• Title/Summary/Keyword: Verification Software

Search Result 952, Processing Time 0.025 seconds

A Study on the value decision and the application method of USLE factors for the soil loss estimation in the large scale site development area using GIS-In the Case of BuJu Mountain in MokPo City- (GIS를 이용한 대규모 단지 개발지의 토양유실량 추정을 위한 USLE의 인지값 결정과 적용 방법에 관한 연구-목포시 부주산을 대상으로-)

  • 우창호;황국웅
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.24 no.3
    • /
    • pp.115-132
    • /
    • 1996
  • The purpose of this study is to estimate the soil loss amount with Geographic Information System according to the land use change of Buju mountain area in Mokpo city. To estimate the soil loss, Universal Soil Loss Equation which is the most proper technique to predict soil loss in this site condition is adopted and IDRISI, a raster GIS software, is used. GIS application with USLE is very efficient to estimate soil loss accurately and fastly. In order to decide value and to find application method of USLE factors, we used existing rainfall erosion index, soil erodibility analysis, slope length, slope steepness, vegetation management and practices, which are rated by GIS through the analysis of various studies related USLE. The result of this study was compared with the previous other researches to verify our method of constructing numerical data of USLE's factors. The result of verification of our way showed significance for the soil loss in forest area. But the result of verification for the soil loss in forest area. But the result of verification for the soil loss of cultivated area showed some errors. It seems that this result was due to local variation of topographical map.

  • PDF

Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment (SOA기반 워크플로우 환경에서 DSML의 구조적 접근방법을 사용한 프라이버시 정책 모델의 통합과 검증)

  • Lee, Yong-Hwan;Jan, Werner;Janos, Sztipanovits
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.139-149
    • /
    • 2009
  • In order to verify that a lot of legal requirements and regulations are correctly translated into software, this paper provides a solution for formal and computable representations of rules and requirements in data protection legislations with a DSML (Domain Specific Modeling Language). All policies are formally specified through Prolog and then integrated with DSML, According to the time of policy verification, this solution has two kinds of policies: static policies, dynamic policies.

  • PDF

A Study on the Performance Evaluation based on Modular Face Recognition System (모듈화된 얼굴인식 시스템을 이용한 성능 시험에 관한 연구)

  • Hong Tae-Hwa;Moon Hyeon-Joon;Shin Yong-Nyuo;Lee Dong-Geun;Kim Jae-Sung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.35-44
    • /
    • 2005
  • Face recognition out of biometrics is considerable interesting due to high performance and accessibility in applications to security such as access control and banking service. Therefore, a study on the protocol of the performance test is an important issue to understand the art-of state and to show a direction in future works, in addtion to developing algorithms. We present a design criterion for the performance test protocol of face recognition system and show the result of experiment executed on identification and verification scenario based on PCA algorithm and XM2VTS DB

An Object Model Verification System based on the Constraint Language (제약 언어를 이용한 객체 모델 검증시스템)

  • Kim, Jin-Soo;Kang, Kwon;Lee, Kyung-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1453-1467
    • /
    • 1996
  • A software development process is regarded as the process of building a series of various models. But developers had no method to verify these models which created subjectively. This paper has adopted initiative of verification tools to an early phase of analysis, whereas the existing verification tools have been used for implementations. This paper has defined a constraint language that expresses disciplines suggested in the system has been built upon the constraint language, which is proven to enhance the quality and consistency of models constructed by object model editor.

  • PDF

Storing information of stroke rehabilitation patients using blockchain technology: a software study

  • Chang, Min Cheol
    • Journal of Yeungnam Medical Science
    • /
    • v.39 no.2
    • /
    • pp.98-107
    • /
    • 2022
  • Background: Stroke patients usually experience damage to multiple functions and a long rehabilitation period. Hence, there is a large volume of patient clinical information. It thus takes a long time for clinicians to identify the patient's information and essential pieces of information may be overlooked. To solve this, we stored the essential clinical information of stroke patients in a blockchain and implemented the blockchain technology using the Java programming language. Methods: We created a mini blockchain to store the medical information of patients using the Java programming language. Results: After generating a unique pair of public/private keys for identity verification, a patient's identity is verified by applying the Elliptic Curve Digital Signature Algorithm based on the generated keys. When the identity verification is complete, new medical data are stored in the transaction list and the generated transaction is verified. When verification is completed normally, the block hash value is derived using the transaction value and the hash value of the previous block. The hash value of the previous block is then stored in the generated block to interconnect the blocks. Conclusion: We demonstrated that blockchain can be used to store and deliver the patient information of stroke patients. It may be difficult to directly implement the code that we developed in the medical field, but it can serve as a starting point for the creation of a blockchain system to be used in the field.

