• Title/Summary/Keyword: Verification Software

Search Result 952, Processing Time 0.025 seconds

Development of a Remote Wheelchair Accessibility Assessment System Using Virtualized Reality Technology (가상현실기술을 이용한 원격휠체어접근성평가시스템의 개발)

  • Kim, Jong-Bae
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.33-39
    • /
    • 2006
  • Home modification has come to be recognized as an important intervention strategy to manage health care conditions, maintain or improve functioning, ensure safety, and reduce the wheelchair user's dependency on others. However, the availability of skilled professionals with experience in home modifications for accessibility is limited. A system that enables accurate remote assessments would be an important tool to improve our ability to perform home assessments more easily and at decreased cost. A Remote Wheelchair Accessibility Assessment System (RWAAS) using Virtualized Reality(VR) technology was developed that enabled clinicians to assess the wheelchair accessibility of users' built environments from a remote location. Characteristics of the camera and 3D reconstruction program chosen for the system significantly affect its overall reliability. In this study, we performed two reliability analyses on the hardware and software components: 1) Verification that commercial software can construct sufficiently accurate 3D models by analyzing the accuracy of dimensional measurements in a virtualized environment; 2) comparison of dimensional measurements with four camera settings. Based on these two analyses, we were able to specify a consumer level digital camera and the Photomodeler Pro software for this system. And we then tested the feasibility of the selected software and hardware in an actual environment. Lastly, A field evaluation was performed to test whether this new system is comparable to the traditional method of accessibility assessment to evaluate its ability to assess the accessibility of a wheelchair user's typical built environment. The results of field trials showed high congruence between the assessments by two methods. Findings suggested that the RWAAS assessments have the potential to enable specialists to assess potential accessibility problems in built environments regardless of the location of the client, home, or specialist.

  • PDF

Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique (소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석)

  • Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.605-615
    • /
    • 2018
  • Due to the rapid growth of the Internet of Things market, the use of the C/C++ language, which is the most widely used language in embedded systems, is also increasing. To improve the quality of code in the C/C++ language and reduce development costs, it is better to use static analysis, a software verification technique that can be performed in the first half of the software development life cycle. Many programs use static analysis to verify software safety and many static analysis tools are being used and studied. In this paper, we use Clang static analysis tool to check security weakness detection performance of verified test code. In addition, we compared the static analysis results of the test codes applied with the source obfuscation techniques, layout obfuscation, data obfuscation, and control flow obfuscation techniques, and the static analysis results of the original test codes, Analyze the detection ability impact of the Clang static analysis tool.

A Real-Time Monitoring Method and Dynamic Load-Balancing Metrics for CORBA Applications (코바 어플리케이션의 동적 부하 분산을 위한 실시간 모니터링 기법 및 메트릭스)

  • Choi, Chang-Ho;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.4
    • /
    • pp.315-326
    • /
    • 2000
  • As Internet is being widely used as an infra of distributed applications, the most of today's softwares are changing into Internet-based distributed applications. The development methods using the middleware, like CORBA ORB, make the development of the web-based software easy. However, the performance verification method useful for an optimized software distribution is not provided at software development. Additionally, monitoring methods and metrics for dynamic load-balancing are not presented at run-time. This paper presents the method to monitor the message between objects, load metric, and metrics for load-balancing. To calculate a load of a node, we define events occurred between applications, time between the events, then extract the data related to a load. And we derive formula calculating the load from the extracted data. Then using the formula, we present the metrics for dynamic load-balancing. Moreover, we observe the utilization and efficiency of the monitoring algorithm, load metric, and load-balancing metrics.

  • PDF

Design and Verification of the Class-based Architecture Description Language (클래스-기반 아키텍처 기술 언어의 설계 및 검증)

  • Ko, Kwang-Man
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1076-1087
    • /
    • 2010
  • Together with a new advent of embedded processor developed to support specific application area and it evolution, a new research of software development to support the embedded processor and its commercial challenge has been revitalized. Retargetability is typically achieved by providing target machine information, ADL, as input. The ADLs are used to specify processor and memory architectures and generate software toolkit including compiler, simulator, assembler, profiler, and debugger. The EXPRESSION ADL follows a mixed level approach-it can capture both the structure and behavior supporting a natural specification of the programmable architectures consisting of processor cores, coprocessors, and memories. And it was originally designed to capture processor/memory architectures and generate software toolkit to enable compiler-in-the-loop exploration of SoC architecture. In this paper, we designed the class-based ADL based on the EXPRESSION ADL to promote the write-ability, extensibility and verified the validation of grammar. For this works, we defined 6 core classes and generated the EXPRESSION's compiler and simulator through the MIPS R4000 description.

A Proposal for Component Formal Specification Activities Using Z (Z를 이용한 컴포넌트 정형 명세 활동의 제안)

  • 장종표;이상준;김병기
    • The KIPS Transactions:PartD
    • /
    • v.8D no.1
    • /
    • pp.99-104
    • /
    • 2001
  • As a plan to counteract solving software crisis, the technology that is called Component Based Software Engineering (CBSE or Componentware) is introsuced. Component Based Software Developement (CBSD) Processes as one of the technique among CBSE have been proposed. Component specification activities among CBSD Processed are necessary and important for generating feusable component. However, the existing CBSD processed can't ensure the correctness in requirements are reflected. In this paper, we propose that formal activities wgich specify component using formal specification language Z which is verified with the ability of analysis and logicality. The proposed activities are composed of 5 tasks and 12 subtasks. By presenting specific 19 products, it is also proposed that component specification activities which are the base of CBSD for reusing. The proposed activities are able to improve qualities of component through correctness and verification of requirements specification of users in the early step of component-based software process.

