• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.038 seconds

A Model-Based Interface to Cloud Services for Intelligent Service Robots (지능형 서비스 로봇을 위한 모델 기반 클라우드 서비스 인터페이스)

  • Choi, Byunggi;Lee, Jonguk;Park, Sunggi;Lee, Jaeho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.1
    • /
    • pp.1-10
    • /
    • 2020
  • Service robots providing services according to user's needs in dynamically changing environments should be able to utilize external services such as cloud services. Cloud services are, however, changing and expanding continuously and thus the interface to the services must be general and flexible to adapt to the changes of the functionality and data of the services. In order to facilitate the adaptation of the interface to the changes, a model-based general interface to various cloud services is proposed. In this approach, a general and extensible interface is realized by defining standard service profiles that can be easily extended to adapt to the changed services. Experiments with intelligent service robots show satisfying results exhibiting flexible adaptations to new or changed external services.

An Algorithm to generate SMIL Documents from Temporal Scripts of Animation Component (애니메이션 컴포넌트의 시간적 스크립트로부터 SMIL 문서 생성 알고리즘)

  • Ha, Yan
    • The KIPS Transactions:PartB
    • /
    • v.10B no.1
    • /
    • pp.111-118
    • /
    • 2003
  • The SMIL specification that is recently approved by the W3C and is meant to help deliver multimedia content to the Web, is widely used in these days and they have continuously emerged tools or softwares related with that. In this paper, I propose an algorithm to convert temporal scripts of RASP that is an experimental toolkit for computer animation that promotes interaction-based programming over time into a SMIL document. For making better use of SMIL documents, we can improve reusability of animation components. And, main contribution of this paper is that it verifies the sequence diagram generated for synchronization of documents by reconverting SMIL from UML sequence diagram.

Analysis of fire hazard of karaoke utilizing the fire simulation (화재시뮬레이션을 활용한 노래방 화재 위험성 분석)

  • Kim, Tae Kwon;Park, Jong Choel
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.2533-2538
    • /
    • 2014
  • In this study, 2-zone model CFAST software was used to predict the fire hazard of karaoke. Model is a three-dimensional unsteady state. Accuracy of CFAST is verified by comparing result of CFAST analysis with result of real fire experiment. For analysis results, the oxygen concentration were reduced to 10% within 5 minutes in room 5, the carbon dioxide concentration were increased to 5%. Therefore, at the enclosed space like karaoke, we can predict that dangerous situation would occur and people be suffocated because of toxic gas.

A Comparative Experiment of Software Defect Prediction Models using Object Oriented Metrics (객체지향 메트릭을 이용한 결함 예측 모형의 실험적 비교)

  • Kim, Yun-Kyu;Kim, Tae-Yeon;Chae, Heung-Seok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.8
    • /
    • pp.596-600
    • /
    • 2009
  • To support an efficient management of software verification and validation activities, many defect prediction models have been proposed based on object oriented metrics. They usually adopt logistic regression analysis, And, they state that the correctness of prediction is about 60${\sim}$70%, We performed a similar experiment with Eclipse 3.3 to check their prediction effectiveness, However, the result shows that correctness is about 40% which is much lower than the original results. We also found that univariate logistic regression analysis produces better results than multivariate logistic regression analysis.

Protecting Technique for the Executable File of Virtual Machines (가상기계 실행파일을 위한 보호 기법)

  • Park, Ji-Woo;Yi, Chang-Hwan;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.668-678
    • /
    • 2007
  • The development of a wire and wireless communication technologies might permit easily accessing on various information. But, the easiness of accessing information has basically the problem of an unintended information outflow. An executable file which has key algorithms, data and resources for itself has very weak point in the security. Because the various information such as algorithms, data and resources is included in an executable file on embedded systems or virtual machines, the information outflow problem may appear more seriously. In this paper, we propose a technique which can be protecting the executable file contents for resolving the outflow problem through the encryption. Experimentally, we applied the proposed technique to EVM-the virtual machine for embedded system and verified it. Also, we tried a benchmark test for the proposed technique and obtained reasonable performance overhead.

  • PDF

Calculating Attribute Weights in K-Nearest Neighbor Algorithms using Information Theory (정보이론을 이용한 K-최근접 이웃 알고리즘에서의 속성 가중치 계산)

  • Lee Chang-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.9
    • /
    • pp.920-926
    • /
    • 2005
  • Nearest neighbor algorithms classify an unseen input instance by selecting similar cases and use the discovered membership to make predictions about the unknown features of the input instance. The usefulness of the nearest neighbor algorithms have been demonstrated sufficiently in many real-world domains. In nearest neighbor algorithms, it is an important issue to assign proper weights to the attributes. Therefore, in this paper, we propose a new method which can automatically assigns to each attribute a weight of its importance with respect to the target attribute. The method has been implemented as a computer program and its effectiveness has been tested on a number of machine learning databases publicly available.

