• Title/Summary/Keyword: Software Quality-in-use

Search Result 470, Processing Time 0.024 seconds

Quality Evaluation Model for Intrusion Detection System based on Security and Performance (보안성과 성능에 따른 침입탐지시스템의 품질평가 모델)

  • Lee, Ha-Young;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.289-295
    • /
    • 2014
  • Intrusion detection system is a means of security that detects abnormal use and illegal intension in advance in real time and reenforce the security of enterprises. Performance of intrusion detection system is judged by information collection, intrusion analysis, intrusion response, review and protection of intrusion detection result, reaction, loss protection that belong to the area of intrusion detection. In this paper, we developed a evaluation model based on the requirements of intrusion detection system and ISO international standard about software product evaluation.

Design for ILS in Ammunition Development applying QFD Method (QFD를 활용한 탄약 ILS 효율화 방안 연구)

  • Lee, Seung-Mok;Park, Young-Won
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.5 no.2
    • /
    • pp.1-9
    • /
    • 2009
  • This paper proposes an effective method on the DFILS(Design for Integrated Logistics Support) in ammunition development applying QFD(Quality Function Deployment) method. The goal of this research is to define the Design for ILS approach at the start of the ammunition development and to yield a set of reusable requirements. Based on 000mm High-Explosive(Warship ammunition) development work, a QFD software tool, CUPID, was used to analyze and define the field force's requirements. Additionally, a set of reusable requirements are identified and defined for use during the Design for ILS development phase in the next-generation ammunition development process. These set of requirements that consider both the priority and importance of the VOC(Voice of Customer) will contribute to the early phase of the ammunition development to implement the Design for ILS specialty engineering effort.

  • PDF

Applied Limit for Biotechnology (정보시스템 감리)

  • 이경덕
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.65-68
    • /
    • 2001
  • The role of information system(IS) audit is growing more important according to rapid change of Information technology. This article is to introduce what is IS audit, purpose and effect of IS audit. Now most clients of private IS audit services companies are the public sector. Korean public sectors invest a lot of money to build or implement their information system. Most of their systems are developed by system intergration companies. But they do not have professional engineers to evaluate and review outsourced information system. Therefore they must use outside private professional engineers for sysem auditing. We, including writer, established the first IS audit sevice company in Korea on September in 1997. After that about 15 IS audit service companies are established until now. The effect of IS audit is highly evaluated In public sector by the clients Most clients think IS audit service contributed to upgrade the quality of software and standard the methodology of developing system

  • PDF

퍼지추론을 이용한 연삭가공조건 설정용 전문가 시스템의 개발

  • 신상룡;김남경;송지복
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1992.10a
    • /
    • pp.121-125
    • /
    • 1992
  • Grinding is considered as a very effective machining technology to attain the good surface quality of a components. However, the grinding operation still needs the skill and experience of an operator because of a lack of scientific and engineering principles. Therefore, recent development focus on expert systems which deal with domain specific knowledge in order to solve this problem. This paper describes an expert system for selecting the optimism grinding wheel by using the fuzzy reasoning and operation conditions in grinding. By the system unskilled workers will be able to make use of the knowledge and experience of skilled workers. The system is consist of programs that, (1) selection of the best wheel form among avairable wheel by using fuzzy reasoning, (2) determine wheel depth of cut, feed and wheel speed for grinding, work speed, and dressing condition. The developed system perform in using the CLIPS as a software tool and run under the IBM PC/AT as a hardware tool.

WiSeMote: a novel high fidelity wireless sensor network for structural health monitoring

  • Hoover, Davis P.;Bilbao, Argenis;Rice, Jennifer A.
    • Smart Structures and Systems
    • /
    • v.10 no.3
    • /
    • pp.271-298
    • /
    • 2012
  • Researchers have made significant progress in recent years towards realizing effective structural health monitoring (SHM) utilizing wireless smart sensor networks (WSSNs). These efforts have focused on improving the performance and robustness of such networks to achieve high quality data acquisition and distributed, in-network processing. One of the primary challenges still facing the use of smart sensors for long-term monitoring deployments is their limited power resources. Periodically accessing the sensor nodes to change batteries is not feasible or economical in many deployment cases. While energy harvesting techniques show promise for prolonging unattended network life, low power design and operation are still critically important. This research presents the WiSeMote: a new, fully integrated ultra-low power wireless smart sensor node and a flexible base station, both designed for long-term SHM deployments. The power consumption of the sensor nodes and base station has been minimized through careful hardware selection and the implementation of power-aware network software, without sacrificing flexibility and functionality.

