• Title/Summary/Keyword: Share of Code

Search Result 87, Processing Time 0.031 seconds

Construction and Service of a Web-based Simulation software management system for the Computational Science and Engineering (계산과학공학 분야를 위한 웹 기반 시뮬레이션 소프트웨어 관리 시스템 구축 및 서비스)

  • Jeon, Inho;Kwon, Yejin;Ma, Jin;Lee, Sik;Cho, Kum Won;Seo, Jerry
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.99-108
    • /
    • 2017
  • Open Science is evolving not only to share research results, but also to open the research process. We are developing the EDISON platform for the spread of open science in computational science and engineering. The EDISON platform provides online simulation services developed by computational science and engineering researchers. It also provides an environment for sharing source code, data, and related research publications. An effective simulation software registration management system is required for successful service on the EDISON platform. In this paper, we proposes a simulation software management system to provide online simulation service through EDISON platform. The proposed system allows the developer to register the simulation software on the EDISON platform without administrator intervention and effectively build a web-based simulation environment.

Writing Discourse Study in a Group of Professionals: Focusing on YouTube (전문가 집단의 글쓰기 담론 연구: 유튜브(YouTube)를 중심으로)

  • Cho, Young-kwon
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.331-341
    • /
    • 2021
  • This paper analyzed the discourse on writing by experts such as writers, novelists, and writing instructors appearing in YouTube videos through narrative analysis methods. According to the analysis, the five key topics comprising writing discourse were: Active reading for writing, Nonstop writing and writing more, Rewriting 10 times more than talent, Writing in spoken language in the era of one-person media, Sharing feedback on social media. The writing discourse of professionals illustrated the change in writing in the age of social media. First, it was confirmed that the writing culture shifted from reading to writing and rewriting. Second, writing in the social media era naturally showed that the spoken language of writing became the dominant code. Third, it has been confirmed that writing in the social media era is social writing of cooperation and sharing that openly share feedback. These findings will have significant implications for future research on media and writing

Design of Web-based Parallel Computing Environment Using Aglet (Aglet을 이용한 웹 기반 병렬컴퓨팅 환경설계)

  • 김윤호
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.2
    • /
    • pp.209-216
    • /
    • 2002
  • World Wide Web has potential possibility of infrastructure for parallel computing environment connecting massive computing resources, not just platform to provide and share information via browser. The approach of Web-based parallel computing has many advantages of the ease of accessibility, scalability, cost-effectiveness, and utilization of existing networks. Applet has the possibility of decomposing the independent/parallel task, moving over network, and executing in computers connected in Web, but it lacks in the flexibility due to strict security semantic model. Therefore, in this paper, Web-based parallel computing environment using mobile agent, Aglet (Agile applet) was designed and possible implementation technologies and architecture were analyzed. And simple simulation and analysis was done compared with applet-based approach.

  • PDF

Efficient Detection of Android Mutant Malwares Using the DEX file (DEX 파일을 이용한 효율적인 안드로이드 변종 악성코드 탐지 기술)

  • Park, Dong-Hyeok;Myeong, Eui-Jung;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.895-902
    • /
    • 2016
  • Smart phone distribution rate has been rising and it's security threat also has been rising. Especially Android smart phone reaches nearly 85% of domestic share. Since repackaging on android smart phone is relatively easy, the number of re-packaged malwares has shown steady increase. While many detection techniques have been proposed in order to prevent malwares, it is not easy to detect re-packaged malwares by static analysis and it is also difficult to operate dynamic analysis in android smart phone. Static analysis proposed in this paper features code reuse of repackaged malwares. We extracted DEX files from android applications and performed static analysis using class names and method names. This process doesn't not include reverse engineering, so it is possible to detect malwares efficiently.

