• Title/Summary/Keyword: 테스트 방법론

Search Result 228, Processing Time 0.034 seconds

Design and Implementation of Interface Module between Network Framework for Sensor Network Application and Co-Simulator (센서네트워크 어플리케이션을 위한 네트워크 프레임워크와 통합시뮬레이터 간의 인터페이스 구현 및 설계)

  • Lee, Jeong-Joo;Koak, Dong-Eun;Seo, Min-Suk;Park, Hyun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.515-524
    • /
    • 2013
  • For the development of reliable software, Software testing is the most important. Recently small changes of the software according to the importance of regression testing is growing. To verify Application of a large number of nodes, Network simulator environment is required. This paper proposed interface module between network framework for sensor network application and co-simulator to unit test sensor network application. To conclude, developer can focus on sensor network application implementation only, so the improved integrated simulator contributes to increase development productivity.

A Study on the Evaluation Methodology for Information Security Level based on Test Scenarios (TS 기반의 정보보호수준 평가 방법론 개발에 관한 연구)

  • Sung, Kyung;Kim, Seok-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.737-744
    • /
    • 2007
  • It need estimation model who is efficient and estimate correctly organization's information security level to achieve effectively organization's information security target. Also, estimate class information security level for this and need reformable estimation indicator or standard and estimation methodology of information security systems that application is possible should be studied in our country. Therefore many research centers including ISO are preparing the measuring and evaluating method for network duality. This study will represent an evaluating model for network security based on checklist. In addition, we propose ah measuring and evaluating method for network performance. The purpose of two studies is to present the evaluating procedure and method for measuring security of network on set workwill be identified and a measuring method and procedure will be proposed.

A Study on the Guidelines of Key Mapping for Mobile Devices using the Method of Key Card Arranging (Key Card Arranging 기법을 활용한 핸드폰 기기의 Key Mapping 가이드라인에 대한 연구)

  • Choi, Jin-Ho;Kang, Han-Jong;Lee, Keun-Min;Lee, Kyoung-Jin;Kim, Jung-Ha
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.275-280
    • /
    • 2006
  • 1990년대 휴대폰이 일반화가 시작된 이후 지금까지 수많은 종류의 휴대폰이 출시되어왔다. 종류가 다양해진 만큼 기능, 목적, 사용방법 또한 다변화 되었고, 이로 인해 매일같이 쏟아져 나오는 휴대폰의 기능 및 사용방법에 대해 유저들은 항상 새로운 방식을 익히도록 강요되고 있다. 이에 본 연구에서는 Key Card Arranging 기법을 활용하여 현재 모바일 기기 사용자들의 멘탈 모델에 적합한 최적의 Key Mapping에 대한 가이드라인을 제시함으로써 최소한의 노력으로 사용자들이 정보기기를 활용할 수 있도록 하는데 그 목적이 있다. 본 연구를 위하여 국내의 대표적인 6개 휴대폰 회사별로 선별된 테스트 서브젝트들을 선정하여 실험을 실시 하였으며, 구체적인 방법론은 다음과 같다. 우선 핸드폰 기기 내의 Hot Key에 대한 Key Mapping을 중심으로 Key Card Arranging 기법과 In-depth Interview 방법론을 활용하여 선정된 서브젝트들을 대상으로 사용자 멘탈 모델에 대한 데이터를 취합하였다. 취합된 자료를 중심으로 정량적 데이터 분석 방법을 활용, 사용자의 휴대폰 키 맵핑에 대한 이상적인 멘탈 모델을 제안하고, 최종적으로 본 연구를 통하여 사용자에게 최적의 경험을 제공하기 위하여 휴대폰 Key Mapping에 대한 가이드라인들을 제시한다.

  • PDF

Localization of sensor nodes using 802.11 RSSI (802.11의 RSSI를 이용한 센서 노드들의 지역화)

  • Park, Eui-Joon;Lee, Hyun-Seung;Song, Ha-Yoon;Park, Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.381-384
    • /
    • 2007
  • RF 신호 강도인 RSSI(Received Signal Strength indication)를 이용해 지역화를 하는 방법론이나 알고리즘은 많이 연구되어 왔다. 그러나 대다수의 연구에서 추가적인 장비를 요구하거나, 복잡한 시스템 환경을 필요로 한다. 본 논문에서는 일반적인 무선랜 환경을 사용할 수 있는 노트북에서, Windows 기반의 802.11의 RSSI를 이용해 지역화를 수행하였다. IEEE 802.11의 네트워킹 구성을 한 센서노드들 중에 AP(Access Point) 역할을 하는 한 개의 고정노드(Anchor)를 중심으로 다수의 움직일 수 있는 모바일 노드들의 위치를 추적해가는 방법이며, Anchor가 많아지거나 모바일 노드가 늘어나면 지역화의 정확도는 증가하게 된다. 이 방법은 일반적인 802.11의 무선랜 환경이 가능한 랩톱에서도 쉽게 적응이 가능하며, 부가적인 장비의 의존성이 전혀 없고 소프트웨어 적인 방법론으로 해결하였다. 또한 지역화가 가능함과 동시에 각각의 센서 노드들은 802.11을 이용한 데이터 송수신이 가능하다. 본 논문에서는 MS의 Windows 플랫폼 기반으로 테스트하였고, 효과적으로 Beacon 패킷을 송출하기 위한 해법을 제시한다.