Characterization of Two-Dimensional Transition Metal Dichalcogenides in the Scanning Electron Microscope Using Energy Dispersive X-ray Spectrometry, Electron Backscatter Diffraction, and Atomic Force Microscopy

  • Lang, Christian;Hiscock, Matthew;Larsen, Kim;Moffat, Jonathan;Sundaram, Ravi
    • Applied Microscopy
    • /
    • v.45 no.3
    • /
    • pp.131-134
    • /
    • 2015
  • Here we show how by processing energy dispersive X-ray spectrometry (EDS) data obtained using highly sensitive, new generation EDS detectors in the AZtec LayerProbe software we can obtain data of sufficiently high quality to non-destructively measure the number of layers in two-dimensional (2D) $MoS_2$ and $MoS_2/WSe_2$ and thereby enable the characterization of working devices based on 2D materials. We compare the thickness measurements with EDS to results from atomic force microscopy measurements. We also show how we can use electron backscatter diffraction (EBSD) to address fabrication challenges of 2D materials. Results from EBSD analysis of individual flakes of exfoliated $MoS_2$ obtained using the Nordlys Nano detector are shown to aid a better understanding of the exfoliation process which is still widely used to produce 2D materials for research purposes.

Design Method of Variable Point Prime Factor FFT For DRM Receiver (DRM 수신기의 효율적인 수신을 위한 가변 프라임펙터 FFT 설계)

  • Kim, Hyun-Sik;Lee, Youn-Sung;Seo, Jeong-Wook;Baik, Jong-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.257-261
    • /
    • 2008
  • The Digital Radio Mondiale (DRM) system is a digital broadcasting standard designed for use in the LF, MF and HF bands of the broadcasting bands below 30 MHz. The system provides both superior audio quality and improved user services / operability compared with existing AM transmissions. In this paper, we propose a variable point Prime Factor FFT design method for Digital Radio Mondiale (DRM) system. Proposed method processes a various size IFFT/FFT of Robustness Mode on DRM standard efficiently by composing Radix-Prime Factor FFT Processing Unit of form similar to Radix-4 by insertion of a variable Prime Factor Twiddle Factor and Garbage data. So, we improved limitation that cannot process 112/176/256/288 FFT of each mode of DRM system with a existent Radix Processor and increase memory size and memory access time for IFFT/FFT processing by software processing in case of implementation with a existent high speed DSP.

  • PDF

A Study on the Fusion of DEM Using Optical and SAR Imagery

  • Yeu, Bock-Mo;Hong, Jae-Min;Jin, Kyeong-Hyeok;Yoon, Chang-Rak
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.407-407
    • /
    • 2002
  • The most widespread techniques for DEM generation are stereoscopy for optical sensor images and interfereometry for SAR images. These techniques suffer from certain sensor and processing limitations, which can be overcome by the synergetic use of both sensors and DEMs respectively. In this paper, different strategies for fusing SAR and optical data are combined to derive high quality DEM products. The filtering techniques, which take advantage of the complementary properties of SAR and stereo optical DEMs, will be applied for the fusion process. By taking advantage of the fact that errors of the DEMs are of different nature using the filtering technique, affected part are filtered and replaced by those of the counterpart and is tested with two sets of SPOT and ERS DEM, resulting in a remarkable improvement in DEM. for the analysis of results, the reference DEM is generated from digital base map(1:5000).

  • PDF

Presentation Attacks in Palmprint Recognition Systems

  • Sun, Yue;Wang, Changkun
    • Journal of Multimedia Information System
    • /
    • v.9 no.2
    • /
    • pp.103-112
    • /
    • 2022
  • Background: A presentation attack places the printed image or displayed video at the front of the sensor to deceive the biometric recognition system. Usually, presentation attackers steal a genuine user's biometric image and use it for presentation attack. In recent years, reconstruction attack and adversarial attack can generate high-quality fake images, and have high attack success rates. However, their attack rates degrade remarkably after image shooting. Methods: In order to comprehensively analyze the threat of presentation attack to palmprint recognition system, this paper makes six palmprint presentation attack datasets. The datasets were tested on texture coding-based recognition methods and deep learning-based recognition methods. Results and conclusion: The experimental results show that the presentation attack caused by the leakage of the original image has a high success rate and a great threat; while the success rates of reconstruction attack and adversarial attack decrease significantly.

A Study on the Application of Gas Sensor Array to Smart Phone (가스 센서 어레이의 스마트 폰 응용에 관한 연구)

  • Lee, Hyun-Beom;Lee, Min-Chul;Joo, Weon-Yong;Lee, Seong-Choon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.4
    • /
    • pp.147-152
    • /
    • 2010
  • Gas sensor array can be widely applied to atmosphere environment, quality control of food, and medical fields etc. So for the commercialization and popularization of sensor technology, this paper looked into the method to provide users with general purpose smart phone and gas sensor array linked together. The reviewed system can detect unknown gas in the air and inform users using smart phone by arraying 8 kinds of common use gas sensor. This system is composed of the sensor module, communication module between sensor array and smart phone application software. In this paper, this prototype system demonstrate convincingly that the application of Gas sensor array to smart phone is a good outlook.

  • PDF