• Title/Summary/Keyword: software protection

Search Result 504, Processing Time 0.023 seconds

A Design of Platform for Environmental protection (환경보호 플랫폼 참여유도 알고리즘에 관한 연구)

  • Bum-June Kim;Ji-Hoon Chae;Bo-Geun Park;Chang-Hoon Kim;Hyun-A Park;DongJu Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.320-321
    • /
    • 2023
  • 환경보호 플랫폼은 환경보호와 관련된 모든 활동들을 대상으로 하나의 애플리케이션 안에서 제공하는 서비스로, 일반 사용자에게 편리하고 다양한 활동 정보를 제공한다. 이러한 과정중 어떤 사용자 경험이 환경보호 활동을 증진 시킬 수 있는가에 대한 연구이다.

Serious Game : A Study on Aware of Protection for Rights of Software and Digital Contents (기능성 게임 : 소프트웨어 및 디지털콘텐츠 저작권 보호 인식에 관한 고찰)

  • Yoon, Sun-Jung;Park, Hee-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1950-1956
    • /
    • 2010
  • There are scattered various kinds of software and digital contents around modern peoples. Most of peoples do not realize the importance of the problem related with rights protections of software and digital contents that most of peoples are acting illegal use or illegal copy of software or digital contents without any sense of guilt. In this paper, we carry out a survey targeting IT department majors and non-IT department majors about their aware of rights of software and digital contents and then we suggest a problem from the results of a survey and study a solution for advancing problem of aware of rights. The most effective solution of aware improvement of rights is continuous and repetitive education concerning rights. Also, Reasonable prices that should makes for paying cost of copyrights by users.

Design and Implementation of Method Generation based Watermarking Technique for Android Copyright Protection (안드로이드 저작권 보호를 위한 메소드 생성 기반 워터마킹 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.61-69
    • /
    • 2019
  • As smartphones become widespread, numerous applications are developed and social issues related to software copyright are emerging. Software watermarking is digital watermarking technology applied to software and is a technology that can be used to recognize copyright owners. Generally, Java language is used to develop applications on the Android environment. The Java is an object-oriented language that supports method overloading and overriding. In this paper, we propose and implement a method generation based watermarking technique. As a result of evaluating the overhead due to the watermark, it was confirmed that the increase of the executable file size and the decrease of the execution speed are not large. Using the watermarking technique proposed in this paper, it is expected that copyright information can be verified when illegal copying is suspected or actual program is stolen, and piracy attempts will be prevented in advance.

A Study of User Environment for Fair Use of Open Source Software (공정한 오픈소스소프트웨어 활용을 위한 사용자환경 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.357-364
    • /
    • 2012
  • For the resistance of the closed intellectual property license from the Free Software Movement. It's free and also can adapt have been widely used. Software for the resistance of the closed intellectual property rights have been promoted by the free software movement. Implementation of the proposed changes in the license that anyone can freely use the software and adapt open source software is widely used. The product of open source software can reduce development time and cost. Many people who use it will improve, verification and developed. However, indiscriminate use of these advantages, as well as the risk of dispute is high. This study is analyzed open source software dispute cases for piracy protection and will show duly open source software available to users by user environment.

Safety Assessment for the Design of Digital Reactor Protection System of Nuclear Power Plant (원자력 발전소 디지털 원자로 보호시스템의 설계에 대한 안전성 평가)

  • Kong, Myung-Bock;Lee, Sang-Yong
    • IE interfaces
    • /
    • v.23 no.1
    • /
    • pp.68-77
    • /
    • 2010
  • Digital reactor protection system which consists of many identical modules, is fault- tolerant to provide high safety. The modules themselves including DSP(digital signal processing) card are also fault-tolerant in nature. This paper assesses the safety for being-designed digital reactor protection system of 2-out-of-4 G structure with lockout. Some interesting design alternatives are compared. Fault tree analysis for assessing system safety is performed by Relex software. The selected reactor protection system fully satisfies EPRIURD stipulation of mean failure time of 50 years.

