• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.027 seconds

A Technique of Reusable and Reliable Device Driver Development For Embedded-Linux System (재사용성 및 신뢰성을 고려한 리눅스기반 임베디드 디바이스 드라이버 개발 기법)

  • Choi, Jae-Hyun;Lee, Woo-Jin;Chon, Ki-Won
    • The KIPS Transactions:PartD
    • /
    • v.12D no.7 s.103
    • /
    • pp.1065-1070
    • /
    • 2005
  • According to the development of embedded systems, they are used in various fields. However, the productivity and the quality of embedded systems are not acceptable because of the hardware environment-oriented development. Several works has proposed new techniques using a formal specification method or complex template, but due to high complexity and low flexibility of the method, it is difficult to be used. Accordingly, this paper presents a new approach to develop embedded device drivers which are kinds of embedded system software. In our approach, we define a light device driver template for ensuring high flexibility and productivity and generate the device driver by incorporating with embedded system information represented by XML. By using XML we consider the design phase in device driver development process for the quality of the driver. Our approach, improves the reusability of embedded device driver and finally, it will improve productivity and quality of embedded system.

Design and Implementation of CNN-based HMI System using Doppler Radar and Voice Sensor (도플러 레이다 및 음성 센서를 활용한 CNN 기반 HMI 시스템 설계 및 구현)

  • Oh, Seunghyun;Bae, Chanhee;Kim, Seryeong;Cho, Jaechan;Jung, Yunho
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.777-782
    • /
    • 2020
  • In this paper, we propose CNN-based HMI system using Doppler radar and voice sensor, and present hardware design and implementation results. To overcome the limitation of single sensor monitoring, the proposed HMI system combines data from two sensors to improve performance. The proposed system exhibits improved performance by 3.5% and 12% compared to a single radar and voice sensor-based classifier in noisy environment. In addition, hardware to accelerate the complex computational unit of CNN is implemented and verified on the FPGA test system. As a result of performance evaluation, the proposed HMI acceleration platform can be processed with 95% reduction in computation time compared to a single software-based design.

Hardware Implementation of Low-power Display Method for OLED Panel using Adaptive Luminance Decreasing (적응적 휘도 감소를 이용한 OLED 패널의 저전력 디스플레이 방법 및 하드웨어 구현)

  • Cho, Ho-Sang;Choi, Dae-Sung;Seo, In-Seok;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1702-1708
    • /
    • 2013
  • OLED has good efficiency of power consumption by having no power consumption from black color as different with LCD. when it has white color, all RGB pixel should be glowing with high power consumption and that can make it has short life time. This paper suggest the way of low power consumption for OLED panel using adaptive luminance enhancement with color compensation and implement it as hardware. This way which is based on luminance information of input image makes converted luminance value from each pixel in real time. There is with using the basic idea of chromaticity reduction algorithm, showing new algorithm of color correction. And performance of proposed method was confirmed by comparing the conventional method in experiments about 48.43% current reduction. The proposed method was designed by Verilog HDL and was verified by using OpenCV and Windows Program.

Genetic Algorithm based B-spline Fitting for Contour Extraction from a Sequence of Images (연속 영상에서의 경계추출을 위한 유전자 알고리즘 기반의 B-spline 적합)

  • Heo Hoon;Lee JeongHeon;Chae OkSam
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.5
    • /
    • pp.357-365
    • /
    • 2005
  • We present a B-spline fitting method based on genetic algorithm for the extraction of object contours from the complex image sequence, where objects with similar shape and intensity are adjacent each other. The proposed algorithm solves common malfitting problem of the existing B-spline fitting methods including snakes. Classical snake algorithms have not been successful in such an image sequence due to the difficulty in initialization and existence of multiple extrema. We propose a B-spline fitting method using a genetic algorithm with a new initial population generation and fitting function, that are designed to take advantage of the contour of the previous slice. The test results show that the proposed method extracts contour of individual object successfully from the complex image sequence. We validate the algorithm by false-positive/negative errors and relative amounts of agreements.

A Two-Phase Component Identification Method using Static and Dynamic Relationship between Classes (클래스들 간의 정적ㆍ동적 관계에 의한 2단계 컴포넌트 식별방법)

  • Choi Mi-Sook;Cho Eun-Sook;Park Jai-Nyun;Ha Jong-Sung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.1-14
    • /
    • 2005
  • It is difficult to identify reusable and independent components in component-based development(CBD) process. Therefore existing methodologies have dealt the problem of component identification based on only developer's intuition and heuristics. As a result, it is difficult to identify the business components by common developers. Therefore, in this paper, we propose a new baseline and technique to identify the business components based on domain model such as use case diagrams, class diagrams, and sequence diagrams. proposed method identifies components through two phases; system component identification and business component identification. Especially, we consider structural characteristics as well as dependency characteristics according to methods call types and directions in identifying components. We also present a case study and comparative analysis and assessment to prove the practical use of our technique.