KISTI-ML Platform: A Community-based Rapid AI Model Development Tool for Scientific Data (KISTI-ML 플랫폼: 과학기술 데이터를 위한 커뮤니티 기반 AI 모델 개발 도구)

  • Lee, Jeongcheol;Ahn, Sunil
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.73-84
    • /
    • 2019
  • Machine learning as a service, the so-called MLaaS, has recently attracted much attention in almost all industries and research groups. The main reason for this is that you do not need network servers, storage, or even data scientists, except for the data itself, to build a productive service model. However, machine learning is often very difficult for most developers, especially in traditional science due to the lack of well-structured big data for scientific data. For experiment or application researchers, the results of an experiment are rarely shared with other researchers, so creating big data in specific research areas is also a big challenge. In this paper, we introduce the KISTI-ML platform, a community-based rapid AI model development for scientific data. It is a place where machine learning beginners use their own data to automatically generate code by providing a user-friendly online development environment. Users can share datasets and their Jupyter interactive notebooks among authorized community members, including know-how such as data preprocessing to extract features, hidden network design, and other engineering techniques.

A Configuration Change Control Procedure for Software Maintenance (소프트웨어 유지보수를 위한 형상변경통제절차)

  • Choe, Gwang-Jun;Kim, Gi-Bong;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2745-2755
    • /
    • 1997
  • Many large-scale enterprises have developed software systems to build management information system for their business. However, it is hard to maintain share ability of data, compatibility of operation methedology, and interoperability among subsystems when the development project progresses since each distributed team prepares a development plan for its subsystem and must have poor communication problem among those teams. We must apply software configuration management to the whole life cycle of the software system in order to solve those Problems. We need a model and a repository in order to execute configuration management on configuration products like document, data, and source code which are generated through the life cycle of software development. In this paper, we suggest a model for configuration change control where cross- referencing among life cycle Phases and data-sharing are highlighted, and define ER model to use IRDS(Information Resource Dictionary system) and IRD schemas.

  • PDF

Detecting Spectre Malware Binary through Function Level N-gram Comparison (함수 단위 N-gram 비교를 통한 Spectre 공격 바이너리 식별 방법)

  • Kim, Moon-Sun;Yang, Hee-Dong;Kim, Kwang-Jun;Lee, Man-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1043-1052
    • /
    • 2020
  • Signature-based malicious code detection methods share a common limitation; it is very hard to detect modified malicious codes or new malware utilizing zero-day vulnerabilities. To overcome this limitation, many studies are actively carried out to classify malicious codes using N-gram. Although they can detect malicious codes with high accuracy, it is difficult to identify malicious codes that uses very short codes such as Spectre. We propose a function level N-gram comparison algorithm to effectively identify the Spectre binary. To test the validity of this algorithm, we built N-gram data sets from 165 normal binaries and 25 malignant binaries. When we used Random Forest models, the model performance experiments identified Spectre malicious functions with 99.99% accuracy and its f1-score was 92%.

A Study on the Medium Designator In Non-book Materials (비도서자료의 매체표시에 관한 연구)

  • Nam Tae Woo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.15
    • /
    • pp.119-140
    • /
    • 1988
  • This paper is the study on the Medium Designator in Non-book materials. Main contents of this study were as follows; 1. The medium designator serves to indicate the class of material to which an item belongs. This is used to give an 'early warning' ;to the catalogue user. 2. This medium designator may be further divided into two elements ; a general material designation (GMD), for example video-recording, and a specific material designation (SMD), for example, videodisc. 3. GMD: In cataloging, a term indicating the broad class of material to which a bibliographic item belongs, such as 'motion picture', and SMD : In descriptive cataloging, a term indicating the special class of material (usually the class of physical object) to which a biblographic item belongs, such as videocassette. 4. Locating the medium designator after the title proper was not prescribed until ISBD(G) and AACR2. In pre-ISBD(G) codes, the ,early, warning type of medium designator was placed after all title information. But in AACR2, the medium designator is placed after the title proper, but before parellel title and other title information. 5. In Terminology, Two separate lists of designations are given in AACR2, l.1C1, one for British and one for North American use. The British list contains fewer terms, and uses generic categories to group together some of the North American list. 6. The problem of where to place the medium designator might be circumvented by using some kind of early alerting device other than a formal element of biblliographic description. Various alternatives have been suggested. A more popular device is the provision of symbols or 'media code' which are part of the call number and indicate the porticular medium type. 'Colour-coding' the use of used by some libraries but is now longly discouraged. 7. According to Frost. The medium designatorhas been generally reeognized as serving three functions; 1) as a statement of the nature or basic format of the item cataloged and thus as a meant of informing the user as to the type of material at hand; 2) as a description of the physical charaetistics of medium and as a means of alerting the user to equipment needed to make use of the item. 3) as a device to distinguish different physical formats which share the same title. 8. AACR2 raises some problems which decision makers have neet had to face preriously It provides a GMD for every item in the collection including books and it makes the application of any or all GMD's optional.

