• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.025 seconds

Implementation of the knowledge management system to effectively utilize human and intellectual resources of the universities (대학의 인적.지적 자원의 효과적 활용을 위한 지식 관리 시스템 구현)

  • 최재원;박진규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.473-476
    • /
    • 2002
  • In this paper by realizing the knowledge base on the web, for example, the information of the technology and human resources of the universities, which is the mecca of the knowledge management, technology information in various segment, education information, visible anti invisible knowledge information like technical advice, etc, and scholaristic knowledge like basic science technologies, economic theories which are verified by experts of the field, and pragmatic knowledge like technical patent, software, data base, also, hands on experience and knowledge like field technology, customer service, front line management. All those related information provides easy access to anyone who need of. This system is also designed for the utilization of the study, company activities, and professionals of the basic science technology which enables not only professor to exchange the research results but also, general public, companies, students can effectively share and exchange the information.

  • PDF

Input Data Synchronization Scheme Based on Redundancy for IMA System (이중화 IMA 시스템의 입력 데이터 동기화 방안)

  • Park, Hong-Youl;Kim, Ki-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2891-2898
    • /
    • 2014
  • It is feasible to develop a fault tolerant system through module level redundancy on the Integrated Modular Avionics (IMA). However, its great implementation complexity is one of important challenges when asynchronous hardware environment is naturally assumed. To solve this problem, Physically Asynchronous Logically Synchronous (PALS) on IMA has been proposed. But, it has adaptation problem by not addressing specific architecture for IMA system. In the paper, we propose how to synchronize the input data on the IMA system under primary/secondary redundancy architecture by referring to existing PALS. In the proposed scheme, we introduce window frame by considering rate monotonic scheduling and analyze the adequate the synchronization time. Finally, we verify the feasibility of the proposed design pattern through the systematic experiments.

A Approach to Use Case Modeling on LASA Display (LASA 디스플레이 유스케이스 모델링을 위한 방안)

  • Min, J.H.;Ryu, H.J.;Chu, H.Y.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.805-808
    • /
    • 2013
  • As the development type of domestic technology on information & communications have changed from following development to leading devalopment, developing new technology and creating new market through securing basic technology and IPR has been more essential than ever before. At the same time, it is required to increase the possibility of commercialization on developed technology. Therefore, it is necessary to formulate the consensus on the value and function of project at project planning phase for creative & innovative idea to be adopted into project and to be performed successfully. Accordingly, this paper proposes use case developing methodology adopted to creative & innovative project by analysing use case developing method in software engineering. Also, new methodology is appled to LASA display developing project to prove the reliability. Since the demands on new technology is henceforth expected to increase gradually, it is necessary to continue to study on the methodology of being more formal and logically related between phases as well as on that of analysing relationship among use cases and proving logical reliability of use case.

  • PDF

Digital Video Watermarking Using Block Reordering Algorithm Based on DCT (DCT 기반의 블록 재정렬 알고리즘을 이용한 디지털 비디오 워터마킹)

  • Kim Kyoung-Sik;Park Kyung-Jun;Ko Hyung Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.696-705
    • /
    • 2005
  • The rapid progress of the software has enabled individuals to copy and remake digital contents, which was only done by professionals. However, this rapid growth of software has brought many other defects. As a solution to the problems, contents producer needs to have certification and inspection of its contents text and hold the proprietary rights. In this paper, the new video watermarking scheme is proposed which is appropriate for the requirements mentioned for digital video contents and it is applied to MPEG-2 video encoder and decoder. In order to insert watermark sequence for digital video data, watermarking used blocks reordering algorithm and SCL(secret code list). It is satisfied two properties of cryptography that confidentiality and integrity. We test the proposed algorithm to see its performance in terms of watermark capacity, compression robustness and visual quality impact. According to the experiment of proposed watermarking algorithm, we obtained satisfactory results that watermark can still be extracted after MPEG-2 re-encoding at lower bit rates. It is important property for data hiding and user authentication in video data.

Automated Code Smell Detection and Refactoring using OCL (OCL을 이용한 자동화된 코드스멜 탐지와 리팩토링)

  • Kim, Tae-Woong;Kim, Tae-Gong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.825-840
    • /
    • 2008
  • Refactoring is a kind of software modification process that improves system qualities internally but maintains system functions externally. What should be improved on the existing source codes should take precedence over the others in such a modification process using this refactoring. Martin Fowler and Kent Beck proposed a method that identifies code smells for this purpose. Also, some studies on determining what refactoring will be applied to which targets through detecting code smells in codes were presented. However, these studies have a lot of disadvantages that show a lack of precise description for such code smells and detect limited code smells only. In addition, these studies showed other disadvantages that generate ambiguity in behavior preservation due to the fact that a description method of pre-conditions for the behavior preservation is included in a refactoring process or unformalized. Thus, our study represents a precise specification of code smells using OCL and proposes a framework that performs a refactoring process through the automatic detection of code smells using an OCL interpreter. Furthermore, we perform the automatic detection in which the code smells are be specified by using OCL to the java program and verify its applicability and effectivity through applying a refactoring process.

