• Title/Summary/Keyword: Software Tracing

Search Result 112, Processing Time 0.027 seconds

A Study of Requirement Change Management and Traceability Effect Using Traceability Table (추적테이블을 이용한 요구사항 변경관리 및 추적 효과 연구)

  • Kim, Ju-Young;Rhew, Sung-Yul;Hwang, Man-Su
    • The KIPS Transactions:PartD
    • /
    • v.17D no.4
    • /
    • pp.271-282
    • /
    • 2010
  • Insufficient requirement management accounts for 54% ofunsuccessful software development projects and 22% of insufficient requirement management comes from requirement change management. Hence, requirement management activities are important to reduce failure rates and a tracing method is suggested as the major factor in requirements change management. A traceability table is easy to use because of its legibility accurate tracing. However, traceability tables of existing studies have failed to concretely suggest method of change management and effect of traceability. Also, studies of methods to estimate change impact is complex. Hence, this study suggests how to use a traceability table to manage changes in requirements. Together, in comparison to existing studies, this study suggests easier methods to estimate change rate and change impact. Also Fifteen projects were sampled to test the hypothesis that traceability table influences the success of projects and that it decreases the failure rate that comes from the insufficient requirements management.

Implementation of 3D mobile game using radiosity model and AI algorithm (Radiosity model과 AI 알고리즘을 이용한 모바일 게임 구현)

  • Kim, Seongdong;Chin, Seonga;Cho, Teresa
    • Journal of Korea Game Society
    • /
    • v.17 no.1
    • /
    • pp.7-16
    • /
    • 2017
  • The 3D game graphic technology has become an important factor in the contents field with the game contents development. In particular, game character technology provides a realistic technique and visual pleasure, as well as an intermediate step in the immersion of the game in which the game might create an optical illusion that enables the player to enjoy heroic adventure in the game. The high expression level of characters in 3D games is a key factor in the development process, with details and carefulness of the character setting work [3]. In this paper, we propose a character representative technique applied to mobile games using mathematical model of radiosity energy, spectral radiance model, and ray tracing model method using 3D unity game engine with sensible AI algorithm for game implementation. As a practical application to the game contents, it was found that the projection of the surface in the rendering process and the game simulation might change according to the lighting condition of the game content environment, so that the high quality of game characters was simulated.

Verification of Dose Evaluation of Human Phantom using Geant4 Code (Geant4 코드를 사용한 인체팬텀 선량평가 검증)

  • Jang, Eun-Sung;Choi, Ji-Hoon
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.5
    • /
    • pp.529-535
    • /
    • 2020
  • Geant4 is compatible with the Windows operating system in C++ language use, enabling interface functions that link DICOM or software. It was simulated to address the basic structure of the simulation using Geant4/Gate code and to specifically verify the density composition and lung cancer process in the human phantom. It was visualized using the Gate Graphic System, i.e. openGL, Ray Tracer: Ray Tracing by Geant4 Tracing, and using Geant4/Gate code, lung cancer is modeled in the human phantom area in 3D, 4D to verify the simulation progress. Therefore, as a large number of new functions are added to the Gate Code, it is easy to implement accurate human structure and moving organs.

Development of Advanced Rendering Library for CAD/CAM Moduler (CAD/CAM 모델러용 고급 렌더링 라이브러리의 개발)

  • Choe, Hun-Gyu;Lee, Tae-Hyeon;Han, Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.385-394
    • /
    • 1999
  • 제품을 설계하는 디자이너나 엔지니어는 많은 시간과 노력을 들이지 않고서 그들이 설계한 3차원 제품 모델에 대한 사실적인 이미지를 원한다. 디자인 프로세스의 초기인 개념 설계에서부터 설계검증, 그리고 가공 과정에서 사실적인 이미지가 매우 유용하므로, 대부분의 주요 CAD 제작사는 그들의 CAD 소프트웨어에 고급 렌더링 기능을 추가하고 있다. 상용의 CAD/CAM 모델러에서는 NURB 곡면을 기초로 모델링을 수행하므로, NURB 곡면을 렌더링할 수 있는 패키지가 필요하다. VIF(Visual InterFace) 렌더링 라이브러리는 A-buffer 방식과 Ray tracing 방식의 두 가지 고급 렌더링 모드를 제공한다. 다각형은 물론 NURB 곡면을 입력으로 받아 사용자가 설정한 표면의 각종 계수, 원하는 view와 설정된 광원에 따라 이미지를 만들고 다양한 형태로 출력시킬 수 있는 다양한 기능을 제공한다. 본 논문에서는 VIF 렌더링 라이브러리에 대한 구조와 기능별로 분류된 함수에 대하여 설명하며, 실제로 CAD/CAM 시스템과 통합되어 구상설계에서부터 3차원 설계 모델링에 이르기까지의 제조공정에서 설계검증 툴로써 어떻게 활용되고 있는가에 대하여 기술한다.Abstract Engineers and industrial designers want to produce a realistic-looking images of a 3D model without spending a lot of time and money. Photo-realistic images are so useful from the conceptual design, through its verification, to the machining, that most major CAD venders offer built-in as well as add-on photo-realistic rendering capability to their core CAD software. Since 3D model is consists of a set of NURB surfaces in commercial CAD packages, we need a renderer which handles NURB surface as well as other primitives.A new rendering library called VIF (Visual InterFace) provides two photo-realistic rendering modes: A-buffer and Ray tracing. As an input data it takes NURB surfaces as well as polygonal data and produces images in accordance with the surface parameters, view and lights set by user and outputs image with different formats. This paper describes the overall architecture of VIF and its library functions classified by their functionalities, and discusses how VIF is used as a graphical verification tool in manufacturing processes from the conceptual design to 3D modeling.