An Implementation of Network Intrusion Detection Engines on Network Processors (네트워크 프로세서 기반 고성능 네트워크 침입 탐지 엔진에 관한 연구)

  • Cho, Hye-Young;Kim, Dae-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.113-130
    • /
    • 2006
  • Recently with the explosive growth of Internet applications, the attacks of hackers on network are increasing rapidly and becoming more seriously. Thus information security is emerging as a critical factor in designing a network system and much attention is paid to Network Intrusion Detection System (NIDS), which detects hackers' attacks on network and handles them properly However, the performance of current intrusion detection system cannot catch the increasing rate of the Internet speed because most of the NIDSs are implemented by software. In this paper, we propose a new high performance network intrusion using Network Processor. To achieve fast packet processing and dynamic adaptation of intrusion patterns that are continuously added, a new high performance network intrusion detection system using Intel's network processor, IXP1200, is proposed. Unlike traditional intrusion detection engines, which have been implemented by either software or hardware so far, we design an optimized architecture and algorithms, exploiting the features of network processor. In addition, for more efficient detection engine scheduling, we proposed task allocation methods on multi-processing processors. Through implementation and performance evaluation, we show the proprieties of the proposed approach.

PKI-based Registration Authority using Efficient Human Iris Recognition Information (홍채 패턴 정보를 이용한 공개키 기반의 등록기관)

  • Lee, Kwan-Yong;Lim, Shin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.864-873
    • /
    • 2001
  • In this paper, a new approach to building a registration authority for issuing PKI-based certificates is presented to make the process of identifying an individual more secure and reliable by utilizing human iris recognition technology. The tasks of the proposed system associated with the manipulation of irises except for the general functions of registration authorities can be categorized into three modules, the acquisition of iris images, the registration of iris information, and the verification of users by means of iris patterns. The information among the three modules is safely exchanged through encryption and decryption with a symmetric cryptographic method. As a feature extraction method for a given iris image, a wavelet transform is applied to represent a feature vector with a small dimension of information obtained by subsampling an image corresponding to lower frequency bands successively without loss of information. Through the experiments on human iris recognition technology we proposed and applied to the registration authority, the potential of biometric technology in various applications is confirmed.

  • PDF

Development and Applications of A Paternity and Kinship Analysis System Based on DNA Data (유전자 분석 자료에 의한 친자 및 혈연관계 분석시스템 개발 및 활용)

  • Koo, Kyo-Chan;Kim, Sun-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.6715-6721
    • /
    • 2015
  • Recently, DNA data of missing person, killed person, and missing child continue to increase but most of statistical calculation for paternity confirmation is being done through manual methods or Excel. Therefore, we need development of a software which is able to facilitate both systematic management and effective analysis of Short Tandem Repeat (STR) derived from DNA data. Without extensive testing, through a twenty-month study was developed a web-based system which performs paternity analysis and kinship analysis easily based on the various options. The former uses an existing algorithm for paternity index and the latter does Identity by descent (IBD) formula. Due to our system validated over real datasets in terms of likelihood ratio and probability of paternity, it ensures increased reliability as well as effective management and analysis of DNA data in mass disaster. In addition, it includes advanced features such as an integrated environment, user-centered interface, process automation and so on.

An Internet Multicast Routing Protocol with Region-based Tree Switching (지역망간의 트리전환을 이용하는 인터넷 멀티캐스트 라우팅 프로토콜)

  • Kim, Won-Tae;Park, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.234-243
    • /
    • 2000
  • We design a modified network architecture with condsidering current Internet network model and traffic characteristics, and propose EDCBT(Enhanced Dispersed Core-based Tree) multicast routing protocol, which enhances scalabity, reliability, end-to-end delay and resource utilization EDBCT adopts bidirectional dispersed shared trees and manages both of intradomain and interdomain multicast trees for a multicast group. Each regional multicast tree is estabilshed from its core router and they are interconnected by the operation between border routers on edges of each regional network. As a result, interdomain multicast tree can be easily established. We introduce a new concept named RBTS(Region-based Tree Switching), which dramatically enhances QoS and network utilization. Finally, protocol performance and the effect of core router location are evaluated with MIL3 OPNet network simulator, in terms of end-to-end delay, packet loss and throughput.

  • PDF

A Transition Reduction Algorithm of Finite State Machines using Slice Models (Slice 모델을 이용한 유한상태머신의 트랜지션 축약 알고리즘)

  • Lee, Woo-Jin
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.1
    • /
    • pp.12-21
    • /
    • 2008
  • As the usage of computer systems is increasing in our lives, the reliability and safely of these systems need to be thoroughly checked through the verification techniques. As a basic formalism for several modeling methods, the finite state machine (FSM) is widely used in specification and verification of system models. And there is a technique for ing internal events of FSM in order to effectively analyze the system. However, this technique does not handle the state explosion problem since it can be applied after completely generating all the state space of the system. In this research, we provide a new approach for efficiently representing concurrent properties of FSM, the slice model and provide an efficient transition reduction method based on the slice model. Our approach is effective in time and space perspective since it is peformed by partially generating the needed system states while the existing abstraction technique can be applied to all the system states.