• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.034 seconds

Full-Custom Design of a Serial Peripheral Interface Circuit for CMOS RFIC Testing (CMOS RF 집적회로 검증을 위한 직렬 주변 인터페이스 회로의 풀커스텀 설계)

  • Uhm, Jun-Whon;Lee, Un-Bong;Shin, Jae-Wook;Shin, Hyun-Chol
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.9
    • /
    • pp.68-73
    • /
    • 2009
  • This paper presents an easily modifiable structure of a serial peripheral interface (SPI) that is suitable for efficient testing of CMOS RF integrated circuits. The proposed SPI Is designed so that the address size and the accompanying software can be easily adjusted and modified according to the requirements and complexity of RF IC's under development. The hardware architecture and software algorithm to achieve the flexibility are described. The proposed SPI is fabricated in $0.13{\mu}m$ CMOS and successfully verified experimentally with a 2.7GHz fractional-N delta-sigma frequency synthesizer as a device under test.

Simulation of Time of Flight Diffraction Signals for Reactor Vessel Head Penetrations (원자로 상부 헤드 관통관 TOFD 신호 시뮬레이션)

  • Lee, Tae-Hun;Kim, Young-Sik;Lee, Jeong-Seok
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.36 no.4
    • /
    • pp.273-280
    • /
    • 2016
  • The simulation of nondestructive testing has been used in the prediction of the signal characteristics of various defects and in the development of the procedures. CIVA, a simulation tool dedicated to nondestructive testing, has good accuracy and speed, and provides a three-dimensional graphical user interface for improved visualization and familiar data displays consistent with an NDE technique. Even though internal validations have been performed by the CIVA software development specialists, an independent validation study is necessary for the assessment of the accuracy of the software prior to practical use. In this study, time of flight diffraction signals of ultrasonic inspection of a calibration block for reactor vessel head penetrations were simulated using CIVA. The results were compared to the experimentally inspected signals. The accuracy of the simulated signals and the possible range for simulation were verified. It was found that, there is a good agreement between the CIVA simulated and experimental results in the A-scan signal, B-scan image, and measurement of depth.

The Design and Performance Verification of Real-Time Inspection Equipment Software based on Windows Operating System (윈도우 운영체제 기반의 실시간 점검장비 소프트웨어 설계 및 성능검증)

  • Kim, Hyo-Joung;Heo, Yong-Kwan;Kwon, Byung-Gi
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.1-8
    • /
    • 2017
  • As the recent advancement of military equipment has been accelerated, it is becoming more important to act as an inspection device that verifies the performance of equipment in real time. Most of the inspection equipments were developed on the Windows OS based system. considering development convenience and development period. However, sice the data communication between these models occurs asynchronously, there is a problem that it is difficult to guarantee real-time performance of the window-based inspection equiment. To solve these problems, we use real-time commercial solutions to guarantee the real-time performance of Windows-based inspection equipment. In this paper, we propose a method of designing and implementing the inspection equipment software based on Real-Time implanted Kernel-Multi Processor (RTiK-MP) operating in Windows environment. In addition, real-time performance data accuracy was measured through a high-speed communication tool and interlocking test to verify the performance of the inspection device based on the real-time porting kernel.

Subject poosition Systems Design of picture reflex (사진영상의 피사체 위치확인 시스템 설계)

  • Jo, Dong-Kwan;Chung, Jung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.551-554
    • /
    • 2008
  • Do subject addition of existent picture reflex inside in this treatise as system that confirmation is available, do subject addition of picture reflex inside through GPS's photography position and Come on! direction angle of deviation campus to do confirmation possibility system design. Constructed each environment of Windows Operating System and embedded system environment for verification of system that is subject position of designed picture reflex also. To development environment of embedded system S3C2440A & used PXA270 processor, Camera and GPS in development baud, Come on! include deviation campus, and development language embodied in C language, and debugging environment did debugging using GCC compiler of Linux environment. PC software for verification designed system to confirm for subject position confirmation of picture reflex through Almap, Google Eartch developed verification software using visual C++. Also, groped way to utilize picture file by various field including position information within picture. Confirmed that decreased by error extent 1m within of radius 10m that is existent GPS's error extent as verification result.

