• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.027 seconds

Design and Implementation of Quality Evaluation Toolkit of Analysis Phase Product (분석단계 산출물에 대한 품질평가툴킷의 설계 및 구현)

  • Yang, Hae-Sool
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1719-1732
    • /
    • 1997
  • In the software development process, various development product are made in each phase of lifecycle. Formless software is visualized by products, and quality management is implemented by management for products. But, because standardization for products which is made in the development process is not established practically, developers use different development methodologies or documentation specifications. Therefore the reality is that quality evaluation is not implemented along standardized methodology or systematic process. In this paper, we constructed quality management system and designed and implemented analysis phase quality evaluation toolkit. We constructed quality external and internal character to evaluate software quality for quality management and constructed relational metrics and system of qualitative quantitative evaluation element items and, under these systems, we constructed quality evaluation toolkit and Implemented functions and evaluated products.

  • PDF

An Empirical Study on Quality Evaluation & Improvement of Component Development Documents (컴포넌트 개발 문서의 품질 평가 및 개선에 관한 경험적 연구)

  • Jang, Yun-Jeong;Lee, Gyeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.435-446
    • /
    • 2002
  • Recently, many IT organizations develop software system with reusable component. Effective reusing of components increases software development productivity and quality. And, development of high quality component documents decrease maintenance problems, which are issues in component-based software development. In this paper, we propose a quality evaluation model of component development documents by empirical research. It consists of component quality reference model (CQRM) and quality evaluation model (CQEM). CQRM contains quality guidelines for component developers. CQEM contains evaluation guidelines for component consumers and distributors. We performed case study to verify this paper. Also, we presented quality improvement methods and improvement effects of component development documents. The quality evaluation model of component development documents proposed in this paper leads component development documents with high quality, and provides a rational quality evaluation model.

Development of Defect Classification Program by Wavelet Transform and Neural Network and Its Application to AE Signal Deu to Welding Defect (웨이블릿 변환과 인공신경망을 이용한 결함분류 프로그램 개발과 용접부 결함 AE 신호에의 적용 연구)

  • Kim, Seong-Hoon;Lee, Kang-Yong
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.21 no.1
    • /
    • pp.54-61
    • /
    • 2001
  • A software package to classify acoustic emission (AE) signals using the wavelet transform and the neural network was developed Both of the continuous and the discrete wavelet transforms are considered, and the error back-propagation neural network is adopted as m artificial neural network algorithm. The signals acquired during the 3-point bending test of specimens which have artificial defects on weld zone are used for the classification of the defects. Features are extracted from the time-frequency plane which is the result of the wavelet transform of signals, and the neural network classifier is tamed using the extracted features to classify the signals. It has been shown that the developed software package is useful to classify AE signals. The difference between the classification results by the continuous and the discrete wavelet transforms is also discussed.

  • PDF

A Research on Virtual Disk Reconstruction Method on Windows Storage Space (윈도우 저장소 공간 시스템 상의 가상 디스크 재구성 방법 연구)

  • Kim, Junho;Choi, Hoyong;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.27-38
    • /
    • 2018
  • Recently, as the amount of digital data rapidly increases, a large storage space is required. RAID is a system that can manage large capacity storage space. Storage space provided by Windows is a type of software RAID. Storage space has been supported since Windows 8, Windows Server 2012, and no analysis has been done on the functionality. To analyze system using storage space, analysis of storage space function and reconstruction method of virtual disk should be studied. In this paper, we briefly describe the layout of existing RAID, explain the layout and metadata of storage space of software RAID, present reconstruction method of virtual disk by disk layout, and verify the result through experiments.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

Extended UDDI System for Registering and Discovering the Reusable Services (재사용 서비스의 등록/검색을 위한 확장된 UDDI 시스템)

  • Shin, Soohye;Baek, Sunjae;Park, Joonseok;Moon, Mikyeong;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.24 no.3
    • /
    • pp.101-110
    • /
    • 2011
  • Web Service which consists of SOAP, WSDL and UDDI is a software system that enables interactions of heterogeneous systems on networks with standardized XML message. Especially, UDDI is a registry for supporting the registration of a service by service publisher and discovery of a service by service requester. The preliminary studies are just about publishing and searching services. It presents the researches about UDDI study for improvement of searching a service and extended UDDI design for improvement of reusability with service components aspects. In this paper, we suggest not only features about publishing and searching services of existing UDDI system but also novel UDDI data structures and API for a reusable service model. In addition, we design and implement an extended UDDI system for publishing and finding the reusable services. Therefore, by using proposed UDDI systems, service developers reduce development costs and time through developing a service application reusing the already implemented services. In addition, it can expect to ensure the quality of services by reusing the proven services.

  • PDF

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Development and application of SW fusion safety education program applying Novel Engineering (Novel Engineering을 적용한 SW융합 안전교육 프로그램 개발 및 적용)

  • Hong, Ji-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.193-200
    • /
    • 2019
  • The 2015 revised curriculum aims to cultivate a 'creative fusion talent' capable of creating new knowledge and fusing various knowledge to create new value. Therefore, it is strengthening reading education to raise humanistic imagination and software education to promote scientific creativity. In addition, we have created [Safe Living] textbooks based on experiential activities as a way to strengthen safety education that is becoming a social issue. And we use it to conduct safety education at creative activity time. Novel Engineering believes that it can develop thinking skills in the process of reading books and finding and solving problems in life in them. Therefore, in this study, we will develop software education programs for safety education that are applied with Novel Engineering and apply them to actual classes to verify the educational effectiveness of students' creative problem solving skills and safety education.

Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher (소프트웨어 기반 스트림 암호 Salsa20/12에 대한 상관도 전력분석 공격)

  • Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.35-45
    • /
    • 2011
  • The Salsa20/12 stream cipher selected for the final eSTREAM portfolio has a better performance than software implementation of AES using an 8-bit microprocessor with restricted memory space, In the theoretical approach, the evaluation of exploitable timing vulnerability was 'none' and the complexity of side-channel analysis was 'low', but there is no literature of the practical result of power analysis attack. Thus we propose the correlation power analysis attack method and prove the feasibility of our proposed method by practical experiments, We used an 8-bit RISC AVR microprocessor (ATmegal128L chip) to implement Salsa20/12 stream cipher without any countermeasures, and performed the experiments of power analysis based on Hamming weight model.

Development of Autonomous Behavior Software based on BDI Architecture for UAV Autonomous Mission (무인기 자율임무를 위한 BDI 아키텍처 기반 자율행동 소프트웨어 개발)

  • Yang, Seung-Gu;Uhm, Taewon;Kim, Gyeong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.312-318
    • /
    • 2022
  • Currently, the Republic of Korea is facing the problem of a decrease in military service resources due to the demographic cliff, and is pursuing military restructuring and changes in the military force structure in order to respond to this. In this situation, the Army is pushing forward the deployment of a drone-bot combat system that will lead the future battlefield. The battlefield of the future will be changed into an integrated battlefield concept that combines command and control, surveillance and reconnaissance, and precision strike. According to these changes, unmanned combat system, including dronebots, will be widely applied to combat situations that are high risk and difficult for humans to perform in actual combat. In this paper, as one of the countermeasures to these changes, autonomous behavior software with a BDI architecture-based decision-making system was developed. The autonomous behavior software applied a framework structure to improve applicability to multiple models. Its function was verified in a PC-based environment by assuming that the target UAV is a battalion-level surveillance and reconnaissance UAV.