• Title/Summary/Keyword: Software Analysis

Search Result 9,375, Processing Time 0.037 seconds

Enhancement of VECTOR Method by Adapting OCTAVE for Risk Analysis in Legacy System Migration

  • Hakemi, Aida;Jeong, Seung Ryul;Ghani, Imran;Sanaei, Mojtaba Ghanaatpisheh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2118-2138
    • /
    • 2014
  • Risks are involved in all phases of the software life cycle, and due to these risks, software can face various problems that can cause different negative outcomes and sometimes, in extreme cases, the failure of the software. Most of these risks lie in the legacy software migration process. These risks can create many problems, and in the worst case they can lead to the failure of the migration project. This paper explores different types of risk analysis methods such as CRAMM, CORAS, OCTAVE and VECTOR. After comparing these methods, the two suitable methods were chosen, namely, OCTAVE and VECTOR. Based on the use of these two methods, the project suggests an enhanced EOV method for risk analysis in the migration of legacy software.

Signal Analysis Software for DGPS Station (DGPS 기준국 신호분석 소프트웨어)

  • Hwang, Ho-Yon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.15 no.2
    • /
    • pp.1-8
    • /
    • 2007
  • In this research, algorithm and software for the medium frequency signal analysis of DGPS(Differential Global Positioning System) station were developed. Based on new MF(Medium Frequency) algorithm, the software of NDGPS(National DGPS) signal analysis was developed for coverage analysis. Predicted MF propagation data from this software was compared to the measurement data for the verification of a developed MF algorithm. GIS(Geographic Information System) techniques including digital map with elevation data were used because MF propagation is closely related to ground conductivity, mountains, building intensity.

  • PDF

"3+3 PROCESS" FOR SAFETY CRITICAL SOFTWARE FOR I&C SYSTEM IN NUCLEAR POWER PLANTS

  • Jung, Jae-Cheon;Chang, Hoon-Sun;Kim, Hang-Bae
    • Nuclear Engineering and Technology
    • /
    • v.41 no.1
    • /
    • pp.91-98
    • /
    • 2009
  • The "3+3 Process" for safety critical software for nuclear power plants' I&C (Instrumentation and Control system) has been developed in this work. The main idea of the "3+3 Process" is both to simplify the software development and safety analysis in three steps to fulfill the requirements of a software safety plan [1]. The "3-Step" software development process consists of formal modeling and simulation, automated code generation and coverage analysis between the model and the generated source codes. The "3-Step" safety analysis consists of HAZOP (hazard and operability analysis), FTA (fault tree analysis), and DV (design validation). Put together, these steps are called the "3+3 Process". This scheme of development and safety analysis minimizes the V&V work while increasing the safety and reliability of the software product. For assessment of this process, validation has been done through prototyping of the SDS (safety shut-down system) #1 for PHWR (Pressurized Heavy Water Reactor).

Development of Interactive Software for Integrated Analysis in Power System (전력계통의 종합적인 해석을 위한 대화형 소프트웨어의 개발)

  • Shin, Myong-Chul;Hong, Jin-Pyo;Kim, Chul-Hwan
    • Proceedings of the KIEE Conference
    • /
    • 1990.11a
    • /
    • pp.252-255
    • /
    • 1990
  • Analyzing and simulating of today's complex electrical networks require the use of computer-aided engineering tools. In recent years, the rapid advances in micro-computer hardware technology have increased the availability of power application software on the personal computer, once the domain of mainframes and minicomputers, enabling efficient and cost-effective power system analysis. An interactive simulation and analysis software for a power system is developed and presented in this paper. The software is written in PASCAL and is designed for PC use. This paper presents an integrated software package to run PC-DOS for the analysis of electric power networks. The software is menu driven and controlled by prompts. These programs are intended to help users understand the process of power system analysis and design.

  • PDF

Comparison of Software Clustering using Split Based Tree Analysis (분기점 기반 트리 분석을 통한 소프트웨어 클러스터링 결과 비교)

  • Um, Jaechul;Lee, Chan-gun
    • Journal of Software Engineering Society
    • /
    • v.25 no.3
    • /
    • pp.59-62
    • /
    • 2012
  • We propose a novel metric for quantitatively comparing different clustered results generated from software clustering algorithms. A quantitative evaluation of software clustering helps understanding of architectural changes of software. The concept of split, which has been used for analysis of genetic characters in bio-informatics, is applied in the analysis of software architecture.