  • PDF

Evaluating Choice Attributes of Korean Ginseng Chicken Soup as a Home Meal Replacement (HMR) Product Using Conjoint Analysis: A Case Study of Singapore Market (컨조인트 분석을 이용한 삼계탕 간편가정식의 선택속성 분석: 싱가포르 시장을 중심으로)

  • Kim, Eun-Mi;Ahn, Jee-Ahe;Lee, Ho-Jin;Lee, Min-A
    • Korean journal of food and cookery science
    • /
    • v.32 no.5
    • /
    • pp.609-618
    • /
    • 2016
  • Purpose: The purpose of this study was to analyze the attributes considered important by Singaporeans in the selection of Korean ginseng chicken soup as an HMR product using conjoint analysis techniques. Methods: A total of 400 questionnaires were distributed to local consumers in April 2012, of which 324 were completed (81.0%). Statistical analyses of data were performed using SPSS/Windows 18.0 for descriptive statistics and conjoint analysis. Results: Analysis of the attributes and levels of Korean ginseng chicken soup as an HMR product for people who lived in Singapore showed the relative importance of each attribute as follows: packing (32.4%), chicken (32.1%), glutinous rice (13.8%), soup (11.6%), and ginseng (10.0%). Results showed that Singaporean consumers preferred code J's Korean ginseng chicken soups as an HMR product, which consisted of half a chicken, glutinous rice, a whole ginseng root in a soy sauce-based soup, and a partially transparent package. The most preferred Korean ginseng chicken soup gained 50.4% potential market share from choice simulation when compared with the second preferred one. Conclusion: This study has significance in that such a practical research contributes to product development of a specific Korean dish for foreign consumers. In addition, the results of this study provide useful information for the food industry for global expansion and commercialization of Korean food, thereby providing an important foundation for future development of various Korean foods as HMR products.

A Study on the Extracting ICT Development Trend and Promising Technologies by Utilizing Patent Information in Gyeongbuk Province (특허정보를 활용한 경북지역 ICT 개발동향 분석 및 유망기술 도출에 관한 연구)

  • Han, Jang-Hyup;Kim, Chae-Bogk
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.1
    • /
    • pp.236-264
    • /
    • 2018
  • This study investigates the trend of the patent applications and the future direction of ICT in Gyeongbuk Province by employing patent portfolio analysis, one of the methodology of map analyses for industry-related ICT issues. Thus, this study aims to investigate the ICT development trend based on ICT patent information in Gyeongbuk Province. The promising technologies in ICT industry are extracted by applying patent portfolio analysis, one of the patent map analyses. The analysis results can be applied to the establishment of research and development strategies. This study extracts ICT trend by applying International Patent Classification to the patents registered in Gyeongbuk. For promising technologies, this study analyzed the patents based on the ICT Classification Code. Based on the analysis results, this study presents the trend of patent application, technology share, patent activity status, the trend of patent application by each technology according to ICT classification, the growth stages of ICT market, registration parties for patents, joint researches of research parties, and primary parties of patent applications. After drawing promising technologies, this study provides the future progress direction of ICT industry in Gyeongbuk Province. The research results also can be applied to securing technology competence and developing strategy of technology policy.