• Title/Summary/Keyword: software verification

Search Result 945, Processing Time 0.021 seconds

Synchronization and identification of ship shaft power and speed for energy efficiency design index verification

  • Lee, Donchool;Barro, Ronald Dela Cruz;Nam, Jeonggil
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.2
    • /
    • pp.123-132
    • /
    • 2014
  • The maritime sector is advancing with dedicated endeavor to reduce greenhouse gas in addressing issues with regards to global warming. Since 01 January 2013, the International Maritime Organization (IMO) regulation mandatory requirement for Energy Efficiency Design Index (EEDI) has been in place and should be satisfied by newly-built ships of more than 400 gross tonnage and the Ship Energy Efficiency Management Plan (SEEMP) for all ships type. Therefore, compliance to this necessitates planning during the design stage whereas verification can be carried-out through an acceptable method during sea trial. The MEPC-approved 2013 guidance, ISO 15016 and ISO 19019 on EEDI serves the purpose for calculation and verification of attained EEDI value. Individual ships EEDI value should be lower than the required value set by these regulations. The key factors for EEDI verification are power and speed assessment and their synchronization. The shaft power can be measured by telemeter system using strain gage during sea trial. However, calibration of shaft power onboard condition is complicated. Hence, it relies only on proficient technology that operates within the permitted ISO allowance. On the other hand, the ship speed can be measured and calibrated by differential ground positioning system (DGPS). An actual test on a newly-built vessel was carried out to assess the correlation of power and speed. The Energy-efficiency Design Index or Operational Indicator Monitoring System (EDiMS) software developed by the Dynamics Laboratory-Mokpo Maritime University (DL-MMU) and Green Marine Equipment RIS Center (GMERC) of Mokpo Maritime University was utilized for this investigation. In addition, the software can continuously monitor air emission and is a useful tool for inventory and ship energy management plan. This paper introduces the synchronization and identification method between shaft power and ship speed for EEDI verification in accordance with the ISO guidance.

A Case Study on Model Checking Online-Game Server Party System Using SPIN (온라인 게임 서버의 파티 시스템 검증을 위한 스핀 모델 체커 적용에 관한 연구)

  • Kim, Goanghun;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.11
    • /
    • pp.479-486
    • /
    • 2015
  • Model checking method is able to check all possible cases automatically and is applicable to specifications or design before actual implementation so that some critical systems have adopted this method actively. However, the current practice of software verification is largely dependant on basic methods such as manual testing because of lack of understanding about this rigorous method and high verification cost. In this paper we conducted an experimental research for the automated verification using the SPIN model checker on an online-game server to study the applicability of the technique in this domain. The results show that we could verify major features of the online-game server party system with 5~7 GB memory and within 10 minutes execution time, and also found a hidden system error that passed existing testing process. This result shows the possibility of rigorous and effective verification with reasonable cost in comparison to manual testing.

Verification of Machine Codes using an Effect Type System (효과 타입 시스템을 이용한 기계어 코드의 검증)

  • Chung, Jae-Youn;Ryu, Suk-Young;Yi, Kwang-Keun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.8
    • /
    • pp.886-901
    • /
    • 2000
  • Verification of the safety of untrusted codes becomes an important issue in the mobile computing environment and the safety-critical software systems. Recently, it is very common to run the codes attached to the electronic mails or downloaded from the web browsers. We propose the verification method of the machine code property. The code producer delivers the machine code and its property, then the code consumer checks whether the delivered code satisfies the delivered property. The safety of source codes is verified by the well-defined compiler systems but the verification mechanism for machine codes is not well defined yet. We design an intermediate language etySECK and propose the verification method of the property of etySECK programs. And then we prove the soundness of our system which is the type system with effect extension.

  • PDF

An Effective ESICD Verification Strategy: A case study of Military Satellite Communications System II

  • Lee, Kee-Sung;Choi, Jun-Ho;Shin, Jeong-Jin;Yoon, Hye-Jin;Kim, Seung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.105-114
    • /
    • 2021
  • ESICD(Electrical Signal Interface Control Document) refers to a document that describes protocols and data for communication between components consist of a system. Each component developer gathers at a specific place to conduct an integrated test for ESICD verification. In this case, it often happens that the integration test is delayed due to a simple mistake of software developers. There are two reasons for this situation: First, software developers do not perform sufficient verification because it is difficult to configure the system environment in a Lab, and second, they do not immediately find the cause of errors occurred during integration tests. Therefore, in this paper, we propose a strategy to effectively perform ESICD verification, which takes a lot of time between the production and implementation stage of the weapon system development stage and the system integration test stage.

