• Title/Summary/Keyword: 검증 프로세스

Search Result 919, Processing Time 0.031 seconds

Analysis of Representation Methods for Semantic Constraints to Enhance the Quality of XBRL Services (XBRL 서비스 품질 향상을 위한 의미제약 표현 방법 분석)

  • Kim, Hyoung-Do
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.274-284
    • /
    • 2008
  • XBRL is an XML-based language, actively used for diverse business reporting applications including financial reporting. It can be flexibly applied to each application by defining concepts and their relationships existing within the application. In these business reporting processes, it is very important for senders and receivers to validate the consistency and completeness of reporting contents in the syntatic and semantic levels. The basic method is to directly represent and validate the semantic constraints using application program codes. However, the method makes it difficult to represent, change, share semantic constraints. While XML constraint languages for XML documents such as XSLT and Schemantron support explicit representation and sharing of semantic constraints, they are limited in the efficiency and effectiveness of representing XBRL semantic constraints. This paper reviews XBRL formula, actively being discussed recently for standardization, and discusses the representation capability and limitations through a case analysis, which applies XBRL formula to business documents in the area of financial reporting.

NDN Contents Verification Scheme for Efficient XaaS Implementation (효과적인 XaaS 구현을 위한 NDN 데이터 인증 기술)

  • Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.692-699
    • /
    • 2015
  • Evarything as a Service (XaaS) is a software, platform, infra distribution method which provide users with necessary modules, not entire modules, as a service. To efficiently and securely operate services such as XaaS, it is needed to solve various Internet problems like network congestion, weak security and so on. Future Internet technologies are provided to solve such problems. Specially, named data networking architecture (NDN) proposes that network nodes cache transmitted data, and then they send the cached data if receiving request messages for the cached data. So NDN can efficiently diffuse excessive request messages transmitted toward original contents providers. However, when receiving contents through NDN, receivers can not confirm the practical providers because the practical providers can be different from original contents providers. Hence, it is requested for receivers to verify the received contents and such a verification process can cause service delay of XaaS. In this paper, we improve a content verification scheme of NDN to enhance the performance of services such as XaaS.

Web-based Product Recommendation System with Probability Similarity Measure (확률 유사성척도를 활용한 웹 기반의 상품추천시스템)

  • Choi, Sang-Hyun;Ahn, Byeong-Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.1
    • /
    • pp.91-105
    • /
    • 2007
  • This research suggests a recommendation system that enables bidirectional communications between the user and system using a utility range-based product recommendation algorithm in order to provide more dynamic and personalized recommendations. The main idea of the proposed algorithm is to find the utility ranges of products based on user specified preference information and calculate the similarity by using overlapping probability of two range values. Based on the probability, we determine what products are similar to each other among the products in the product list of collaborative companies. We have also developed a Web-based application system to recommend similar products to the customer. Using the system, we carry out the experiments for the performance evaluation of the procedure. The experimental study shows that the utility range-based approach is a viable solution to the similar product recommendation problems from the viewpoint of both accuracy and satisfaction rate.

  • PDF

SEAndroid Policy Protection Architecture Design and Implementation in Android (안드로이드 시스템 하에서의 SEAndroid 정책 보호 기법 설계 및 구현)

  • Yoo, Seok-man;Park, Jin-Hyung;Lee, Dong-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1105-1119
    • /
    • 2016
  • Android includes SEAndroid as a core security feature. SELinux is applied to Android OS as a SEAndroid, because there exists structural differences between Linux and Android. Since the security of SEAndroid depends on the reliable policy if the policy is tampered by the attacker, the serious security problems can be occurred. So we must protect policies which are the most important thing in SEAndoroid. In this paper, we analyze the process of SEAndroid policy updating to find out vulnerabilities and study the attack points on policy tampering. And we propose the SPPA to detect whether the policy is modified by an attacker. Moreover, we prove the performance and the effect of our proposed method on mobile device.

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

A Study on the Verification of Computational Thinking Effectiveness of Understanding-Oriented SW Basic Education Program (이해중심 SW기초교육 프로그램의 컴퓨팅사고 효과성 검증 연구)

  • Oh, Kyung-Sun;Kwon, Jung-In
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.23-35
    • /
    • 2019
  • In order to cultivate talented people who have problem solving ability due to computational thinking according to the trend of the fourth industrial revolution, each university is actively promoting software education. This study suggests that understanding-oriented SW curriculum is needed for non-majors students to improve computational thinking. In order to achieve the purpose of the study, this study designed the basic education program based on the understanding of the SW with the backward design model. The SW Basic Education Program was applied to 15 weeks of instruction and conducted three surveys. The positive effects of the understanding-oriented SW basic education on the computational thinking efficacy and the computer perception were verified. In addition, it was found that the understanding-oriented computational thinking and programming education are effective when they are linked to one process. It is expected that understanding-based SW based education, which uses the backward design model, can be applied as one of the efficient ways to improve computational thinking in the education field.

