• 제목/요약/키워드: 애플리케이션 테스트

Search Result 94, Processing Time 0.026 seconds

Test Case Generation Techniques based on Use Cases for Interoperability Test of Component-Based software (컴포넌트 기반 소프트웨어의 상호운용성 테스트를 위한 유스케이스 기반 테스트 케이스 생성 기법)

  • Yoo, Cheol-Jung;Noh, Hye-Min
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.5
    • /
    • pp.361-375
    • /
    • 2009
  • The major concern of component users who develop applications using the existing components is to confirm whether a component is collaborating with the different components in accordance with the requirements. Therefore, interoperability testing whose role is to check whether components collaborate with each other within the new operating environment not within the component development content of each component is considered as an importance research topic. In this paper, we propose a test case generation technique for interoperability test of component based software. The proposed technique defines a test model for generating test cases. The proposed technique generates test models from the use case specification and thereafter from these models, test cases for Interoperability testing are derived. In addition, we describe a tool which Implements the procedures for generating test sequences from test models.

The Structure of Synchronized Data Broadcasting Applications (연동형 데이터 방송 애플리케이션의 구조)

  • 정문열;백두원
    • Journal of Broadcast Engineering
    • /
    • v.9 no.1
    • /
    • pp.74-82
    • /
    • 2004
  • In digital broadcasting, applications are computer programs executed by the set-top box(TV receiver) , and synchronized applications are those that perform tasks at the specified moments in the underlying video. This paper describes important concepts, standards, and skills needed to implement synchronized applications and explains how to integrate them to implement these applications. This Paper assumes the European data broadcasting standard, DVB-MHP. In DVB-MHP, scheduled stream events are recommended as a means of synchronizing applications with video streams. In this method, the application receives each stream event, and executes the action associated with the stream event at the time specified in the stream event. Commercially available stream generators, i.e., multiplexers, do not generate transport streams that support scheduled stream events. So we used a stream generator implemented in our lab. We implemented a synchronized application where the actions triggered by stream events are to display graphic images. We found that our synchronized application processes scheduled stream events successfully. In our experimentation, the stream events were synchronized with the video and the deviation from the intended time was within 240 ㎳, which is a tolerance for synchronization skew between graphic images and video.

A study on User experience of Virtual Beauty Makeup Applications (가상 뷰티 메이크업 애플리케이션의 사용자 경험 연구)

  • Woo, Ji-Hye;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.459-464
    • /
    • 2020
  • This study is a study that analyzes the user experience of a virtual makeup application in the beauty industry where color or formulation testing is important. Recently, cases of beauty smart stores and beauty applications using AR and AI are increasing. However, since virtual makeup is different from testing a real product, it is necessary to derive needs through research from the user's side. In order to compare user preferences by using AR and AI cases, six factors based on the emotional interface model were analyzed through a questionnaire to identify items with statistically significant figures. As a result, the user felt comfortable with the virtual makeup function, but showed that it needs to be supplemented in terms of reliability. Since this study focused on the customer experience as a real user and identified the main experience factors and needs of virtual makeup through two types of comparison, it is hoped that this study will be useful as a prior study.

Design and Implementation of Web Services Analyzing System based JWSDP (JWSDP기반의 웹 서비스 분석 시스템 설계 및 구현)

  • 이대하;정승우;김연준;박찬규;조현규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.352-354
    • /
    • 2004
  • 웹 서비스란 인터넷을 통한 네트워크 상에, 단일 또는 다수의 비즈니스간 기존 애플리케이션 시스템을 표준화된 기술로서 결합시킴으로써, 모든 비즈니스를 가능하게 하는 것으로서, 사용자나 개발자들은 웹 서비스가 구동되어지는 하드웨어 및 소프트웨어에 상관없이 동일한 패턴으로 서비스를 제공받거나 또는 해당 애플리케이션을 개발할 수 있다. 최근 여러 분야에서 웹 서비스 형태로 서비스를 제공하고 있으며, 이에 따른 여러 응용 애플리케이션들이 개발 중에 있다. 본 논문에서는 웹 서비스 개발 패키지인 JWSDP(Java Web Services Development Pack)(1)를 이용하여 기존 웹 서비스에 대한 동작 테스트 및 기능 분석을 할 수 있는 웹 서비스 분석 시스템을 설계하고 구현하는 방법에 대해 살펴볼 것이다.

  • PDF

A Study on IoT Remote Control for Efficient Control (효율적인 제어를 위한 사물인터넷 리모컨에 관한 연구)

  • Kim, Dong-min;Lim, Ji-yong;Oh, Am-suk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.505-506
    • /
    • 2018
  • 사물인터넷 리모콘은 스마트폰 애플리케이션으로 제어하고 있다. 그러나 제조사가 다른 디바이스를 사용할 경우 여러 애플리케이션을 설치하여 사용하여야 한다. 본 논문에서는 이러한 스마트 홈 환경에서 사물인터넷 디바이스와 서비스를 통합 제어할 수 있는 사물인터넷 리모컨을 제안한다. 사물인터넷 리모컨을 WiFi를 통해 인터넷에 연결하고 서비스 서버를 통해 버튼 입력 이벤트를 다른 디바이스 혹은 서비스로 전송하여 직접 제어할 수 있는 사물인터넷 리모컨이다. 그리고 사물인터넷 리모컨의 초기 설정을 위한 애플리케이션과의 연동 테스트를 진행하였다.

