• Title/Summary/Keyword: Software Tools

Search Result 1,231, Processing Time 0.038 seconds

A UML Profile for USN Application Development based on Software Product Line Approach (프로덕트라인 기반의 USN 응용개발을 위한 UML 프로파일)

  • Lee, Woo-Jin;Choi, Il-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4234-4243
    • /
    • 2012
  • USN(Ubiquitous Sensor Network) application S/W has a complex characteristic that it controls various kind of sensor nodes organically based on the core modules of various target operating systems. Currently, various researches for efficient S/W development are being performed in USN application field. In order to increase S/W productivity, the method such as product line development approach to specify core common functions of applications according to the domain and develop applications with the core common functions and variant functions selected according to the workflow of applications is efficient. To apply this approach to the USN domain, characteristics of USN application S/W and product line development should be specified with one consistent view. However, it is difficult to efficiently specify the characteristics using general UML notations. In order to solve the problem, this paper proposes a method to effectively specify the characteristics of USN applications and product line development using UML profile which is the extension mechanism of UML. The proposed UML profile for produce line based USN application development enables developers to effectively develop product line based USN applications using existing UML and UML support tools without new design methods or tools which are specified for USN or product line development.

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

Dependency Label based Causing Inconsistency Axiom Detection for Ontology Debugging (온톨로지 디버깅을 위한 종속 부호 기반 비논리적 공리 탐지)

  • Kim, Je-Min;Park, Young-Tack
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.764-773
    • /
    • 2008
  • The web ontology language(OWL) has become a W3C recommendation to publish and share ontologies on the semantic web. In order to check the satisfiablity of concepts in OWL ontology, OWL reasoners have been introduced. But most reasoners simply report check results without providing a justification for any arbitrary entailment of unsatisfiable concept in OWL ontologies. In this paper, we propose dependency label based causing inconsistency axiom (CIA) detection for debugging unsatisfiable concepts in ontology. CIA is a set of axioms to occur unsatisfiable concepts. In order to detect CIA, we need to find axiom to cause inconsistency in ontology. If precise CIA is gave to ontology building tools, these ontology tools display CIA to debug unsatisfiable concepts as suitable presentation format. Our work focuses on two key aspects. First, when a inconsistency ontology is given, it detect axioms to occur unsatisfiable and identify the root of them. Second, when particular unsatisfiable concepts in an ontology are detected, it extracts them and presents to ontology designers. Therefore we introduce a tableau-based decision procedure and propose an improved method which is dependency label based causing inconsistency axiom detection. Our results are applicable to the very expressive logic SHOIN that is the basis of the Web Ontology Language.

A study on the process of mapping data and conversion software using PC-clustering (PC-clustering을 이용한 매핑자료처리 및 변환소프트웨어에 관한 연구)

  • WhanBo, Taeg-Keun;Lee, Byung-Wook;Park, Hong-Gi
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.7 no.2 s.14
    • /
    • pp.123-132
    • /
    • 1999
  • With the rapid increases of the amount of data and computing, the parallelization of the computing algorithm becomes necessary more than ever. However the parallelization had been conducted mostly in a super-computer until the rod 1990s, it was not for the general users due to the high price, the complexity of usage, and etc. A new concept for the parallel processing has been emerged in the form of K-clustering form the late 1990s, it becomes an excellent alternative for the applications need high computer power with a relative low cost although the installation and the usage are still difficult to the general users. The mapping algorithms (cut, join, resizing, warping, conversion from raster to vector and vice versa, etc) in GIS are well suited for the parallelization due to the characteristics of the data structure. If those algorithms are manipulated using PC-clustering, the result will be satisfiable in terms of cost and performance since they are processed in real flu with a low cos4 In this paper the tools and the libraries for the parallel processing and PC-clustering we introduced and how those tools and libraries are applied to mapping algorithms in GIS are showed. Parallel programs are developed for the mapping algorithms and the result of the experiments shows that the performance in most algorithms increases almost linearly according to the number of node.