A Study on SE Process based Defense M&S System Development Procedures (SE 프로세스 기반 국방 M&S체계 개발 절차 연구)

  • Dong Joon Lee;Seong Hyun Koh;Sang Bok Lee;Kwan Ghyun Ro;Ju Il Yoon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.44-55
    • /
    • 2023
  • The defense M&S system, which has been classified as a weapon system between requirements determination and project implementation, is being developed by applying the weapon system development procedure of the Defense Acquisition Program Administration. The M&S system abstracts and models the real world to suit the intended use and proceeds with the process of developing it as a software-oriented system. Overseas, the conceptual model development stage is staged before entering the design stage after the requirements analysis. In addition, each step includes verification and validation processes. In Korea, while establishing and applying the weapon system development procedure based on the SE process, the M&S system is also applied in the same way as the general weapon system, limiting appropriate development outputs and verification and validation. In this study, the system development procedure of the M&S system is established and presented based on the relevant standards and SE process of developed countries.

LUAV Software Certification Method using Checklists based on DO-178C (DO-178C 기반 체크리스트를 활용한 무인동력비행장치 소프트웨어 인증 방안)

  • Ji-Hun Kwon;Dong-Min Lee;Kyung-Min Park;Eun-Hee Lee;Sauk-Hoon Im;Yong-Hun Choi;Jong-Whoa Na
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.1
    • /
    • pp.33-41
    • /
    • 2023
  • As seen in the case of the Boeing 737 Max accident, the proportion of aircraft software is rapidly increasing. However, it is vulnerable to safety issues. In case of domestic aircraft software, to operate a Light Unmanned Aerial Vehicle (LUAV) less than an empty weight of 150 kg, safety certification is required for an Ultra-Light Vehicle (ULV). However, software certification procedure is not included. Since the use of LUAVs has increased recently, software verification is required. This paper proposed a checklist of LUAV software that could be applied to LUAV referring DO-178C, an aviation software certification standard. A case study of applying the proposed checklist to the Model-based Development-based Helicopter Flight Control Computer (FCC) project currently used by domestic and foreign advanced companies and institutions was conducted.

A Study on Suggestions for Activating Smart Contract - Focusing on Software Export Business (스마트계약의 활성화 방안에 관한 연구 - 소프트웨어 수출사업을 중심으로)

  • Whayoon Song
    • Korea Trade Review
    • /
    • v.47 no.1
    • /
    • pp.163-180
    • /
    • 2022
  • The purpose of this study is to examine the extent to which smart contracts can be applied to the software export business and to find out the legislative issues to activate smart contracts. A smart contract is a computer program that automatically executes a contract when conditions are fulfilled. Smart contracts can play a pivotal role in the field that requires immediate execution of contract or in a highly standardized field with multiple parties involved. In the software export business, it is desirable to apply the smart contract partially rather than applying the smart contract to the entire process because various parties are involved and the process is very complicated. The business model of exporting packaged software, a completed software that is mainly licensed for use, rather than the business model of exporting customized software is suitable for using smart contracts because the project for implementing customized software is mainly focused in the development stage. When smart contracts are used in processes such as contract signing, payment, and project management, work efficiency can be increased. In addition, smart contracts can be used when conditions can be quantified, such as error penalties, in areas that previously required contracts with third parties such as banks, guarantors. In order for smart contracts to be actively used in practice, legal reviews on various issues are necessary including the legality of a smart contract and the validity as an electronic document of NFT (non-fungible token) certificate. Also, for the system stability preventing hacking, etc, the periodic verification or inspection by a third party is essential. To activate smart contracts in international transactions the international treaty regarding smart contracts is also necessary.

A Development of GPS SIS Anomalies Generation Software

  • Han, Younghoon;Ko, Jaeyoung;Shin, Mi Young;Cho, Deuk Jae
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.2 no.1
    • /
    • pp.33-40
    • /
    • 2013
  • In this paper, GPS signal anomaly generation software is proposed which can be used for the analysis of GPS signal anomaly effect and the design, verification, and operation test of anomalous signal monitoring technique. For the implementation of anomalous signal generation technique, anomalous signals are generated using a commercial signal generation simulator, and their effects and characteristics are analyzed. An error model equation is proposed from the result of analysis, and the anomalous signal generation software is constructed based on this equation. The proposed anomalous signal generation software has high scalability so that users can easily utilize and apply, and is economical as the additional cost for purchasing equipment is not necessary. Also, it is capable of anomalous signal generation based on real-time signal by comparing with the commercial signal generation simulator.

A Study on Availability Agent from UML Products (I) (UML 산출물로부터의 Agent 사용가능성에 관한 연구 (1))

  • Han, Hyun-Gaun;Yun, Young-Woo
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1055-1062
    • /
    • 2004
  • Unified Modeling Language (UML) is a standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems. On the other hand, XML, which is a meta-language, provides meta-data types for representing and string objects. It make software development easy because it can represent various information and share information about the software analysis and design between developers, In this paper, we apply BitWiz, one of automated software generation systems, to a bid application and analyse this in UML point of view. Also, we briefly introduce an XML documentation from UML products and a verification method of XML documents from UML products.

  • PDF