A Hypertext Categorization Method using Incrementally Computable Class Link Information (점진적으로 계산되는 분류정보와 링크정보를 이용한 하이퍼텍스트 문서 분류 방법)

  • Oh, Hyo-Jung;Myaeng, Sung-Hyoun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.7
    • /
    • pp.498-509
    • /
    • 2002
  • As WWW grows at an increasing speed, a classifier targeted at hypertext has become in high demand. While document categorization il quite mature, the issue of utilizing hypertext structure and hyperlinks has been relatively unexplored. In this paper, we propose a practical method for enhancing both the speed and the quality of hypertext categorization using hyerlinks. In comparison against a recently proposed technique that appears to be the only one of the kind, we obtained up to 18.5% of improvement in effectiveness while reducing the processing time dramatically. We attempt to explain through experiments what factors contribute to tile improvement.

A Design of the Structure of Net-Enabled Weapon Model for Scalability of Weapon Model and Modifiability of the Protocol in The Weapon Data Link Simulation (무장데이터링크 시뮬레이션 환경에서 유도탄모델 확장성과 프로토콜 변경용이성을 고려한 네트워크기반 유도탄모델 시뮬레이션 구조 설계)

  • Kim, Sung-Tae;Shim, Jun-Young;Lee, Won-Sik;Wi, Soung-Hyouk;Kim, Ki-Bum
    • Annual Conference of KIPS
    • /
    • 2019.10a
    • /
    • pp.697-700
    • /
    • 2019
  • 무장데이터링크 시뮬레이션은 네트워크 기반 유도무기 모델링을 위하여 M&S 기술을 바탕으로 무장데이터링크의 운용성 및 정밀타격 성능을 검증하기 위한 시뮬레이션 소프트웨어다. 네트워크 기반 유도무기 모델은 원격임무통제를 위한 무장데이터링크망과 가상전장을 위한 시뮬레이션망이 연동하는 분산네트워크 환경에서 동작한다. 이때 유도탄모델 인터페이스는 다수의 프로토콜과 종속관계를 갖게 된다. 따라서 프로토콜이 수정될 때마다 유도탄모델 뿐만 아니라, 해당 인터페이스를 사용하는 다른 프로토콜도 수정되어야 한다. 또한 시뮬레이션 특성상 다양한 운용개념이 유도탄모델에 적용될 수 있다. 기존 고정표적 유도탄모델에 임무통제기능을 적용할 경우, 기존 모델이 훼손될 뿐만 아니라 기능 추가 및 삭제가 쉽지 않다는 문제가 있다. 본 논문은 서로 다른 프로토콜을 유도탄모델에 쉽게 적용하고 변경할 수 있는 프로토콜 변경용이성과 기 개발된 고정표적 유도탄모델을 변경하지 않고 무장데이터링크 운용 개념을 적용할 수 있는 유도탄모델 확장성을 위한 구조를 제안한다.

Twitter Sentiment Analysis for the Recent Trend Extracted from the Newspaper Article (신문기사로부터 추출한 최근동향에 대한 트위터 감성분석)

  • Lee, Gyoung Ho;Lee, Kong Joo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.731-738
    • /
    • 2013
  • We analyze public opinion via a sentiment analysis of tweets collected by using recent topic keywords extracted from newspaper articles. Newspaper articles collected within a certain period of time are clustered by using K-means algorithm and topic keywords for each cluster are extracted by using term frequency. A sentiment analyzer learned by a machine learning method can classify tweets according to their polarity values. We have an assumption that tweets collected by using these topic keywords deal with the same topics as the newspaper articles mentioned if the tweets and the newspapers are generated around the same time. and we tried to verify the validity of this assumption.

하상재료에 따른 세굴에 대한 기초 실험 연구

  • Kim, Gwang Soo;Jung, Dong gue;Kim, Young Do;Park, Yong Sung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.138-138
    • /
    • 2018
  • 국내의 기상 이변으로 인해 강우의 급격한 증가로인해 하천의 허용유량이 초과하여 제방의 침식 또는 하상변화등의 문제가 발생되고 있다. 국내 하천 사업에서 호안공법을 도입할 때 유속과 하상재료에 따라 하천의 하상변동에 미치는 영향을 파악하고 설계하는 것은 하천설계기준에 있어 매우 중요하다. 본 연구에서는 다양한 유속 범위에서 하상재료에 따라 세굴 정도를 측정하고 하상재료에 대한 한계유속과 세굴 관계를 통해 호안 및 제방에 발생하는 영향을 정성적 평가를 통해 기초적 데이터베이스를 구축하고자 실험연구를 진행하였다. 실험에 사용된 재료는 실제 제방을 구성하고 있는 재료로 모래, 황토, 자연제방에 있는 응고된 토양을 이용하였으며, 실험실규모의 고속수로 실험 장치를 이용하여 유속의 변화에 따라 재료의 세굴을 측정하고 이를 통해 세굴 전 후의 재료를 비교분석하여 고유속흐름에서 하상재료에 따른 기초 세굴평가를 하고자 본 연구를 진행하였다. 기초 세굴평가에 사용되는 계측 기기, 평가는 인제대학교에서 소프트웨어, 특허 등록된 검증된 기법을 통해 산정하였다. 본 연구의 결과는 다양한 수리특성 및 세굴측정을 통한 재료에 대한 기초평가와 재료의 정량적 평가를 통한 호안 및 제방에 발생하는 정성적인 영향을 산정하였다.

  • PDF