• Title/Summary/Keyword: Software Analysis

Search Result 9,428, Processing Time 0.044 seconds

The Case Study on Application of Software Reliability Analysis Model by Utilizing Failure History Data of Weapon System (무기체계의 고장 이력 데이터를 활용한 소프트웨어 신뢰도 분석 모델 적용 사례 연구)

  • Cho, Ilhoon;Hwang, Seongguk;Lee, Ikdo;Park, Yeonkyeong;Lee, Junghoon;Shin, Changhoon
    • Journal of Applied Reliability
    • /
    • v.17 no.4
    • /
    • pp.296-304
    • /
    • 2017
  • Purpose: Recent weapon systems in defense have increased the complexity and importance of software when developing multifunctional equipment. In this study, we analyze the accuracy of the proposed software reliability model when applied to weapon systems. Methods: Determine the similarity between software reliability analysis results (prediction/estimation) utilizing data from developing weapon systems and system failures data during operation of weapon systems. Results: In case of a software reliability prediction model, the predicted failure rate was higher than the actual failure rate, and the estimation model was consistent with actual failure history data. Conclusion: The software prediction model needs to adjust the variables that are appropriate for the domestic weapon system environment. As the reliability of software is increasingly important in the defense industry, continuous efforts are needed to ensure accurate reliability analysis in the development of weapon systems.

A Study on the Property Analysis of Software Reliability Model with Shape Parameter Change of Finite Fault NHPP Erlang Distribution (유한고장 NHPP 어랑분포의 형상모수 변화에 따른 소프트웨어 신뢰성 모형의 속성 분석에 관한 연구)

  • Min, Kyung Il
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.4
    • /
    • pp.115-122
    • /
    • 2018
  • Software reliability has the greatest impact on computer system reliability and software quality. For this software reliability analysis, In this study, we compare and analyze the trends of the properties affecting the reliability according to the shape parameters of Erlang distribution based on the finite fault NHPP. Software failure time data were used to analyze software failure phenomena, the maximum likelihood estimation method was used for parameter estimation. As a result, it can be seen that the intensity function is effective because it shows a tendency to decrease with time when the shape parameters a = 1 and a = 3. However, the pattern of the mean value function showed an underestimation pattern for the true values when the shape parameters a = 1 and a = 2, but it was found to be more efficient when a = 3 because the error width from the true value was small. Also, in the reliability evaluation of the future mission time, the stable and high trend was shown when the shape parameters a = 1 and a = 3, but on the contrary, when a = 2, the reliability decreased with the failure time. Through this study, the property of finite fault NHPP Erlang model according to the change of shape parameter without existing research case was newly analyzed, and new research information that software developers can use as basic guideline was presented.

A Study on Software Security Vulnerability Detection Using Coding Standard Searching Technique (코딩 표준 검색 기법을 이용한 소프트웨어 보안 취약성 검출에 관한 연구)

  • Jang, Young-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.973-983
    • /
    • 2019
  • The importance of information security has been increasingly emphasized at the national, organizational, and individual levels due to the widespread adoption of software applications. High-safety software, which includes embedded software, should run without errors, similar to software used in the airline and nuclear energy sectors. Software development techniques in the above sectors are now being used to improve software security in other fields. Secure coding, in particular, is a concept encompassing defensive programming and is capable of improving software security. In this paper, we propose a software security vulnerability detection method using an improved coding standard searching technique. Public static analysis tools were used to assess software security and to classify the commands that induce vulnerability. Software security can be enhanced by detecting Application Programming Interfaces (APIs) and patterns that can induce vulnerability.

Design and Implementation of Bioluminescence Signal Analysis Tool

  • Jeong, Hye-Jin;Lee, Byeong-Il;Hwang, Hae-Gil;Song, Soo-Min;Min, Jung-Joon;Choi, Heung-Kook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1580-1587
    • /
    • 2006
  • The term molecular imaging can be broadly defined as the in vivo characterization and measurement of biologic processes at the cellular and molecular level. Optical imaging that has highly reproducibility and repetition used in molecular imaging research. In the bioluminescence imaging, animals carrying the luciferase gene are imaged with a cooled CCD(Charge-Coupled Device) camera to pick up the small number of photons transmitted through tissues. Molecular imaging analysis will allow us to observe the incipience and progression of the disease. But hardware device for molecular imaging and software for molecular image analysis were dependent on imports. In this paper, we suggest image processing methods and designed software for bioluminescence signal analysis. And we demonstrated high correlation(r=0.99) between our software's photon counts and commercial software's photon counts. ROI function and processing functions were accomplished without error. This study have the importance of the development software for bioluminescence image processing and analysis. And this study built the foundations for creative development of analysis methods. We expected this study lead the development of image technology.

