• Title/Summary/Keyword: SW 신뢰성

Search Result 75, Processing Time 0.028 seconds

Design of Quality Metrics and Accreditate Procedure for SW Process Improvement based on K-model (K-모델기반의 소프트웨어 프로세스 품질 척도 및 인증절차 설계)

  • Hwang, Sun-Myung
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.861-875
    • /
    • 2009
  • In order to make high quality software and high reliability software, systematic development management and organizational support are essential needed. Since 1990's Software process models such as ISO/IEC 15504 and CMMI have been used to improve organization capability. But these models have problems that are used to apply on large scaled organization or large project and so many practices are actually required. We present characteristics of ISO/IEC 15504, CMMI and K-model can easily apply to small and medium sized business or project, and propose the standard quality metric and accreditate procedure based on K-model for measuring quantitative quality level.

  • PDF

Design of Location Recognition and ID Identification for NFT Reports in Metaverse-based Field_study Trip (메타버스기반 체험학습 NFT보고서의 위치인식과 ID식별 설계)

  • Mingoo Kang
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.38-44
    • /
    • 2023
  • In this paper, a blockchain-based platform of NFT(Non-Fungible Token) reports was proposed to ensure the reliable performance contents of field study trip. It is possible to identify and manage the personal multi biomeric authentication user ID of activity records for students in a mobile IP-based metaverse with the linkage of extended reality(XR). At this time, many quests and incentives of platform are provided to induce students to experience smart and fun field studying facilities by linking real trip experiences and virtual extended_reality studies in the metaverse interworking.

Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement (정보보호 기반 강화를 위한 정보보호 예산 확대 및 개선 방안 연구)

  • Bae, Sunha;KIM, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1279-1294
    • /
    • 2016
  • Information security to use information technology(IT) in safety and reliability environment is becoming of great importance. In advanced countries including United States and United Kingdom are consistently expanding budget for information security. Korea also has been a growing interest in information security and Korea government announced plan to develop information security into next-generation growth engine. However, information security budget has increased slightly in recent years, so many national institutions and state governments have budget shortfall to perform information security work. Moreover budget items do not include generic contents about information security and there are confined to some security SW, HW and services. It is necessary to expand information security budget for enhancement national capabilities of information security. In this paper, we analyze the IT and information security budget situation for Korea and United States and propose effective budget expansion and improvement approaches for Korea.

A Study of CCTV Video Tracking Technique to The Object Monitoring in The Automation Manufacturing Facilities (자동화 생산 시설물의 객체모니터링을 위한 CCTV 영상추적 기술에 관한 연구)

  • Seo, Won-Gi;Lee, Ju-Young;Park, Goo-Man;Shin, Jae-Kwon;Lee, Seung-Youn
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.134-138
    • /
    • 2012
  • In this paper, we implement the real-time status monitoring system to surveil the object in the automation manufacturing facilities and we propose the CCTV video tracking system using the video tracking filter to improve efficiency. To surveil the object in automation manufacturing facilities, we implement monitoring SW on the based of the video tracking filter instead of the general method for the video monitoring so the reliable monitoring based on the PC is possible efficiently. In addition, accessibility and convenience for administrator are improved as the real-time status confirmation function. Also, we conform the performance improvement effect through the performance analysis of the proposed monitoring system using the video tracking filter.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

A Study on the System Management CSCI Software Modularization in Naval Combat Management System

  • Hyeon-Tae Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.67-75
    • /
    • 2024
  • Frequently changeable functional requirements in System Management CSCI Software make it difficult to reuse an overall application, but only the partial class codes repeatedly as a new version of Naval Combat Management System is developed. This structural environment leads to increasing development time and expenses. This is why modularization for System Management CSCI Software is proposed as a solution, leveraging the advantages of proper standardization and functional expandability offered by Standard Interface Architecture. This paper outlines the comparisons of modified class ratios as well as software reliability test runtime results between before and after implementing the modularization for System Management CSCI Software. The findings demonstrate there is sufficient improvement in areas, such as higher maintenance and reusability, supporting the application of modularization for System Management CSCI Software with the implementation of Standard Interface Architecture.