  • PDF

Comparison of Path Exploration and Model Checking Techniques for Checking Automotive API Call Safety (차량전장용 소프트웨어의 API 제약사항 위배여부 탐지를 위한 실행경로 탐색방법과 모델검증 방법의 비교)

  • Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.12
    • /
    • pp.615-622
    • /
    • 2016
  • Automotive control software can be a source of critical safety issues when developers do not comply system constraints. However, a violation is difficult to identify in complicated source code if not supported by an automated verification tool. This paper introduces two possible approaches that check whether an automotive control software complies API call constraints to compare their performance and effectiveness. One method statically analyzes the source code and explores all possible execution paths, and the other utilizes a model checker to monitor constraint violations for a given set of constraint automata. We have implemented both approaches and performed a series of experiments showing that the approach with model-checking finds constraint violations more accurately and scales better.

A Study on the Development of Test Facility for Safety System Software V/V in Nuclear Power Plant (원자력발전소 안전계통 소프트웨어의 확인/검증을 위한 시험장치 개발에 관한 연구)

  • Lee, Sun-Sung;Suh, Young;Moon, Chae-Joo
    • Journal of Energy Engineering
    • /
    • v.7 no.1
    • /
    • pp.96-102
    • /
    • 1998
  • The use of computers as part of nuclear safety systems elicits additional requirements-software verification and validation (v/v), hardware qualification-not specifically addressed in general industry fields. The computer used in nuclear power plants is a system that includes computer hardware, software, firmware, and interfaces. To develop the computer systems graded with nuclear safety class, the developing environments have to be required in advance and the developed software have to be verified and validated in accordance with nuclear code and standards. With this requirements, the test facility for Inadequate Core Cooling Monitoring System (ICCMS) as one of safety systems in the nuclear power plants was developed. The test facility consists of three(3) parts such as Input/Output (I/O) simulator, Plant Data Acqusition System (PDAS) cabinets and supervisory computer. The performance of the system was validated by manual test procedure.

  • PDF

Development of Software GPS Receiver for GEO Satellites Using Weak Signal Receiver Algorithm (미약신호 수신 알고리즘을 활용한 정지궤도위성 탑재용 소프트웨어 GPS 수신기 개발)

  • Kim, Chong-Won;Kim, Ghang-Ho;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.312-318
    • /
    • 2014
  • The altitudes of GEO satellites are higher than those of GPS satellites. Therefore the visibility and the received power of GPS signals are totally different from those of the users near the Earth's surface. In this study, we analyzed the visibility of GPS signals received on GEO satellites. And we also developed a software GPS receiver that works on GEO satellites using CCMDB algorithm which is a weak signal receiver algorithm. GPS signals received on a GEO satellite are generated by a commercial hardware GPS simulator and used for the verification of the developed software GPS receiver. The mean 3D position and velocity error are calculated as 165.636 m and 0.5081 m/s.

Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing

  • Chae, Seung-Hoon;Lim, Sung-Jin;Bae, Sang-Hyun;Chung, Yong-Wha;Pan, Sung-Bum
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1294-1310
    • /
    • 2010
  • User authentication using fingerprint information provides convenience as well as strong security. However, serious problems may occur if fingerprint information stored for user authentication is used illegally by a different person since it cannot be changed freely as a password due to a limited number of fingers. Recently, research in fuzzy fingerprint vault system has been carried out actively to safely protect fingerprint information in a fingerprint authentication system. In addition, research to solve the fingerprint alignment problem by applying a geometric hashing technique has also been carried out. In this paper, we propose the hardware architecture for a geometric hashing based fuzzy fingerprint vault system that consists of the software module and hardware module. The hardware module performs the matching for the transformed minutiae in the enrollment hash table and verification hash table. On the other hand, the software module is responsible for hardware feature extraction. We also propose the hardware architecture which parallel processing technique is applied for high speed processing. Based on the experimental results, we confirmed that execution time for the proposed hardware architecture was 0.24 second when number of real minutiae was 36 and number of chaff minutiae was 200, whereas that of the software solution was 1.13 second. For the same condition, execution time of the hardware architecture which parallel processing technique was applied was 0.01 second. Note that the proposed hardware architecture can achieve a speed-up of close to 100 times compared to a software based solution.

Verification of the usefulness of smartphone for wrist swing motion in VR environments (VR 환경에서 손목 스윙 동작에 대한 스마트폰의 유용성 검증)

  • Lee, Chung-Jae;Kim, Jong-Hyun;Lee, Jung;Kim, Sun-Jeong
    • Journal of Korea Game Society
    • /
    • v.17 no.3
    • /
    • pp.53-62
    • /
    • 2017
  • VR content manipulation equipment is not easy for individuals to access because it requires high prices. Especially, in the case of a system for tracking the motion of the user among the VR contents, a separate optical sensor device using an infrared camera is generally used. The disadvantage of the optical sensor equipment is that the measurable range is dependent on the measurement direction when tracking the rotation motion when using only a single device. In order to solve the above problems, this paper shows that the inertial sensor of the smartphone, which is generally owned by the public, can track the rotational motion of the user regardless of the measurement direction . The system using the LeapMotion is used as the reference system, and the system using the smart phone is defined as the evaluation system, and the usability of the evaluation system is verified by comparing the user satisfaction of the two systems.