  • PDF

Software for adaptable eccentric analysis of confined concrete circular columns

  • Rasheed, Hayder A.;El-Fattah, Ahmed M. Abd;Esmaeily, Asad;Jones, John P.;Hurst, Kenneth F.
    • Computers and Concrete
    • /
    • v.10 no.4
    • /
    • pp.331-347
    • /
    • 2012
  • This paper describes the varying material model, the analysis method and the software development for reinforced concrete circular columns confined by spiral or hoop transverse steel reinforcement and subjected to eccentric loading. The widely used Mander model of concentric loading is adapted here to eccentric loading by developing an auto-adjustable stress-strain curve based on the eccentricity of the axial load or the size of the compression zone to generate more accurate interaction diagrams. The prediction of the ultimate unconfined capacity is straight forward. On the other hand, the prediction of the actual ultimate capacity of confined concrete columns requires specialized nonlinear analysis. This nonlinear procedure is programmed using C-Sharp to build efficient software that can be used for design, analysis, extreme event evaluation and forensic engineering. The software is equipped with an elegant graphics interface that assimilates input data, detail drawings, capacity diagrams and demand point mapping in a single sheet. Options for preliminary design, section and reinforcement selection are seamlessly integrated as well. Improvements to KDOT Bridge Design Manual using this software with reference to AASHTO LRFD are made.

The Study for Process Capability Analysis of Software Failure Interval Time (소프트웨어 고장 간격 시간에 대한 공정능력분석에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.49-55
    • /
    • 2007
  • Software failure time presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing. For data analysis of software reliability model, data scale tools of trend analysis are developed. The methods of trend analysis are arithmetic mean test and Laplace trend test. Trend analysis only offer information of outline content. From the subdivision of this analysis, new attemp needs the side of the quality control. In this paper, we discuss process capability analysis using process capability indexs. Because of software failure interval time is pattern of nonnegative value, instead of capability analysis of suppose to normal distribution, capability analysis of process distribution using to Box-Cox transformation is attermpted. The used software failure time data for capability analysis of process is SS3, the result of analysis listed on this chapter 4 and 5. The practical use is presented.

  • PDF

Commercial and In-house Simulator Development Trend for Electromagnetic Analysis of Autonomous Driving Environments (자율주행 환경의 전자기 해석을 위한 상용 및 자체 시뮬레이터 개발 동향)

  • Park, Woobin;Kim, Moonseong;Lee, Woochan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.31-42
    • /
    • 2021
  • In the modern era, radio wave analysis is necessary for various fields of engineering, and interpretation of this is also indispensable. Self-driving cars need multiple different electronic components, and thus accurate and fast electromagnetic simulator for this kind of complex radio environment is required for self-driving simulations. Accordingly, the demand for self-driving simulators as well as existing electromagnetic analysis software has increased. This paper briefly describes the characteristics of numerical analysis techniques for electromagnetic analysis, self-driving simulation software, and conventional electromagnetic simulation software and also summarizes the characteristics of each software. Finally, the verification of the result from in-house code compared to HFSS is demonstrated.

An Analysis of Perceptions of Students toward Software Education according to School Level

  • Kim, Seong-Won;Lee, Youngjun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.167-176
    • /
    • 2019
  • In this paper, we propose students' perception of software education according to the type of school. So, in this study, 47373 students were surveyed about the perception of SW education, and the results of the questionnaire were analyzed according to school type, gender, school level, experience of software education and event, and duration of software education experience. As a result, students attending software education lead schools showed the highest perception about software education, followed by software education research school and general school. In gender, males were more positive than females. The level of satisfaction and effectiveness of software education in school level was higher as the school level was lower, but the perception and career area of software education was higher as the school level was higher. In addition, software training and event experience have a positive effect on students' perception of software education, and the perception of software education changes positively as the duration of software education increases.

An Empirical Study of Software Size Estimation Techniques by Use Case (Use Case에 의한 소프트웨어 규모 예측 방법에 대한 실증적 연구)

  • 서예영;이남용
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.143-157
    • /
    • 2001
  • There has been a need for predicting development efforts and costs of the system during the early stage of the software process and hundreds of metrics have been proposed for computer software, but not all provide practical support to the software engineer. Some demand measurement that is too complex, others are so esoteric that few real-world professionals have any hope of understanding them, and others violate the basic intuitive notions of what high-quality software really is. It is worthwhile that metrics should be tailored to best accommodate specific products and processes after grasping their good and no good point. This paper describes two size estimation techniques, the Karner technique and the Marchesi technique, and compares and analyzes them with proposed evaluation criteria. Both techniques are to estimate software size analyzed by use case that is mainly described during the object-oriented analysis phase. We also present an empirical comparison of them, both are applied in the Internet Medicine Prescription System. We also propose some guidance for experiments based on our analysis. We believe that it should be facilitating project management more effective by adjusting software metrics properly.

  • PDF