• Title/Summary/Keyword: 검증 소프트웨어

Search Result 2,336, Processing Time 0.033 seconds

a improved neighborhood selection of simulated annealing technique for test data generation (테스트 데이터 생성을 위한 개선된 이웃 선택 방법을 이용한 담금질 기법 기술)

  • Choi, Hyun Jae;Lee, Seon Yeol;Chae, Heung Seok
    • Journal of Software Engineering Society
    • /
    • v.24 no.2
    • /
    • pp.35-45
    • /
    • 2011
  • Simulated annealing has been studied a long times. And it is one of the effective techniques for test data generation. But basic SA methods showed bad performance because of neighborhood selection strategies in the case of large input domain. To overcome this limitation, we propose new neighborhood selection approach, Branch Distance. We performs case studies based on the proposed approach to evaluate it's performance and to compare it whit basic SA and Random test generation. The results of the case studies appear that proposed approach show better performance than the other approach.

  • PDF

Energy-Efficient Context Monitoring Methods for Android Devices (안드로이드 디바이스를 위한 에너지 효율적 컨텍스트 모니터링 기법)

  • Kim, Moon Kwon;Lee, Jae Yoo;Kim, Soo Dong
    • Journal of Software Engineering Society
    • /
    • v.26 no.3
    • /
    • pp.53-62
    • /
    • 2013
  • Along with increasing supplies of smart devices, a proliferation of context-aware applications is came. However, acquiring contexts through sensors requires considerable energy consumption. It has became big constraints on running many context-aware applications in mobile devices having limited battery capacity. Hence, energy-efficient methods for monitoring contexts are highly required. In this paper, we propose four context monitoring methods, analyse energy consumption in each method, and provide guidelines for applying the methods. It is effective to decrease energy consumption for monitoring contexts with applying the methods. To assess the proposed methods, we implement an application that is aware of a user's motion and show quantitative comparison between each of the methods.

  • PDF

Construction of Clinical Decision Support System Architecture and Case Study (임상의사결정지원 시스템 아키텍처 수립 및 적용 사례)

  • Kim, Jeong Ah;Cho, InSook
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.29-34
    • /
    • 2012
  • Quality control in medical is getting very important issue so that the importance of CDS(Clinical Decision Support) System has been increased. Local clinics as well as big hospitals are required to implement the CDS System. But the cost and complexity of CDS system implementation is so high since many different activities including knowledge authoring, software development, and integrating the legacy system are necessary. In this paper, we suggest the CDS system architecture to be sharable and interoperable and evaluate the availability and efficiency of this architecture.

  • PDF

A Benchmark Suite for Data Race Detection Technique in GPGPU Progrmas (GPGPU 프로그램의 자료경합 탐지기법을 위한 벤치마크 모음)

  • Lee, Keonpyo;Choi, Eu-Teum;Jun, Yong-Kee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.7-8
    • /
    • 2019
  • 자료경합은 두 개 이상의 스레드가 같은 공유메모리에 적절한 동기화 없이 접근하고, 적어도 한 개의 접근사건이 쓰기일 때 발생할 수 있는 동시성 오류이다. 자료경합은 프로그래머가 의도하지 않은 비결정적인 수행결과를 초래하여, 항공기 소프트웨어와 같은 고신뢰성이 요구되는 프로그램에서 치명적인 오류를 발생시켜 인적 물적 손해로 이어질 수 있다. 자료경합 탐지기법은 이러한 문제를 사전에 탐지하여 수정하는데 사용되어진다. 하지만 GPGPU 프로그램에서의 자료경합은 CPU 병행프로그램에서보다 복잡한 실행구조를 가지고 있어 스레드 및 메모리 계층, 스케줄링, 동기화 기법 등의 많은 변수가 존재한다. 이로 인해 실세계 프로그램에 자료경합 탐지기법을 적용하여 검증 시 이러한 변수들을 반영하여 실험하는데 많은 노력이 소요된다. 본 논문은 실세계 프로그램에서의 자료경합을 대표하는 4가지 패턴의 합성프로그램으로 이루어지고 실행 시 스레드 및 메모리 계층, 스레드 구조, 메모리 사용량 및 동기화 방안을 지정할 수 있는 벤치마크 모음을 제시한다.

