• Title/Summary/Keyword: Code checking

Search Result 130, Processing Time 0.029 seconds

Application of Classification of Object-property Represented in Korea Building Act Sentences for BIM-enabled Automated Code Compliance Checking (BIM기반 설계 품질검토 자동화를 위한 건축 관련 법규문장의 객체 및 속성 표현에 대한 체계화 접근방법)

  • Shin, Jaeyoung;Lee, Jin-Kook
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.3
    • /
    • pp.325-333
    • /
    • 2016
  • This paper aims to classify objects and their properties represented in Korea Building Act sentences for applying to BIM-enabled automated code compliance checking task. In order to conduct automated code compliance checking, it is necessary to develop translation process of converting the building act sentences into computer-executable forms. However, since Korea building act sentences are written in natural language, some of requirements are ambiguous to translate explicitly. In this regard, the building act sentences regarding building permit requirements are analyzed focusing on the regulation-specific objects and related properties representation from noun phrases within the scope of this paper. From 1977 building act sentences and attached reference regulations, 1200 regulation-specific objects and about 220 related properties are extracted and classified. In the application for the classification, object-property database is implemented and some of application using the database and the regulation-specific classification is suggested to support to generate rule set written in computable codes.

Development of Rule-based Checking Modules for the Evacuation Regulations of Super-tall Buildings in Open BIM Environments (개방형BIM환경에서의 룰기반 초고층건축물 피난법규 검토모듈 개발)

  • Kim, Inhan;Choi, Jungsik;Cho, Geunha
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.2
    • /
    • pp.83-92
    • /
    • 2013
  • IFC based open BIM has internationally developed as a solution for interoperability problem among different software applications. Despite much interest and effort, the open BIM technologies are rarely introduced to the construction industry and need more technical development for a practical application as well. This research aims to develop automated code checking modules for quality assurance process of BIM data. The research have analyzed domestic regulations focusing on super-tall buildings and developed open BIM-based code checking modules for the evacuation regulations. The modules are able to validate evacuation regulations such as installation of emergency elevator and fire safety zone. The authors expect to improve the process of BIM quality assurance and enhance the quality of BIM data by this research on automated checking system.

Mobile Robot System Design for RFID-based Inventory Checking (RFID 기반 재고조사용 이동로봇 시스템의 설계)

  • Son, Min-Hyuk;Do, Yong-Tae
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.1
    • /
    • pp.49-57
    • /
    • 2011
  • In many industries, the accurate and quick checking of goods in storage is of great importance. Most today's inventory checking is based on bar code scanning, but the relative position between a bar code and an optical scanner should be maintained in close distance and proper angle for the successful scanning. This requirement makes it difficult to fully automate the inventory information/control systems. The use of RFID technology can be a solution for overcoming this problem. The mobile robot presented in this paper is equipped with an RFID tag scanning system, that automates the otherwise manual or semi-automatic inventory checking process. We designed the robot system in a quite practical approach, and the developed system is close to the commercialization stage. In our experiments, the robot could collect information of goods stacked on shelves autonomously without any failure and maintain corresponding database while it navigated predefined paths between the shelves using vision.

Cross-Language Clone Detection based on Common Token (공통 토큰에 기반한 서로 다른 언어의 유사성 검사)

  • Hong, Sung-Moon;Kim, Hyunha;Lee, Jaehyung;Park, Sungwoo;Mo, Ji-Hwan;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.14 no.2
    • /
    • pp.35-44
    • /
    • 2018
  • Tools for detecting cross-language clones usually compare abstract-syntax-tree representations of source code, which lacks scalability. In order to compare large source code to a practical level, we need a similarity checking technique that works on a token level basis. In this paper, we define common tokens that represent all tokens commonly used in programming languages of different paradigms. Each source code of different language is then transformed into the list of common tokens that are compared. Experimental results using exEyes show that our proposed method using common tokens is effective in detecting cross-language clones.

