• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.029 seconds

Development of Assistive Software for color blind to Electronic Documents (전자문서용 색각 장애 보정 소프트웨어 개발)

  • Jang, Young-Gun
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.535-542
    • /
    • 2003
  • This study is concerned with an assistive technology which reduces color blinds´s confusion when they access electronic documents including color objects in their computers. In this study, 1 restrict the assistive technology would apply to windows operating system, 256 color mode and implement to minimize color distortion which occurs in multi window environments because of color approximation process. As a basic palette, I use a 216 colors web safe palette which the Christine proposed as a standard for color blind, expand it to 256 colors to apply all computer displays using Microsoft Windows as its operating system and implement it as windows application. To test its effectiveness, I use a simulator for dichromats, as results of the test, the developed color vision deficiency correction S/W is effective to reduce the confusion. It is more effective to use the implemented S/W in both of design and client process for electronic documents.

Application of a REID-Based Monitoring System for the Concrete Pour Process (RFID를 응용한 콘크리트 타설 모니터링 시스템의 적용방안)

  • Moon, Sung-Woo;Hong, Seung-Moon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.3
    • /
    • pp.142-149
    • /
    • 2007
  • A ubiquitous environment in construction should be developed integrating hardware and software systems. The objective of this paper is to study the feasibility of applying the RFID technology to the concrete pour process, and improve the effectiveness of data exchange A pilot system of u-CPS (Ubiquitous Concrete Pour System) has been developed to test the feasibility. The pilot can automatically generate the data for concrete pour work such as departure time, arrival time, concrete pour time. Construction managers can keep track of the progress of concrete pour work using the information. A case study was done for a building construction using the pilot system, the result of which demonstrated that the RFID-base system can help improve the effectiveness of data communication during the concrete pour process.

Development and usability evaluation of a Collaborative Mind map Authoring Tool (협업을 위한 공동 작업용 마인드맵 도구 개발 및 사용성 평가)

  • Sin, Eun Joo;Choi, Ja-Ryoung;Im, Su Jie;Lim, Ji Su;Choi, Yu Jin;Lim, Soon Bum
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.187-192
    • /
    • 2018
  • Mind map is a very useful technique for brainstorming. Therefore, it can be effectively used for collaboration as a creative group conception. However, existing mind map software is not possible to collaborate because it is difficult to share mind map or discuss among members. In this study, we developed a mind map system that can support collaborative work as well as individual authoring and editing. This can incorporate individual mind maps of members into mind map of team, share and discuss them, and modify the mind map. This is convenient because it does not require a separate program installation, and verifies usability to support the process of collaborative process through usability evaluation.

A Decomposition Method for TMMi Maturity Level 1 using Process Area Dependency Analysis (프로세스 영역 의존성을 이용한 TMMi 레벨 1 단계화 방안)

  • Kim, Seon-Joon;Rhew, Sung-Yul;Oh, Kie-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.189-196
    • /
    • 2010
  • Domestic software test maturity level is the most Level 2 below based on TMMi. The first condition of enhancement of test maturity is that know exactly what the current maturity. There is no Level 1 definition in TMMi, but even the same level of maturity level of an organization, there are clear differences. In this study, grasp a maturity level of Level 1 organization, while less effort to improve in Level organization, the ways to achieve Level 2 is presented. Sub practices with dependencies in Level 2 is grouped with the corresponding process areas and define a Level 1 newly at 3 phases. If sub practices with dependencies are tied and improve a process, it will produce the effect which attains the practices all at once. Verify the adequacy of three phases, as a result, an organization clearly identify Test Maturity Level 1, we know that the organization can set specific improvement goals and direction.

SSD Test case generation method for early defect detection (불량 조기 검출을 위한 SSD 테스트 케이스 개발 방법)

  • Son, Myeong-Gyu;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.6
    • /
    • pp.542-550
    • /
    • 2015
  • Usually, a new SSD (Solide State Drive) product is developed based on the software platform of the previous product. Therefore, when using the same test case was used to evaluate the previous generation evaluation of new products are a number of advantages may be, but a priority or weight is the inefficiency exists in the use of the evaluation resources due to not considered. A new method is proposed to prevent the waste of testing resources. Through the analysis of the evaluation data for the previous products, the combinations of testing cases with the highest probability for defect detections are identified. When the software is to be reused, most part of the base software platform is rarely modified and only some modules are added or modified. So, the whole software system may have similar types of defects with the previous products. By utilizing the evaluation data for the previous proucts, we can detect defects at an early stage.

