• Title/Summary/Keyword: software safety

Search Result 1,513, Processing Time 0.03 seconds

Development of Bus Commuting Management Application for Children's Safety (어린이 안전을 위한 버스 등하교 관리 애플리케이션 개발)

  • Young-Hwan Kim;Ga-Hyun Kim;Hyuk-Jun Kwon;Jong-Beom Si;Bo-Seok Hwang;Young-Seok Jung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.463-464
    • /
    • 2023
  • 본 논문에서는 플루터와 파이어베이스를 기반으로 구글 맵에서 위치 정보를 받아 높은 정확도와 빠른 위치 정보 업데이트가 가능한 버스 등하교 시스템을 개발하고 위치 정보가 제대로 업데이트되는지 확인하기 위해 대중교통을 타고 직접 실험하였다. 최근 어린 자녀에 대한 학부모의 걱정이 커지고 있으며 부모와 교사 간의 갈등도 빈번하게 발생한다. 가장 대표적인 원인으로 학부모와 교사 간의 불필요한 연락 그리고 아이들의 안전을 꼽을 수 있다. 하지만 위 플랫폼을 통하면 학부모와 교사 간의 연락을 최소화하고 자녀들의 안전을 지키고 혹시 모를 돌발 상황이 생겼을 때 빠른 해결이 가능하다.

  • PDF

Safety helmet wearing detection and notification system for construction site (공사현장 안전모 미착용 감지 및 알림 시스템)

  • Joong-Geun Seok;Mu-gyeong Gong;Min-Seok Kim;Dong-hyeon Heo;Jae-won Koo;Tae-jin Yun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.291-292
    • /
    • 2024
  • 국내의 산재 사고 사망 비율 중 대부분은 건설업이 차지하고 있으며 사망 원인 중 42.9%는 추락사가 차지하고 있다. 따라서 국내 사고 사망을 예방하기 위해서는 노동자의 생명을 지켜주는 안전 장비의 착용 여부가 중요하다. 본 논문에서는 객체 탐지에 사용되는 YOLO v4와 YOLO v4-TINY 알고리즘과 영상 처리에 사용되는 OpenCV를 이용하여 실시간 영상에서 안전모 미착용 인원을 감지하고 관리자에게 알려주는 시스템을 개발하였다. 이 시스템을 활용하여 건설 현장에서 현장 카메라로 안전모 미착용 인원을 실시간으로 검출하여 경고하므로써 작업자의 안전에 기여할 수 있다.

  • PDF

Analyses of Security for Software Attack (소프트웨어 공격에 대한 보안성 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.725-728
    • /
    • 2007
  • Software security is about making software behave correctly in the presence of a malicious attack, even though software failures usually happen spontaneously in the real world. Standard software testing literature is concerned only with what happens when software fails, regardless of intent. The difference between software safety and software security is therefor the presence of an intelligent adversary bent on breaking the system. Software security for attacking the system is presented in this paper

  • PDF

Process for Software Product Evaluation and Life Cycle (소프트웨어 제품 평가 및 생명 주기 프로세스)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.04a
    • /
    • pp.437-448
    • /
    • 2007
  • This paper introduce information technology of software process assessment. It consists of eight parts such as concepts and introductory guide, a reference model for processes and process capability, performing an assessment, guide to performing assessments, an assessment model and indicator guidance, guide to competency of assessors, guide for use in process improvement, and guide for use in determining supplier process capability.

  • PDF

A Study on Software Standardization of Biometrics Industry (생체인식 산업의 Software부문 표준화에 관한 연구)

  • 강병노;송수정
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2003.05a
    • /
    • pp.121-125
    • /
    • 2003
  • The Purpose of this study is to carry out comparative analysis of the differences between the trend of biometrics-related software standardization in the world and that of Korea, and to suggest ideal directions and building plans for domestic biometrics industry. Its purpose also includes constructing promptly a standardization of domestic biometrics industry based on the suggested standards.