  • PDF

Lamport OTP Extension using Overlapped Infinite Hash Chains (중첩된 무한 해시체인을 이용한 Lamport OTP 확장)

  • Shin, Dong Jin;Park, Chang Seop
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.11-17
    • /
    • 2018
  • Lamport's one-time password (OTP) was originally proposed to address the weaknesses of a simple password system: fixed password, pre-shared password. However, a main weakness of Lamport's OTP is that a root hash value of a new hash chain should be re-registered after consuming all the hash values since OTP generation is based on the finite hash chain. Several studies have been conducted to solve these drawbacks, but new drawbacks such as increased burden of proof for verifiers and verifiers have been exposed. In this paper, we propose and compare a novel OTP that overlaps several short hash chains instead of one long hash chain, which is the core of existing Lamport OTP, to solve the drawbacks while maintaining the advantages of Lamport.

  • PDF

Research on the Content to Develop Instructor's Certification for Software Education

  • Jun, Soo-Jin;Shim, Jae-Kwoun;Kim, Jeong-Rang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.341-347
    • /
    • 2020
  • In this paper, we propose to discover the certification items and to study the content system for SW education instructors, including SW education based on basic teaching-learning capabilities and Computational Thinking(CT). To this end, SW education instructor qualification were divided into three classes using methods such as prior case studies, Delphi surveys, and expert meetings, and the certification evaluation areas were divided into large areas of 'Teaching and Learning Method' and 'Software Education' reflecting primary and secondary curriculum. Sub-areas and content elements for each series were set and verified through expert Delphi survey. Such research is expected to contribute to the spread and dissemination of SW education by being used meaningfully when establishing a system that fosters SW education instructors and maintains and manages the quality of instructors.

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

Object Material Confirmation for Source Code Comparison on Embedded System (임베디드 시스템의 동일기능 소스코드 유사도 분석 요구사항)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2021
  • In case of evaluating the similarity of the source code analysis material in the embedded system, the provided source code must be confirmed to be executable. However, it is currently being in which compilation and interface matching with hardware are provided in an unconfirmed materials. The complainant assumes that many parts of the source code are similar because the characteristics of the operation are similar and the expression of the function is similar. As for the analysis result, the analysis result may appear different than expected due to these unidentified objects. In this study, the improvement direction is sugested through the case study by the analysis process of the source code and the similarity of the unverified source code.

Interoperability Design and Verification of Small Drone System Applying STANAG 4586 (STANAG 4586을 적용한 소형드론시스템의 상호운용성 설계 및 검증)

  • Jonghun, Lee;Taesan, Park;Kilyoung, Seong;Gyeongrae, Nam;Jungho, Moon
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.6
    • /
    • pp.74-80
    • /
    • 2022
  • The utilisation of small drones is becoming increasingly widespread particularly in the military sector. In this study, STANAG 4586, a standard interface for military unmanned aerial vehicles, was applied to a multicopter-type small drone to examine the suitability of the military system. To accomplish this, a small multi-copter vehicle was designed and manufactured, integrating a flight control computer, ground control system, and data link. Furthermore, flight control and ground control equipment software were developed by applying the STANAG 4586 interface, followed by HILS and flight tests.

Risk Based Software Development Strategy (리스크 기반 소프트웨어 개발 전략)

  • KWON, W.;Bae, C.K.;Kim, Y.B.;Hwang, S.A.;Kwak, E.Y.;Kwon, H.Y.
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.1020-1023
    • /
    • 2010
  • 소프트웨어 개발은 복잡도가 높고 가시성 확보가 어려워 전략적으로 접근해야 한다. 일반 개발 프로젝트에서 개발 전략은 특정 개발 모델과 프로젝트 관리 기법을 사용하겠다는 것이 주류를 이루고 있다. 이러한 방법은 각 개발 단계에서 업무를 진행하는 프로젝트 참여자가 프로젝트 전체를 보지 못하고 각자의 전문 분야만을 국지적으로 개발하여 초기에 의도된 대로 개발되지 않는 결과를 초래하는 경우가 다반사여서 개발 전략으로서의 역할을 적절히 수행하지 못하는 문제가 있다. 본 연구에서는 리스크 기반의 개발 전략을 제시한다. 개발 프로젝트 전체는 물론 개발의 각 단계 별로 전략이 존재할 수 있으며, 전사 차원과 프로젝트 차원의 전략이 존재한다. 분석한 리스크 레벨에 차등적으로 개발 리소스를 할당하고, 개발 기법을 사용하고, 리뷰 및 검증 활동을 진행하여 제한된 개발 리소스를 합리적이고 적절하게 사용하여 개발하고, 개발 과정을 모니터링 및 제어하는 접근법이다. 이미 개발의 일부인 테스팅 분야에서는 리스크 기반 테스팅 전략이라는 이름으로 활용하여 직간접적인 효과를 보고 있으며, 같은 개념을 개발 전체로 확장하여 개발 전략으로 체계화하여 제시한다.