• Title/Summary/Keyword: Program Codes

Search Result 371, Processing Time 0.028 seconds

Encoding of sentences appearing in Cho Ji-Hoon's poem "White night"

  • Park, In-Kwa
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.31-37
    • /
    • 2017
  • This study was initiated with the aim of suggesting a further step in the program of literary therapy by revealing the mechanism by which the body heals through the discharge of neural network codes. Sentence is encoded as neural signals in our body as it is being read. If the neural networks in the human body are activated and created, the code in which the neural networks are encoded is a code composed of sentences. That is, Sentence is a code. And if the Sentence connects to the human body again and activates the human neural networks, it can be said that Sentence is encoded. At this time, the relation of "neural network codes = Sentence codes" is established. In other words, human narrative and literary narratives are the mediums that convey the same kinds of neural network codes. Cho Ji-Hoon's Poem "White Night" draws sadness through the path of loneliness in 1strophe. Through the Sentence of Loneliness, it activates neural network codes of sadness. 2strophe for the 'pure white snow' is the encoding of the Sentence. In 3strophe, the sentence for 'sadness' is encoded. This flow causes a healing mechanism in this Poem, because the neural network codes about the loneliness, sadness, and eyes of the human body are passed to the other. Here, the other is "White Night". In the future, it is expected that more effective healing results will be obtained if a literary therapy program on the encoding of the sentence of Cho Ji-Hoon's Poem is performed in the future.

A Plagiarism Detection Technique for Source Codes Considering Data Structures (데이터 구조를 고려한 소스코드 표절 검사 기법)

  • Lee, Kihwa;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.189-196
    • /
    • 2014
  • Though the plagiarism is illegal and should be avoided, it still occurs frequently. Particularly, the plagiarism of source codes is more frequently committed than others since it is much easier to copy them because of their digital nature. To prevent code plagiarism, there have been reported a variety of studies. However, previous studies for plagiarism detection techniques on source codes do not consider the data structures although a source code consists both of data structures and algorithms. In this paper, a plagiarism detection technique for source codes considering data structures is proposed. Specifically, the data structures of two source codes are represented as sets of trees and compared with each other using Hungarian Method. To show the usefulness of this technique, an experiment has been performed on 126 source codes submitted as homework results in an object-oriented programming course. When both the data structures and the algorithms of the source codes are considered, the precision and the F-measure score are improved 22.6% and 19.3%, respectively, than those of the case where only the algorithms are considered.

A Design of An Optimizer For Conversion of Parallel Constructs of Data Parallel Language Programs (자료 병렬 언어 프로그램의 병렬 구조 변환을 위한 최적화기 설계)

  • Gu, Mi-Sun;Park, Myeong-Sun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.792-803
    • /
    • 1999
  • Most data parallel language compilers are source-to-source translators. Most Compilers of HPF which is recognized as a standard data parallel language convert a parallel program in PHF in a Fortran 77 program inserted message passing primitives. By the way, they currently generate significant amount of ineffective codes in the course of the conversion. Especially, FORALL construct is converted into several DO loops, so loop overhead of these codes is very increased. In this paper, we define and use relation distance vector to keep necessary informations. Then we evaluate and analyze execution time for the codes converted by our method and by PARADIGM method for various array sizes.

  • PDF

Development of a Real-Time Control System for Rapid Prototyping (Rapid Prototyping을 위한 실시간 제어시스템 개발에 관한 연구)

  • Kang, Moon-Ho;Jeong, Kyung-Min;Park, Yoon-Chang
    • Proceedings of the KIEE Conference
    • /
    • 1999.07b
    • /
    • pp.927-929
    • /
    • 1999
  • In this research a real-time control system was developed without program codings during control system designing procedures. On the Simulink window control system is designed in the form of block diagrams, program codes are produced automatically with the real time workshop package, then C-compiler compiles the program codes. With this automatic real-time program producing mechanism rapid prototyping is realized. To show effectiveness of the proposed system designing scheme a DSP-based DC motor speed control system was constructed and PI and Fuzzy control methods were implemented.