  • PDF

Validation of User Needs Using a Design Prototyping - Development of Design Concepts in Wearable Cardioverter-Defibrillator(WCD) - (디자인프로토타이핑을 이용한 사용자 니즈의 검증 - 웨어러블 자동 제세동기의 디자인컨셉 개발을 중심으로 -)

  • Cho, Seung-yeon;Oh, In-sik
    • Journal of Communication Design
    • /
    • v.57
    • /
    • pp.256-271
    • /
    • 2016
  • We attempted to implement Human Centered Design(HCD) according to the following three steps : (1) deriving user needs, (2) conducting ideation based the derived user needs, and (3) developing design concepts. The research on users and experts requires substantial time and cost, and there has not been an effective and clear-cut means to validate the research results before developing design concepts. We therefore extended the means of usability test to a context-based character. We applied this test for the development of design for Wearable Cardioverter-Defibrillator(WCD). Would this test be applied to various cases in the fields of medical equipment/apparatus development - which relatively takes a longer time to be developed - it would aid in accumulating and categorizing the reference data for variables incorporated for evaluating such cases. Future studies are needed to complement our findings concerning context-based usability tests.

Virtual Environment Hardware-In-the-Loop Simulation for Verification of OHT Controller (OHT 제어기 검증을 위한 가상환경 HIL 시뮬레이션)

  • Lee, Kwan Woo;Lee, Woong Geun;Park, Sang Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.11-20
    • /
    • 2019
  • This paper presents a HILS(Hardware-In-the-Loop Simulation) approach for the verification of the OHT (Overhead Hoist Transport) controller in a semiconductor FAB. Since hundreds of OHTs can run simultaneously on the OHT network of a FAB, the full verification of the OHT controller is very essential to guarantee the stableness of the material handling system. The controller needs to fully consider not only normal situations but also abnormal situations that are difficult to predict. For the verification of the controller, we propose a HILS approach using a virtual environment including OHTs on a rail network, which can generate abnormal situations. The proposed HILS approach has been implemented and tested with various examples.

QoS-Guaranteed Segment Restoration in MPLS Network (MPLS망에서 QoS 보장 세그먼트 복구 방법)

  • Chun, Seung-Man;Park, Jong-Tae;Nah, Jae-Wook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.11
    • /
    • pp.49-58
    • /
    • 2010
  • In this paper, we present a methodology for fast segment restoration under multiple simultaneous link failures in mesh-type MPLS networks. The salient feature of the methodology is that both resilience and QoS constraint conditions have been taken into account for fast segment restoration. For fast restoration, a sufficient condition for testing the existence of backup segments with guaranteed-resilience has been derived for a mesh-type MPLS network. The algorithms for constructing backup segments which can meet both resilience and QoS constraint conditions are then presented with illustrating examples. Finally, simulation has been done to show the efficiency of the proposed segment restoration algorithms.

Web application firewall technology trends and testing methodology (웹방화벽 기술동향 파악 및 시험방법론)

  • Jo, In-june;Kim, Sun-young;Kim, Chan-joong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.132-138
    • /
    • 2012
  • Existing network layer firewall security support is one that does not support the higher layer, the application layer of a vulnerable web application security. Under these circumstances, the vulnerability of web applications to be able to defend a Web Application Firewall is positioned as a solver to solve the important security issues of businesses spotlighted in the next generation of security systems, and a very active market in the market other than domestic is expected to be formed. However, Firewall Web has not yet proposed a standard which can be used to test the performance of the Web Application Firewall Web Application Firewall and select the products of trust hardly Companies in BMT conduct their own individual problems and the cost of performance testing technologies, there is a limit. In this study, practically usable BMT model was developed to evaluate the firewall vendor. Product ratings ISO / IEC 9126, eight product characteristics meet the performance and characteristics of a web application firewall entries are derived. This can relieve the burden on the need to be evaluated in its performance testing of Web firewall, and can enhance the competitiveness of domestic-related sectors, by restoring confidence in the product can reduce the dependence on foreign products.

  • PDF

Semantic Segmentation using Convolutional Neural Network with Conditional Random Field (조건부 랜덤 필드와 컨볼루션 신경망을 이용한 의미론적인 객체 분할 방법)

  • Lim, Su-Chang;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.3
    • /
    • pp.451-456
    • /
    • 2017
  • Semantic segmentation, which is the most basic and complicated problem in computer vision, classifies each pixel of an image into a specific object and performs a task of specifying a label. MRF and CRF, which have been studied in the past, have been studied as effective methods for improving the accuracy of pixel level labeling. In this paper, we propose a semantic partitioning method that combines CNN, a kind of deep running, which is in the spotlight recently, and CRF, a probabilistic model. For learning and performance verification, Pascal VOC 2012 image database was used and the test was performed using arbitrary images not used for learning. As a result of the study, we showed better partitioning performance than existing semantic partitioning algorithm.

Design of a Statics analysis tool through Worm Code (Worm코드를 이용한 정적분석 도구의 설계)

  • 김상영;이영식;황선명
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04b
    • /
    • pp.385-387
    • /
    • 2002
  • 개발자는 품질 요구사항을 만족하는 소프트웨어를 만들 책임이 있기 때문에 최종 제품의 품질뿐만 아니라 중간 제품의 품질에도 관심을 갖는다. 이러한 이유에서 품질관리를 위해서는 소프트웨어 품질 테스팅이 필요로 하게 되는데 테스팅의 방법에는 크게 WhiteBox Testing과 BlackBox Testing으로 나누어 진다 본 논문에서는 C++ 언어에 적용할 수 있는 정적 분석 도구를 설계하였으며, 이 도구의 특징은 테스팅 도구에 테스터의 의도를 전달 할 수 있는 테스트 제어 언어를 정의하고, 또한 이 정의 언어를 사용하여 Worm 코트론 삽입하여 테스팅 할 수 있는 정적 태스팅 도구를 설계하였다.

  • PDF