Automation Review of Road Design Standard using Visual Programming (비주얼 프로그래밍 기법을 활용한 도로설계기준 자동검토 방안)

  • Hyoun-seok Moon;Hyeoun-seung Kim
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.891-898
    • /
    • 2022
  • Purpose: There is not much time left for mandatory BIM implementation for all sectors and stages of the construction industry. Therefore, it is necessary to find a way to secure technology to substantially improve the productivity of BIM work. In the research, we proposed a method to automatically verify related construction standards for major objects produced by BIM modeling procedures so that engineers can verify construction standards in the BIM-based design process. Method: We defined a modeling work procedure for BIM-based road design work and prepared a method for constructing related design standards in a database. In addition, a process map for developing a BIM-based design basis review automation system was also presented. Result: A BIM-based design standard review automation module was developed using Civil3D and Dynamo. And it was confirmed by the test application that it is possible to quickly judge whether the BIM object manufactured in the design process conforms to the construction design standard. Conclusion: BIM-based design standard review automation technology can improve the productivity of BIM model production work and secure the quality of the BIM model.

Spatio-temporal pattern of energy fluxes in Northeast Asia using CLM5 (CLM5 기반 동북아시아 에너지 플럭스 분석 및 검증)

  • Yulan Li;Nguyen Thi Ngoc My;Minsun Kang;Minha Choi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.434-434
    • /
    • 2023
  • 다양한 지면 모형은 대기 강제력 데이터 세트에 의해 구동되며 육지의 물, 에너지 및 생지화학적 순환의 해석에 활용된다. 그 중 에너지 플럭스 교환을 추정하는 것은 극심한 가뭄, 폭염, 물 부족 등 극한 기후 현상에서 중요한 역할을 한다. 에너지 플럭스는 기상기후조건과 토지피복의 변화에 따른 영향을 받고 있는데 그 영향을 구체적으로 조사하는 것은 생태계 프로세스의 매커니즘을 구성하는 데 필수적이다. 본 연구에서는 최신버전인 Community Land Model 버전 5.0 (CLM5)를 이용하여 동북아시아 지역의 에너지 플럭스의 시공간분포를 분석하였다. CLM5의 시뮬레이션은 1991년부터 2010년까지 2.5° × 2.5° 그리드에서 실행되었고 주요 에너지 인자인 순복사량, 현열, 잠열을 모의하였으며, 실행결과는 FLUXNET의 동북아시아 사이트의 관측자료를 이용하여 모델을 검증 및 평가하였다. 대기 강제력 변수의 차이는 모의 결과에 영향을 미치기 때문에 수문인자와 토지피복유형에 따른 에너지 플럭스의 변동성을 분석하였고 잠열을 식생 증발산열과 지면 증발열로 파티션하여 연구지역에 따른 각 구성요소의 비율을 산정하였다. 20년간의 순복사열, 잠열과 온도의 시공간적 변동성의 연 추세를 분석한 결과 동북아시아의 대부분 지역에서 잠열과 온도는 소폭 증가되였고 순복사열은 중국 내륙과 몽골지역에서 감소되였다. 본 연구는 지표와 대기 사이의 에너지 교환에 대해 분석하였으며 이후 증발산 및 물 플럭스와의 연동성과 관계성 분석에 활용하여 기후변화를 이해하는 데 기여할수 있을 것으로 사료된다.

  • PDF

A Study on the Primary Factors of Internal and External Competency for Improving Performance of Small and Medium Software Company (중.소 소프트웨어 기업의 성과 향상을 위한 내.외부 역량 요인에 관한 연구)

  • Yoo, Sang-Jun;Ki, Byoung-Gun;Choi, Jong-Hwa;Leem, Choon-Seong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.1
    • /
    • pp.17-31
    • /
    • 2009
  • The importance of software has been growing rapidly owing to the development of various Internet and e-business applications. The traditional approaches to software evaluation are based on the development process perspective, and their major concerns are no strongly related to use or customer-oriented evaluation of software. According to resource-based theory, company's resource is consisted of human, technology, market value, and finance. Customer satisfaction improved by product satisfaction and service satisfaction. Based on the previous studies the factors of human resources, technology, customer satisfaction are selected to evaluate software company's competence This research suggests the factor effecting on sales performance. And then statistical methods are used for verifying relationship between the factor and sales performance.

Evaluation of AFDX Certification Support System by both AFDX Tap and AFDX Analyzer (AFDX Tap과 AFDX 프로토콜 분석기를 이용한 AFDX 네트워크 인증 기술)

  • Park, Pusik;Son, Myeonghwan;Lee, Jeongdo;Yoon, Jongho
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Avionics Full-DupleX Ethernet (AFDX) is a next-generation avionics network interface technology that is widely applied in the latest aircraft to replace ARINC429 and MIL-STD-1553B. However, the criteria for authenticating an avionics network consisting of AFDX are very scarce. Using AFDX Protocol Analyzer developed by the Korea Electronics Technology Research Institute and AFDX Tap developed by the Korea Aerospace University, we proposed a technology of certification practicality that can verify the normal functioning of avionics equipment with AFDX network interface. Our proposed technology provided the ability to collect precision packets, to verify AFDX specification compliance, and perform automatic tests to reduce the time and cost of authentication of AFDX avionics devices.