• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.031 seconds

Development of MATLAB GUI Based Software for Analysis of KASS Availability Performance (KASS 가용성 성능 평가를 위한 MATLAB GUI 기반 소프트웨어 설계)

  • Choi, Bong-kwan;Han, Deok-hwa;Kim, Dong-uk;Kim, Jung-beom;Kee, Chang-don
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.384-390
    • /
    • 2018
  • This paper introduces a MATLAB graphical user interface (GUI) based software for analysis of korea augmentation satellite system (KASS) availability performance. This software uses minimum variance (MV) estimator and Kriging algorithm to generate integrity information such as user differential range error (UDRE) and grid ionospheric vertical error (GIVE). The information is offered to ground and aviation users in Korean region. The software also gives accuracy data, protection level data and availability map about each user position by using the integrity information. In particular the software calculates the protection level along a path of aircraft. We verified the result of protection level of aviation user by comparing them with the results of SBASimulator#2, which is a simulation tool of european geostationary navigation overlay service (EGNOS). As a result, the protection level error between the result of our software and the SBASimulator#2 was about 2% which means that the result of our software is accurate.

A Study for the Accessibility of Camera-Based Mobile Applications on Touch Screen Devices for Blind People (스마트기기에서 시각장애인을 위한 카메라기반 인식 소프트웨어 인터페이스의 접근성 연구)

  • Choi, Yoonjung;Hong, Ki-Hyung
    • Journal of the HCI Society of Korea
    • /
    • v.7 no.2
    • /
    • pp.49-56
    • /
    • 2012
  • The camera-based mobile applications such as color, pattern and object reading can improve the living quality of blind people. However currently available camera-based applications are uncomfortable for the blind, since these applications do not reflect accessibility requirements of the blind especially on touch screen. We investigated accessibility requirements about rapidly growing camera-based mobile applications on touch screen devices for the blind. In order to identify accessibility requirements, we conducted a usability testing for color reading applications with three different types of interfaces on Android OS. The results of the usability testing were as follows: (1) users preferred short depth of menu hierarchy, (2) the initial audio help was more useful than just-in-time help, (3) users needed both manual and automatic camera shooting modes although they preferred manual to automatic mode, (4) users wanted the OS supported screen reader function to be turned off during the color reading application was running, and (5) users required tactile feedback to identify touch screen boundary. We designed a new user interface for blind people by applying the identified accessibility requirements. From a usability testing of the new user interface with 10 blind people, we showed that the identified accessibility requirements were very useful accessibility guidelines for camera-based mobile applications.

  • PDF

Information Modeling of Railway Track using Information Iinkage of Railway Alignment and Alignment-based Objects (철도 선형중심의 객체 정보연계를 통한 철도 궤도부 정보모델 생성 방안)

  • Kwon, Tae Ho;Park, Sang I.;Shin, Min Ho;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.30 no.6
    • /
    • pp.507-514
    • /
    • 2017
  • As BIM has been widely used in the field of architecture, efforts to apply BIM to civil engineering structures are increasing rapidly. Since commercial BIM softwares are focused on building structure, it is difficult to apply to alignment-based civil infrastructures. In this study, we proposed a method to generate an information model that reflects cant by sharing information between alignment-centered modeling tools and BIM authoring tools to manage information of railway track. The railway track modeling process consists of classifying structures into continuous and non-continuous structures, creating continuous structures by alignment-centered modeling tools, and using the shared alignment information to generate information model of the non-continuous structures. Non-continuous structures were generated by an algorithm that calculates the position and rotation information of each structure based on discretized railway alignment and cant information transmitted to the BIM authoring tools. The availabilities of proposed method were studied by applying to the osong test-line. Using the test model, it was shown that the objects were identified, the properties were extracted, and the quantities of each structure were calculated.

