• Title/Summary/Keyword: 테스트 도구

Search Result 393, Processing Time 0.028 seconds

A Survey of Embedded Software Testing for Automotive Standard Platform (지능형 자동차용 임베디드 플랫폼 소프트웨어 테스팅 연구)

  • Jo, Hyun-Chul;Piao, Shiquan;Cho, Hui-Sup
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.6
    • /
    • pp.73-79
    • /
    • 2010
  • The number of electronic embedded software in vehicle system is ever increasing for years. As a result, the electronic control units have been growing dramatically, and it is required to mutual link between these units. Due to separate API each and every embedded platform, it is difficult to develop and integrate in automotive industry. The AUTOSAR project consists suppliers and manufacturers, and the partnership is a standardized platform to establish and develop an industry standard. On the previous works, we implemented the RTE generated module design based on AUTOSAR architecture. This paper specifically focuses on the testing of the development tool that generates RTE source code. The result satisfied a need for a RTE requirements and AUTOSAR methodology in a vehicle applications.

Designing VOD Service Domain Feature Model and VOD Service Developing Process Based-on it (VOD 서비스 도메인 피처모델과 이를 기반한 VOD 서비스 개발 프로세스)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.51-57
    • /
    • 2017
  • VOD service provides an additional revenue for broadcasting companies in addition to the existing subscription fees and advertisement-based revenue. Therefore, each broadcasting company develops its own VOD service and performs frequent improvement work. This leads to the development of new VOD services, so developers are considering ways to effectively handle the frequent development needs. In this background, we conducted an underlying research to apply the feature-oriented analysis model to the development of VOD service. The feature-oriented analysis model used in this study is the Feature-Oriented Domain Analysis (FODA) developed by SEI of Carnegie Mellon University. FODA provides a tool for specifying a feature model of a software domain, based on which developers determine the configuration of a software with customers. This study developed a feature model of the VOD service domain and devised the functionalities and testcases in an integrated manner with the feature model. Additionally, we proposed a VOD service development process utilizing the feature model, function specification, and testcases.

Searching Human Motion Data by Sketching 3D Trajectories (3차원 이동 궤적 묘사를 통한 인간 동작 데이터 검색)

  • Lee, Kang Hoon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.19 no.2
    • /
    • pp.1-8
    • /
    • 2013
  • Captured human motion data has been widely utilized for understanding the mechanism of human motion and synthesizing the animation of virtual characters. Searching for desired motions from given motion data is an important prerequisite of analyzing and editing those selected motions. This paper presents a new method of content-based motion retrieval without the need of additional metadata such as keywords. While existing search methods have focused on skeletal configurations of body pose or planar trajectories of locomotion, our method receives a three-dimensional trajectory as its input query and retrieves a set of motion intervals in which the trajectories of body parts such as hands, foods, and pelvis are similar to the input trajectory. In order to allow the user to intuitively sketch spatial trajectories, we used the Leap Motion controller that can precisely trace finger movements as the input device for our experiments. We have evaluated the effectiveness of our approach by conducting a user study in which the users search for dozens of pre-selected motions from baseketball motion data including a variety of moves such as dribbling and shooting.

A Learning Content System which is Objectified with the Reusable Unit of Pedagogical Designs for Distributed Environments (분산환경을 위한 교수법적 설계의 재사용 단위를 객체화한 강의 컨텐츠 시스템)

  • Shin, Haeng-Ja;Park, Kyung-Hwan
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.559-570
    • /
    • 2003
  • In this paper, we investigate a problem with Web-based learing contents and introduce the solving method of the problem. To be more accurate, existing Web-based learning contents were one fixd and uniformed courseware file with a large size and HTML format. Also, They were written files with authoring tools of which depended upon providing a multimedia vender. These learning contents were difficult to reuse among cyber education systems and change the applicable contents to the learner for learning experiences in time. So in this paper, we produced reusable and interopreable learning contents among instruction designers and education systems. They were deconstructed into smaller chunks and added to its properties. For the purpose of this producing method, we used the pedagogical designs for units of reuse. These are just turorial link-more and tell-more and was implemented with CBD method. As a result, The problem of existing Web-based learning contents system was resolved and then the power of understanding about objectified learning content was increased for the learner and instruction designers.

Assessing Infinite Failure Software Reliability Model Using SPC (Statistical Process Control) (통계적 공정관리(SPC)를 이용한 무한고장 소프트웨어 신뢰성 모형에 대한 접근방법 연구)

  • Kim, Hee Cheul;Shin, Hyun Cheul
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.85-92
    • /
    • 2012
  • There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do asymptotic likelihood inference for software reliability models based on infinite failure model and non-homogeneous Poisson Processes (NHPP). For someone making a decision about when to market software, the conditional failure rate is an important variables. The finite failure model are used in a wide variety of practical situations. Their use in characterization problems, detection of outliers, linear estimation, study of system reliability, life-testing, survival analysis, data compression and many other fields can be seen from the many study. Statistical Process Control (SPC) can monitor the forecasting of software failure and there by contribute significantly to the improvement of software reliability. Control charts are widely used for software process control in the software industry. In this paper, we proposed a control mechanism based on NHPP using mean value function of log Poission, log-linear and Parto distribution.

