• Title/Summary/Keyword: 애플리케이션 테스트

Search Result 95, Processing Time 0.024 seconds

Performance Evaluation of PEP based TCP Splitting Scheme in Satellite Communication Systems (위성 통신 시스템에서 TCP연결 분할 기반 PEP의 성능 평가)

  • Weldegiorgis, Nathnael Gebregziabhe;Lee, Kyu-Hwan;Kim, Jong-Mu;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.10-17
    • /
    • 2015
  • A satellite communication system is one of viable solutions for Internet applications running in wide areas. However, the performance of TCP can be seriously degraded in the satellite networks due to long round-trip time (RTT) and high bit error rate (BER) over satellite links. Therefore, a performance enhancing proxy(PEP) based TCP splitting connection scheme is used in the satellite link to improve the TCP performance. In this paper, we implement PEP testbed and conduct experiment to evaluate the performance of TCP splitting connection by comparing with high-speed TCP solutions in various environments. In our experimental environment, we consider multiple connections, high packet loss, and limited bandwidth. The experiment results show that PEP improves the TCP throughput than high-speed TCP variants in various environments. However, there is no improvement of the TCP throughput with the limited bandwidth because there is packet loss caused by both the congestion and the channel error.

Development of Inshop service system and UI using multi-dimensional mash-up promotional multimedial considered devices for micro small business owner's store (광고디바이스를 고려 다차원 홍보물을 활용한 소상공인 점포지원 서비스 인샵 서비스 시스템 및 UI 개발)

  • Jung, Jong-Jin;Cho, Jung-Min;Park, Ji-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2015.07a
    • /
    • pp.509-512
    • /
    • 2015
  • 국내 자영업자의 수는 매년 증가하고 있으나 판로나 홍보 부족으로 인해 폐업하는 자영업자의 수가 급격하게 증가하고 있다. 대형 FC는 별도의 마케팅을 지원하는 조직을 보유하고 있어 홍보나 판촉에 용이하지만 개인 소상공인들은 주로 전통적인 광고수단인 전단이나 판촉물을 통해 홍보함에 따라 수익 창출에 어려움이 있다. 최근 고속 네트워크 발전과 다양한 고성능 스마트 단말의 보급으로 홍보할 수 있는 매체와 채널이 다양화되고 있다. 그러나 소상공인들은 이러한 환경을 적극적으로 이용할 수 없는 상황이다. 따라서 IT 활용 능력을 통해 소상공인이 손쉽게 이용하기 위한 경쟁력 있는 다차원 홍보물을 활용한 소상공인 점포지원 서비스가 필요하다. 본 연구 과제에서는 다차원 홍보물을 활용한 소상공인 점포지원 서비스 시스템 및 UI 개발을 수행한다. 이를 통해 고객의 점포 재방문율을 향상시켜 소상공인들의 이익 창출을 증대할 수 있다. 본 연구에서는 다차원 홍보물을 활용한 소상공인 점포지원 서비스 시스템 및 UI 개발을 위해 소상공인 점포들이 이용 가능한 서비스 시나리오 개발, 고객 정보 관리 기능 개발, 다양한 형태의 메시지 전송 기술 개발과 시험 테스트를 수행한다. 본 용역 과제는 (1) 다차원 홍보물을 활용하여 고객 재방문율을 향상하는 서비스 시나리오 개발, (2) 고객 정보 관리 기능 개발, (3) SMS, MMS, 애플리케이션 등을 이용한 다양한 형태의 메시지 전송 기술 개발, (4) 고객 정보 관리와 다차원 홍보물 전송이 수행 가능한 형태의 UI 개발, (5) 소상공인 점포지원 서비스 시스템 프로토타입 개발 부분으로 구분하여 진행되었다.

  • PDF

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

MPW Chip Implementation and Verification of High-performance Vector Inner Product Calculation Circuit for SVM-based Object Recognition (SVM 기반 사물 인식을 위한 고성능 벡터 내적 연산 회로의 MPW 칩 구현 및 검증)

  • Shin, Jaeho;Kim, Soojin;Cho, Kyeongsoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.124-129
    • /
    • 2013
  • This paper proposes a high-performance vector inner product calculation circuit for real-time object recognition based on SVM algorithm. SVM algorithm shows a higher detection rate than other object recognition algorithms. However, it requires a huge amount of computational efforts. Since vector inner product calculation is one of the major operations of SVM algorithm, it is important to implement a high-performance vector inner product calculation circuit for real-time object recognition capability. The proposed circuit adopts the pipeline architecture with six stages to increase the operating speed and makes it possible to recognize objects in real time based on SVM. The proposed circuit was described in Verilog HDL at RTL. For silicon verification, an MPW chip was fabricated using TSMC 180nm standard cell library. The operation of the implemented MPW chip was verified on the test board with test application software developed for the chip verification.

