• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.028 seconds

The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory (오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여)

  • Choi, Junghong;Choi, Joohee;Lee, Hye Sun;Hwangbo, Hwan;Lee, Inseong;Kim, Jinwoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.

Characteristics of Water Surface Variations around 3-Dimensional Permeable Submerged Breakwaters under the Conditions of Salient Formation (설상사주 형성조건하에 있는 3차원투과성잠제 주변에서 수면변동의 특성)

  • Lee, Kwang-Ho;Bae, Ju-Hyun;An, Sung-Wook;Kim, Do-Sam
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.29 no.6
    • /
    • pp.335-349
    • /
    • 2017
  • Submerged breakwaters installed under the water surface are a representative coastal structure to prevent coastal erosion, and various types of submerged breakwaters have been proposed and discussed so far. Generally, submerged breakwaters make the complex wave fields due to abrupt change in water depth at the crown of the breakwater. In this study, wave heights and mean water level formed around a breakwater are examined numerically for three-dimensional permeable submerged breakwaters. OLAFOAM, CFD open source code, is applied in the numerical analysis, and the comparisons are made with available experimental results on the permeable upright wall and the impermeable submerged breakwater to verify its applicability to the three-dimensional numerical analysis. Based on the applicability of OLAFOAM numerical code, the wave height and mean water level distribution formed around the permeable submerged breakwaters are investigated under the formation condition of salient. The numerical results show that as the gap width between breakwaters decreases, the wave height in the center of the gap increases, while it decreases behind the gap, and the installing position of the breakwater from the shoreline has little influence on the change of the wave height. Furthermore, it is found that the decrease of the mean water level near the gap between breakwaters increases with decreasing of the gap width.

Design of X-ray Target for a CNT-based High-brightness Microfocus X-ray Tube (탄소나노튜브를 이용한 고휘도 마이크로빔 X-선원 발생부 설계)

  • Ihsan Aamir;Kim Seon Kyu;Heo Seong Hwan;Cho Sung Oh
    • Journal of the Korean Vacuum Society
    • /
    • v.15 no.1
    • /
    • pp.103-109
    • /
    • 2006
  • A target for a high-brightness microfocus x-ray tube, which is based on carbon nanotubes (CNT) as electron source, is designed. The x-ray tube has the following specifications: brightness of $1\times10^{11}phs/s.mm^2. mrad^2$, spot size $\~5{\mu}m$, and average x-ray energy of $20\~40 keV$. In order to meet the specifications, the design parameters of the target, such as configuration, material, thickness of the target as well as the required beam current, were optimized using computer code MCNPX. The design parameters were determined from the calculation of both x-ray spectrum and intensity distribution for a transmission type configuration. For the thin transmission type target to withstand vacuum pressure and localized thermal loading, the structural stability and temperature distribution were also considered. The material of the target was selected as molybdenum(Mo) and the optimized thickness was $7.2{\mu}m$ to be backed by $150{\mu}m$ beryllium (Be). In addition, the calculations revealed that the maximum temperature of the transmission target can be maintained within the limits of stable operation.

Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities (SW 보안 취약점 자동 탐색 및 대응 기술 분석)

  • Oh, Sang-Hwan;Kim, Tae-Eun;Kim, HwanKuk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.94-103
    • /
    • 2017
  • As automatic hacking tools and techniques have been improved, the number of new vulnerabilities has increased. The CVE registered from 2010 to 2015 numbered about 80,000, and it is expected that more vulnerabilities will be reported. In most cases, patching a vulnerability depends on the developers' capability, and most patching techniques are based on manual analysis, which requires nine months, on average. The techniques are composed of finding the vulnerability, conducting the analysis based on the source code, and writing new code for the patch. Zero-day is critical because the time gap between the first discovery and taking action is too long, as mentioned. To solve the problem, techniques for automatically detecting and analyzing software (SW) vulnerabilities have been proposed recently. Cyber Grand Challenge (CGC) held in 2016 was the first competition to create automatic defensive systems capable of reasoning over flaws in binary and formulating patches without experts' direct analysis. Darktrace and Cylance are similar projects for managing SW automatically with artificial intelligence and machine learning. Though many foreign commercial institutions and academies run their projects for automatic binary analysis, the domestic level of technology is much lower. This paper is to study developing automatic detection of SW vulnerabilities and defenses against them. We analyzed and compared relative works and tools as additional elements, and optimal techniques for automatic analysis are suggested.

