• Title/Summary/Keyword: Software Test Process

Search Result 590, Processing Time 0.024 seconds

Vibration Health Monitoring of Helicopter Transmission Systems at Westland Helicopter Ltd.

  • Kang, Chung-Shin;Choi, Sun-Woo;Ahn, Seok-Min;Horsey, M.W;Stuckey, M.J
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.1 no.1
    • /
    • pp.48-61
    • /
    • 2000
  • Korea Aerospace Research Institute (KARI) have gained experience with Helicopter Vibration Health Monitoring (VHM) System technology with the help of UK GKN-WHL. GKN-WHL have had many years of experience with the research and development of vibration analysis techniques to improve the health monitoring of helicopter transmissions. This activity was targeted at transmission rig testing at first, but the techniques have been progressively developed where they are now used as a part of integrated Health and Usage Monitoring (HUM) systems on many types of in-service and new helicopters. The technique development process has been considerably aided by an ever expanding database of transmission monitoring experience from both the rig testing and aircraft operations. This experience covers a wide range of failure types from naturally occurring faults to crack propagation studies and covering a wide range of transmission configurations. Primarily based on accelerometer signals GKN-WHL's vibration analysis methods have also been applied to a variety of other sensor types. The transition from an experimental environment to operational VHM systems has been a lengthy process, there being a need to demonstrate technique reliability as well as effectiveness to both regulatory (Airworthiness Authority) and commercial organizations. Another important feature of this process has been the development of close relationships with a number of VHM system hardware and software suppliers. Such an experienced GKN-WHL provides various raw vibration data which was acquired from transmission ground test rig and allow KARI to develop it's own analysis program. KARI made a program and then analyzed the data to coma pre with the results of GKN-WHL. The KARI's results both time domain signals and statistical values show comparable to GKN's.

  • PDF

DEVELOPMENT OF A VALLEY MANAGEMENT SYSTEM FOR GIS AND REMOTE SENSING EDUCATION

  • Wu, Mu-Lin;Wong, Deng-Ching;Wang, Yu-Ming
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.570-573
    • /
    • 2006
  • College GIS and remote sensing education usually consists of commercial software packages implementations in the classroom. Computer programming is quite important when college graduates work in private or public sectors relevant with GIS and remote sensing implementations. The objective of this paper was to develop a valley management system which implements GIS and remote sensing as the key components for education. The Valley Authority is entitled with water resource protection for sustainable drinking water supply of the second largest city in Taiwan. The test area consists of three different government agencies, Forest Service, EPA, and Water Resource Agency. Materials were provided by the Valley Authority in ArcGIS file format. MapObjects have made the GIS development process much easier. Remote sensing with image manipulation functions were provided by computer programming with Visual Baisc.NET and Visual C#.NET. Attributes inquiry are performed by these two computer languages as well. ArcGIS and ArcPad are also used for simple GIS manipulations of the test area. Comparison between DIY and commercial GIS can be made by college students. Functions provided by the developed valley management system depending on how many map layers have been used and what types of MapObjects components have been used. Computer programming experience is not essential but can be helpful for a college student. The whole process is a step-by-step sequence which college students can modify to depict their capability in GIS and remote sensing. The development process has gone through one semester, three hours every week in 18 weeks. College students enrolled in this class entitled with GIS showed remarkable progresses both in GIS and remote sensing.

  • PDF

A Design of Framework based on Distributed System for Enhancing Productivity (개발 생산성 향상을 위한 분산 시스템 기반의 프레임워크 설계)

  • Choi, Byung-Ha;Choi, Sung-Kyo;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.53-60
    • /
    • 2012
  • In this paper, we propose a framework which supports the simple development cycle based on Distributed System using IPO(Input-Process-Output) model. In our proposed framework, once a single class with Input, Process and Output functions is developed, it can be executed like a single application in both presentation layer and middle layer of a distributed system. Our proposed Framework removes dependency on distributed system and makes development cycle decreased from Develop-Build-Deploy-Test cycle to Develop-Test cycle when application programs is developed. The verification of productivity and performance is performed by comparing our Framework with distributed system or lightweight Framework. The results show high productivity due to the considerable amount of reduction in lines of source code and reduction in dependency on distributed system, and show stabler performance than lightweight framework.