  • PDF

Marketing Organization's Regulatory Focus and NPD Creativity: The Moderating Role of Creativity Enhancement Tools (마케팅 부서의 조절초점과 신제품 개발 창의성: 창의성 증진수단의 조절효과)

  • Kang, Seong-Ho;Son, Jung-Min
    • Journal of Distribution Science
    • /
    • v.14 no.7
    • /
    • pp.71-81
    • /
    • 2016
  • Purpose - Because creativity, which is an intangible resource embedded within the company, can offer a competitive advantage, most companies have an interest in promoting creativity among their employees and division(e.g., marketing organization). Creativity renders a sustainable competitive advantage to a firm because it is a strategic resource that is valuable, flexible, rare, and imperfectly imitable or substitutable. Although most companies broadly recognize the importance of creativity, the methods for developing creativity remain elusive. Therefore, the present study investigates how to structure incentives to motivate employees to be more creative and how to develop tools to facilitate creativity. In detail, the present study aimed to examine the relationship between the regulatory focus of marketing organizations(e.g., promotion focus vs prevention focus) and creativity of marketing organizations. In addition, the present study set out to examine the moderating role of interaction of financial reward and creative training in addition to investigating the direct relationship between creativity and regulatory focus in New Product Development(NPD) context. Research design, data, and methodology - The data used to test the hypotheses are drawn from a survey of full time NPD project members(including project manager, designer, engineer, and marketer). The present study utilized data obtained mainly from a database compiled by the Korea Investors Service-Financial Analysis System which provides comprehensive corporate and financial information on firms listed on the Korea Stock Exchange. A study population comprising 1,000 South Korean firms was obtained from this database. We selected 864 firms from the database, and the firms have experiences of new product development project. We collected a total of 162 responses, for a 18.8% response rate. After we excluded 14 questionnaire because of incomplete responses, a total of 148 questionnaire remained(final response rate: 17.1%). Working with a sample of 148 responses in South Korea, hierarchical moderated regression is employed to test research hypotheses(

    The relationship between promotion focus and creativity of marketing organization,

    The relationship between prevention focus and creativity of marketing organization,

    The moderating effect of joint influences(interaction between financial rewards and creativity training) on the relationship between promotion focus creativity of marketing organization,

    The moderating effect of joint influences(interaction between financial rewards and creativity training) on the relationship between prevention focus creativity of marketing organization). SPSS 18.0 and AMOS software were used in the data analysis. Results - The empirical study confirmed that promotion focus of marketing organization is positively related to creativity of marketing organization. Also, prevention focus of marketing organization is positively affected to creativity of marketing organization. In addition, the interaction between financial rewards and creativity training moderated the relationship between regularity focus(e.g.), promotion focus vs prevention focus) and creativity of marketing organization. These results suggest that managers can improve the performances of their creative efforts by providing the use of financial rewards and creativity training in combination. Conclusion - Based on results of this study that examine the effects of regulatory focused creative efforts on creativity of marketing organization, promotion focus is helpful with marketing organizations to enhance their service innovation and performance. Prevention focused organization should allow monetary rewards and creativity training to increase their creativity for innovation of new products.

Trends of Semantic Web Services and Technologies : Focusing on the Business Support (비즈니스를 지원하는 시멘틱 웹서비스와 기술의 동향)

  • Kim, Jin-Sung;Kwon, Soon-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.113-130
    • /
    • 2010
  • During the decades, considerable human interventions to comprehend the web information were increased continually. The successful expansion of the web services made it more complex and required more contributions of the users. Many researchers have tried to improve the comprehension ability of computers in supporting an intelligent web service. One reasonable approach is enriching the information with machine understandable semantics. They applied ontology design, intelligent reasoning and other logical representation schemes to design an infrastructure of the semantic web. For the features, the semantic web is considered as an intelligent access to understanding, transforming, storing, retrieving, and processing the information gathered from heterogeneous, distributed web resources. The goal of this study is firstly to explore the problems that restrict the applications of web services and the basic concepts, languages, and tools of the semantic web. Then we highlight some of the researches, solutions, and projects that have attempted to combine the semantic web and business support, and find out the pros and cons of the approaches. Through the study, we were able to know that the semantic web technology is trying to offer a new and higher level of web service to the online users. The services are overcoming the limitations of traditional web technologies/services. In traditional web services, too much human interventions were needed to seek and interpret the information. The semantic web service, however, is based on machine-understandable semantics and knowledge representation. Therefore, most of information processing activities will be executed by computers. The main elements required to develop a semantic web-based business support are business logics, ontologies, ontology languages, intelligent agents, applications, and etc. In using/managing the infrastructure of the semantic web services, software developers, service consumers, and service providers are the main representatives. Some researchers integrated those technologies, languages, tools, mechanisms, and applications into a semantic web services framework. Therefore, future directions of the semantic web-based business support should be start over from the infrastructure.

