In this paper, we study abstracting and identifying license file from a package to prevent unintentional intellectual property infringement because of lost/modified/confliction of license information when redistributing open source software. To invest character of the license files, we analyzed 322 licenses by n-gram and TF-IDF methods, and abstract license files from the packages. We identified license information with a similarity of the registered licenses by cosine measurement.
A copyright evaluation is a way to decide a illegal modification between the original product and the suspected product as modification. To compare to two product, the copyright association took an estimation to the first product and illegal copy product. The evaluation expert do compare both product as the request list from the coptright association. Then he excludes the comparison item as detail to seeking objective result. This detailed comparison item should have a serious concentraion as it hss a sensitivity for the decision. In this study, it was analyzed and illustrated the detailed item as for actual evaluation materials.
Recently, as the environment of the technology and market of computer program works has changed, the cases to designate an object code as a standard regarding copyright disputes are increasing. Accordingly, it hereby examines such standard based on the object code in terms of copyright laws as well as suggests the necessity to establish the appropriate method to perform comparison and analysis by referring to the elements subject to the copyright laws significantly.
Software reuse is to reduce software develop cost and to improve software quality. But the general understanding of existing software is required in order to software reuse. Otherwise It is more efficient to newly software developed.In this study, we proposed an association analysis model for Software Reuse success using Apriori algorithm. We analyzed success factor and column's association of software reuse in software reuse dataset. The evaluation results showed that software reuse is successful when Rewards.Policy=no, Type of Software production=product-family, Human Factors=yes, Repository=yes, Top Management Commitment=Yes. And we showed that six columns have association with each other.
These days, wireless communications provide several advantages such as easy deployment, less network construction cost, and comparable bandwidth to the wired network. But the wireless network is more vulnerable to the malicious cyber attacks.
In this paper, attack success probability in the SDR network to which the MTD technology is applied is analyzed in a mathematical way and compared with the simulation results.