• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.024 seconds

Development of a 3D Printing Open-market System for Copyright Protection and Remote 3D Printing (3D프린터용 설계데이터의 저작권보호와 원격출력을 지원하는 오픈 마켓 시스템 개발)

  • Kim, Sung Gyun;Yoo, Woosik
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.3
    • /
    • pp.253-258
    • /
    • 2015
  • The 3D printing is any of various processes for making a three dimensional object of almost any shape from a 3D model. Recently, a rapidly expanding hobbyist and home-use market has become established with the inauguration of the open-source RepRap and Fab@Home projects. However, this causes problems regarding copyright protection and usage of illegal 3D data. In this paper, we developed a 3D printing open-market system, which guarantees copyright protection using the remote 3D printing without direct distribution of 3D design data. Because most of the home-use 3D printers are FFF (Fused Filament Fabrication) based on NC code system, open-market system uses FFF 3D printers. Also, open-market system inspects the uploaded 3D model data, so the system can prevent distribution of illegal model data such as weapons, etc.

A Fast Implementation of JPEG and Its Application to Multimedia Service in Mobile Handset

  • Jeong Gu-Min;Jung Doo-Hee;Na Seung-Won;Lee Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1649-1657
    • /
    • 2005
  • In this paper, a fast implementation of JPEG is discussed and its application to multimedia service is presented for mobile wireless internet. A fast JPEG player is developed based on several fast algorithms for mobile handset. In the color transformation, RCT is adopted instead of ICT for JPEG source. For the most time-consuming DCT part, the binDCT can reduce the decoding time. In upsampling and RGB conversion, the transformation from YCbCr to RGB 16 bit is made at one time. In some parts, assembly language is applied for high-speed. Also, an implementation of multimedia in mobile handset is described using MJPEG (Motion JPEG) and QCELP(Qualcomm Code Excited Linear Prediction Coding). MJPEG and QCELP are used for video and sound, which are synchronized in handset. For the play of MJPEG, the decoder is implemented as a S/W upon the MSM 5500 baseband chip using the fast JPEG decoder. For the play of QCELP, the embedded QCELP player in handset is used. The implemented multimedia player has a fast speed preserving the image quality.

  • PDF

Coding Rule of Characters by 2 bytes with 4×4 bits to Improve the Transmission Efficiency in Data Communications (데이터 전송 효율을 고려한 4비트행×4비트열 2 바이트 문자 부호화 규칙에 관한 연구)

  • Hong, Wan-Pyo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.749-756
    • /
    • 2011
  • This paper propose the rule of coding for the characters and symbol, etc which are used in computer, information devices, etc. When they use the rule of coding, they may improve the efficiency of transmission in data communications by reducing the number of scrambling during the line coding in the coder in the transmitter. The paper considered the codes of two bytes(16 bits) of 4bits column ${\times}$ 4bits rows. In the paper, we applied the code system of Roman characters in KS X 1001.

Sparrow: The Source Code Analyzer (스패로우: 소스 코드 분석기)

  • Oh, Hak-Joo;Jung, Young-Bum;Jin, Min-Sik;Kim, Deok-Hwan;Hwang, Yi-Kwon;Park, Dae-Jun;Lee, Hee-Jong;Kong, Soon-Ho;Yi, Kwang-Keun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06c
    • /
    • pp.500-504
    • /
    • 2007
  • Sparrow(스패로우)는 C/C++로 작성된 프로그램의 메모리 누수와 버퍼오버런 오류를 자동으로 프로그램 실행전에 찾아주는 도구이다. Sparrow는 실제 현장에서 쓰이는 상용 프로그램의 분석에 유용하게 쓰일 수 있도록 제작되었다. 이를 위해 분석기 엔진은 수십만 라인 이상의 소프트웨어를 적절한 시간과 정확도로 분석하기 할 수 있도록 많은 기술이 적용되었다. 또한 사용자의 편의성을 위해 대상 프로그램의 소스 구조를 자동으로 파악하여 분석을 준비하고, 거짓일 가능성이 높은 알람을 미리 제거하며, 발생한 알람의 원인을 설명해 준다. Sparrow로 httpd-2.2.2를 비롯한 오픈 소프트웨어들을 분석한 결과 실제 오류들을 찾아낼 수 있었다.