  • PDF

A Study on Model Transformation for Mobile Application Development on WIPI platform (WIPI 기반 모바일 애플리케이션 개발을 위한 모델변환에 관한 연구)

  • Jong-Won Ko;Young-Jae Song
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.504-507
    • /
    • 2008
  • 국내 표준무선인터넷플랫폼인 WIPI에 대한 확장성 연구는 미들웨어 차원에서 여러 연구로 진행되었지만 이 논문에서는 애플리케이션 레벨에서 MDA에서의 모델변환을 적용, 다른 플랫폼에서의 애플리케이션을 쉽게 WIPI 플랫폼으로 포팅할 수 있는 방법을 제안한다. 도메인 모델의 식별과 메타모델 정의, 그리고 변환규칙 등을 정의하여 XML 및 XSLT를 이용한 모델 변환을 수행한다. 또한 서로 다른 개발 플랫폼에서의 API매핑과 WIPI 기반 도메인 제약조건 등을 인식하고 향후 제한적이지만 제안사항을 적용한 모델변환도구의 개발과 테스트 기능 지원으로 연구를 진행한다.

Usability Evaluation for Smart Phone Augmented Reality Application User Interface (스마트폰 증강현실 애플리케이션 사용자 인터페이스의 사용성 평가 방안)

  • Chang, Won-Suk;Ji, Yong-Gu
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.35-47
    • /
    • 2011
  • Augmented reality applications offering location based service on smart phone require attention to users and new usability evaluation methods. The aim of this paper is to introduce new usability principles for application development and usability evaluation, and conduct expert evaluation on the augmented reality applications. We created a set of usability principles by analyzing characteristic of augmented reality applications, and conducted expert evaluation on three augmented reality applications primarily used by smart phone users. In expert evaluation and filtering procedure, we identified six usability problems that three applications have in common and the improvement guideline for the usability problems. The results of expert evaluation was verified by user test with a prototype that was developed using the guidelines. It is expect that the results of this study can be presented usability principles of the augmented reality application and a method of usability evaluation in the middle of new technology development process.

Design and Implementation of A Weakness Analyzer for Mobile Applications (모바일 애플리케이션을 위한 취약점 분석기의 설계 및 구현)

  • Mun, Il-Yong;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1335-1347
    • /
    • 2011
  • The dissemination and use of mobile applications have been rapidly expanding these days. And in such a situation, the security of mobile applications has emerged as a new issue. Although the safety of general software such as desktop and enterprise software is systematically achieved from the development phase to the verification phase through secure coding, there have been not sufficient studies on the safety of mobile applications yet. This paper deals with deriving weakness enumeration specialized in mobile applications and implementing a tool that can automatically analyze the derived weakness. Deriving the weakness enumeration can be achieved based on CWE(Common Weakness Enumeration) and CERT(Computer Emergency Response Team) relating to the event-driven method that is generally used in developing mobile applications. The analysis tool uses the dynamic tests to check whether there are specified vulnerabilities in the source code of mobile applications. Moreover, the derived vulnerability could be used as a guidebook for programmers to develop mobile applications.

Implementation of XML-based Open API for Smartphone Middleware (XML 기반 스마트폰 미들웨어 Open API 구현)

  • Kim, Young-Ju;Kim, Kyoung-Ju;Yu, Young-Jung;Park, Seong-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.869-876
    • /
    • 2011
  • Recently, use of Smartphones is growing at an extremely rapid pace. Many researchers have recognized the importance of developing Smartphones applications under these circumstances, and they have been conducted many studies to develop apps efficiently. The Smartphones middleware has become a focus of recent research to develop efficient Smartphones apps on a server-client environment in particular. In this study, for enhancing portability, expandability and convenience in the development of apps on the various platforms of Smartphones, We have proposed XML based Open API optimized in the Smartphones middleware. We also evaluated the performance, by applying it in Smartphone middleware environment.

A Study on SMiShing Detection Technique using TaintDroid (테인트드로이드를 이용한 스미싱 탐지 기법 연구)

  • Cho, Jiho;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.3-9
    • /
    • 2015
  • In this paper, a detection technique of smishing using a TaintDroid is suggested. Suggesting system detects malicious acts by transmitting a URL to the TaintDroid server and installing a relevant application to a virtual device of the TaintDroid server, when a smartphone user receives a text message including the URL suspected as a smishing. Through this we want to distinguish an application that can not install because of suspicion of a smishing in an actual smartphone whether said application is malicious application or not by testing with the virtual device of said system. The detection technique of a smishing using the TaintDroid suggested in this paper is possible to detect in a new form a smishing with a text message and to identifying which application it is through analysis of results from a user.