• Title/Summary/Keyword: 오류감지시스템

Search Result 112, Processing Time 0.029 seconds

An Effective Test Data Selection Technique for Customized COM Components and its Empirical Study (맞춤된 COM 컴포넌트를 위한 효과적인 테스트 데이타 선정 기법과 적용사례)

  • 윤회진;이병희;김은희;최병주
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.6
    • /
    • pp.741-749
    • /
    • 2004
  • Component users must customize components they obtain from providers, in order to fit them to their own purposes. Normally, a component consists of black-box parts and white-box parts. Component users customize a component by modifying white-box parts of a component, and the customization faults appear through the interaction between black-box parts and white-box parts. Customization testing could be an integration testing of these two parts of a component. Also, customization testing in CBSD should select effective test data to reduce the testing cost, since CBSD aims to reduce the development cost. Therefore, this paper proposes a customization testing technique based on COM architecture through analyzing many COM components, and the technique selects effective test data. This paper evaluates the effectiveness of the test data selected by the proposed technique through an empirical study. It applies the techlique to a large-scale component-based system, Chamois, and it shows that the technique enables us to test customized COM components that run in a real component-based system

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

Application of Patient-based Real-time Quality Control (환자 기반 실시간 정도관리의 적용)

  • Seung Mo LEE;Kyung-A SHIN
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.56 no.2
    • /
    • pp.105-114
    • /
    • 2024
  • Clinical laboratories endeavor to secure quality by establishing effective quality management systems. However, laboratory environments are complex, and single quality control procedures may inadequately detect many errors. Patient-based real-time quality control (PBRTQC) is a laboratory tool that monitors the testing process using algorithms such as Bull's algorithm and several variables, such as average of normal, moving median, moving average, and exponentially weighted moving average. PBRTQC has many advantages over conventional quality control, including low cost, commutability, continuous real-time performance monitoring, and sensitivity to pre-analytical errors. However, PBRTQC is not easily implemented as it requires statistical algorithm selection, the design of appropriate rules and protocols, and performance verification. This review describes the basic concepts, methods, and procedures of PBRTQC and presents guidelines for implementing a patient-based quality management system. Furthermore, we propose the combined use of PBRTQC when the performance of internal quality control is limited. However, clinical evaluations were not conducted during this review, and thus, future evaluation is required.

A Study on Simulation Based Fault Injection Test Scenario and Safety Measure Time of Autonomous Vehicle Using STPA (STPA를 활용한 자율주행자동차의 시뮬레이션 기반 오류 주입 시나리오 및 안전조치 시간 연구)

  • Ahn, Dae-ryong;Shin, Seong-geun;Baek, Yun-soek;Lee, Hyuck-kee;Park, Ki-hong;Choi, In-seong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.129-143
    • /
    • 2019
  • As the importance of autonomous vehicle safety is emphasized, the application of ISO-26262, a development verification guideline for improving safety and reliability, and the safety verification of autonomous vehicles are becoming increasingly important, in particular, SAE standard level 3 or higher level autonomous vehicles detect and decision the surrounding environment instead of the human driver. Therefore, if there is and failure or malfunction in the autonomous driving function, safety may be seriously affected. So autonomous vehicles, it is essential to apply and verity the safety concept against failure and malfunctions. In this study, we study the fault injection scenarios for safety evaluation and verification of autonomous vehicles using ISO-26262 part3 process and STPA were studied and safety measures for safety concept design were studied through simulation bases fault injection test.

Study for Design of Defect Management to Improve the Quality of IoT Products (IoT 제품의 품질 개선을 위한 결함관리 설계에 관한 연구)

  • Kim, Jae Gyeong;Choi, Yeong Sook;Cho, Kyeong Rok;Lee, Eun Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.6
    • /
    • pp.229-236
    • /
    • 2022
  • Based on the Internet of Things, a web system that can check the condition around the fire extinguisher, whether a fire has occurred, and an application that can receive fire notifications in real time is implemented. Minimize errors that occur during development by using software engineering to clarify the goals of the system and define the structure in detail. In addition, for IoT-based fire extinguishers, a method of reducing defects by finding product defects in the demand analysis, design, and implementation stages and analyzing the cause thereof is proposed. Through the proposed research, it is possible to secure the reliability of defect management for IoT-based smart fire extinguisher.

Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model (카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법)

  • Yi-ji Im;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1099-1110
    • /
    • 2023
  • The recognition system of autonomous driving and robot navigation performs vision work such as object recognition, tracking, and lane detection after multi-sensor fusion to improve performance. Currently, research on a deep learning model based on the fusion of a camera and a lidar sensor is being actively conducted. However, deep learning models are vulnerable to adversarial attacks through modulation of input data. Attacks on the existing multi-sensor-based autonomous driving recognition system are focused on inducing obstacle detection by lowering the confidence score of the object recognition model.However, there is a limitation that an attack is possible only in the target model. In the case of attacks on the sensor fusion stage, errors in vision work after fusion can be cascaded, and this risk needs to be considered. In addition, an attack on LIDAR's point cloud data, which is difficult to judge visually, makes it difficult to determine whether it is an attack. In this study, image scaling-based camera-lidar We propose an attack method that reduces the accuracy of LCCNet, a fusion model (camera-LiDAR calibration model). The proposed method is to perform a scaling attack on the point of the input lidar. As a result of conducting an attack performance experiment by size with a scaling algorithm, an average of more than 77% of fusion errors were caused.

Detection of Anomaly VMS Messages Using Bi-Directional GPT Networks (양방향 GPT 네트워크를 이용한 VMS 메시지 이상 탐지)

  • Choi, Hyo Rim;Park, Seungyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.125-144
    • /
    • 2022
  • When a variable message signs (VMS) system displays false information related to traffic safety caused by malicious attacks, it could pose a serious risk to drivers. If the normal message patterns displayed on the VMS system are learned, it would be possible to detect and respond to the anomalous messages quickly. This paper proposes a method for detecting anomalous messages by learning the normal patterns of messages using a bi-directional generative pre-trained transformer (GPT) network. In particular, the proposed method was trained using the normal messages and their system parameters to minimize the corresponding negative log-likelihood (NLL) values. After adequate training, the proposed method could detect an anomalous message when its NLL value was larger than a pre-specified threshold value. The experiment results showed that the proposed method could detect malicious messages and cases when the system error occurs.

SR-ARQ Retramsission Persistence Management to Avoid TCP Spurious Timeout in a Wireless Environment (무선 환경에서 TCP 스퓨리어스 타임아웃 방지를 위한 SR-ARQ 재전송 지속성 관리 방안)

  • Kim, Beom-Joon;Han, Je-Chan
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.451-458
    • /
    • 2010
  • To detect and recover packet losses over wireless links is very important in terms of reliability in packet transmission. Most wireless communication systems adopt an automatic repeat request (ARQ) protocol operating at link layer. However, it has been constantly addressed that the interaction not harmonized sufficiently between ARQ and TCP rather degrades TCP performance. In this paper, therefore, we propose an improved scheme from the aspect of the interaction with TCP loss recovery mechanism that can be applied to selective repeat ARQ (SR-ARQ) protocol and prove that the proposed scheme improves TCP performance significantly by OPNET simulations.

An Efficient User Authentication Protocol using Smartcard (효율적인 스마트카드 사용자 인증 프로토콜)

  • Yong, Seung-Lim;Cho, Tae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.109-116
    • /
    • 2010
  • Due to the increasing interest and demands of user privacy, remote user authentication schemes using smart card has been researched in active. Recently, a lot of suggestion have been made in order to provide user's anonymity and trace a malicious user. In 2008, Kim et al. proposed a traceable anonymity authentication scheme. In 2009, Choi et al. pointed out that Kim's protocol was insecure against outsider attacker and proposed an improved scheme. But Kim's and Choi's schemes fail to provide the user's anonymity or compute some values in the protocol. In this paper, we analyse those problems and suggest two improved schemes to resolve those problems.

A hybrid navigation system of underwater vehicles using fuzzy inferrence algorithm (퍼지추론을 이용한 무인잠수정의 하이브리드 항법 시스템)

  • 이판묵;이종무;정성욱
    • Journal of Ocean Engineering and Technology
    • /
    • v.11 no.3
    • /
    • pp.170-179
    • /
    • 1997
  • This paper presents a hybrid navigation system for AUV to locate its position precisely in rough sea. The tracking system is composed of various sensors such as an inclinometer, a tri-axis magnetometer, a flow meter, and a super short baseline(SSBL) acoustic position tracking system. Due to the inaccuracy of the attitude sensors, the heading sensor and the flowmeter, the predicted position slowly drifts and the estimation error of position becomes larger. On the other hand, the measured position is liable to change abruptly due to the corrupted data of the SSBL system in the case of low signal to noise ratio or large ship motions. By introducing a sensor fusion technique with the position data of the SSBL system and those of the attitude heading flowmeter reference system (AHFRS), the hybrid navigation system updates the three-dimensional position robustly. A Kalman filter algorithm is derived on the basis of the error models for the flowmeter dynamics with the use of the external measurement from the SSBL. A failure detection algorithm decides the confidence degree of external measurement signals by using a fuzzy inference. Simulation is included to demonstrate the validity of the hybrid navigation system.

  • PDF