD 0.14 drawn elements. Main advance in newly designed Selfie-stick is the portability. To improve portability of the Selfie-stick, folding mechanism was adopted from folding LED stands. Several mechanisms were adopted to improve user convenience as well. Ansys 14.0 was used for structural analyses of conventional Selfie-stick model and the newly designed model as well. Several simplifications for the models were needed to process the analyses. When analyzing the newly designed model various materials were used one by one to find compatible composition. Using Aluminum alloys for the stick and the hand grip was found to be compatible. FREECAD was useful for suggestion of the newly designed model but not so much useful to design an actual product. Various efforts would make FREECAD the best choice for industrial use for free as it is named.

  • PDF

Quality Management Model for Process Performance Level and Development Technology (프로세스 이행 수준과 개발 기술 품질 관리 모델)

  • Park, J.H.;Park, Y.S.;Jung, H.T.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.105-115
    • /
    • 2017
  • This paper describes a project - based quality management model that identifies development technologies and codes while at the same time verifying the ability to implement processes that are essential in R & D projects. In order to verify the process implemented in the R & D project implementation, there are review, checking points, and evaluating methods the process performance levels for five processes such as defining requirements which is the beginning stage of system development, testing process which is the completion stage of system development, and project management and peer review process for project management and support in the proposed project-based quality management model. For development technology and code validation, the model included the documented test cases for each requirement by the developer in the requirements definition stage, debugging and testing in the design and implementation stages, static analysis and open source licence verification procedure, and system environment. After applying the model in SW development R&D project for evaluating the process performance, and verifying the development technology and the code, the developers responded that the improvement in the development technique and the code, and upgrade of process performance level for project are more than 10%.

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

A Method for Tool-Chain-driven Quality Control based on Visualization for Small and Medium Scale Software Development Projects (중소규모 SW개발 프로젝트를 위한 시각화 기반의 Tool-Chain 품질관리 방법 제안)

  • Kim, Jung-Bo;Jung, Jin-Young;Kim, Jung-In
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.546-556
    • /
    • 2015
  • Since the concept of software engineering was first used in 1968 by NATO Science Committee, a lot of research work and improvements have been made on software development methodology and software quality control, but they still fall short of ensuring successful development of small and medium scale software systems. Under these circumstances, Center for Software Engineering (CSE) at National IT Industry Promotion Agency(NIPA) has been conducting studies on quality control methodologies of software visualization well-suited for small and medium scale software systems, and also working on the systemization and quantification of software quality control. In this paper, we attempt to scope on the software development management of domestic and foreign small and medium-sized enterprises that are lying in the blind spot, compared to large enterprises with well-organized software development systems. In particular, based on software visualization that CSE is pursuing for small and medium-sized developers, we propose a practical quality control methodology well-suited for small and medium scale projects, and a low-cost quality control management tool by combining open-source quality control tools. Our proposal is expected to induce developers' mind change in SI-specialized small and medium-sized software enterprises, increase their profits and improve customer satisfaction through project quality control.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

Design and Implementation of User Agent for Internet Telephony Services based on SW (SIP 기반 인터넷 전화 서비스를 위한 사용자 에이전트의 설계 및 구현)

  • Huh Mi Young;Han Jaechon;Hyun Wook;Park Sun Ok;Kang Shin Gak;Kim Dae Young
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.350-358
    • /
    • 2005
  • Recently, VoIP technology is being accepted as are the most promising Internet telephony service, due to the substitution effect of traditional telephony service. Two standards, i.e, . H.323 and SIP. have emerged for signaling and control for Intemet telephony, of which SIP provides far lower complexity and rich extensibility. It is important to secure components of SIP in order to develop various services. Generally, open source codes provide basic functions of SIP as well as complicated structure, but are difficult to extend. In this thesis, we focused on offering interface mechanism between application and SIP User Agent to easily extend for various VoIP services. This thesis describes what function is needed for SIP User Agent, how to define the internal data structure, and how to define the internal processing procedure. The check iist derived through participating the interoperability event for stabilized SIP User Agent is also suggested.

Improving development environment for embedded software (내장 소프트웨어를 위한 개발 환경의 개선)

  • AHN, ILSOO
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • RFID systems have been widely used in various fields such as logistics, distribution, food, security, traffic and others. A RFID middleware, one of the key components of the RFID system, perform an important role in many functions such as filtering, grouping, reporting tag data according to given user specifications and so on. However, manual test data generation is very hard because the inputs of the RFID middleware are generated according to the RFID middleware standards and complex encoding rules. To solve this problem, in this paper, we propose a black box test technique based on RFID middleware standards. Firstly, we define ten types of input conversion rules to generate new test data from existing test data based on the standard specifications. And then, using these input conversion rules, we generate various additional test data automatically. To validate the effectiveness of generated test data, we measure coverage of generated test data on actual RFID middleware. The results show that our test data achieve 78% statement coverage and 58% branch coverage in the classes of filtering and grouping, 79% statement coverage and 64% branch coverage in the classes of reporting.

  • PDF

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.