1D CNN and Machine Learning Methods for Fall Detection (1D CNN과 기계 학습을 사용한 낙상 검출)

  • Kim, Inkyung;Kim, Daehee;Noh, Song;Lee, Jaekoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.85-90
    • /
    • 2021
  • In this paper, fall detection using individual wearable devices for older people is considered. To design a low-cost wearable device for reliable fall detection, we present a comprehensive analysis of two representative models. One is a machine learning model composed of a decision tree, random forest, and Support Vector Machine(SVM). The other is a deep learning model relying on a one-dimensional(1D) Convolutional Neural Network(CNN). By considering data segmentation, preprocessing, and feature extraction methods applied to the input data, we also evaluate the considered models' validity. Simulation results verify the efficacy of the deep learning model showing improved overall performance.

Core network maintenance by NO.7 protocol analyzing (Core Network 유지 보수를 위한 NO.7 Protocol 감시 방안)

  • Yoo Jun-Mo;Kim Yun-Sung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.49-60
    • /
    • 2005
  • The Back Bone of gearing portion between Core Network System which is used in wire and wireless system is No.7 Protocol. ISUP( ISDN User Part), INAP handling in Intelligent Network and MAP gearing method for linking each Network Element System in mobile network have use of No.7 signaling. Therefore, it is require for system to detect the problem - operating problem occurs in Core Network which use No.7 signaling or the existing problem that is not recognized - in shortest time. This paper study out analyzing and measuring system for No.7 protocol and analyzing out system whether out of order or not. It can abstract No.7 Signaling Message and analyze system performance and report it. This system is connected in system No.7 HW Module which is in charge of No.7 Signaling. It is not offer Emulator function and Simulation function for any scenario but offer monitoring No.7 signaling. This system perform the function about No.7 MTP, ISUP, INAP and MAP and is offered several wire and wireless network Operator. It can detect and correct SW system, HW system and operating system problem. From now on, this system may offer the function about A-interface which is gearing between BSC and MSC, so it will perform to analyze generally and prompt effective operating for Core Network system.

Performance analysis of packet transmission for a Signal Flow Graph based time-varying channel over a Wireless Network (무선 네트워크 시변(time-varying) 채널에서 SFG (Signal Flow Graph)를 이용한 패킷 전송 성능 분석)

  • Kim Sang Yong;Park Hong Seong;Oh Hoon;LI Vitaly
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.2 s.332
    • /
    • pp.23-38
    • /
    • 2005
  • The state of channel between two or more wireless terminals is changed frequently due to noise or multiple environmental conditions in wireless network. In this paper, we analyze packet transmission time and queue length in a time-varying channel of packet based Wireless Networks. To reflect the feature of the time-varying channel, we model the channel as two-state Markov model and three-state Markov model Which are transformed to SFG(Signal Flow Graph) model, and then the distribution of the packet transmission can be modeled as Gaussian distribution. If the packet is arrived with Poisson distribution, then the packet transmission system is modeled as M/G/1. The average transmission time and the average queue length are analyzed in the time-varying channel, and are verified with some simulations.

Suggestion of RE and TDD-based V&V Development Process for Scientific Software Implementation (과학용 소프트웨어 구현을 위한 RE와 TDD기반 V&V 개발 프로세스 제안)

  • Lee, Jae-Hong;Kim, Duksu;Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.79-88
    • /
    • 2021
  • Scientific software requires a development process different from conventional application software due to its unique characteristics, such as expert-level deep domain knowledge requirements. In this study, we proposed a V & V development process based on RE (Reverse Engineering) and TDD (Test-Driven Development) for software development for science. We also configured a virtual scenario for the actual project, applied it, checked the procedure, and refined it. The development process of this study, suggested for the purpose of developing scientific software, will contribute to the development and application of the software that can provide high quality and high reliability. And This study is expected to serve as an opportunity for the development of scientific software and the spread of research.