A Study on the Architecture Modeling of Information System using Simulation (시뮬레이션을 이용한 정보시스템 아키텍쳐 모델링에 관한 연구)

  • Park, Sang-Kook;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.455-458
    • /
    • 2013
  • The conventional design of the information system architecture based on the personal experience of information systems has been acted as a limit in progress utilizing appropriate resource allocation and performance improvements. Architecture design depending on personal experience makes differences in variance of a designer's experience, intellectual level in related tasks and surroundings, and architecture quality according to individual's propensity. After all these problems cause a waste of expensive hardware resources. At working place, post-monitoring tools are diversely developed and are running to find the bottleneck and the process problems in the information operation. However, there are no simulation tools or models that are used for expecting and counteracting the problems at early period of designing architecture. To solve these problems we will first develop a simulation model for designing information system architecture in a pilot form, and will verify validity. If an error rate is found in the permissible range, then it can be said that the simulation reflects the characteristic of information system architecture. After the model is developed in a level that can be used in various ways, more accurate performance computation will be able to do, getting out of the old way relying on calculations, and prevent the existence of idle resources and expense waste that comes from the wrong design of architecture.

  • PDF

A Web-based Simulation Environment based on the Client/Server Architecture for Distance Education: SimDraw (원격교육을 위한 클라이언트/서버구조의 웹 기반 시뮬레이션 환경 : SimDraw)

  • 서현곤;사공봉;김기형
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1080-1091
    • /
    • 2003
  • Recently, the distance education has been rapidly proliferated with the rapid growth of the Internet and high speed networks. There has been relatively much research with regard to online lecture (teaching and studying) tools for the distance education, compared to the virtual laboratory tools (for self-study and experiments). In this paper, we design and implement a web-based simulation tool, named as SimDraw, for the virtual laboratory in the distance education. To apply the web-based simulation technology into the distance education, some requirements should be met; firstly, the user interface of the simulation should be very easy for students. Secondly, the simulation should be very portable to be run on various computer systems of remote students. Finally, the simulation program on remote computers should be very thin so that students can easily install the program onto their computers. To meet these requirements, SimDraw adopts the client/server architecture; the client program contains only model development and animation functions so that no installation of a client program onto student's system is required, and it can be implemented by a Java applet in Web browsers. The server program supports client programs by offering the functions such as remote compiling, model storing, library management, and user management. For the evaluation of SimDraw, we show the simulation process using the example experimentation of the RIP(Routing Information Protocol) Internet routing protocol.

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

Full mouth rehabilitation using various digital tools in a patient with collapsed bite due to severe attrition (심한 마모로 인하여 교합이 붕괴된 환자의 다양한 디지털 도구를 이용한 완전 구강회복증례)

  • Moon, Sooin;Lee, Younghoo;Hong, Seoung-Jin;Noh, Kwantae;Pae, Ahran;Kim, Hyeong-Seob;Kwon, Kung-Rock;Paek, Janghyun
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.4
    • /
    • pp.320-329
    • /
    • 2022
  • Physiological wear of occlusal surface is inevitable throughout the lifetime, and considered to be normal. Pathologic wear, however, may cause fatal damage to the occlusal surface and destroy esthetics and proper anterior guidance. In such cases, rehabilitation of occlusal wear should be followed by thorough evaluation and diagnosis. In this present case, severe occlusal wear was found in the labial surfaces of mandibular anterior teeth and palatal surfaces of maxillary anterior teeth. Occlusal vertical dimension was evaluated and decided to be regained due to insufficient amount of restorative space. After determining new occlusal vertical dimension, diagnostic wax-up is usually performed to continue prosthodontic treatment. In this case with collapsed occlusion and loss of occlusal vertical dimension, conventional diagnostic wax-up was replaced with various digital devices. Diagnostic wax-up was digitally performed in the software and provisional prosthesis was fabricated with digital tools. With verification with provisional prosthesis, the entire dentition was rehabilitated with newly set occlusal vertical dimension and proper anterior guidance.