• Title/Summary/Keyword: Software validation

Search Result 502, Processing Time 0.023 seconds

Development of a Traceability Analysis Method Based on Case Grammar for NPP Requirement Documents Written in Korean Language

  • Yoo Yeong Jae;Seong Poong Hyun;Kim Man Cheol
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.295-303
    • /
    • 2004
  • Software inspection is widely believed to be an effective method for software verification and validation (V&V). However, software inspection is labor-intensive and, since it uses little technology, software inspection is viewed upon as unsuitable for a more technology-oriented development environment. Nevertheless, software inspection is gaining in popularity. KAIST Nuclear I&C and Information Engineering Laboratory (NICIEL) has developed software management and inspection support tools, collectively named "SIS-RT. "SIS-RT is designed to partially automate the software inspection processes. SIS-RT supports the analyses of traceability between a given set of specification documents. To make SIS-RT compatible for documents written in Korean, certain techniques in natural language processing have been studied [9]. Among the techniques considered, case grammar is most suitable for analyses of the Korean language [3]. In this paper, we propose a methodology that uses a case grammar approach to analyze the traceability between documents written in Korean. A discussion regarding some examples of such an analysis will follow.

Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality

  • Malhotra, Ruchika;Jain, Ankita
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.241-262
    • /
    • 2012
  • An understanding of quality attributes is relevant for the software organization to deliver high software reliability. An empirical assessment of metrics to predict the quality attributes is essential in order to gain insight about the quality of software in the early phases of software development and to ensure corrective actions. In this paper, we predict a model to estimate fault proneness using Object Oriented CK metrics and QMOOD metrics. We apply one statistical method and six machine learning methods to predict the models. The proposed models are validated using dataset collected from Open Source software. The results are analyzed using Area Under the Curve (AUC) obtained from Receiver Operating Characteristics (ROC) analysis. The results show that the model predicted using the random forest and bagging methods outperformed all the other models. Hence, based on these results it is reasonable to claim that quality models have a significant relevance with Object Oriented metrics and that machine learning methods have a comparable performance with statistical methods.

A Research on Tac-ELINT SW Development Method Using M&S System (M&S 시스템을 활용한 Tac-ELINT 지상운용 SW 개발 방안 연구)

  • Shin, Dong-Cho;Kwak, Hyun-Gyu;Lee, Kwang-Il
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1058-1066
    • /
    • 2011
  • This research paper on Tac-ELINT SW development method using M&S system describes the validation and verification methods of Tac-ELINT ground operating software development each stages, and the method of improving reusability of software using SBD(Simulation Based Design/Development) concept. In this project, We obtain the EW software SBD technologies and improved Tac-ELINT ground operating software through software crisis mitigation. This method and technology will expect to support a future EW system and any other various weapon software development.

High-velocity impact of large caliber tungsten projectiles on ordinary Portland and calcium aluminate cement based HPSFRC and SIFCON slabs -Part II: numerical simulation and validation

  • Gulkan, P.;Korucu, H.
    • Structural Engineering and Mechanics
    • /
    • v.40 no.5
    • /
    • pp.617-636
    • /
    • 2011
  • We present the numerical implementation, simulation, and validation of the high-velocity impact experiments that have been described in the companion article. In this part, numerical investigations and simulations performed to mimic the tests are presented. The experiments were analyzed by the explicit integration-based software ABAQUS for improved simulations. Targets were modeled with a damaged plasticity model for concrete. Computational results of residual velocity and crater dimensions yielded acceptable results.

Software Attack Detection Method by Validation of Flow Control Instruction’s Target Address (실행 제어 명령어의 목적 주소 검증을 통한 소프트웨어 공격 탐지 기법)

  • Choi Myeong-Ryeol;Park Sang-Seo;Park Jong-Wook;Lee Kyoon-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.397-404
    • /
    • 2006
  • Successful software attacks require both injecting malicious code into a program's address space and altering the program's flow control to the injected code. Code section can not be changed at program's runtime, so malicious code must be injected into data section. Detoured flow control into data section is a signal of software attack. We propose a new software attack detection method which verify the target address of CALL, JMP, RET instructions, which alter program's flow control, and detect a software attack when the address is not in code section. Proposed method can detect all change of flow control related data, not only program's return address but also function pointer, buffer of longjmp() function and old base pointer, so it can detect the more attacks.

FAULT TREE ANALYSIS OF KNICS RPS SOFTWARE

  • Park, Gee-Yong;Koh, Kwang-Yong;Jee, Eunk-Young;Seong, Poong-Hyun;Kwon, Kee-Choon;Lee, Dae-Hyung
    • Nuclear Engineering and Technology
    • /
    • v.40 no.5
    • /
    • pp.397-408
    • /
    • 2008
  • This paper describes the application of a software fault tree analysis (FTA) as one of the analysis techniques for a software safety analysis (SSA) at the design phase and its analysis results for the safety-critical software of a digital reactor protection system, which is called the KNICS RPS, being developed in the KNICS (Korea Nuclear Instrumentation & Control Systems) project. The software modules in the design description were represented by function blocks (FBs), and the software FTA was performed based on the well-defined fault tree templates for the FBs. The SSA, which is part of the verification and validation (V&V) activities, was activated at each phase of the software lifecycle for the KNICS RPS. At the design phase, the software HAZOP (Hazard and Operability) and the software FTA were employed in the SSA in such a way that the software HAZOP was performed first and then the software FTA was applied. The software FTA was applied to some critical modules selected from the software HAZOP analysis.

Software Piracy in Vietnam: Analysis of Key Factors

  • Tuan, Vo-Quoc;Yoo, Chul-Woo;Kim, Mi-Suk;Choe, Young-Chan
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.487-492
    • /
    • 2007
  • This research focuses on the development and empirical validation of a model of software piracy behavior on the basis of deterrence theory, expected utility theory and the theory of reasoned action. The total of sample numbered 86 and PLS (Partial Least Square) was utilized for analysis. The test of this study revealed that punishment severity was the greatest significant factor to influence to software piracy and subjective norms was also significantly related to it. However punishment certainty and software cost do not significantly affect to software piracy.

  • PDF

Study on Reliability Assessment for the Medical Device Software from the Viewpoint of Functional Safety (기능 안전 관점에서의 의료기기 소프트웨어 신뢰성 평가 방법에 관한 연구)

  • Kim, Sung Min;Ko, Byeonggak;Do, Gyeong-Hun;Kim, Hye Jin;Ham, Jung-Keol
    • Journal of Applied Reliability
    • /
    • v.16 no.3
    • /
    • pp.216-223
    • /
    • 2016
  • Purpose: This paper suggests the procedure to enhance the reliability of the software of the medical device that is to cure, treat, diagnose, and prevent a disease or an abnormal health conditions. Methods: After test requirements are classified by the software requirements specification for safety and backgrounds, reliability assessment methods are suggested. Results: Verification and validation for function and safety can be performed whether the medical device software are implemented as intended. Conclusion: Procedure on the static analysis, unit test, integration test, and system test are provided for the medical device software.