  • PDF

An Optimized V&V Methodology to Improve Quality for Safety-Critical Software of Nuclear Power Plant (원전 안전-필수 소프트웨어의 품질향상을 위한 최적화된 확인 및 검증 방안)

  • Koo, Seo-Ryong;Yoo, Yeong-Jae
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.1-9
    • /
    • 2015
  • As the use of software is more wider in the safety-critical nuclear fields, so study to improve safety and quality of the software has been actively carried out for more than the past decade. In the nuclear power plant, nuclear man-machine interface systems (MMIS) performs the function of the brain and neural networks of human and consists of fully digitalized equipments. Therefore, errors in the software for nuclear MMIS may occur an abnormal operation of nuclear power plant, can result in economic loss due to the consequential trip of the nuclear power plant. Verification and validation (V&V) is a software-engineering discipline that helps to build quality into software, and the nuclear industry has been defined by laws and regulations to implement and adhere to a through verification and validation activities along the software lifecycle. V&V is a collection of analysis and testing activities across the full lifecycle and complements the efforts of other quality-engineering functions. This study propose a methodology based on V&V activities and related tool-chain to improve quality for software in the nuclear power plant. The optimized methodology consists of a document evaluation, requirement traceability, source code review, and software testing. The proposed methodology has been applied and approved to the real MMIS project for Shin-Hanul units 1&2.

A Quantitative Study on Important Factors of the PSA of Safety-Critical Digital Systems

  • Kang, Hyun-Gook;Taeyong Sung
    • Nuclear Engineering and Technology
    • /
    • v.33 no.6
    • /
    • pp.596-604
    • /
    • 2001
  • This paper quantitatively presents the effects of important factors of the probabilistic safety assessment (PSA) of safety-critical digital systems. The result which is quantified using fault tree analysis methodology shows that these factors remarkably affect the system safety. In this paper we list the factors which should be represented by the model for PSA. Based on the PSA experience, we select three important factors which are expected to dominate the system unavailability. They are the avoidance of common cause failure, the coverage of fault tolerant mechanisms and software failure probability. We Quantitatively demonstrate the effect of these three factors. The broader usage of digital equipment in nuclear power plants gives rise to the safety problems. Even though conventional PSA methods are immature for applying to microprocessor-based digital systems, practical needs force us to apply it because the result of PSA plays an important role in proving the safety of a designed system. We expect the analysis result to provide valuable feedback to the designers of digital safety- critical systems.

  • PDF

A Development of GPS SIS Anomalies Generation Software

  • Han, Younghoon;Ko, Jaeyoung;Shin, Mi Young;Cho, Deuk Jae
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.2 no.1
    • /
    • pp.33-40
    • /
    • 2013
  • In this paper, GPS signal anomaly generation software is proposed which can be used for the analysis of GPS signal anomaly effect and the design, verification, and operation test of anomalous signal monitoring technique. For the implementation of anomalous signal generation technique, anomalous signals are generated using a commercial signal generation simulator, and their effects and characteristics are analyzed. An error model equation is proposed from the result of analysis, and the anomalous signal generation software is constructed based on this equation. The proposed anomalous signal generation software has high scalability so that users can easily utilize and apply, and is economical as the additional cost for purchasing equipment is not necessary. Also, it is capable of anomalous signal generation based on real-time signal by comparing with the commercial signal generation simulator.

An Estimation of Risky Module using SVM (SVM을 이용한 위험모듈 예측)

  • Kim, Young-Mi;Jeong, Choong-Heui;Kim, Hyeon-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.435-439
    • /
    • 2009
  • Software used in safety-critical system must have high dependability. Software testing and V&V (Verification and Validation) activities are very important for assuring high software quality. If we can predict the risky modules of safety-critical software, we can focus testing activities and regulation activities more efficiently such as resource distribution. In this paper, we classified the estimated risk class which can be used for deep testing and V&V. We predicted the risk class for each module using support vector machines. We can consider that the modules classified to risk class 5 and 4 are more risky than others relatively. For all classification error rates, we expect that the results can be useful and practical for software testing, V&V, and activities for regulatory reviews.