  • PDF

A Study on the Software Fault Modes and Effect Analysis for Software Safety Evaluation (소프트웨어 안전성 평가를 위한 소프트웨어 고장 유형과 영향 분석에 관한 연구)

  • Kim, Myong-Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.115-130
    • /
    • 2012
  • These days, most of safety-critical systems, which are systems those failures or malfunction may result in death or serious injury to people, or loss or severe damage to social systems, or environmental harm, are being built of embedded software or loaded controlling software systems on computers, electrical and electronic components or devices. There are a lot kind of fault analysis methods to evaluate safety of the safety-critical systems equipped computers, electrical and electronic components or devices with software. However, the only assessment method to evaluate software safety of a safety-critical system is not enough to analysis properly on account of the various types and characteristic of software systems by progress of information technology. Therefore, this paper proposes the integrated evaluation method and carries out a case study for the software safety of safety-critical system which embedded or loaded software sizes are small and control response times are not sensitive by use of two security analysis methods which are Fault Tree Analysis (FTA) and Fault Modes and Effect Analysis (FMEA) for ubiquitous healthcare system.

The Comparative Software Development Cost Model Considering the Change in the Shape Parameter of the Erlang Distribution (어랑분포의 형상모수 변화에 따른 소프트웨어 개발 비용모형에 관한 비교 연구)

  • Yang, Tae-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.566-572
    • /
    • 2016
  • Software Reliability implemented in software development is one of the most important issues. In finite failure NHPP software reliability models for software failure analysis, the hazard function that means a failure rate may have constant independently for failure time, non-increasing or non-decreasing pattern. In this study, software development cost analysis considering the variable shape parameter of Erlang distribution as the failure life distribution in the software product testing process was studied. The software failure model was applied finite failure Non-Homogeneous Poisson Procedure and the parameters approximation using maximum likelihood estimation was accompanied. Thus, this paper was presented comparative analysis by applying a software failure time data to the software, considering the shape parameter of Erlang distribution for development cost model analysis. When compared to the cost curve in accordance with the shape parameter, the model of smaller shape can be seen that the optimal software release time delay and more cost. Through this study, it is thought that it can serve as a preliminary information which can basically help the software developers to search for development cost according to software shape parameters.

HisCoM-GGI: Software for Hierarchical Structural Component Analysis of Gene-Gene Interactions

  • Choi, Sungkyoung;Lee, Sungyoung;Park, Taesung
    • Genomics & Informatics
    • /
    • v.16 no.4
    • /
    • pp.38.1-38.3
    • /
    • 2018
  • Gene-gene interaction (GGI) analysis is known to play an important role in explaining missing heritability. Many previous studies have already proposed software to analyze GGI, but most methods focus on a binary phenotype in a case-control design. In this study, we developed "Hierarchical structural CoMponent analysis of Gene-Gene Interactions" (HisCoM-GGI) software for GGI analysis with a continuous phenotype. The HisCoM-GGI method considers hierarchical structural relationships between genes and single nucleotide polymorphisms (SNPs), enabling both gene-level and SNP-level interaction analysis in a single model. Furthermore, this software accepts various types of genomic data and supports data management and multithreading to improve the efficiency of genome-wide association study data analysis. We expect that HisCoM-GGI software will provide advanced accessibility to researchers in genetic interaction studies and a more effective way to understand biological mechanisms of complex diseases.

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

An Evolution of Software Reliability in a Large Scale Switching System: using the software

  • Lee, Jae-Ki;Nam, Sang-Sik;Kim, Chang-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4A
    • /
    • pp.399-414
    • /
    • 2004
  • In this paper, an evolution of software reliability engineering in a large-scale software project is summarized. The considered software consists of many components, called functional blocks in software of switching system. These functional blocks are served as the unit of coding and test, and the software is continuously updated by adding new functional blocks. We are mainly concerned with the analysis of the effects of these software components in software reliability and reliability evolution. We analyze the static characteristics of the software related to software reliability using collected failure data during system test. We also discussed a pattern which represents a local and global growth of the software reliability as version evolves. To find the pattern of system software, we apply the S-shaped model to a collection of failure data sets of each evolutionary version and the Goel-Okumoto(G-O) model to a grouped overall failure data set. We expect this pattern analysis will be helpful to plan and manage necessary human/resources fur a new similar software project which is developed under the same developing circumstances by estimating the total software failures with respect to its size and time.