Dispersion Compensation of an Optical System for Femtosecond Pulses Using a Ray-Tracing Program (광선 추적 프로그램을 이용한 펨토초 펄스 광학계의 보상설계)

  • Kim, Seoyoung;Lee, Hyunyong;Kim, Tae Young;Im, Jeong-eun;Kim, Chal-won;Hwangbo, Chang Kwon
    • Korean Journal of Optics and Photonics
    • /
    • v.29 no.1
    • /
    • pp.1-6
    • /
    • 2018
  • In this study, ray-tracing software was used to calculate the optical path length of an optical system. Using the optical path length, the optical phase, group delay (GD), group delay dispersion (GDD), and third-order dispersion (TOD) of the optical system were obtained. Pulse compressors using a prism pair or grating pair were designed to compensate the GDD of a real optical system for a femtosecond fiber laser. Also, a pulse stretcher using a grating pair with lenses or mirrors was designed. The results of this study can be used to calculate the dispersion of an optical system and optimize the performance of an ultrashort pulse laser optical system.

Real-Time Attack Detection System Using Event-Based Runtime Monitoring in ROS 2 (ROS 2의 이벤트 기반 런타임 모니터링을 활용한 실시간 공격 탐지 시스템)

  • Kang, Jeonghwan;Seo, Minseong;Park, Jaeyeol;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1091-1102
    • /
    • 2022
  • Robotic systems have developed very rapidly over the past decade. Robot Operating System is an open source-based software framework for the efficient development of robot operating systems and applications, and is widely used in various research and industrial fields. ROS applications may contain various vulnerabilities. Various studies have been conducted to monitor the excution of these ROS applications at runtime. In this study, we propose a real-time attack detection system using event-based runtime monitoring in ROS 2. Our attack detection system extends tracetools of ros2_tracing to instrument events into core libraries of ROS 2 middleware layer and monitors the events during runtime to detect attacks on the application layer through out-of-order execution of the APIs.

Contact Tracking Development Trend Using Bibliometric Analysis

  • Li, Chaoqun;Chen, Zhigang;Yu, Tongrui;Song, Xinxia
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.359-373
    • /
    • 2022
  • The new crown pneumonia (COVID-19) has become a global epidemic. The disease has spread to most countries and poses a challenge to the healthcare system. Contact tracing technology is an effective way for public health to deal with diseases. Many experts have studied traditional contact tracing and developed digital contact tracking. In order to better understand the field of contact tracking, it is necessary to analyze the development of contact tracking in the field of computer science by bibliometrics. The purpose of this research is to use literature statistics and topic analysis to characterize the research literature of contact tracking in the field of computer science, to gain an in-depth understanding of the literature development status of contact tracking and the trend of hot topics over the past decade. In order to achieve the aforementioned goals, we conducted a bibliometric study in this paper. The study uses data collected from the Scopus database. Which contains more than 10,000 articles, including more than 2,000 in the field of computer science. For popular trends, we use VOSviewer for visual analysis. The number of contact tracking documents published annually in the computer field is increasing. At present, there are 200 to 300 papers published in the field of computer science each year, and the number of uncited papers is relatively small. Through the visual analysis of the paper, we found that the hot topic of contact tracking has changed from the past "mathematical model," "biological model," and "algorithm" to the current "digital contact tracking," "privacy," and "mobile application" and other topics. Contact tracking is currently a hot research topic. By selecting the most cited papers, we can display high-quality literature in contact tracking and characterize the development trend of the entire field through topic analysis. This is useful for students and researchers new to field of contact tracking ai well as for presenting our results to other subjects. Especially when comprehensive research cannot be conducted due to time constraints or lack of precise research questions, our research analysis can provide value for it.

Comparison procedure in evaluation analysis of source code comparison on Embedded system (정보기기 소스코드 유사성 분석에서 목적물 검증)

  • Nam, SangYep;Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2021
  • In order to analyze the similarity of the source code object material, the source code on both sides must be able to be compiled and executed. In particular, in the case of hardware-integrated software, it is necessary to check whether the hardware interface matches. However, currently, the source code is provided in an incomplete state which is not original of source code used in developing steps. The complainant confirms that the executing characteristics are similar to their own in the expression and function of the output, and request an evaluation. When a source code compilation error occurs during the evaluation process, the experts draw a flowchart of the source code and applies the method of tracing the code flow for each function as indirect method. However, this method is indirect and the subjective judgment is applied, so there is concern about the contention of objectivity in the similarity evaluation result. In this paper, the problems of unverified source code similarity analysis and improvement directions are dealt with, through the analysis cases of source code disputes applied to embedded systems.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

Steady-State Performance Analysis of Air Conditioner with Multi-Indoor Units (복수 실내기를 가지는 에어컨의 정상상태 성능해석)

  • Hur, Hyun;Lee, Jin Wook;Jung, Eui Guk;Kim, Byung Soon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.11
    • /
    • pp.705-715
    • /
    • 2016
  • In this study, the cycle performance of an air conditioner with multi-indoor units is analyzed and simulated. The cycle performance could be predicted through the integration of mathematical formulation for these devices. The condenser pressure is obtained by an iteration process to match the mass flow rates of the compressor and the expansion valve and the evaporator pressure is determined by an iteration process, in which the suction super heat is tracing the targeted super heat. The required software was developed by system programming. the software algorithm is extended to predict the cycle performance of an air conditioner system with multi-indoor units, and then the numerical results are compared with experimental results. This mathematical model is validated from the result of experiments conducted on 8.3kW air conditioner. The errors in capacity, electronic power, and COP are found to be within 10% in general.