Classification of HDAC8 Inhibitors and Non-Inhibitors Using Support Vector Machines

  • Cao, Guang Ping;Thangapandian, Sundarapandian;John, Shalini;Lee, Keun-Woo
    • Interdisciplinary Bio Central
    • /
    • v.4 no.1
    • /
    • pp.2.1-2.7
    • /
    • 2012
  • Introduction: Histone deacetylases (HDAC) are a class of enzymes that remove acetyl groups from ${\varepsilon}$-N-acetyl lysine amino acids of histone proteins. Their action is opposite to that of histone acetyltransferase that adds acetyl groups to these lysines. Only few HDAC inhibitors are approved and used as anti-cancer therapeutics. Thus, discovery of new and potential HDAC inhibitors are necessary in the effective treatment of cancer. Materials and Methods: This study proposed a method using support vector machine (SVM) to classify HDAC8 inhibitors and non-inhibitors in early-phase virtual compound filtering and screening. The 100 experimentally known HDAC8 inhibitors including 52 inhibitors and 48 non-inhibitors were used in this study. A set of molecular descriptors was calculated for all compounds in the dataset using ADRIANA. Code of Molecular Networks. Different kernel functions available from SVM Tools of free support vector machine software and training and test sets of varying size were used in model generation and validation. Results and Conclusion: The best model obtained using kernel functions has shown 75% of accuracy on test set prediction. The other models have also displayed good prediction over the test set compounds. The results of this study can be used as simple and effective filters in the drug discovery process.

Conformity Assessment and Test Method for Implementation of Web Services Compositions based on Choreography (코레어그래피 기반 웹 서비스 조합의 구현 적합성 평가 및 테스트 방법)

  • Kuk, Seung-Hak;Seo, Yong-Jin;Kim, Hyeon-Soo
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.83-98
    • /
    • 2012
  • Recently Web services and SOA(Service Oriented Architecture) is widely used for an effective integration way of distributed applications. The service choreography is a way of service compositions to define workflows and the message exchange protocols among several partner ser-vices in the B2B business process environment. It defines the overall business process from a global perspective. However, it must be transformed into some kind of the executable form to implement service compositions, because it does not support an execution mechanism but is a de-clarative form. Therefore, the transformed executable model must be validated with the original choreography model to guarantee behavior equivalence. In this paper, we propose the conformity assessment with respect to service compositions method between the choreography model and the transformed executable model. And we suggest the test method to show behavior equivalence between them from a viewpoint of the dynamic execution.

The Development of Module for 5-axis Drilling of a Closed Type Impeller (밀폐형 임펠러의 5축 드릴링 모듈의 개발)

  • Son, Hwang-Jin;Cho, Yoon-Tea;Jung, Yoon-Gyo
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.13 no.1
    • /
    • pp.1-7
    • /
    • 2014
  • An impeller is difficult to machine due to the complex, overlapping and twisted shapes that form the blades of an impeller. Therefore, most CAM software companies have developed a CAM module for manufacturing an impeller in addition to their CAM software. However, it is not easy for inexperienced users to machine impellers. The purpose of this paper is to outline the development of an automatic CAM module for the manufacturing of an impeller (E-ICAM) which is based on visual basic language and which uses a CATIA graphical environment in order to simplify the machining of impellers. The automatic CAM module generates a tool path and proposes the recommended cutting condition according to the stock and tool material. In addition, it includes a post-processor for five-axis control machining. Therefore, a user can easily machine impellers using this automation module. There are two types of impellers: the closed and open types. The closed-type impeller consists of the body and cover parts. To combine these two parts, it is necessary to create tap holes on the shroud of the body. Therefore, in the study, a drilling CAM program for a closed-type impeller is developed and manufactured by creating NC data from the developed drilling program. After manufacturing the test specimen, its compatibility was verified.