  • PDF

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

A Study on the Software Development to Automate the Calculation for the Landscape Architecture Construction Cost Estimation. (조경 공사 내역서 계산 자동화를 위한 소프트웨어 개발에 관한 연구)

  • 이규석;황국웅
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.20 no.2
    • /
    • pp.106-118
    • /
    • 1992
  • The landscape architecture construction cost estimation includes the repeated calculation and updating. Thus, it is time-consuming, and one of the jobs which needs to be automated first. In Korea, the IBM compatible personal computer(PC) is the most widely used one in the landscape architecture firms. However, the software for landscape architecture construction cost estimation is not being used in the PC environment. Therefore, the purpose of this study is to develop the software which can be used to automate the calculation for the landscape architecture construction cost estimation, and runs in the IBM compatible personal computers(PC). The clipper '88 summer is one of the DBMS software packages, and it has many commands and functions and functions which reduces program lines and makes the programing efficient, especially in the programing work whose total source code lines do not exceed over 10,000 lines. So, it was used in this study. The software developed in the this study was tested using the real data, and it was found that it can be efficiently used in the following jobs. They are: (1) to calculate exactly and rapidly. (2) to use resources repeatedly. (3) to print out the results. (4) to store data files for the future use. The software, as discussed in this paper, reduces the time and efforts to be spent in the calculation for the landscape architecture construction cost estimation compared with the traditional approach using the pocket calculator.

  • PDF

Implementation of medicinal plant information system using Ajax and jQuery (Ajax과 jQuery 기반 약용식물 정보시스템 구현)

  • Kim, Hae-Ran;Kang, So-Young;Ceong, Hee-Taek;Han, Soon-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.7
    • /
    • pp.1626-1633
    • /
    • 2010
  • In this paper, we implemented medicinal plant information system based on user requirement using Ajax technique which can retrieve data from the server asynchronously in the background without refresh webpage and jQuery which is a lightweight cross-browser javascript library. Also, we presented the source code handling the server response data used in the system and compared the features by the type of response data. This system shows the improvement of user interaction and response rates because of a simple response data from the server, client-side data processing and change of web page by manipulating the DOM tree and provides ease of use and convenient data access.

Impacts on water-cycle by land use change and effects of infiltration trenches in Asan New town (토지이용 변화가 물순환에 미치는 영향과 침투트렌치 설치 효과 분석 - A 신도시 지구를 중심으로 -)

  • Hyun, Kyoung-Hak;Lee, Jung-Min
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.24 no.6
    • /
    • pp.691-701
    • /
    • 2010
  • As the water-cycle is transformed by increasing of the impermeable area in process of urbanization, decentralized rainwater management facilities(infiltration, harvesting and retention facilities) as source control are considered to be a method of restoring water-cycle of urban and reducing runoff. SWMM model was used to analyse the change of water-cycle structure before and after development in A new town watershed. Modified SWMM code was developed to apply infiltration facilities. The modified SWMM was used to analyse the change of water-cycle before and after infiltration trench setup in AJ subcatchment. Changes of the impervious area by development and consequent increase in runoff were analyzed. These analyses were performed by a day rainfall during ten years from 1998 to 2007. According to the results, surface runoff increased from 51.85% to 65.25 %, and total infiltration volume decreased from 34.15 % to 21.08 % in A newtown watershed. If more than 80 infiltration trenches are constructed in AJ subcatchment, the low flow and the drought flow increases by around 47%, 44%, separately. The results of this study, infiltration trench is interpreted to be an effective infiltration facility to restore water-cycle in new town.

A Supply Chain Management based on Mobile Agents with Flexible Reply Scheme (유연한 응답 기능을 가지는 이동 에이전트에 기반을 둔 공급 체인 관리)

  • Jeong, Won-Ho;Nam, Hui-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.439-450
    • /
    • 2001
  • Mobile agent is one of the promising ways of overcoming network load and latency. It is also a new software paradigm including those concepts of client/server, applet/servelet, and code-on-demand. In this paper, a new mobile agent concept with flexible replay scheme is proposed, which can deal with embarrassing situation when replying results should be accomplished in various distributed applications. For example, they are 1) a burden of bulky result, 2) a need of different replay scheme dependent on work type, 3) connection failure to the target node, and 4) a need of fast migration to next node to keep the itinerary. Regarding the source node, there may be another situation that it wants to be aware of whether its wi가 is completed or not. Three kinds of reply schemes are proposed for dealing flexibly with such situations. They are based on priority reply list where nodes to be replied are stored according to their priorities. An experimental supply chain management model using the proposed reply schemes is designed and implemented. It is one of good distributed applications appropriate for our reply schemes, because it requires different reply schemes according to work types and it is important to gather required information in time.

  • PDF

Secure User and Program Interface for SecuROS (SecuROS 에서 개발된 사용자 및 프로그램 인터페이스)

  • Doo, So-Young;Go, Jong-Guk;Eun, Seong-Gyeong;Kim, Jeong-Nyeo;Gong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.557-564
    • /
    • 2001
  • Many people use Linux and FreeBSD because it is freeware and excellent performance. The open source code is very important feature but it also has some problem which may be attacked by hackers frequently. This paper describes the SecuROS of secure operating system that is best solution to this problem and introduces user and programmer interface for active use of secure operating system. Developed secure operating system is composed of the access control method MAC and ACL and conforms to the POSIX which is universally used.

  • PDF