• Title/Summary/Keyword: open source programs

Search Result 78, Processing Time 0.023 seconds

A case study of collaborative learning implementation using open source Moodle learning management system - for collaborative learning promotion by users - (오픈소스 Moodle 학습관리시스템 기반의 협동학습 운영 사례에 관한 연구 - 사용자의 협동학습지원을 중심으로 -)

  • Lee, Jong-Ki
    • Journal of Service Research and Studies
    • /
    • v.6 no.4
    • /
    • pp.47-57
    • /
    • 2016
  • Open source has an amazing spread with the advent of smartphones. Open-source Moodle in e-learning areas are free of LMS (Learning Management System) and the most widely used worldwide, except for the black board commercial programs. One reason is well designed to support collaborative learning and interaction based on constructivist principles, which is the core principle of e-learning in particular that the theoretical basis of educational technology has a high educational effectiveness and benefits. This study examines the operational practices of collaborative learning using open source learning management system Moodle program. It introduces specific information to support the user of the collaborative learning. It looks at the advantages and singularity of collaborative learning in e-learning through examples shown. The purpose of this study is the importance of the relationship between learners and the importance of self-learning of collaborative learning through collaborative learning in a knowledge repository of Moodle. In addition, collaborative learning outcomes are is based on the motivation of learners and playfulness.

Design of Internet Telephony Network System using Open Source Softwares (오픈 소스 소프트웨어를 활용한 인터넷 전화망 시스템 설계)

  • Ha, Eun-Yong
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.259-267
    • /
    • 2012
  • Internet telephony is an Internet service which supports voice telephone using VoIP technology on the IP-based Internet. It has some advantages in that voice telephone services can be accompanied with multimedia services such as video communication and messaging services. Recently, the introduction of smart phones has led to a growth in social networking services and thus, the research and development of Internet telephony has been actively progressed and has the potential to become a replacement for the telephone service that is currently being used. In this paper we designed and implemented an Internet telephony network system which is developed by using Asterisk and open source softwares. It is developed on the linux system and has some features such as VoIP telephony service between SIP phones, voice mail, and call recording. It also supports web-based functions such as SIP users and server system management that is implemented by Apache web server and PHP programs. Afterwards, this system will be applied as VoIP network base technology for small sized companies and organizations. It will paly a role for encouraging companies to use open source softwares.

Detection of an Open-Source Software Module based on Function-level Features (함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지)

  • Kim, Dongjin;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.713-722
    • /
    • 2015
  • As open-source software (OSS) becomes more widely used, many users breach the terms in the license agreement of OSS, or reuse a vulnerable OSS module. Therefore, a technique needs to be developed for investigating if a binary program includes an OSS module. In this paper, we propose an efficient technique to detect a particular OSS module in an executable program using its function-level features. The conventional methods are inappropriate for determining whether a module is contained in a specific program because they usually measure the similarity between whole programs. Our technique determines whether an executable program contains a certain OSS module by extracting features such as its function-level instructions, control flow graph, and the structural attributes of a function from both the program and the module, and comparing the similarity of features. In order to demonstrate the efficiency of the proposed technique, we evaluate it in terms of the size of features, detection accuracy, execution overhead, and resilience to compiler optimizations.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Study on the Face recognition, Age estimation, Gender estimation Framework using OpenBR. (OpenBR을 이용한 안면인식, 연령 산정, 성별 추정 프로그램 구현에 관한 연구)

  • Kim, Nam-woo;Kim, Jeong-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.779-782
    • /
    • 2017
  • OpenBR is a framework for researching new facial recognition methods, improving existing algorithms, interacting with commercial systems, measuring perceived performance, and deploying automated biometric systems. Designed to facilitate rapid algorithm prototyping, it features a mature core framework, flexible plug-in system, and open and closed source development support. The established algorithms can be used for specific forms such as face recognition, age estimation, and gender estimation. In this paper, we describe the framework of OpenBR and implement facial recognition, gender estimation, and age estimation using supported programs.

  • PDF

An Integer Programming Model for a Complex University Timetabling Problem: A Case Study

  • Prabodanie, R.A. Ranga
    • Industrial Engineering and Management Systems
    • /
    • v.16 no.1
    • /
    • pp.141-153
    • /
    • 2017
  • A binary integer programming model is proposed for a complex timetabling problem in a university faculty which conducts various degree programs. The decision variables are defined with fewer dimensions to economize the model size of large scale problems and to improve modeling efficiency. Binary matrices are used to incorporate the relationships between the courses and students, and the courses and teachers. The model includes generally applicable constraints such as completeness, uniqueness, and consecutiveness; and case specific constraints. The model was coded and solved using Open Solver which is an open-source optimizer available as an Excel add-in. The results indicate that complicated timetabling problems with large numbers of courses and student groups can be formulated more efficiently with fewer numbers of variables and constraints using the proposed modeling framework. The model could effectively generate timetables with a significantly lower number of work hours per week compared to currently used timetables. The model results indicate that the particular timetabling problem is bounded by the student overlaps, and both human and physical resource constraints are insignificant.

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.

A Study on Open Source Programs for IPSec Key Management System (IPSec 키 관리 시스템 관련 오픈 소스 프로그램 분석)

  • Kim, Geon-Ung;Song, Byung-Kwen
    • Annual Conference of KIPS
    • /
    • 2003.05b
    • /
    • pp.1385-1388
    • /
    • 2003
  • 망 차원에서의 보안 기능을 지원하기 위한 IPsec을 도입하기 위해서는 통신에 참여하는 각 호스트들의 인증에 필요한 키 관리 시스템 구축이 선행되어야 한다. 본 논문에서는 이러한 IPsec 키 관리 시스템 구축을 위해 현재 인터넷에 공개되어 있는 관련 오픈 소스 프로그램들을 분석하고 이를 통한 구축 방안을 제시한다.

  • PDF

Statistical Investigation on Class Mutation Operators

  • Ma, Yu-Seung;Kwon, Yong-Rae;Kim, Sang-Woon
    • ETRI Journal
    • /
    • v.31 no.2
    • /
    • pp.140-150
    • /
    • 2009
  • Although mutation testing is potentially powerful, it is a computationally expensive testing method. To investigate how we can reduce the cost of object-oriented mutation testing, we have conducted empirical studies on class mutation operators. We applied class mutation operators to 866 classes contained in six open-source programs. An analysis of the number and the distribution of class mutants generated and preliminary data on the effectiveness of some operators are provided. Our study shows that the overall number of class mutants is smaller than for traditional mutants, which offers the possibility that class mutation can be made practically affordable.

  • PDF

Static Analysis of Large Scale Software Repositories Using WALA and Boa (WALA와 Boa를 활용하여 대규모 소프트웨어 저장소를 정적으로 분석하는 도구 개발)

  • Park, Gyunghee;Ryu, Sukyoung
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1081-1086
    • /
    • 2017
  • A program analysis of a large-scale open-source software repository has a significant meaning in that it allows us to examine the changes and improvements of the software in repositories, and this brings more reliable results based on a large amount of programs. In this paper, we introduce a new static analysis framework WALABOA, which enables a scalable static analysis of large-scale software repositories. In addition, we show new findings from applying WALABOA, together with a module comparing the analysis results from a static analysis and a dynamic analysis, in evaluation of the field-based analysis, one of JavaScript static analysis techniques used in WALA.