Affine Invariant Local Descriptors for Face Recognition (얼굴인식을 위한 어파인 불변 지역 서술자)

  • Gao, Yongbin;Lee, Hyo Jong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.375-380
    • /
    • 2014
  • Under controlled environment, such as fixed viewpoints or consistent illumination, the performance of face recognition is usually high enough to be acceptable nowadays. Face recognition is, however, a still challenging task in real world. SIFT(Scale Invariant Feature Transformation) algorithm is scale and rotation invariant, which is powerful only in the case of small viewpoint changes. However, it often fails when viewpoint of faces changes in wide range. In this paper, we use Affine SIFT (Scale Invariant Feature Transformation; ASIFT) to detect affine invariant local descriptors for face recognition under wide viewpoint changes. The ASIFT is an extension of SIFT algorithm to solve this weakness. In our scheme, ASIFT is applied only to gallery face, while SIFT algorithm is applied to probe face. ASIFT generates a series of different viewpoints using affine transformation. Therefore, the ASIFT allows viewpoint differences between gallery face and probe face. Experiment results showed our framework achieved higher recognition accuracy than the original SIFT algorithm on FERET database.

Local Path Generation Method for Unmanned Autonomous Vehicles Using Reinforcement Learning (강화학습을 이용한 무인 자율주행 차량의 지역경로 생성 기법)

  • Kim, Moon Jong;Choi, Ki Chang;Oh, Byong Hwa;Yang, Ji Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.9
    • /
    • pp.369-374
    • /
    • 2014
  • Path generation methods are required for safe and efficient driving in unmanned autonomous vehicles. There are two kinds of paths: global and local. A global path consists of all the way points including the source and the destination. A local path is the trajectory that a vehicle needs to follow from a way point to the next in the global path. In this paper, we propose a novel method for local path generation through machine learning, with an effective curve function used for initializing the trajectory. First, reinforcement learning is applied to a set of candidate paths to produce the best trajectory with maximal reward. Then the optimal steering angle with respect to the trajectory is determined by training an artificial neural network. Our method outperformed existing approaches and successfully found quality paths in various experimental settings, including the cases with obstacles.

Named Entity Recognition for Patent Documents Based on Conditional Random Fields (조건부 랜덤 필드를 이용한 특허 문서의 개체명 인식)

  • Lee, Tae Seok;Shin, Su Mi;Kang, Seung Shik
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.9
    • /
    • pp.419-424
    • /
    • 2016
  • Named entity recognition is required to improve the retrieval accuracy of patent documents or similar patents in the claims and patent descriptions. In this paper, we proposed an automatic named entity recognition for patents by using a conditional random field that is one of the best methods in machine learning research. Named entity recognition system has been constructed from the training set of tagged corpus with 660,000 words and 70,000 words are used as a test set for evaluation. The experiment shows that the accuracy is 93.6% and the Kappa coefficient is 0.67 between manual tagging and automatic tagging system. This figure is better than the Kappa coefficient 0.6 for manually tagged results and it shows that automatic named entity tagging system can be used as a practical tagging for patent documents in replacement of a manual tagging.

Stress Detection of Railway Point Machine Using Sound Analysis (소리 정보를 이용한 철도 선로전환기의 스트레스 탐지)

  • Choi, Yongju;Lee, Jonguk;Park, Daihee;Lee, Jonghyun;Chung, Yongwha;Kim, Hee-Young;Yoon, Sukhan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.9
    • /
    • pp.433-440
    • /
    • 2016
  • Railway point machines act as actuators that provide different routes to trains by driving switchblades from the current position to the opposite one. Since point failure can significantly affect railway operations with potentially disastrous consequences, early stress detection of point machine is critical for monitoring and managing the condition of rail infrastructure. In this paper, we propose a stress detection method for point machine in railway condition monitoring systems using sound data. The system enables extracting sound feature vector subset from audio data with reduced feature dimensions using feature subset selection, and employs support vector machines (SVMs) for early detection of stress anomalies. Experimental results show that the system enables cost-effective detection of stress using a low-cost microphone, with accuracy exceeding 98%.

A Study on the Contribution Evaluation of Developer in Convergence Social App Manufacturing Platform (융복합 소셜 앱 제작 플랫폼에서 참여자의 기여도 평가 방법에 관한 연구)

  • Gu, Seokmo;Park, SeongIk;Park, KyungDong;Ahn, ByongSun;Kim, Yei-chang
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.225-233
    • /
    • 2015
  • The convergence social app manufacturing platform for both demander and developer in worldwide provides a collective collaborative development approach. This platform can bring enhanced productivity with exchange of views among participants. If the assessment is not fair that many participants will leave the collective collaborative project. The previous studies verified the reliability of the evaluation based on statistical techniques. Because the previous studies did not consider the task performance of participants, do not reflect the feature of project tasks. So, the contribution scores of the participants can be distorted. In this study, we suggest the method for evaluating the development contributions value. This is considered the task performance of participants and involved the method of equitable and consistency peer assessment.