• Title/Summary/Keyword: code duplication

Search Result 23, Processing Time 0.022 seconds

The Video on Demand System Failure Evaluation of Software Development Step

  • Jang, Jin-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.107-112
    • /
    • 2019
  • Failure testing is a test that verifies that the system is operating in accordance with failure response requirements. A typical failure test approaches the operating system by identifying and testing system problems caused by unexpected errors during the operational phase. In this paper, we study how to evaluate these Failure at the software development stage. Evaluate the probability of failure due to code changes through the complexity and duplication of the code, and evaluate the probability of failure due to exceptional situations with bugs and test coverage extracted from static analysis. This paper studies the possibility of failure based on the code quality of software development stage.

Soft Error Detection for VLIW Architectures with a Variable Length Execution Set (Variable Length Execution Set을 지원하는 VLIW 아키텍처를 위한 소프트 에러 검출 기법)

  • Lee, Jongwon;Cho, Doosan;Paek, Yunheung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.111-116
    • /
    • 2013
  • With technology scaling, soft error rate has greatly increased in embedded systems. Due to high performance and low power consumption, VLIW (Very Long Instruction Word) architectures have been widely used in embedded systems and thus many researches have been studied to improve the reliability of a system by duplicating instructions in VLIW architectures. However, existing studies have ignored the feature, called VLES (Variable Length Execution Set), which is adopted in most modern VLIW architectures to reduce code size. In this paper, we propose how to support instruction duplication in VLIW architecture with VLES. Our experimental results demonstrate that a VLIW architecture with VLES shows 64% code size decrement on average at the cost of about 4% additional cell area as compared to the case of a VLIW architecture without VLES when instruction duplication is applied to both architectures. Also, it is shown that the case with VLES does not cause extra execution time compared to the case without VLES.

Design and Implementation of Piping Spool Management Android Application using QR Code (QR Code를 활용한 배관 스풀관리용 안드로이드 어플리케이션 설계 및 구현)

  • Jeon, Sang-Moon;Kim, Kyoung-Su
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.609-616
    • /
    • 2012
  • Plumbing of the plant project is an important discipline. Now workers on the construction site, carry hundreds of piping spool drawings and documents, record the Spool Stage data. Then, The data is input into the system or has been documented in the field office. Because of the work-flow, duplication work occurs. As a result, it is reducing the effectiveness of the Plumbing and causes schedule delays. Also, To manage the integration process, there is a problem, it takes a lot of time. Therefore, The study is conducted to design and implementation of piping spool management Android Application using QR Code. The Application will contribute to the management to the integration of piping work process.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.

Web Page Similarity based on Size and Frequency of Tokens (토큰 크기 및 출현 빈도에 기반한 웹 페이지 유사도)

  • Lee, Eun-Joo;Jung, Woo-Sung
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.263-275
    • /
    • 2012
  • It is becoming hard to maintain web applications because of high complexity and duplication of web pages. However, most of research about code clone is focusing on code hunks, and their target is limited to a specific language. Thus, we propose GSIM, a language-independent statistical approach to detect similar pages based on scarcity and frequency of customized tokens. The tokens, which can be obtained from pages splitted by a set of given separators, are defined as atomic elements for calculating similarity between two pages. In this paper, the domain definition for web applications and algorithms for collecting tokens, making matrics, calculating similarity are given. We also conducted experiments on open source codes for evaluation, with our GSIM tool. The results show the applicability of the proposed method and the effects of parameters such as threshold, toughness, length of tokens, on their quality and performance.

Retrospective Drug Utilization Review Study on the Therapeutic Duplication in Patients with Anxiety Disorders (불안장애 환자에서의 치료약제 중복사용에 대한 후향적 의약품사용평가 연구)

  • Park, Chan-Hyun;Sohn, Hyun-Soon;Shin, Hyun-Taek;Choi, Kyung-Eob
    • Korean Journal of Clinical Pharmacy
    • /
    • v.20 no.1
    • /
    • pp.39-49
    • /
    • 2010
  • The present study was aimed to examine the occurrence and influencing factors therapeutic duplication (TD) of medications for anxiety disorders by analyzing the relevant prescription data. In this study, the prescription data issued on March 19, 2008 in domestic medical institutes were utilized. TD was defined as more than two medications under the same therapeutic classification per prescription based on the Anatomical Therapeutic Classification (ATC) code. The assessment of TD was performed based on the number of cases and on the ratio determined. To identify the influencing factor of TD, the variables related to the differences in the TD ratio were analyzed based on the results of the Chi-Square test conducted with the variables; patients, medical institutes, diseases, and treatments. The number and ratio of TD were determined to be 1,333 out of the total of 19,219 anxiety disorder cases, and 6.94%, most cases involving benzodiazepine derivatives, respectively. The TD ratio was found to be higher in relation to males than to females. Patients with national health insurance benefits have a higher TD ratio compared to the medical-aid beneficiaries. The TD ratios were highest in clinics, psychiatry divisions, and Gyeongsang district. The TD ratio of the cases with more than two anxiety disorders was found to be higher than that of the cases with only one anxiety disorder. As the number of medications per prescription increased, the TD ratio was shown to have become gradually higher. In conclusion, in order to prevent TD, the concurrent DUR system should be implemented. The prescribers and pharmacists must be educated regarding duplicated medications to promote the safe and effective use of medicines, without unnecessary TD.

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

De-duplication of Parity Disk in SSD-Based RAID System (SSD 기반의 RAID 시스템에서 패리티 디스크의 중복 제거)

  • Yang, Yu-Seok;Lee, Seung-Kyu;Kim, Deok-Hwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.105-113
    • /
    • 2013
  • RAID systems have been widely used by connecting several disks in parallel structure. to resolve the delay and bottleneck of data I/O. Recently, SSD based RAID systems are emerging since SSDs have better I/O performance than HDD. However, endurance and power consumption problems due to frequent write operation in SSD based RAID system should be resolved. In this paper, we propose a de-duplication method of parity disk in SSD based RAID system with expensive update cost. The proposed method segments chunk of parity data into small pieces and removes duplicate data, therefore, it can reduce wear-leveling and power consumption by decreasing write operation for duplicated parity data. Experimental results show that bit update rate of the proposed method is 16% in total disk, 31% in parity disk less than that of existing method in RAID-6 system using EVENODD erasure code, and the power consumption of the proposed method is 30% less than that of existing method. Besides the proposed method is 12% in total disk, 32% in parity disk less than that of existing method in RAID-5 system, and the power consumption of the proposed method is 36% less than that of existing method.

Chiron-2 Architecture Based Score Processing System for Web-Based Education (웹 기반 학습을 위한 Chiron-2 아키텍처기반의 성적처리 시스템)

  • Jeong Hwa-Young
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.1-7
    • /
    • 2005
  • Web-Based instruction system implemented according to CGI based process-oriented. But, in case of system development, theses method is able to take inefficiency with duplication of program code. Also, ofter the development, it takes difficult on the operation and management. In this research, I implement Web-based score processing system by component composition. Applied component model is Java Beans and composition method is to use Chiron-2 architecture. By this method, this research shows the high efficiency - not only structural advance but also low value of cyclomatic complex that measure a maintenance.

  • PDF