Comparison on Recent Metastability and Ring-Oscillator TRNGs (최신 준안정성 및 발진기 기반 진 난수 발생기 비교)

  • Shin, Hwasoo;Yoo, Hoyoung
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.543-549
    • /
    • 2020
  • As the importance of security increases in various fields, research on a random number generator (RNG) used for generating an encryption key, has been actively conducted. A high-quality RNG is essential to generate a high-performance encryption key, but the initial pseudo-random number generator (PRNG) has the possibility of predicting the encryption key from the outside even though a large amount of hardware resources are required to generate a sufficiently high-performance random number. Therefore, the demand of high-quality true random number generator (TRNG) generating random number through various noises is increasing. This paper examines and compares the representative TRNG methods based on metastable-based and ring-oscillator-based TRNGs. We compare the methods how the random sources are generated in each TRNG and evaluate its performances using NIST SP 800-22 tests.

Design and Implementation of a Virtual Robot Education System (가상 로봇 교육 시스템 설계 및 구현)

  • Hongyu, Xiong;So, Won-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.1
    • /
    • pp.108-115
    • /
    • 2011
  • Virtual Robot Education System (VRES), which is for programming education with a Lego Mindstorm NXT robot, is designed and implemented. Through this system, program learners can edit source code, compile, download it into the robot, and run their executive program. In order to observe it, the system includes web cameras and provide monitoring services. Thus, students are able to verify the operation of robot into which they download their program in detail and to debug if necessary. In addition, we design a new simple user-friendly programming language and a corresponding compiler for it. With those tools, learner can more easily create programs for NXT robot and test them than Java language. A educator can control and manage the robot for the subject of a class with direct control mode of our system. Therefore, the proposed system is able to support students to learn robot programming during or after regular classes with web browsers through Internet.

Design and Implementation of Motion Recipe for PLCopen-Compliant Motion Applications with Multiple Operation Modes (다중 동작 모드를 가진 PLCopen 표준 호환 모션 응용을 위한 모션 레시피 개념 설계 및 구현)

  • Kim, Sanghyun;Lee, Kyunghyun;Kim, Taehyoun;Choi, Cheol;Kang, Donggu
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.40 no.11
    • /
    • pp.955-962
    • /
    • 2016
  • In recent years, there have been emerging needs for standardized software-based motion application development for better scalability and support for multiple operation modes for small quantity batch production. Although a software-based motion system provides a basis for constructing multiple operation modes on a machine, it is not easy to construct such systems without tools for defining multiple motion operation modes and standardized mode-change protocols. This paper proposes a motion recipe concept to overcome this problem; the concept includes the authoring of multiple motion operation modes using the PLCopen-compliant motion function blocks and communication protocols to trigger operation mode changes from an external interface. The motion recipe was implemented by extending an IEC 61131-3 compliant IDE called Beremiz, and the correctness of the motion recipe-based application behavior was verified on a real testbed.

Agent-Server based Protocol Analyzer for LTE Network (LTE 망을 위한 에이전트-서버 기반의 프로토콜 분석기)

  • Pi, Jun-Il;Lee, Nak-Guy;Lim, Jong-Tae;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.30-40
    • /
    • 2011
  • Recently, together with the development of wireless communication technologies and the wide use of smart phones, the demand of the next generation mobile communication has been increased. To construct the next generation mobile communication platform efficiently for a short period from protocol development phase to protocol stability phase, an protocol analyzer is required to verify and analyze the protocol. In this paper, we propose the protocol analyzer of LTE network which is the leader of the next generation mobile communication platforms. The protocol analyzer is a software based agent-server architecture and uses XML metadata which defines intercommunication messages to analyze the protocol of the next generation mobile communications. We can analysis the encoding messages applied to LTE network using the loading of the decoding library. We verify the superiority of the proposed analyzer through an integrated test with LTE network.

A Statistic-based Response System against DDoS Using Legitimated IP Table (검증된 IP 테이블을 사용한 통계 기반 DDoS 대응 시스템)

  • Park, Pilyong;Hong, Choong-Seon;Choi, Sanghyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.827-838
    • /
    • 2005
  • DDoS (Distributed Denial of Service) attack is a critical threat to current Internet. To solve the detection and response of DDoS attack on BcN, we have investigated detection algorithms of DDoS and Implemented anomaly detection modules. Recently too many technologies of the detection and prevention have developed, but it is difficult that the IDS distinguishes normal traffic from the DDoS attack Therefore, when the DDoS attack is detected by the IDS, the firewall just discards all over-bounded traffic for a victim or absolutely decreases the threshold of the router. That is just only a method for preventing the DDoS attack. This paper proposed the mechanism of response for the legitimated clients to be protected Then, we have designed and implemented the statistic based system that has the automated detection and response functionality against DDoS on Linux Zebra router environment.