A Study on Refined Information Generation through Classes Composition Based on Reengineering (재공학 기반의 클래스 합성을 통한 정련화된 정보 생성에 관한 연구)

  • 김행곤;한은주
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.2
    • /
    • pp.239-248
    • /
    • 1998
  • Software reengineering is making various research for solutions against problem of maintain existing system. Reengineering has a meaning of development of softwares on existing systems through the reverse-engineering and the forward-engineering. It extracts classes from existing system's softwares to increase the comprehension of the system and enhance the maintenability of softwares. Most of the important concepts used in reengineering is composition that is restructuring of the existing objects from other components. The classes and clusters in storage have structural relationship with system's main components to reuse in the higher level. These are referenced as dynamic informations through structuring an architect for each of them. The classes are created by extractor, searcher and composer through representing existing object-oriented source code. Each of classes and clusters extract refined informations through optimization. New architecture is created from the cluster based on its classes' relationship in storage. This information can be used as an executable code later on. In this paper, we propose the tools, it presented by this thesis presents a new information to users through analysing, based on reengineering, Object-Oriented informations and practicing composition methodology. These composite classes will increase reusability and produce higher comprehension information to consist maintainability for existing codes.

  • PDF

Attacking OpenSSL Shared Library Using Code Injection (코드 주입을 통한 OpenSSL 공유 라이브러리의 보안 취약점 공격)

  • Ahn, Woo-Hyun;Kim, Hyung-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.226-238
    • /
    • 2010
  • OpenSSL is an open-source library implementing SSL that is a secure communication protocol. However, the library has a severe vulnerability that its security information can be easily exposed to malicious software when the library is used in a form of shared library on Linux and UNIX operating systems. We propose a scheme to attack the vulnerability of the OpenSSL library. The scheme injects codes into a running client program to execute the following attacks on the vulnerability in a SSL handshake. First, when a client sends a server a list of cryptographic algorithms that the client is willing to support, our scheme replaces all algorithms in the list with a specific algorithm. Such a replacement causes the server to select the specific algorithm. Second, the scheme steals a key for data encryption and decryption when the key is generated. Then the key is sent to an outside attacker. After that, the outside attacker decrypts encrypted data that has been transmitted between the client and the server, using the specified algorithm and the key. To show that our scheme is realizable, we perform an experiment of collecting encrypted login data that an ftp client using the OpenSSL shared library sends its server and then decrypting the login data.

Methodology of Application to Air Quality Model to Evaluate the Results of the Enforcement Plan in Seoul Metropolitan Area (수도권 지역의 대기환경관리 시행계획 추진결과 평가를 위한 대기질 모델링 적용 방법)

  • Yoo, Chul;Lee, Dae-Gyun;Lee, Yong-Mi;Lee, Mi-Hyang;Hong, Ji-Hyung;Lee, Seok-Jo
    • Journal of Environmental Science International
    • /
    • v.20 no.12
    • /
    • pp.1647-1661
    • /
    • 2011
  • The Government had devised legislation of Special Act and drew up guidelines for improving air quality in Seoul Metropolitan area. In 2007 local government of Seoul, Incheon and Gyeonggi conducted the results of application policy by reduced air pollutants emission for the first time. Although there was reduction of air pollutant emission in each local government, it was ineffective as expected using air pollution monitoring database. Therefore we worked out a way to prepare modeling input data using the results of enforcement plan. And we simulated surface $NO_2$ and PM10 before and after decrease in air pollutants emission and examine reduction effects of air pollution according to enforcement regulation except other influence, by using MM5-SMOKE-CMAQ system. Each local government calculated the amount of emission reduction under application policy, and we developed to prepare input data so as to apply to SMOKE system using emission reduction of enforcement plan. Distribution factor of emission reduction were classified into detailed source and fuel codes using code mapping method in order to allocate the decreased emission. The code mapping method also included a way to allocate spatial distribution by CAPSS distribution. According to predicted result using the reduction of NOx emission, $NO_2$ concentration was decreased from 19.1 ppb to 18.0 ppb in Seoul. In Gyeonggi and Incheon $NO^2$ concentrations were down to 0.65 ppb and 0.68 ppb after application of enforcement plan. PM10 concentration was reduced from 18.2 ${\mu}g/m^3$ to 17.5 ${\mu}g/m^3$ in Seoul. In Gyeonggi PM10 concentration was down to 0.51 ${\mu}g/m^3$ and in Incheon PM10 concentration was decreased about 0.47 ${\mu}g/m^3$ which was the lower concentration than any other cities.

