• Title/Summary/Keyword: 소프트웨어 테스트

Search Result 1,039, Processing Time 0.027 seconds

A Study on the Optimal Release Time Decision of a Developed Software by using Logistic Testing Effort Function (로지스틱 테스트 노력함수를 이용한 소프트웨어의 최적인도시기 결정에 관한 연구)

  • Che, Gyu-Shik;Kim, Yong-Kyung
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.2
    • /
    • pp.1-13
    • /
    • 2005
  • This paper proposes a software-reliability growth model incoporating the amount of testing effort expended during the software testing phase after developing it. The time-dependent behavior of testing effort expenditures is described by a Logistic curve. Assuming that the error detection rate to the amount of testing effort spent during the testing phase is proportional to the current error content, a software-reliability growth model is formulated by a nonhomogeneous Poisson process. Using this model the method of data analysis for software reliability measurement is developed. After defining a software reliability, This paper discusses the relations between testing time and reliability and between duration following failure fixing and reliability are studied. SRGM in several literatures has used the exponential curve, Railleigh curve or Weibull curve as an amount of testing effort during software testing phase. However, it might not be appropriate to represent the consumption curve for testing effort by one of already proposed curves in some software development environments. Therefore, this paper shows that a logistic testing-effort function can be adequately expressed as a software development/testing effort curve and that it gives a good predictive capability based on real failure data.

  • PDF

Strategic Coalition for Improving Generalization Ability of Multi-agent with Evolutionary Learning (진화학습을 이용한 다중에이전트의 일반화 성능향상을 위한 전략적 연합)

  • 양승룡;조성배
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.2
    • /
    • pp.101-110
    • /
    • 2004
  • In dynamic systems, such as social and economic systems, complex interactions emerge among its members. In that case, their behaviors become adaptive according to Changing environment. In many cases, an individual's behaviors can be modeled by a stimulus-response system in a dynamic environment. In this paper, we use the Iterated Prisoner's Dilemma (IPD) game, which is simple yet capable of dealing with complex problems, to model the dynamic systems. We propose strategic coalition consisting of many agents and simulate their emergence in a co-evolutionary learning environment. Also we introduce the concept of confidence for agents in a coalition and show how such confidences help to improve the generalization ability of the whole coalition. Experimental results are presented to demonstrate that co-evolutionary learning with coalitions and confidence allows better performing strategies that generalize well.

A study for Verification Procedures on Open-source Software Via Benchmark Testing (벤치마크 테스트를 통한 공개소프트웨어 검증 절차에 관한 연구)

  • Kim, Doo-Yeon;Rhew, Sung-Yul
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.99-108
    • /
    • 2006
  • Public institutions are considering adoption of open-source software in the process of information projects. However, there doesn't exist reliable information about an adoption process for open-source software. Performance and stability problems of this software also persist, as a result, current open-source software is not widely used. As a software market and industry grows, Benchmark test has been performed more often than before in order to help customers understand and select the most appropriate product among myriad similar ones. It is certain that more objective and trustful data evidence should be obtained by way of utilizing the procedures and methods of Benchmark Test in decision making process for selecting an open-source software. For this research, Benchmark test was applied as a way of demonstrating performance verification of an open-source software in the public institutions. It is certain that more objective and trustful data evidence should be obtained by way of utilizing the procedures and methods of Benchmark Test in decision making process for selecting an open-source software. It also introduces a case study of a information system, which selected and implemented open-source software, in order to confirm the validity of this research. This research will serve as a guideline to adopt open-source software in governments as well as public institutions.

A Design and Implementation of Flash Memory Simulator (플래시 메모리 시뮬레이터의 설계 및 구현)

  • Jeong, Jae-Yong;Noh, Sam-Hyuk;Min, Sang-Lyull;Cho, Yoo-Kun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.36-45
    • /
    • 2002
  • This paper introduces the design and implementation of a flash memory simulator to emulate a real flash memory. Since this simulator provides exact execution time information and parameter testing functions as well as the type, total capacity, block size, and page size of flash memory, it can be used as a real flash memory as viewed by the operating system. Furthermore, the simulator provides time logging functions of the internal routines of the flash memory management software allowing the monitoring of bottlenecks within the software. Finally, we show the performance measurements of applications under the Linux operating systems on both the simulator and a test board verifying the simulator's use as a replacement for real flash memory.

