• Title/Summary/Keyword: Software license

Search Result 80, Processing Time 0.021 seconds

Design and Implementation of Multi-mode Mobile Device for supporting License Shared Access (면허기반 주파수 공동 사용을 위한 멀티모드 단말기 설계 및 구현)

  • Jin, Yong;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.81-87
    • /
    • 2016
  • Recently, as the heterogeneous network (HetNet) has been deployed widely to support various kinds of Radio Access Networks(RANs) with a combination of Macro, Pico, and/or Femto cells, research and standardization efforts have been very active regarding the concept of Licensed Shared Access (LSA) for supporting spectrum sharing. In order for a mobile device to efficiently support the spectrum sharing, the mobile device shall be reconfigurable, meaning that its radio application code has to be adaptively changed in accordance with the hopping of desired spectral band. Especially, Working Group 2 (WG2) of Technical Committee (TC) Reconfigurable Radio System (RRS) of European Telecommunications Standards Institute (ETSI) has been a main driving force for developing standard architecture for Multi-mode Mobile Device (MD) that can be applied to the LSA system. In this paper, we introduce the Multi-mode MD architecture for supporting LSA-based spectrum sharing. An implementation of a test-bed of Multi-mode MD is presented in order to verify the feasibility of the standard MD architecture for the purpose of LSA-based spectrum sharing through various experimental tests.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Application and Analysis of the Paradigm of Software Safety Assurance for a Digital Reactor Protection System in Nuclear Power Plants (원전 디지털 원자로보호계통 소프트웨어 안전보증 패러다임 적용 및 분석)

  • Kwon, Kee-Choon;Lee, Jang-Soo;Jee, Eunkyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.335-342
    • /
    • 2017
  • In the verification and validation procedures regarding the safety-critical software of nuclear power plants for the attainment of the requisite license from the regulatory body, it is difficult to judge the safety and dependability of the development, implementation, and validation activities through a simple reading and review of the documentation. Therefore, these activities, especially safety assurance activities, require systematic evaluation techniques to determine that software faults are acceptable level. In this study, a safety case methodology is applied in an assessment of the level and depth of the results of the development and validation of a manufacturer in its targeting of the bistable processor of a digital reactor protection system, and the evaluation results are analyzed. This study confirms the possibility of an effective supplementation of the existing safety demonstration method through the application of the employed safety case methodology.

Assessment of Distributed and Dynamic Potential of Photovoltaic Systems in Urban Areas (태양광 발전 시스템의 시공간적 잠재성 평가 소프트웨어 개발)

  • Choi, Yosoon
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2011.11a
    • /
    • pp.59.2-59.2
    • /
    • 2011
  • This study presents a new method for coupling ArcGIS (popular GIS software) with TRaNsient SYstems Simulation (TRNSYS, reference software for researchers and engineers around the world) to use capabilities of the 4 and 5-parameter PV array performance models within the ArcGIS environment. Using the validated and industry-proven solar energy simulation models implemented in TRNSYS and other built-in ArcGIS functionalities, dynamic characteristics of distributed PV potential in terms of hourly, daily or monthly power outputs can be investigated with considerations of diverse options in selecting and mounting PV panels. In addition, the proposed method allows users to complete entire procedures in a single framework (i.e., a preliminary site survey using 3D building models, shading analyses to investigate usable rooftop areas with considerations of different sizes and shapes of buildings, dynamic energy simulation to examine the performances of various PV systems, visualization of the simulation results to understand spatially and temporally distributed patterns of PV potential). Therefore tedious tasks for data conversion among multiple softwares can be significantly reduced or eliminated. While the programming environment of TRNSYS is proprietary, the redistributable executable, simulation kernel and simulation engine of TRNSYS can be freely distributed to end-users. Therefore, GIS users who do not have a license of TRNSYS can also use the functionalities of solar energy simulation models within ArcGIS.

  • PDF

Detection of an Open-Source Software Module based on Function-level Features (함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지)

  • Kim, Dongjin;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.713-722
    • /
    • 2015
  • As open-source software (OSS) becomes more widely used, many users breach the terms in the license agreement of OSS, or reuse a vulnerable OSS module. Therefore, a technique needs to be developed for investigating if a binary program includes an OSS module. In this paper, we propose an efficient technique to detect a particular OSS module in an executable program using its function-level features. The conventional methods are inappropriate for determining whether a module is contained in a specific program because they usually measure the similarity between whole programs. Our technique determines whether an executable program contains a certain OSS module by extracting features such as its function-level instructions, control flow graph, and the structural attributes of a function from both the program and the module, and comparing the similarity of features. In order to demonstrate the efficiency of the proposed technique, we evaluate it in terms of the size of features, detection accuracy, execution overhead, and resilience to compiler optimizations.