Radiation Shielding Analysis on The Spent Fuel Storage Facility for the Extended Fuel Cycle (장주기(長週期) 핵연료(核燃料) 저장시설(貯藏施設)에서의 방사선차폐해석(放射線遮蔽解析))

  • Lee, Tae-Young;Ha, Chung-Woo;Yook, Chong-Chul
    • Journal of Radiation Protection and Research
    • /
    • v.9 no.2
    • /
    • pp.90-96
    • /
    • 1984
  • Estimated dose rates in spent fuel pool storage with the extended fuel cycle core management were reviewed and compared with design limit after calculation with the aid of DLC-23/CASK(22 n, 18 g) nuclear data and ANISN code. Radioactivity and gamma spectrum within spent fuel assemblies were calculated with ORIGEN code by extended fuel cycle model. In the calculation of dose rate, the fuel pool geometry was assumed to be infinite slab. Also, composition materials and radiation source within assemblies which are being stored in pool storage were assumed to be uniformly distributed throughout all the assemblies. As a result of culculation of dose rate from stored assemblies and waterborne radionuclides in pool water, the calculated dose rates appear to be lower than design basis limit under normal condition as well as abnormal condition.

  • PDF

Effect of frequency dependent multipath fading on non-coherent underwater communication system (주파수 종속 다중경로 페이딩이 비코히어런트 수중통신시스템에 미치는 영향)

  • Kim, Jongjoo;Park, Jihyun;Bae, Minja;Park, Kyu-Chil;Yoon, Jong Rak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.35 no.4
    • /
    • pp.295-302
    • /
    • 2016
  • Underwater acoustic communication channel is often defined as a multipath fading channel since the multipath arrivals from various paths interfere with each other and cause frequency dependent constructive or destructive interference in received signals. Therefore signal-to-noise ratio (SNR) of received signal fluctuates as a function of frequency. In addition, sea surface fluctuation induces frequency dependent time variant signal fading due to coherent component variation of surface bounce path. The frequency shift keying (FSK) system is known to be less sensitive and more robust under these interference and fading, and M-ary frequency shift keying (MFSK) system is adopted to increase a data rate. In this study, a bit error rate (BER) of 4 channels 4FSK system are examined in shallow sea multipath channel. Experimental results show that RS code reduces efficiently the BER of 4FSK system since frequency dependent time-varying fading is characterized to give burst errors. The BER of a different data rate or different source-to-receiver range depends on not only the channel coherent bandwidth but also frequency dependent multipath fading.

Monte Carlo Simulation of a Varian 21EX Clinac 6 MV Photon Beam Characteristics Using GATE6 (GATE6를 이용한 Varian 21EX Clinac 선형가속기의 6 MV X-선 특성모사)

  • An, Jung-Su;Lee, Chang-Lae;Baek, Cheol-Ha
    • Journal of radiological science and technology
    • /
    • v.39 no.4
    • /
    • pp.571-575
    • /
    • 2016
  • Monte Carlo simulations are widely used as the most accurate technique for dose calculation in radiation therapy. In this paper, the GATE6(Geant4 Application for Tomographic Emission ver.6) code was employed to calculate the dosimetric performance of the photon beams from a linear accelerator(LINAC). The treatment head of a Varian 21EX Clinac was modeled including the major geometric structures within the beam path such as a target, a primary collimator, a flattening filter, a ion chamber, and jaws. The 6 MV photon spectra were characterized in a standard $10{\times}10cm^2$ field at 100 cm source-to-surface distance(SSD) and subsequent dose estimations were made in a water phantom. The measurements of percentage depth dose and dose profiles were performed with 3D water phantom and the simulated data was compared to measured reference data. The simulated results agreed very well with the measured data. It has been found that the GATE6 code is an effective tool for dose optimization in radiotherapy applications.