• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.027 seconds

Design and Implementation of Hand-Held Inspection Device for High Performance Mobile TFT LCD/OLED Module (고성능 모바일 TFT LCD/OLED 모듈을 위한 헨드헬드 검사장비 설계 및 구현)

  • Moon, Seung-Jin;Kim, Hong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6B
    • /
    • pp.630-640
    • /
    • 2009
  • The thesis suggests hand-held equipment to overhaul for mobile TFT LCD/OLED module of high-performance. The established module equipment to overhaul could distinguish outputting video data to module for distinguishing flicker, but it is impossible with low system. In this thesis, supporting system could check the various supplement functions from bringing equipment to overhaul without changing design of FPGA or H/W the module various size for equipment to overhaul for module of high-performance coincidently. The system includes hand-held equipment to overhaul, test software embedded and software a base personal computer and have designed to output, save, and certify all contents of module test of hand-held equipment to overhaul to interface universal serial bus. Setting up 9 items that represent for efficient verification of the proposed system have been possible confirmation with TFT LCD/OLED module of high-performance, establishment scan time, creation gamma, changing register, supporting interface, and multi inch modules.

A Reflectornet Based on Software Defined Network (소프트웨어 정의 네트워크 기반 리플렉터넷)

  • Park, Taejune;Lee, Seungsoo;Shin, Seoungwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.397-405
    • /
    • 2014
  • Software-Defined Networking (SDN), which separates the control plane from the data plane and manages data planes in a centralized way, is now considered as a future networking technology, and many researchers and practitioners have dived into this area to devise new network applications, such new routing methods. Likewise, network security applications could be redesigned with SDN, and some pioneers have proposed several interesting network security applications with SDN. However, most approaches have just reimplemented some well-known network security applications, although SDN provides many interesting features, They didn't effectively use them. To investigate if we can use SDN in realizing sophisticated network security applications, we have designed and implemented an advanced network security application, Reflectornet, which redirects malicious or suspicious network trials to other security monitoring points (e.g., honeypot). In addition, we have tested its performance and practicability in diverse angles. Our findings and some insights will encourage other researchers to design better or intelligent network security applications with SDN.

Development of MPEG-4 Audio Streaming Player on Mobile Terminal with Embedded Linux Processor (내장형 리눅스 기반 이동 단말기에서의 MPEG-4 오디오 스트리팅 재생기의 구현)

  • Cha, Kyung-Ae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.117-123
    • /
    • 2008
  • In this paper, we develop MPEG-4 AAC streaming player on embedded Linux processor such as mobile terminals. Moreover we show the experimental results that the player preforms the decoding processes of MPEG-4 AAC data effectively. MPEG-4 AAC technology supports a wide range encoding rates and high sound quality so it is appropriate to adopt various applications. In particular, the need in the development of the application of audio data increases according to significantly increase in devices used in mobile environments, such as cell phones and PDAs. In this environment, it is necessary to optimize the decoding processes to the ability of the terminal hardware in order to play audio data without delays. We also implement the decoding module to optimize the processor capabilities and make the player to decode and play streaming audio data from streaming server.

  • PDF

An Autonomous Navigation System for Unmanned Underwater Vehicle (무인수중로봇을 위한 지능형 자율운항시스템)

  • Lee, Young-Il;Jung, Hee;Kim, Yong-Gi
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.3
    • /
    • pp.235-245
    • /
    • 2007
  • UUV(Unmanned Underwater Vehicle) should possess an intelligent control software performing intellectual faculties such as cognition, decision and action which are parts of domain expert's ability, because unmanned underwater robot navigates in the hazardous environment where human being can not access directly. In this paper, we suggest a RVC intelligent system architecture which is generally available for unmanned vehicle and develope an autonomous navigation system for UUV, which consists of collision avoidance system, path planning system, and collision-risk computation system. We present an obstacle avoidance algorithm using fuzzy relational products for the collision avoidance system, which guarantees the safety and optimality in view of traversing path. Also, we present a new path-planning algorithm using poly-line for the path planning system. In order to verify the performance of suggested autonomous navigation system, we develop a simulation system, which consists of environment manager, object, and 3-D viewer.