A Study on Enhanced Self-Checking Characteristics in Redundant Communication System (여분을 갖는 통신시스템에서의 자기검사특성 향상에 관한 연구)

  • 신덕호;김현기;이재훈;이창훈;이기서
    • Proceedings of the KSR Conference
    • /
    • 2000.05a
    • /
    • pp.352-359
    • /
    • 2000
  • In this paper, the method is used that each system isolates the part in which faults are occurred in case of fault occurrence since total system is designed in the type of hot standby sparing system construction and self-checking circuit in each system is attached to the memory being of the high failure rate in common communication system. Thus reliability and availability in system are improved. In this thesis, self-checking circuit was designed using 2 out of 6 code and didn't have any effect to the system operation. For the purpose of verification, each system attached with self-checking circuit was simulated through fault injection arid the continuity of each system in hot standby sparing system was tested in case that the system was switched when faults in the system were occurred.

  • PDF

A Function Network Analyzer for Efficient Analysis of Automotive Operating System

  • Yu, Lu Zheng;Choi, Yunja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.972-975
    • /
    • 2013
  • This work developed a code analysis & extraction tool named Function Network Analyzer (FNA) to reduce the cost of software safety analysis. FNA analyzes functions and variables which a given function depends on, and extracts subset of code that can be compiled of automotive operating system, final resulting a well-ordered code sequence that can be compiled for model checking technique. And the experimental result illustrates that FNA can get 100% accurate rate and over 96% reduction rate by testing API functions from trampoline system.

Code-Reuse Attack Detection Using Kullback-Leibler Divergence in IoT

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.54-56
    • /
    • 2016
  • Code-reuse attacks are very dangerous in various systems. This is because they do not inject malicious codes into target systems, but reuse the instruction sequences in executable files or libraries of target systems. Moreover, code-reuse attacks could be more harmful to IoT systems in the sense that it may not be easy to devise efficient and effective mechanism for code-reuse attack detection in resource-restricted IoT devices. In this paper, we propose a detection scheme with using Kullback-Leibler (KL) divergence to combat against code-reuse attacks in IoT. Specifically, we detect code-reuse attacks by calculating KL divergence between the probability distributions of the packets that generate from IoT devices and contain code region addresses in memory system and the probability distributions of the packets that come to IoT devices and contain code region addresses in memory system, checking if the computed KL divergence is abnormal.

FPGA implementation of overhead reduction algorithm for interspersed redundancy bits using EEDC

  • Kim, Hi-Seok
    • Journal of IKEEE
    • /
    • v.21 no.2
    • /
    • pp.130-135
    • /
    • 2017
  • Normally, in data transmission, extra parity bits are added to the input message which were derived from its input and a pre-defined algorithm. The same algorithm is used by the receiver to check the consistency of the delivered information, to determine if it is corrupted or not. It recovers and compares the received information, to provide matching and correcting the corrupted transmitted bits if there is any. This paper aims the following objectives: to use an alternative error detection-correction method, to lessens both the fixed number of the required redundancy bits 'r' in cyclic redundancy checking (CRC) because of the required polynomial generator and the overhead of interspersing the r in Hamming code. The experimental results were synthesized using Xilinx Virtex-5 FPGA and showed a significant increase in both the transmission rate and detection of random errors. Moreover, this proposal can be a better option for detecting and correcting errors.

A Study on Routing of In-Core Instrumentation Guide Tubes from Reactor (원자로 노내 계측기안내관 배열에 관한 연구)

  • 조덕상;손용수
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1993.04a
    • /
    • pp.159-164
    • /
    • 1993
  • This paper presents a computer design program for In-Core Instrumentation(ICI) guide tube routing and locations on support system, and checking the interference between ICI guide tubes in the reactor coolant system of typical Pressurized Water Reactor. The program, ICITRIC, has been written in FORTRAN language which is available under UNIX environment. Results of this program are compared with those of the commercial code, PATRAN, and both results are almost same Also the results may provide input data for ICI system static and dynamic analysis performed by the commercial code, SUPER PIPE. This program can simulate ICI guide tube routing and locations on support system, and checking the interference between ICI guide tubes. Through a process of iteration, the designer can apply initial conditions, and modify the routing until satisfied with the overall system performance.

  • PDF

Automated Scenario Generation for Model Checking Trampoline Operating System

  • Chowdhury, Nahida Sultana;Choi, Yunja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1342-1345
    • /
    • 2011
  • A valid scenario generation is essential for model checking software. This paper suggests an automated scenario generation technique through the analysis of function called-by graphs and call graphs of the program source code. We provide the verification process including the scenario generation and show application results on the Trampoline operating system using CBMC as a back-end model checker.