Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

2020 KCI Impact Factor : 0.41
Home > Explore Content > All Issues > Article List

2016, Vol.12, No.2

  • 1.

    Measurement for License Identification of Open Source Software

    Ho-Yeong Yun | Yong-Joon Joe | Byung-Ok Jung and 1other persons | 2016, 12(2) | pp.1~8 | number of Cited : 0
    Abstract PDF
    In this paper, we study abstracting and identifying license file from a package to prevent unintentional intellectual property infringement because of lost/modified/confliction of license information when redistributing open source software. To invest character of the license files, we analyzed 322 licenses by n-gram and TF-IDF methods, and abstract license files from the packages. We identified license information with a similarity of the registered licenses by cosine measurement.
  • 2.

    A Practical item guideline for IT device evaluation

    LEE KYU TAE | Kwon Kee Young | 2016, 12(2) | pp.9~14 | number of Cited : 4
    Abstract PDF
    A copyright evaluation is a way to decide a illegal modification between the original product and the suspected product as modification. To compare to two product, the copyright association took an estimation to the first product and illegal copy product. The evaluation expert do compare both product as the request list from the coptright association. Then he excludes the comparison item as detail to seeking objective result. This detailed comparison item should have a serious concentraion as it hss a sensitivity for the decision. In this study, it was analyzed and illustrated the detailed item as for actual evaluation materials.
  • 3.

    A Study on the Comparison Methods of Substantial Similarity for Object Code focused on Copyright Act

    Kim, Si Yeol | Hyung-Rak Joo | 2016, 12(2) | pp.15~24 | number of Cited : 1
    Abstract PDF
    Recently, as the environment of the technology and market of computer program works has changed, the cases to designate an object code as a standard regarding copyright disputes are increasing. Accordingly, it hereby examines such standard based on the object code in terms of copyright laws as well as suggests the necessity to establish the appropriate method to perform comparison and analysis by referring to the elements subject to the copyright laws significantly.
  • 4.

    Association analysis model for Software Reuse

    Kwon, Ki Tae | Na-Young Lee | 2016, 12(2) | pp.25~31 | number of Cited : 0
    Abstract PDF
    Software reuse is to reduce software develop cost and to improve software quality. But the general understanding of existing software is required in order to software reuse. Otherwise It is more efficient to newly software developed.In this study, we proposed an association analysis model for Software Reuse success using Apriori algorithm. We analyzed success factor and column's association of software reuse in software reuse dataset. The evaluation results showed that software reuse is successful when Rewards.Policy=no, Type of Software production=product-family, Human Factors=yes, Repository=yes, Top Management Commitment=Yes. And we showed that six columns have association with each other.
  • 5.

    Random Attack Success Probability on the Moving Target Defense

    Ki Jang Geun | 2016, 12(2) | pp.33~37 | number of Cited : 0
    Abstract PDF
    These days, wireless communications provide several advantages such as easy deployment, less network construction cost, and comparable bandwidth to the wired network. But the wireless network is more vulnerable to the malicious cyber attacks. In this paper, attack success probability in the SDR network to which the MTD technology is applied is analyzed in a mathematical way and compared with the simulation results.