Statistical Test for Performance Evaluation of Code Carrier Divergence Detection at a GBAS Reference Station (GBAS 기준국의 코드 반송파 발산 검출성능 평가를 위한 통계시험)

  • Yun, Young-Sun;Kim, Joo-Kyoung;Cho, Jeong-Ho;Heo, Moon-Beom;Nam, Gi-Wook
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.9
    • /
    • pp.760-770
    • /
    • 2012
  • In order to provide precision approach service based on GBAS, air navigation service providers should validate the GBAS system performance against international standard requirements and receive approval. The GBAS manufacturer should define integrity threat, analyze the integrity monitors and evaluate performance of the implemented monitors to verify integrity performance which is critical to the aircraft safety. This paper describes a statistical test result to evaluate performance of the code carrier divergence monitors implemented in KARI Integrity Monitor System software. The paper introduces analysis and test procedure which is developed for the performance evaluation and describes the analysis, the test scenario generation and the test results. The results show that the implemented monitors can detect the expected minimum detectable errors with satisfying the probability of missed detection requirements.

The Design and Implementation of Network Intrusion Detection System Hardware on FPGA (FPGA 기반 네트워크 침입탐지 시스템 하드웨어 설계 및 구현)

  • Kim, Taek-Hun;Yun, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.11-18
    • /
    • 2012
  • Deep packet inspection which perform pattern matching to search for malicious patterns in the packet is most computationally intensive task. Hardware-based pattern matching is required for real-time packet inspection in high-speed network. In this paper, we have designed and implemented network intrusion detection hardware as a Microblaze-based SoC using Virtex-6 FPGA, which capture the network input packet, perform hardware-based pattern matching for patterns in the Snort rule, and provide the matching result to the software. We verify the operation of the implemented system using traffic generator and real network traffic. The implemented hardware can be used in network intrusion detection system operated in wire-speed.

Experimental Study of Keyword-Based Exploratory Testing (키워드 기반 탐색적 테스트의 실험적 연구)

  • Hwang, Jun Sun;Choi, Eun Man
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.13-20
    • /
    • 2020
  • The exploratory test was introduced as a desirable test method due to its fast development cycle, but it is not actively adopted because documentation and analysis of the test range are required for application. On the other hand, keyword-based testing has been introduced as a way to save resources and facilitate maintenance, but it is difficult to plan tests in advance due to the large number of variables such as data, settings, interactions, sequence and timing. However, in keyword-based testing, you can create a test case based on keywords by presenting clear criteria and methods for creating keywords and applying the exploration testing process. In this paper, we propose a model that automates exploratory tests based on keywords. To verify the effectiveness, we compared the general keyword-based test(KBT) and keyword-based exploratory test(KBET), and compared with the exploratory normal test case(ETC) and keyword-based exploratory test(KBET).

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

An Empirical Study on Factors Affecting an Individual User's Behavioral Intention to Use SaaS (개인 사용자의 SaaS 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Hong, Il-Yoo;Lee, Seung-Min;Cho, Hwi-Hyung
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.75-94
    • /
    • 2018
  • Today, Software as a Service(SaaS) is being recognized as a key means to enable the innovation of software distribution. Despite the increase in the interest in SaaS, individuals as well as businesses are not yet making an extensive use of it. This research is aimed at identifying and analyzing the antecedents of intentions to use SaaS. We proposed a research model to predict an individual's intention to use SaaS based on the Technology Acceptance Model(TAM). To this end, we conducted a questionnaire survey in which actual software users participated. An empirical analysis has been performed to test the reliability and validity and the hypotheses using SPSS and AMOS software packages. The results of the analysis revealed that functionality, interoperability and economic benefits have positive effects on the intention to use SaaS, while system quality has no significant effect on the behavioral intention. We discussed practical as well as academic implications, and provided research directions.

An Implementation of Group Objects in CORBA (CORBA상에서의 그룹객체의 구현에 관한 연구)

  • Ryu, Gi-Yeol;Lee, Jeong-Tae;Byeon, Gwang-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.234-246
    • /
    • 1999
  • As an application software in distributed computing environment becomes large, the number of objects to be created increases drastically and the interfaces among them become very complex, The concept of group object resolves this problem to some extent by grouping a set of related objects, encapsulating them and controlling their interfaces systematically. In this paper, we propose an implementation model f the group object concept in CORBA, which is a standard middle ware for developing distributed application software on heterogeneous networks. To support group objects we extends CORBA ORB without modifying its internal structure for the compatibility with existing CORBA applications. And we devise an interface definition language by extending CORBA IDL to describe group objects in a language-independent style, which is one of the most important characteristics in CORBA. Finally, we experiment the implementation model on a CORBA ORB compliant product which supports the Java language.

  • PDF