  • PDF

Development of a Real Time Control System Using Simulink/RTW (Simulink/RTW를 이용한 실시간 제어시스템 개발)

  • Kang, Moon-Ho;Jeong, Dae-Yeon
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2392-2394
    • /
    • 2000
  • In this research a real time control system was developed without program codings during control system designing procedures. On the Simulink window control system is designed in the form of block diagrams, program codes are produced automatically with the real time workshop package(RTW), then c compiler compiles the program codes. With this automatic real time program producing mechanism rapid prototyping is realized. To show effectiveness of the proposed designing scheme a DSP-based induction motor vector control system was constructed and implemented

  • PDF

RELEVANT CODES AND REGULATIONS: EFFECTS ON THE DESIGN OF INDUSTRIAL CONSTRUCTION

  • Ahmed Abdallah
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.409-416
    • /
    • 2005
  • This paper presents the possible effects and restrictions that may arise in the field of industrial construction due to compliance with relevant construction codes and regulations, as well as the ways they can be favorably handled in the design of industrial buildings. Designs should be based primarily on human design factors, while considering the human as the centre of the work environment. Design parameters should be described as a function of both the physical and psychosocial attributes of a person as well as the technical and economical aspects on the design of industrial construction. This paper is an examination of the connection that exists between design law (codes and regulations) and industrial construction. The relevant construction laws and regulations are described, including standards and codes of practice that designing and supervising engineers are obliged to observe. Possible solutions and consequences of development in the production, constructional, and ergonomic field of design are also discussed.

  • PDF

Accelerating Numerical Analysis of Reynolds Equation Using Graphic Processing Units (그래픽처리장치를 이용한 레이놀즈 방정식의 수치 해석 가속화)

  • Myung, Hun-Joo;Kang, Ji-Hoon;Oh, Kwang-Jin
    • Tribology and Lubricants
    • /
    • v.28 no.4
    • /
    • pp.160-166
    • /
    • 2012
  • This paper presents a Reynolds equation solver for hydrostatic gas bearings, implemented to run on graphics processing units (GPUs). The original analysis code for the central processing unit (CPU) was modified for the GPU by using the compute unified device architecture (CUDA). The red-black Gauss-Seidel (RBGS) algorithm was employed instead of the original Gauss-Seidel algorithm for the iterative pressure solver, because the latter has data dependency between neighboring nodes. The implemented GPU program was tested on the nVidia GTX580 system and compared to the original CPU program on the AMD Llano system. In the iterative pressure calculation, the implemented GPU program showed 20-100 times faster performance than the original CPU codes. Comparison of the wall-clock times including all of pre/post processing codes showed that the GPU codes still delivered 4-12 times faster performance than the CPU code for our target problem.

A Development of Color Prototypes Based on Digital Color Image Analysis (한국 디지털 전통색채이미지를 이용한 배색유형 개발)

  • Lee, Hyun-Soo;Kim, Joon-Jl
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.6
    • /
    • pp.240-249
    • /
    • 2007
  • The purpose of this paper is to produce color harmony code based on color harmony prototype in terms of environmental color design. This paper proposes ways of categorizing more accurate color harmony prototype through digital image processing by the computer program called the Color Syntax. The method of analysis adopted in this paper is pixel based color image processing. The study suggests color harmony prototype which are categorized by a color harmony angles. These angles represented internal relations between colors. This study describes development processes of color harmony prototype which is a basis for creating color harmony codes. Development processes of color harmony schema consists of color analysis, color codes generation and color selection. Also, how to analyze color images and to chose suitable harmony color codes among various codes are main research issues. As a final result, 109 color harmony codes have been obtained. These code numbers are suggested through rotating 2 color pairs in a 360-degree arc in the same color harmony angles, the codes which is applicable to the color harmony schema previously developed. This color harmony codes will produce better color environment in a sense that it will help designers to maximally reduce their time consumption, and the results of their designs will also be related to the use of proper color for regional environments.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

Program Slicing for Binary code Deobfuscation (역난독화를 위한 바이너리 프로그램 슬라이싱)

  • Mok, Seong-Kyun;Jeon, Hyeon-gu;Cho, Eun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.59-66
    • /
    • 2017
  • Hackers have obfuscated their malware to avoid being analyzed. Recently, obfuscation tools translate original codes into bytecodes to use virtualized-obfuscation, so that bytecodes are executed by virtual machines. In such cases, malware analysts fail to know about the malware before execution of the codes. We found that program slicing is one of promising program analysis techniques to solve this problem. The main concepts of program slice include slicing criteria given by analysts and sliced statements according to the slicing criteria. This paper proposes a deobfuscation method based on program slicing technique.