• Title/Summary/Keyword: 소스 코드 품질

Search Result 57, Processing Time 0.019 seconds

A Proposal for Unit Testing Procedure of Embedded Software Complied with Safety Assessment Criteria (안정성평가 기준에 적합한 내장형 소프트웨어 단위시험 절차 방안)

  • Jang, Jeong-Hoon;Lee, Won-Taek;Jang, Ju-Su
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.2223-2231
    • /
    • 2010
  • Recently, an important physical device of transportation, such as car, railroad, ship and aircraft has changed into electronic control unit. According to accident reports, the most of car accidents are caused by faults of embedded software loaded to computer control unit. The facts implies that the test to find defects in embedded software haven't performed sufficiently. As a result, it is necessary to establish the test procedures of embedded software based on safety assessment criteria. The objective of this proposal is to provide a unit test procedure complied with the safety assessment criteria for the embedded software. In addition, an effective unit testing procedure and defect analysis methods are proposed and a testing procedure using a safety criteria built-in tool is presented.

  • PDF

A Study on Environment for Web Applications Design (웹 어플리케이션 설계 환경 개발)

  • 이미경;강병도
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.417-422
    • /
    • 2002
  • In recent years, the progress of Network and Web technology is made more demanding and pervasive of Web-based information systems. At the same time, the complexity of web applications has grown significantly. As a result, developers, users, and other stake-holders have become increasingly concerned about the manner in which complex Web-based systems are created as well as the level of system performance quality, and integrity. In this paper, we propose an efficient developing process and modeling environment of the web applications. Also, after modeling web application using the diagrams, web pages are extracted automatically. It is aimed at facilitating the desist implementation and maintenance of large, complex web applications and the reuse of previously gathered design experience.

  • PDF

A Study on Environment for Web Applications Design (웹 어플리케이션 설계 환경 개발)

  • 이미경;강병도
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.417-422
    • /
    • 2002
  • In recent years, the progress of Network and Web technology is made more demanding and Pervasive of Web-based information systems. At the same time, the complexity of web applications has grown significantly. As a result, developers, users, and other stake-holders have become increasingly concerned about the manner in which complex Web-based systems are created as well as the level of system performance, quality, and integrity. In this paper, we propose an efficient developing process and modeling environment of the web applications. Also, after modeling web application using the diagrams, web pages are extracted automatically. It is aimed at facilitating the design, implementation and maintenance of large, complex web applications and the reuse of previously gathered design experience.

  • PDF

An Optimized V&V Methodology to Improve Quality for Safety-Critical Software of Nuclear Power Plant (원전 안전-필수 소프트웨어의 품질향상을 위한 최적화된 확인 및 검증 방안)

  • Koo, Seo-Ryong;Yoo, Yeong-Jae
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.1-9
    • /
    • 2015
  • As the use of software is more wider in the safety-critical nuclear fields, so study to improve safety and quality of the software has been actively carried out for more than the past decade. In the nuclear power plant, nuclear man-machine interface systems (MMIS) performs the function of the brain and neural networks of human and consists of fully digitalized equipments. Therefore, errors in the software for nuclear MMIS may occur an abnormal operation of nuclear power plant, can result in economic loss due to the consequential trip of the nuclear power plant. Verification and validation (V&V) is a software-engineering discipline that helps to build quality into software, and the nuclear industry has been defined by laws and regulations to implement and adhere to a through verification and validation activities along the software lifecycle. V&V is a collection of analysis and testing activities across the full lifecycle and complements the efforts of other quality-engineering functions. This study propose a methodology based on V&V activities and related tool-chain to improve quality for software in the nuclear power plant. The optimized methodology consists of a document evaluation, requirement traceability, source code review, and software testing. The proposed methodology has been applied and approved to the real MMIS project for Shin-Hanul units 1&2.

Automated Functionality Test Methods for Web-based Applications (웹 기반 어플리케이션의 기능 테스트 자동화 방법)

  • Kuk, Seung-Hak;Kim, Hyeon-Soo
    • The KIPS Transactions:PartD
    • /
    • v.14D no.5
    • /
    • pp.517-530
    • /
    • 2007
  • Recently web applications have growl rapidly and have become more and more complex. As web applications become more complex, there is a growing concern about their quality. But very little attentions are paid to web applications testing and there are scarce of the practical research efforts and tools. Thus, in this paper, we suggest the automated testing methods for web applications. For this, the methods generate an analysis model by analyzing the HTML codes and the source codes. Then test targets are identified and test cases are extracted from the analysis model. In addition, test drivers and test data are generated automatically, and then they are depleted on the web server to establish a testing environment. Through this process we can automate the testing processes for web applications, besides the automated methods makes our approach more effective than the existing research efforts.

Detection Models and Response Techniques of Fake Advertising Phishing Websites (가짜 광고성 피싱 사이트 탐지 모델 및 대응 기술)

  • Eunbeen Lee;Jeongeun Cho;Wonhyung Park
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.29-36
    • /
    • 2023
  • With the recent surge in exposure to fake advertising phishing sites in search engines, the damage caused by poor search quality and personal information leakage is increasing. In particular, the seriousness of the problem is worsening faster as the possibility of automating the creation of advertising phishing sites through tools such as ChatGPT increases. In this paper, the source code of fake advertising phishing sites was statically analyzed to derive structural commonalities, and among them, a detection crawler that filters sites step by step based on foreign domains and redirection was developed to confirm that fake advertising posts were finally detected. In addition, we demonstrate the need for new guide lines by verifying that the redirection page of fake advertising sites is divided into three types and returns different sites according to each situation. Furthermore, we propose new detection guidelines for fake advertising phishing sites that cannot be detected by existing detection methods.

Model-based Integrated Development Tool for the Development of Applications in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 응용 프로그램 개발을 위한 모델 기반 통합 개발 도구)

  • Chong, Ki-Won;Kim, Ju-Il;Lee, Woo-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.442-453
    • /
    • 2007
  • A model-based integrated development tool for the development of USN application programs is proposed in this paper. The proposed tool has been implemented as a plug-in for Eclipse platform. The tool consists of Graphical User Interface, Modeler, Configuration Information Generator, Validity Checker, Source Code Generator and Templates Storage. Developers can implement USN applications from models of sensor networks using the tool. The developer can implement USN applications by automatic generation of execution code of each node in the sensor network after he/she designs a model of the sensor network. The configuration information of each node is automatically generated from the validated USN model. Then, the execution code is automatically generated using the configuration information and the predefined templates. Through the tool of this paper, developers can easily implement valid USN applications even if they do not know the details of low-level information. Also, a large number of application programs can be generated at once because application programs are generated from sensor network model instead of models of applications. Accordingly, the development effort of USN applications will be decreased and developers can consistently construct USN applications from USN models using the proposed tool.