• Title/Summary/Keyword: Automated tool

Search Result 446, Processing Time 0.025 seconds

A Study of Software Coding Rules Inspection Tool for Railway Signaling Software Safety

  • Hwang, Jong-Gyu;Jo, Hyun-Jeong
    • International Journal of Safety
    • /
    • v.8 no.2
    • /
    • pp.31-36
    • /
    • 2009
  • In accordance with the development of recent computer technology, railway signaling software became more complex for the intellectualization. Therefore the importance and dependency of railway signaling system on the computer software is getting more increased further, and the testing for the safety and reliability of railway signaling system software became more important. It is started to become influential as very important issue for the reliability and safety of vital embedded software like railway signaling system. The software coding which can have an effect on the safety at the coding level of software shall not be included preferentially, for the safety of software, and must be checked. This thesis suggested an automated testing tool for coding rules on this railway signaling system software, and presented its applied result for railway signaling system software. The testing items in the implemented tool had referred to the international standards in relation to the software for railway system and MISRA-C standards. This automated testing tool for railway signaling system can be utilized at the assessment stage for railway signaling system software also, and it is anticipated that it can be utilized usefully at the software development stage also.

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Case study of Utilizing Automated Tools for Improving Maritime Software Quality (해양 소프트웨어 품질 제고를 위한 자동화 도구 활용 사례 연구)

  • Lim, Sang-woo;Kim, Kilyong;Lee, Seojeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.51-52
    • /
    • 2015
  • IMO has been proceeding in the maritime SQA for software quality is considered to be essential for the development of the introduction of the e-Navigation. In order to ensure software quality, follow the prescribed procedures throughout the software development project and create the output as a result of executing the respective steps. This paper is introduced a case for applying to maritime software development using the tool that is capable of real-time monitoring and automated documentation. Also, it is discussed the improvement of procedures for applying the expected effects and maritime SQA for thr tool utilization. The Development of customized tools for maritime SQA that is reflected an improved procedure for tool is the future goals.

  • PDF

A Study on the Utilization of Artificial Intelligence-Based Infringement Analysis Tools (인공지능 기반 침해분석 도구 활용에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.3-8
    • /
    • 2024
  • Recently, in order to build a cyber threats have increased in number and complexity. These threats increase the risk of using personally owned devices for work. This research addresses how to utilize an AI-enabled breach analysis tool. To this end, we developed and proposed the feasibility of using an AI-based breach analysis tool that reduces the workload of analysts and improves analysis efficiency through automated analysis processes. This allows analysts to focus on more important tasks. The purpose of this research is to propose the development and utilization of an AI-based breach analysis tool. We propose a new research direction in the field of breach analysis and suggest that automated tools should be improved in performance, coverage, and ease of use to enable organizations to respond to cyberattacks more effectively. As a research method, we developed a breach analysis tool using A.I. technology and studied various use cases. We also evaluated the performance, coverage, and ease of use of automated tools, and conducted research on predicting and preventing breaches and automatically responding to them. As a result, this research will serve as a foundation for the development and utilization of AI-based breach analysis tools, which can be used to respond to cyberattacks more effectively through experiments.

Synthesizing Image and Automated Annotation Tool for CNN based Under Water Object Detection (강건한 CNN기반 수중 물체 인식을 위한 이미지 합성과 자동화된 Annotation Tool)

  • Jeon, MyungHwan;Lee, Yeongjun;Shin, Young-Sik;Jang, Hyesu;Yeu, Taekyeong;Kim, Ayoung
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.2
    • /
    • pp.139-149
    • /
    • 2019
  • In this paper, we present auto-annotation tool and synthetic dataset using 3D CAD model for deep learning based object detection. To be used as training data for deep learning methods, class, segmentation, bounding-box, contour, and pose annotations of the object are needed. We propose an automated annotation tool and synthetic image generation. Our resulting synthetic dataset reflects occlusion between objects and applicable for both underwater and in-air environments. To verify our synthetic dataset, we use MASK R-CNN as a state-of-the-art method among object detection model using deep learning. For experiment, we make the experimental environment reflecting the actual underwater environment. We show that object detection model trained via our dataset show significantly accurate results and robustness for the underwater environment. Lastly, we verify that our synthetic dataset is suitable for deep learning model for the underwater environments.