Event and Command based Fuzzing Method for Verification of Web Browser Vulnerabilities (웹 브라우저 취약성 검증을 위한 이벤트 및 커맨드 기반 퍼징 방법)

  • Park, Seongbin;Kim, Minsoo;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.535-545
    • /
    • 2014
  • As the software industry has developed, the attacks making use of software vulnerability has become a big issue in society. In particular, because the attacks using the vulnerability of web browsers bypass Windows protection mechanism, web browsers can readily be attacked. To protect web browsers against security threat, research on fuzzing has constantly been conducted. However, most existing web browser fuzzing tools use a simple fuzzing technique which randomly mutates DOM tree. Therefore, this paper analyzed existing web browser fuzzing tools and the patterns of their already-known vulnerability to propose an event and command based fuzzing tool which can detect the latest web browser vulnerability more effectively. Three kinds of existing fuzzing tools were compared with the proposed tool. As a result, it was found that the event and command based fuzzing tool proposed was more effective.

Development of the System Controller for the Airborne Small SAR (KOMSAR) (항공기탑재 소형 영상레이더 (KOMSAR) 시스템 제어기 개발)

  • Hwang, Yong-Chul;Lee, Cheol-Hoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.3
    • /
    • pp.86-92
    • /
    • 2005
  • Synthetic Aperture Radar is an active sensor utilizing the microwaves in order to get the requested high resolution imageries day or night regardless of the weather conditions. In this paper, the architecture of a real-time system controller for the airborne small SAR system, KOrea Miniature SAR which was developed by Agency for Defense Development is proposed considering the embedded real-time environment. The main purpose of the system controller is to control the internal and the rest of subsystem within SAR system in real-time. The main characteristics of the proposed system controller were implemented using the real-time operating system and the distributed hardware architecture for the small, low weight and real-time operation. The system controller performance and real-time operation were verified and confirmed by the demo flight with the KT-1 airplane.

Design and Evaluation of Intelligent Helmet Display System (지능형 헬멧시현시스템 설계 및 시험평가)

  • Hwang, Sang-Hyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.5
    • /
    • pp.417-428
    • /
    • 2017
  • In this paper, we describe the architectural design, unit component hardware design and core software design(Helmet Pose Tracking Software and Terrain Elevation Data Correction Software) of IHDS(Intelligent Helmet Display System), and describe the results of unit test and integration test. According to the trend of the latest helmet display system, the specifications which includes 3D map display, FLIR(Forward Looking Infra-Red) display, hybrid helmet pose tracking, visor reflection type of binocular optical system, NVC(Night Vision Camera) display, lightweight composite helmet shell were applied to the design. Especially, we proposed unique design concepts such as the automatic correction of altitude error of 3D map data, high precision image registration, multi-color lighting optical system, transmissive image emitting surface using diffraction optical element, tracking camera minimizing latency time of helmet pose estimation and air pockets for helmet fixation on head. After completing the prototype of all system components, unit tests and system integration tests were performed to verify the functions and performance.

Analysis of Performance of Spoofing Detection Algorithm in GPS L1 Signal (GPS L1 기만신호 검출 알고리즘 성능 분석)

  • Kim, Taehee;Kim, Jaehoon;Lee, Sanguk
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.29-35
    • /
    • 2013
  • In this paper, we investigate the type and detection methode of spoofing attack, and then analyze the performance of spoofing detection algorithm in GPS L1 signal through the simulation. Generally spoofer is different from the jammer, because the receiver can be operated and not. In case of spoofing the GPS receiver is hard to recognize the spoofing attack and can be operated normally without stopping because the spoofing signal is the mimic GPS signal. To evaluate the performance of spoofing detection algorithm, both the software based spoofing and GPS signal generator and the software based GPS receiver are implemented. In paper, we can check that spoofing signal can affect to the DLL and PLL tracking loop because code delay and doppler frequency of spoofing. The spoofing detection algorithm has been implemented using the pseudorange, signal strength and navigation solution of GPS receiver and proposed algorithm can effectively detect the spoofing signal.

A Research of Design and Implementation of Visual Program to Displaying External Factors of Marine Buoy using Quest3D (Quest3D 기반 해상부표 동적안정성의 시각적 표현 프로그램 설계 및 구현에 관한 연구)

  • Lee, Seo-Jeong;Lee, Jae-Wook;Gug, Seung-Gi
    • Journal of Navigation and Port Research
    • /
    • v.36 no.8
    • /
    • pp.599-605
    • /
    • 2012
  • As vessels are faster and bigger, higher safety navigation techniques have been required. In marine traffic area, buoy is to be one of the most important equipment, so that it should be built stable and robust. Verification in design level is good to accomplish it. This paper tries to implement visual program to confirm the external stability, which shows the movement on water by external factors such as wind, tide and current. Considering further requirements for additional influences or functions, design architecture for program introduces the concept of software component. Using Quest3D as the graphic tool, visual programming with software component concept can be implemented.