  • PDF

Implementation and Static Verification Methodology of Discrete Event Simulation Software based on the DEVS Diagram: A Practical Approach (DEVS 다이어그램 기반 이산사건 시뮬레이션 소프트웨어 구현 및 정적 검증기법: 실용적 접근방법)

  • Song, Hae Sang
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.23-36
    • /
    • 2018
  • Discrete Event System Specification (DEVS) has been used for decades as it provides sound semantics for hierarchical modular specification of discrete event systems. Instead of the mathematical specification, the DEVS diagram, based on the structured DEVS formalism, has provided more intuitive and convenient representation of complex DEVS models. This paper proposes a clean room process for implementation and verification of a DEVS diagram model specification into a simulation software source code. Specifically, it underlies a sequence of transformation steps from conformance and integrity checking of a given diagram model, translation into a corresponding tabular model, and finally conversion to a simulation source code, with each step being inversely verifiable for traceability. A simple example helps developers to understand the proposed process with associated transformation methods; a case study shows that the proposed process is effective for and adaptable to practical simulation software development.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

Code Refactoring Techniques Based on Energy Bad Smells for Reducing Energy Consumption (Energy Bad Smells 기반 소모전력 절감을 위한 코드 리팩토링 기법)

  • Lee, Jae-Wuk;Kim, Doohwan;Hong, Jang-Eui
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.5
    • /
    • pp.209-220
    • /
    • 2016
  • While the services of mobile devices like smart phone, tablet, and smart watch have been increased and varied, the software embedded into such devices has been also increased in size and functional complexity. Therefore, increasing operation time of mobile devices for serviceability became an important issue due to the limitation of battery power. Recent studies focus on the software development having efficient behavioral patterns because the energy consumption of mobile devices is caused by software behaviors which control the hardware operations. However, it is often difficult to develop the embedded software with considering energy-efficiency and behavior optimization due to the short development cycle of the mobile services in many cases. Therefore, this paper proposes the refactoring techniques for reducing energy consumption, and enables to fulfill the energy requirements during software development and maintenance. We defined energy bad smells with the code patterns that can excessively consume the energy, and our refactoring techniques are to remove these bad smells. We performed some case studies to verify the usefulness of our refactoring techniques.

How to Combine Secure Software Development Lifecycle into Common Criteria (CC에서의 소프트웨어 개발보안 활용에 대한 연구)

  • Park, Jinseok;Kang, Heesoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.171-182
    • /
    • 2014
  • Common Criteria is a scheme that minimize IT products's vulnerabilities in accordance with the evaluation assurance level. SSDLC(Secure Software Development Lifecycle) is a methodology that reduce the weakness that can be used to generate vulnerabilities of software development life cycle. However, Common Criteria does not consider certificated IT products's vulnerabilities after certificated it. So, it can make a problem the safety and reliability of IT products. In addition, the developer and the evaluator have the burden of duplicating evaluations of IT products that introduce into the government business due to satisfy both Common Criteria and SSDLC. Thus, we researched the relationship among the Common Criteria, the static code analysis tools, and the SSDLC. And then, we proposed how to combine SSDLC into Common Criteria.

A Study on developing Flight Software for Nano-satellite based on NASA CFS (NASA CFS에 기반한 초소형 위성용 비행소프트웨어 개발에 관한 연구)

  • Choi, Won-sub;Kim, Jin-Hyoung;Kim, Hae-dong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.11
    • /
    • pp.997-1005
    • /
    • 2016
  • Flight software plays an important role in operating satellites, such as processing commands from ground station, controlling satellites and processing mission data. Reliability is the most important thing in flight software and many verifications and tests are needed for assuring it. this causes an increase of cost and period of development. So NASA has developed a reusable flight software platform to apply to their satellite projects. The CFS(Core Flight System) is the very result. We are developing our flight software for a nano-satellite based on NASA CFS. We have tested core services and functions provided in CFS and we have designed and implemented flight software based on these.

Open Source Software Security Issues and Applying a Secure Coding Scheme (오픈 소스의 소프트웨어 보안 문제 및 시큐어 코딩 적용방안)

  • Kim, Byoungkuk
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.487-491
    • /
    • 2017
  • Open source software allows the users to freely use, copy, distribute and modify source code without any particular limitations, and this offers the advantages of low entry cost, fast and flexible development, compatibility, reliability and safety. The emergence of many useful open source projects has the advantage of achieving high levels of output with lower costs and time commitment for software development. However, this also increases the risks caused by the security vulnerabilities of the used open source software. There is still no separate process to verify security in using open source software. In this paper, we analyze the security weakness in open source and propose a secure coding scheme in adopting open source, which is known to be highly reliable from a security point of view.