An Integration of Legacy Nuclear Simulation Code into HLA Federation using Shared Memory (공유메모리를 사용한 레거시 원자력 시뮬레이션 코드의 HLA 패더레이션으로의 통합)

  • Park Geun-Ok;Han Kwan-Ho;Lim Jong-Tae
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.797-806
    • /
    • 2005
  • The objective of the In-h(High Level Architecture) have recommended by DoD(Department of Defense) is to facilitate interoperability among simulations and to promote reuse of their components. There are many legacy simulation softwares developed before the HLA becomes simulation standard. The integration of legacy simulations into federations using the HLA is an important research topic in M&S(Modeling and Simulation) area. Legacy simulation softwares of the mission critical industry such as nuclear and aerospace are generally use Fortran language. However, the reuse of those is not easy because the HLA is not support Fortran language. This paper suggests a integration method which minimizes the modification of legacy simulation software and migrates the legacy simulation software to HLA federation. Each federate participating in federation have the separated executables that communicate via a shared memory created at run-time. Two types of shared memory blocks are used for publication and subscription. Declaration block for global variables used in legacy simulation software is separated for publication and subscription and then mapped as classes of objects and interactions for the HLA FOM design. To validate the suggested method, we approached the HLA integration of legacy nuclear simulation code being used in plant design and to observe the integration results, we used the FMT(Federation Management Tool). The diagnostic information which the FTM displays showed that our method can be successfully and effectively used for a HLA federation.

A Hardware Architecture for Estimating Optimal Capacity of Information System based on Simulation Model (시뮬레이션 모델을 이용한 정보시스템의 적정용량 추정을 위한 하드웨어 아키텍처)

  • Kim, Jeong-su;Lee, Eun-seok;Kim, Jong-hee;Park, Jong-kook;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.215-217
    • /
    • 2014
  • A system architecture design relying only on the experience of its designer varies in quality in line with the designer's personal experience and knowledge ability. Likewise, a wrong estimation of hardware capacity ends up in waste of resources. In practice, a range of post-hoc monitoring tools are in operation, without providing any method for estimating and reflecting the performance at an early stage of architecture design. Provided capacity requirement is estimated in advance with simulation at the stage of design, the system capacity ends up in waste of resources. In practice, a range of post-hoc monitoring tools are in operation, without providing any method for estimating and reflecting the performance at an early stage of architecture design. Provided capacity requirement is estimated in advance with simulation at the stage of design, the system performance requirement can be met with a minimal cost while the waste of resources can be reduced to a great extent. In this context, the present study develops a pilot simulation model for hardware architecture design and then verifies its validity in an experiment. If the error rate falls within a permissible range in the experiment, the simulation model may be considered to reflect well the characteristics of real-life information system architecture.

  • PDF

A Study on The Application of ISO/IEC 17025 Software Accredited Testing Institute Using ISO/IEC/IEEE 29119 and ISO/IEC 25023 (ISO/IEC/IEEE 29119와 ISO/IEC 25023을 이용한 ISO/IEC 17025 소프트웨어 공인시험기관 적용에 관한 연구)

  • Lee, Chang-Hee;Kim, Yoon-Sook;Noh, A-Reum;Yang, Jung-Sim;Kim, Myung-Sup;Song, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.97-106
    • /
    • 2020
  • The purpose of this study is to determine how to apply ISO/IEC/IEEE 29119 software test procedures and ISO/IEC 25023 software test evaluation items to software-accredited testing laboratories based on the ISO/IEC 17025 international standard requirements. As a method, the overall requirements for their application to a test laboratory were analyzed by mapping ISO/IEC/IEEE 29119 and ISO/IEC 25023 based on ISO/IEC 17025. According to the mapping analysis, a total of 29 documents were created, including quality manuals, procedures, and test guidelines for the operation of the test laboratory. As a result of the study, a test laboratory management system was developed using Confluence 6.15 software by applying the analyzed results of the overall requirements. The test procedures, documents, and records were stored in, and operated from, this system. Verification of suitability for operation of the test laboratory was conducted by KOLAS evaluators through a document review and an on-site audit at the LG Electronics SW Accredited Test Laboratory in Seoul. In conclusion, it was confirmed through the KOLAS evaluation that the test laboratory management system and the operation of the test laboratory are appropriate and, compared with previous cases, the test laboratory operates effectively, and the overall schedule of accreditation could be shortened.

Line Tracer Modeling for Educational Virtual Experiment (교육용 가상실험 라인 트레이서 모델링)

  • Ki, Jang-Geun;Kwon, Kee-Young
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.109-116
    • /
    • 2021
  • Traditionally, the engineering field has been dominated by face-to-face education focused on experimental practice, but demand for online learning has soared due to the rapid development of IT technology and Internet communication networks and recent changes in the social environment such as COVID-19. In order for efficient online education to be conducted in the engineering field, where the proportion of experimental practice is relatively high compared to other fields, virtual laboratory practice content that can replace actual experimental practice is very necessary. In this study, we developed a line tracer model and a virtual experimental software to simulate it for efficient online learning of microprocessor applications that are essential not only in the electric and electronic field but also in the overall engineering field where IT convergence takes place. In the developed line tracer model, the user can set various hardware parameter values in the desired form and write the software in assembly language or C language to test the operation on the computer. The developed line tracer virtual experimental software has been used in actual classes to verify its operation, and is expected to be an efficient virtual experimental practice tool in online non-face-to-face classes.