Development of a Python-based Algorithm for Image Analysis of Outer-ring Galaxies (외부고리 은하 영상 분석을 위한 파이썬 기반 알고리즘 개발)

  • Jo, Hoon;Sohn, Jungjoo
    • Journal of the Korean earth science society
    • /
    • v.43 no.5
    • /
    • pp.579-590
    • /
    • 2022
  • In this study, we aimed to develop a Python-based outer-ring galaxy analysis algorithm according to the data science process. We assumed that the potential users are citizen scientists, including students and teachers. In the actual classification studies using real data of galaxies, a specialized software called IRAF is used, thereby limiting the general public's access to the software. Therefore, an image analysis algorithm was developed for the outer-ring galaxies as targets, which were compared with those of the previous research. The results of this study were compared with those of studies conducted using IRAF to verify the performance of the newly developed image analysis algorithm. Among the 69 outer-ring galaxies in the first test, 50 cases (72.5%) showed high agreement with the previous research. The remaining 19 cases (27.5%) showed differences that were caused by the presence of bright stars overlapped in the line of sight or weak brightness in the inner galaxy. To increase the usability of the finished product that has undergone a supplementary process, all used data, algorithms, Python code files, and user manuals were loaded in GitHub and made available as shared educational materials.

Deep Learning based Dynamic Taint Detection Technique for Binary Code Vulnerability Detection (바이너리 코드 취약점 탐지를 위한 딥러닝 기반 동적 오염 탐지 기술)

  • Kwang-Man Ko
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.3
    • /
    • pp.161-166
    • /
    • 2023
  • In recent years, new and variant hacking of binary codes has increased, and the limitations of techniques for detecting malicious codes in source programs and defending against attacks are often exposed. Advanced software security vulnerability detection technology using machine learning and deep learning technology for binary code and defense and response capabilities against attacks are required. In this paper, we propose a malware clustering method that groups malware based on the characteristics of the taint information after entering dynamic taint information by tracing the execution path of binary code. Malware vulnerability detection was applied to a three-layered Few-shot learning model, and F1-scores were calculated for each layer's CPU and GPU. We obtained 97~98% performance in the learning process and 80~81% detection performance in the test process.

Study on failure behaviors of mixed-mode cracks under static and dynamic loads

  • Zhou, Lei;Chen, Jianxing;Zhou, Changlin;Zhu, Zheming;Dong, Yuqing;Wang, Hanbing
    • Geomechanics and Engineering
    • /
    • v.29 no.5
    • /
    • pp.567-582
    • /
    • 2022
  • In the present study, a series of physical experiments and numerical simulations were conducted to investigate the effects of mode I and mixed-mode I/II cracks on the fracture modes and stability of roadway tunnel models. The experiments and simulations incorporated different inclination angle flaws under both static and dynamic loads. The quasi-static and dynamic testing were conducted by using an electro-hydraulic servo control device and drop weight impact system (DWIS), and the failure process was simulated by using rock failure process analysis (RFPA) and AUTODYN software. The stress intensity factor was also calculated to evaluate the stability of the flawed roadway tunnel models by using ABAQUS software. According to comparisons between the test and numerical results, it is observed that for flawed roadways with a single radical crack and inclination angle of 45°, the static and dynamic stability are the lowest relative to other angles of fractured rock masses. For mixed-mode I/II cracks in flawed roadway tunnel models under dynamic loading, a wing crack is produced and the pre-existing cracks increase the stress concentration factor in the right part of the specimen, but this factor will not be larger than the maximum principal stress region in the roadway tunnel models. Additionally, damage to the sidewalls will be involved in the flawed roadway tunnel models under static loads.

The Interface Test between LEO Satellite and Ground Station (저궤도위성과 지상국 간 접속 검증 시험)

  • Kwon, Dong-Young;Jung, Ok-Chul;Kim, HeeSub
    • Aerospace Engineering and Technology
    • /
    • v.11 no.2
    • /
    • pp.49-56
    • /
    • 2012
  • LEO Satellite performs the operations and missions by FSW(Flight Software) after separation from a launch vehicle. Many of the operations by FSW are automatically conducted by the algorithms of FSW. In the case of the IAC(Initial Activation and Checkout) operations, a mission scheduling, an orbit transition, etc, however, a decision and a control of the satellite operators or manufacturers are required in order to operate the satellite safely. For this, the wireless communication channel between a satellite and a ground station should be prepared to receive telemetries and to transmit tele-commands for controlling FSW properly. Therefore, the verification of the interface between KOMPSAT-3 and a ground station is essential. This verification test is named the satellite end-to-end test. In this paper, we show the design process of the satellite end-to-end test and test results.