Analysis of the Protective Distance of Low-Voltage Surge Protective Device(SPD) to Equipment (저압용 서지 보호 장치(SPD)의 보호 거리 해석)

  • Lee, Jung-Woo;Oh, Yong-Taek
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.4
    • /
    • pp.28-34
    • /
    • 2012
  • Installing surge protection devices for a low-voltage system is important to ensure the survival of electric or electronic devices and systems. If surge protection devices (SPD) are installed without consideration of the concept of lightning protection zones, the equipment to be protected might be damaged despite the correct energy coordination of SPDs. This damage is induced by the reflection phenomena on the cable connecting an external SPD and the load protected. These reflection phenomena depend on the characteristics of the output of the external SPD, the input of the loads, and the cables between the load and the external SPD. Therefore, the SPD has an effective protection distance under the condition of the specific load and the specific voltage protection level of SPD. In this paper, PSCAD/EMTDC software is used to simulate the residual voltage characteristics of SPD Entering the low-voltage device. And by applying a certain voltage level, the effective protection distances of SPD were analyzed according to the each load and length of connecting cable, and the effectiveness of SPD were verified.

Mathematical Verification of a Nuclear Power Plant Protection System Function with Combined CPN and PVS

  • Koo, Seo-Ryong;Son, Han-Seong;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.31 no.2
    • /
    • pp.157-171
    • /
    • 1999
  • In this work, an automatic software verification method for Nuclear Power Plant (NPP) protection system is developed. This method utilizes Colored Petri Net (CPN) for system modeling and Prototype Verification System (PVS) for mathematical verification. In order to help flow-through from modeling by CPN to mathematical proof by PVS, an information extractor from CPN models has been developed in this work. In order to convert the extracted information to the PVS specification language, a translator also has been developed. ML that is a higher-order functional language programs the information extractor and translator. This combined method has been applied to a protection system function of Wolsong NPP SDS2(Steam Generator Low Level Trip). As a result of this application, we could prove completeness and consistency of the requirement logically. Through this work, in short, an axiom or lemma based-analysis method for CPN models is newly suggested in order to complement CPN analysis methods and a guideline for the use of formal methods is proposed in order to apply them to NPP Software Verification and Validation.

  • PDF

A Study on the Improvement of the Method for Implementing Protection Algorithm by using Component Object Model(COM) (컴포넌트 오브젝트 모델을 응용한 계전 알고리즘 구현방법의 개선에 관한 연구)

  • Park, In-Kwon;Yoon, Nam-Seon;An, Bok-Shin
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1210-1212
    • /
    • 1998
  • The complexity of newly developed protection algorithm and higher performance requested by the user makes the software embedded in the protective relay much harder to develop and maintain. The versatility of 32bit microprocessor and the availability of cheaper memory semiconductors introduced the fertile developing background for the protective relay developers. The use of component object model(COM) in the software developing process enables the developer to write much complex code in the easy and safe way and to maintain the code easily, too. And the aid of the COM library, the distributed computing environment will be expected to appear by the use of the COM programming model in the protective relay firmware program.

  • PDF

Numerical study on the post-earthquake fire behavior of intermediate steel moment frames

  • Parvizizadeh, Shayan;Kazemi, Mohammad Taghi
    • Earthquakes and Structures
    • /
    • v.22 no.2
    • /
    • pp.137-145
    • /
    • 2022
  • As steel is highly sensitive to temperature variations, fire exposure is more destructive in the case of steel structures in comparison to the concrete ones. The performance of an intermediate three-story steel moment frame with 4 spans was studied under the service load, thermal load and post-earthquake fire in this paper. Also, the effects of passive fire-protection materials such as ordinary cement-based and fire-retardant coatings were investigated. To model and analyze the structure; Abaqus software is utilized. In order to apply the earthquake effect, the push-over analysis method is employed. Changes in the stories deflection, endurance time and growth of nonlinear regions due to losses in the steel stiffness and strength, are among the issues considered in this study. As an interesting finding, the beams protected by ordinary cement-based coating could sustain the fire exposure at least for 30 minutes in all cases. The mentioned time is increased by employing a new fire-retardant protection, which could prevent significant loss in the structure resistance against fire, even after 60 minutes of exposure to fire.

A lightweight detection mechanism of control flow modification for IoT devices (IoT 기기를 위한 경량의 소프트웨어 제어 변조 탐지 기법)

  • Pak, Dohyun;Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1449-1453
    • /
    • 2015
  • Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.