A Comparison Study on Software Testing Efforts (소프트웨어 테스트 노력의 비교 연구)

  • Choe, Gyu-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.818-822
    • /
    • 2003
  • We propose a software-reliability growth model incoporating the amount of uniform and Weibull testing efforts during the software testing phase in this paper. The time-dependent behavior of testing effort is described by uniform and Weibull curves. Assuming that the error detection rate to the amount of testing effort spent during the testing phase is proportional to the current error content, the model is formulated by a nonhomogeneous Poisson process. Using this model the method of data analysis for software reliability measurement is developed. The optimum release time is determined by considering how the initial reliability R(x|0) would be. The conditions are $R(x|0)>R_o$, $R_o>R(x|0)>R_o^d$ and $R(x|0)<R_o^d$ for uniform testing efforts. Ideal case is $R_o>R(x|0)>R_o^d$. Likewise, it is $R(x|0){\geq}R_o$, $R_o>R(x|0)>R_o^{\frac{1}{g}$ and $R(x\mid0)<R_o^{\frac{1}{g}}$ for Weibull testing efforts. Ideal case is $R_o>R(x|0)>R_o^{\frac{1}{g}}$.

  • PDF

RUP Model Based SBA Effectiveness Analysis by Considering the V Process and Defense Simulation Hierarchy (V 프로세스와 국방시뮬레이션 모델유형을 고려한 RUP 모델 기반의 SBA 효과도 분석)

  • Cha, HyunJu;Kim, Hyung Jong;Lee, Hae Young
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.55-60
    • /
    • 2015
  • This paper presents an SBA (simulation-based acquisition) effectiveness analysis environment using the RUP (Relational Unified Process) model. The RUP model has 4 phases which cover the whole development steps such as requirement analysis, design, development and test. By applying the RUP model, SW development can be represented with the iterations of developments for each phase. Such a characteristics of the model would make the model suitable for defense acquisition. In this paper, we show the relation between the RUP model and V process model, which is the foundation for defense acquisition. In order to show how the model could be applied to SBA effectiveness analysis, graphical user interfaces for the analysis are presented at the end of the paper.

A System Level Design of Heterogeneous Multiplication Server Farms (이종 곱셈 연산기 서버 팜의 시스템 레벨 설계)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.768-770
    • /
    • 2014
  • Due to increasing demand of new technology, the complexity of hardware and software consisting embedded systems is rapidly growing. Consequently, it is getting hard to design complex devices only with traditional methodology. In this contribution, I introduce a new approach of designing complex hardware with SystemVerilog. I adopted the idea of object oriented implementation of the SystemVerilog to the design of multiplication server farms. I successfully implemented the whole system including the test bench in one integrated environment, otherwise in the traditional way it would have cost Verilog simulation and C/SystemC verification which means much more time and effort.

  • PDF

Implementation of Session Test Tool for MEC (MEC를 위한 세션 테스트 도구 개발)

  • Kim, Tae-Young;Kim, Tae-Hyun;Jin, Sunggeun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.1
    • /
    • pp.11-19
    • /
    • 2021
  • The emerging Fifth Generation (5G) network technology brings us a new demand for low latency services. However, it may not be possible for long-distanced cloud computing servers to support users with satisfactory low latency services. For this reason, Multi-access Edge Computing (MEC) technology are gaining attraction since it is designed to provide low latency services to users by placing cloud computing resources to base-stations or mobile switching centers nearby users. Accordingly, it is necessary to verify the deployed containers on the MECs are reliable enough to provide low latency services empirically. For the purpose, we develop a testing tool to verify the reliability as well as network resources status of running MECs by deploying containers on the MECs in a Kubernetes environment.

A New Method for Detecting Trapdoors in Smart Cards with Timing and Power Analysis (시차와 전력 분석을 이용한 새로운 스마트카드 트랩도어 검출방법)

  • Lee Jung Youp;Jun Eun-A;Jung Seok Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.47-57
    • /
    • 2005
  • For economic reasons, even though there are some security problems, the commands of re-initializing and writing patch code are widely used in smart cards. The current software tester has difficulty in detecting these trapdoor commands because trapdoors are not published and programmed sophisticatedly. Up to now the effective way to detect them is to completely reveal and analyze the entire code of the COS with applications such as the ITSEC. It is, however, a very time-consuming and expensive processes. We propose the new detecting approach of trapdoors in smart cards using timing and power analysis. With our experiments, this paper shows that the proposed approach is more practical than the current methods.

A Study of Machine Learning Model for Prediction of Swelling Waves Occurrence on East Sea (동해안 너울성 파도 예측을 위한 머신러닝 모델 연구)

  • Kang, Donghoon;Oh, Sejong
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.9
    • /
    • pp.11-17
    • /
    • 2019
  • In recent years, damage and loss of life and property have been occurred frequently due to swelling waves in the East Sea. Swelling waves are not easy to predict because they are caused by various factors. In this research, we build a model for predicting the swelling waves occurrence in the East Coast of Korea using machine learning technique. We collect historical data of unloading interruption in the Pohang Port, and collect air pressure, wind speed, direction, water temperature data of the offshore Pohang Port. We select important variables for prediction, and test various machine learning prediction algorithms. As a result, tide level, water temperature, and air pressure were selected, and Random Forest model produced best performance. We confirm that Random Forest model shows best performance and it produces 88.86% of accuracy