A Design for the Automated Process of LCD Module Assembly Line (LCD 모듈 조립라인의 공정 자동화 설계)

  • Song, Chun-Sam;Kim, Joo-Hyun;Kim, Jong-Hyeong
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.5
    • /
    • pp.162-165
    • /
    • 2007
  • TFT-LCD process has two advantages as compared with the semiconductor-process. It is that cycle time is short and number of the final products are small. But it needs complicated inspection / assembly line to be treated manually and much higher labor costs in the TFT-LCD process. Also, It is necessary to build PICS(Production Information and Control System) which is automated and intelligent. In this paper, an automated process of LCD module assembly line that can increase productivity and reduce the cost of production to strengthen the competitiveness corresponding with global market is planned in comparison with its manual/semi-auto. It is noted that The automated line for COG$\sim$FOG process replacing with the existing facilities had the following effects; the productivity is increased to about 1.5 times and labor cost reduced 85%. In addition, whole assembly line can be short and simple.

Application of mathematical metamodeling for an automated simulation of the Dong nationality drum tower architectural heritage

  • Deng, Yi;Guo, Shi Han;Cai, Ling
    • Computers and Concrete
    • /
    • v.28 no.6
    • /
    • pp.605-619
    • /
    • 2021
  • Building Information Modeling (BIM) models are a powerful tool for preserving and using architectural history. Manually creating information models for such a significant number and variety of architectural monuments as Dong drum towers is challenging. The building logic based on "actual measurement construction" was investigated using the metamodel idea, and a metamodel-based automated modeling approach for the wood framework of Dong drum towers was presented utilizing programmable algorithms. Metamodels of fundamental frame kinds were also constructed. Case studies were used to verify the automated modeling's correctness, completeness, and efficiency using metamodel. The results suggest that, compared to manual modeling, automated modeling using metamodel may enhance the model's integrity and correctness by 5-10% while also reducing time efficiency by 10-20%. Metamodel and construction logic offer a novel way to investigate data-driven autonomous information-based modeling.

Development of the Automated Calculation System for Air-Bearing Spindle (공기 베어링 주축의 자동설계시스템 개발)

  • Chernopyatov Y.A.;Chung W.J.;Dolotov K.S.;Kim D.S.;Lee C.M.
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.13 no.5
    • /
    • pp.38-48
    • /
    • 2004
  • Recently the use of high-speed equipment in machine-tool industry has greatly increased, which requires the development of prognostics and prediction methods on the design stage. Conversion of the test/experiments stage from real to virtual reality will not only significantly reduce the design and manufacturing cost, but will also increase design quality. This paper shows how it is possible to develop the automated system for the design calculations of the air-bearing spindles. First, the general calculation method is introduced. It contains several steps, namely, geometry identification, pressure calculation, stiffiness calculation, dynamics characteristics calculation. For geometry identification reducing spindle shaft to rings was proposed, which helps to automate the calculation process. For pressure calculation the Peshti method was implemented. For stiffiness calculation the analysis was made, which shown the necessity of correct calculation step selection. Then the system of ordinary differential equations containing influence coefficients was evolved, which is used for trjectories calculation. The graphical representation of the calculation results shows the dynamic behavior of the spindle unit concerning various working conditions. Finally, this automated system is illustrated by an example of the air-bearing spindle calculation.

Bond Graph/Genetic Programming Based Automated Design Methodology for Multi-Energy Domain Dynamic Systems (멀티-에너지 도메인 동적 시스템을 위한 본드 그래프/유전프로그래밍 기반의 자동설계 방법론)

  • Seo, Ki-Sung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.677-682
    • /
    • 2006
  • Multi-domain design is difficult because such systems tend to be complex and include a mixtures of electrical, mechanical, hydraulic, and thermal components. To design an optimal system, unified and automated procedure with efficient search technique is required. This paper introduces design method for multi-domain system to obtain design solutions automatically, combining bond graph which is domain independent modeling tool and genetic programming which is well recognized as a powerful tool for open-ended search. The suggested design methodology has been applied for design of electric fitter, electric printer drive, and and pump system as a proof of concept for this approach.

A Study on Implementing an Automated Tool for De-Obfuscating a ConfuserEx (ConfuserEx의 난독화 복구 자동화 시스템 구축 연구)

  • Jae-hwi Lee;Young-seok Park;Dong-hyeon Kim;Gyu Heo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.129-137
    • /
    • 2023
  • According to a continuous attempts to manipulate content on portal sites using automated programs, a Naver, one of a portal site from Korea, is also trying to secure and analyze the programs to respond to the attempts. However, since some of the programs are secured by obfuscation tools, it is necessary to develop de-obfuscation technique. In this paper, we analyze a ConfuserEx, which occupied high percentage from obfuscation tools that applied to obtained programs, and propose an automated tool for de-obfuscating to save time for unpacking.