Method for License Compliance of Open Source Software (오픈소스 소프트웨어 라이선스 컴플라이언스 검증 도구)

  • Yun, Hoyeong;Joe, Yongjoon;Jung, Byung-OK;Shin, Dongmyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.548-550
    • /
    • 2017
  • 오픈소스 소프트웨어를 사용하기 위해서는 개발자가 정의한 라이선스를 반드시 준수해야 한다. 이를 위반할 경우, 소스코드 공개/수정/재작성, 재배포 라이선스 변경, 특허권 포기 등의 피해로 이어질 수 있다. 소프트웨어를 다수의 개발자가 함께 개발하는 경우, 오픈소스 소프트웨어가 혼용되기도 하는데, 이는 서로 다른 라이선스간의 조항이 충돌하는 상황을 유발할 수 있다. 즉, 라이선스 규정 때문에 상황에 따라 혼용할 수 없는 오픈소스 소프트웨어 조합이 존재한다. 이러한 오픈소스 소프트웨어를 사용하는 과정에서 발생할 수 있는 무의적인 라이선스 규정 위반을 미연에 방지하고자 오픈소스 소프트웨어 라이선스 컴플라이언스 검증 도구를 제시하고자 한다.

Deep-learning Sliding Window Based Object Detection and Tracking for Generating Trigger Signal of the LPR System (LPR 시스템 트리거 신호 생성을 위한 딥러닝 슬라이딩 윈도우 방식의 객체 탐지 및 추적)

  • Kim, Jinho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.85-94
    • /
    • 2021
  • The LPR system's trigger sensor makes problem occasionally due to the heave weight of vehicle or the obsolescence equipment. If we replace the hardware sensor to the deep-learning based software sensor in order to generate the trigger signal, LPR system maintenance would be a lot easier. In this paper we proposed the deep-learning sliding window based object detection and tracking algorithm for the LPR system's trigger signal generation. The gate passing vehicle's license plate recognition results are combined into the normal tracking algorithm to catch the position of the vehicle on the trigger line. The experimental results show that the deep learning sliding window based trigger signal generating performance was 100% for the gate passing vehicles including the 5.5% trigger signal position errors due to the minimum bounding box location errors in the vehicle detection process.

Development of an open-source GUI computer program for modelling irradiation of multi-segmented phantoms using grid-based system for PHITS

  • Hiroshi Watabe;Kwan Ngok Yu;Nursel Safakatti;Mehrdad Shahmohammadi Beni
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.373-377
    • /
    • 2023
  • The Monte Carlo (MC) method has become an indispensable part of the nuclear radiation research field. Several widely used and well-known MC packages were developed for simulation of radiation transport and interaction with matter. All these MC packages require users to prepare an input script. The input script can become lengthy for complex models. The process of preparing these input scripts is time-consuming and error-prone. In the present work, we have developed an open-source GUI computer program for modelling radiation transport and interaction in multi-segmented slab phantoms using grid-based system for the widely used PHITS MC package. The developed tools would be useful for future users of PHITS MC package and particularly inexperienced users. The present program is distributed under GPL license and all users can freely download, modify and redistribute the program without any restrictions.

Usability Testing of Open Source Software for Digital Archiving (디지털 아카이브 구축을 위한 공개 소프트웨어 사용성 평가)

  • Jeon, Kyungsun;Chang, Yunkeum
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.3
    • /
    • pp.247-271
    • /
    • 2018
  • This research aims to explore the possibility of open source software for creating digital archives of small organizations or ordinary people that run short of budget and professional workforce and may easily create digital archives without the help of a professional. To do so, this study suggested three open source software, AtoM, ArchivesSpace, and Omeka, for such use, and conducted usability tests with system designers and users who had no experience with open source software. The results of the usability testing was that AtoM, which was developed to support the records management system and user services of small organizations, proved satisfactory to both system designers and users. ArchivesSpace had too many required fields with it to create archives. Omeka greatly satisfied the system designers because it is possible to create archives with simple inputs on the item level. However, Omeka, which focuses on exhibition functions while neglecting search functions, registered low satisfaction among the users. Based on the results of the usability testing, this study suggested selection criteria of open source software for small organizations or ordinary individuals, namely, purposes, license, characteristics, service creation environment, advantages and disadvantages, functions, metadata, file type, and interoperability.

Operation and Command of Virtual Router Redundancy Protocol in Open N2OS (Open N2OS를 활용한 가상 라우터 이중화 프로토콜의 기능 동작과 명령어)

  • Lee, ChangSik;Ryu, HoYong;Park, Jaehyung
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.693-700
    • /
    • 2018
  • Virtual router redundancy protocol (VRRP) was designed as a solution to support fast fail-over in case of network failure. There exists virtual router which acts as default gateway in LAN, and the virtual router is dynamically elected between master and backup router. Through this protocol, end-hosts can be provided seamless network service. However, it needs expensive license fees and maintenance costs to adopt current commercial network operating systems. Furthermore, they are commonly enterprise proprietary software and inherently closed source. In order to tackle these problem, Open N2OS which is open source based open network software platform was developed. It has no dependency on hardware equipment, and provides high availability, scalability, various networking functions. In this paper, we handle VRRP operation and mechanism with related command line interface (CLI).