Development of a Traceability Analysis Method Based on Case Grammar for NPP Requirement Documents Written in Korean Language

  • Yoo Yeong Jae;Seong Poong Hyun;Kim Man Cheol
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.295-303
    • /
    • 2004
  • Software inspection is widely believed to be an effective method for software verification and validation (V&V). However, software inspection is labor-intensive and, since it uses little technology, software inspection is viewed upon as unsuitable for a more technology-oriented development environment. Nevertheless, software inspection is gaining in popularity. KAIST Nuclear I&C and Information Engineering Laboratory (NICIEL) has developed software management and inspection support tools, collectively named "SIS-RT. "SIS-RT is designed to partially automate the software inspection processes. SIS-RT supports the analyses of traceability between a given set of specification documents. To make SIS-RT compatible for documents written in Korean, certain techniques in natural language processing have been studied [9]. Among the techniques considered, case grammar is most suitable for analyses of the Korean language [3]. In this paper, we propose a methodology that uses a case grammar approach to analyze the traceability between documents written in Korean. A discussion regarding some examples of such an analysis will follow.

A Research on Tac-ELINT SW Development Method Using M&S System (M&S 시스템을 활용한 Tac-ELINT 지상운용 SW 개발 방안 연구)

  • Shin, Dong-Cho;Kwak, Hyun-Gyu;Lee, Kwang-Il
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1058-1066
    • /
    • 2011
  • This research paper on Tac-ELINT SW development method using M&S system describes the validation and verification methods of Tac-ELINT ground operating software development each stages, and the method of improving reusability of software using SBD(Simulation Based Design/Development) concept. In this project, We obtain the EW software SBD technologies and improved Tac-ELINT ground operating software through software crisis mitigation. This method and technology will expect to support a future EW system and any other various weapon software development.

State-of-the-art in Quantum Computing Software (양자컴퓨팅 소프트웨어 최신 기술 동향)

  • Cho, E.Y.;Kim, Y.C.;Jung, H.B.;Cha, G.I.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.67-77
    • /
    • 2021
  • Since Richard Feynman presented the concept of quantum computers, quantum computing have been identified today overcoming the limits of supercomputing in various applications. Quantum hardware has steadily developed into 50 to hundreds of qubits of various quantum hardware technologies based on superconductors, semiconductors, and trapped ions over 40 years. However, it is possible to use a NISQ (Noisy Intermediate Scale Quantum) level quantum device that currently has hardware constraints. In addition, the software environment in which quantum algorithms for problem solving in various applications can be executed is pursuing research with quantum computing software such as programming language, compiler, control, testing and verification. The development of quantum software is essential amid intensifying technological competition for the commercialization of quantum computers. Therefore, this paper introduces the trends of the latest technology, focusing on quantum computing software platforms, and examines important software component technologies.

Development of Metrics to Measure Reusability of Mobile App. (모바일 앱 재사용성 측정을 위한 메트릭 개발)

  • Cho, Eun-Sook;Kim, Chul-Jin;Song, Chee-Yang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4500-4507
    • /
    • 2014
  • As the number of smart phone users is increasing exponentially, the scale of the future mobile market is expected to be very large. Many mobile applications are developing according to this growth trend. On the other hand, there has been little verification of the quality, such as the reusability or extensibility of the developed mobile applications. In particular, many users have expressed their dissatisfaction in the case of pay mobile applications. Therefore, developed to measure the quality of mobile applications in developing mobile applications. Overall, the degree of user satisfaction can be improved by realizing the quality verification of mobile applications by applying the proposed metrics.

Automatic Verification of the Control Flow Model for Effective Embedded Software Design (효과적인 임베디드 소프트웨어 설계를 위한 제어흐름 모델의 자동 검증)

  • Park, Sa-Choun;Kwon, Gi-Hwon;Ha, Soon-Hoi
    • The KIPS Transactions:PartA
    • /
    • v.12A no.7 s.97
    • /
    • pp.563-570
    • /
    • 2005
  • Hardware and software codesign framework called PeaCE(Ptolemy extension as a Cod sign Environment) allows to express both data flow and control flow. To formally verify an fFSM specification which expresses control flow in PeaCE, the step semantics of the model was defined. In this paper, we introduce the automatic verification tool developed by formal semantics of previous work. This tool uses the SMV as inner model checker md, through our tool, users can formally verify some important bugs such as race condition, ambiguous transition, and circulartransition without directly writing logical formulae.

Realization and Test of the Transport Layer Protocol (전달 계층 프로토콜 구현 및 시험에 관한 연구)

  • 전동근;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.650-662
    • /
    • 1993
  • The thesis describes the realization and test of the transport layer operating on the CLNS (Connection Less Network Service) which is specified by ISO 8073 and ADDENDUM 2 protocol. For realization of the transport layer, five modules and interface primitives were definde. This protocol was formally described by SDL (Specification and Description Language) and was programmed in C-language. For verification of the software, protocol tester was implemented and test scenarios were defined. The verification was accomplished based on the test scenarios. Transport Layer software presented in this thesis may be utilized in a real situation with some modifications. Protocol tester presented in this thesis can also be used for verification of other protocol softwares.

  • PDF