Development of Bluetooth Protocol Stack on Embedded System (임베디드 시스템 상에서 블루투스 프로토콜 스택 개발)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.2
    • /
    • pp.123-128
    • /
    • 2004
  • Recent advancement in RF technology and wireless communications has enabled the development of noble networks. Bluetooth that can be used in various application field is a kind of WPAN(Wireless Personal Area Network) standard that is widely known. Bluetooth enables voice and data applications to operate simultaneously. Various applications have been implemented based on standard Profiles. In this paper, we describes the development of Biuetooth network AP(Access Point) system for network connection of Bluetooth devices. Unlike headset, mouse, and keyboard, the access point should have capability to support multiple connection and stabilized network throughput. We have designed and developed the hardware system, core stack and profiles on embedded system to comply with standard specification. Our system showed compatibility and good protocol performance through testing with lots of products that is available in market.

A Position Tracking System Using Pattern Matching and Regression Curve (RFID 태그를 이용한 실내 위치 추적 시스템에 관한 연구)

  • Cho, Jaehyung
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.211-217
    • /
    • 2019
  • Location positioning systems are available in applications such as mobile, robotic tracking systems and Wireless location-based service (LBS) applications. The GPS system is the most well-known location tracking system, but it is not easy to use indoors. The method of radio frequency identification (RFID) location tracking was studied in terms of cost-effectiveness for indoor location tracking systems. Most RFID systems use active RFID tags using expendable batteries, but in this paper, an inexpensive indoor location tracking system using passive RFID tags has been developed. A pattern matching method and a system for tracing location by generating regression curves were studied to use precision tracking algorithms. The system was tested by verifying the level of error caused by noise. The three-dimensional curves are produced by the regression equation estimated the statistically meaningful coordinates by the differential equation. The proposed system could also be applied to mobile robot systems, AGVs and mobile phone LBSs.

Mean Transfer Time for SCTP and TCP in Single-homed Environment considering Packet Loss (싱글홈드 환경에서 패킷 손실을 고려한 SCTP와 TCP의 평균 전송 시간)

  • Kim, Ju-Hyun;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.33 no.1
    • /
    • pp.233-248
    • /
    • 2008
  • Stream Control Transmission Protocol(SCTP) is a new transport protocol that is known to provide improved performance than Transmission Control Protocol(TCP) in multi-homing environment that is having two and more IP addresses. But currently single-homed computer is used primarily that is having one IP address. To identify whether mean transfer time for SCTP is faster that for TCP in single-homed environment considering packet loss, we make up real testbed regulating the bandwidth, delay time and packet loss rate on router and observe the transfer time. We write server and client applications to measure SCTP and TCP mean transfer time by C language. Analysis of these experimental results from the testbed implementation shows that mean transfer time of SCTP is not better than performance of TCP in single homed environment exceptional case. Main reasons of performance are that SCTP compared to TCP stops transmitting data by timeout and data transmission is often delayed when SACK congestion happens. The result of study shows that elaborate performance tuning is required in developing a new SCTP module or using a implemented SCTP module.

Implementation and Performance Analysis of High Speed Communication Mechanism between Internet Processor and CDMA Processor (인터넷 프로세서와 CDMA 송수신 프로세서간의 고속 데이타 전송 메커니즘 구현 및 성능분석)

  • Jung, Hae-Seung;Chung, Sang-Hwa
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.590-597
    • /
    • 2002
  • Currently, with the increasing demand for combining cellular phone and PDA, various kinds of PDA-phones are being developed. A typical PDA-phone consists of a CDMA processor and a PDA processor. Generally, a UART serial communication port is used for inter-processor communication. However, the CDMA standard will need more data bandwidth over 2Mbps with the emergence of IMT-2000. The bandwidth requirement is beyond the capability of UART. In this paper, several inter-processor communication mechanisms are analyzed and especially Dual Port Memory and USB were chosen as the candidates for the new communication mechanism. A prototype PDA-phone board has been implemented for experiment. The experimental result shows that Dual Port Memory is better than USB in cost performance.

Single Shot Detector for Detecting Clickable Object in Mobile Device Screen (모바일 디바이스 화면의 클릭 가능한 객체 탐지를 위한 싱글 샷 디텍터)

  • Jo, Min-Seok;Chun, Hye-won;Han, Seong-Soo;Jeong, Chang-Sung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.1
    • /
    • pp.29-34
    • /
    • 2022
  • We propose a novel network architecture and build dataset for recognizing clickable objects on mobile device screens. The data was collected based on clickable objects on the mobile device screen that have numerous resolution, and a total of 24,937 annotation data were subdivided into seven categories: text, edit text, image, button, region, status bar, and navigation bar. We use the Deconvolution Single Shot Detector as a baseline, the backbone network with Squeeze-and-Excitation blocks, the Single Shot Detector layer structure to derive inference results and the Feature pyramid networks structure. Also we efficiently extract features by changing the input resolution of the existing 1:1 ratio of the network to a 1:2 ratio similar to the mobile device screen. As a result of experimenting with the dataset we have built, the mean average precision was improved by up to 101% compared to baseline.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.