Measuring Similarity of Android Applications Using Method Reference Frequency and Manifest Information (메소드 참조 빈도와 매니페스트 정보를 이용한 안드로이드 애플리케이션들의 유사도 측정)

  • Kim, Gyoosik;Hamedani, Masoud Reyhani;Cho, Seong-je;Kim, Seong Baeg
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.15-25
    • /
    • 2017
  • As the value and importance of softwares are growing up, software theft and piracy become a much larger problem. To tackle this problem, it is highly required to provide an accurate method for detecting software theft and piracy. Especially, while software theft is relatively easy in the case of Android applications (apps), screening illegal apps has not been properly performed in Android markets. In this paper, we propose a method to effectively measure the similarity between Android apps for detecting software theft at the executable file level. Our proposed method extracts method reference frequency and manifest information through static analysis of executable Android apps as the main features for similarity measurement. Each app is represented as an n-dimensional vectors with the features, and then cosine similarity is utilized as the similarity measure. We demonstrate the effectiveness of our proposed method by evaluating its accuracy in comparison with typical source code-based similarity measurement methods. As a result of the experiments for the Android apps whose source file and executable file are available side by side, we found that our similarity degree measured at the executable file level is almost equivalent to the existing well-known similarity degree measured at the source file level.

Application and Development Strategies of a Secure Real-Time Operating System in Weapon Systems within the Defense Sector (국방분야 보안 RTOS의 무기체계 적용 및 발전 방안)

  • Sang-Seung Lee;Keun-Ha Choi;Seung-Hyeon Hwang;Hyun-Ji Kim;Kyung-Deok Seo;Hwa-Eun Seong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.189-193
    • /
    • 2024
  • As cyber threats increase in the defense sector, the security of weapon system software is becoming increasingly important. Currently, most of the embedded software installed in domestic weapon systems operates based on foreign real-time operating systems(RTOS) that have no security. As a result, the localization and security enhancement of embedded software for weapon systems have emerged as urgent tasks. This study aims to propose the application and development strategies of secure RTOS for weapon systems. To this end, we examined the technological trends of domestic and foreign RTOS and secure RTOS, and analyzed the problems of current embedded software in weapon systems. The results revealed major issues such as low localization, vulnerability to cyber attacks, difficulty in maintenance, increased costs, and loss of opportunities for accumulating technological capabilities. An investigation of the current status of embedded software applied to existing weapon systems found that embedded SW are in operation across all fields, including maneuver, firepower, protection, command and control, communication, naval vessels, and aircraft. Among them, 99% rely on foreign RTOS such as VxWorks. A review of the core functions and applicability of secure RTOS to weapon systems suggests that it can be applied to key areas requiring real-time performance and security, such as fire control, navigation devices, and flight control in existing and future weapon systems. However, ensuring performance and reliability, securing verification and compatibility, and systematic government support were raised as prerequisites.

A Study on Automated Fake News Detection Using Verification Articles (검증 자료를 활용한 가짜뉴스 탐지 자동화 연구)

  • Han, Yoon-Jin;Kim, Geun-Hyung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.569-578
    • /
    • 2021
  • Thanks to web development today, we can easily access online news via various media. As much as it is easy to access online news, we often face fake news pretending to be true. As fake news items have become a global problem, fact-checking services are provided domestically, too. However, these are based on expert-based manual detection, and research to provide technologies that automate the detection of fake news is being actively conducted. As for the existing research, detection is made available based on contextual characteristics of an article and the comparison of a title and the main article. However, there is a limit to such an attempt making detection difficult when manipulation precision has become high. Therefore, this study suggests using a verifying article to decide whether a news item is genuine or not to be affected by article manipulation. Also, to improve the precision of fake news detection, the study added a process to summarize a subject article and a verifying article through the summarization model. In order to verify the suggested algorithm, this study conducted verification for summarization method of documents, verification for search method of verification articles, and verification for the precision of fake news detection in the finally suggested algorithm. The algorithm suggested in this study can be helpful to identify the truth of an article before it is applied to media sources and made available online via various media sources.