• Title/Summary/Keyword: Automated software

Search Result 525, Processing Time 0.023 seconds

Evaluation of Hippocampal Volume Based on Various Inversion Time in Normal Adults by Manual Tracing and Automated Segmentation Methods

  • Kim, Ju Ho;Choi, Dae Seob;Kim, Seong-hu;Shin, Hwa Seon;Seo, Hyemin;Choi, Ho Cheol;Son, Seungnam;Tae, Woo Suk;Kim, Sam Soo
    • Investigative Magnetic Resonance Imaging
    • /
    • v.19 no.2
    • /
    • pp.67-75
    • /
    • 2015
  • Purpose: To investigate the value of image post-processing software (FreeSurfer, IBASPM [individual brain atlases using statistical parametric mapping software]) and inversion time (TI) in volumetric analyses of the hippocampus and to identify differences in comparison with manual tracing. Materials and Methods: Brain images from 12 normal adults were acquired using magnetization prepared rapid acquisition gradient echo (MPRAGE) with a slice thickness of 1.3 mm and TI of 800, 900, 1000, and 1100 ms. Hippocampal volumes were measured using FreeSurfer, IBASPM and manual tracing. Statistical differences were examined using correlation analyses accounting for spatial interpretations percent volume overlap and percent volume difference. Results: FreeSurfer revealed a maximum percent volume overlap and maximum percent volume difference at TI = 800 ms ($77.1{\pm}2.9%$) and TI = 1100 ms ($13.1{\pm}2.1%$), respectively. The respective values for IBASPM were TI = 1100 ms ($55.3{\pm}9.1%$) and TI = 800 ms ($43.1{\pm}10.7%$). FreeSurfer presented a higher correlation than IBASPM but it was not statistically significant. Conclusion: FreeSurfer performed better in volumetric determination than IBASPM. Given the subjective nature of manual tracing, automated image acquisition and analysis image is accurate and preferable.

Change in lip movement during speech by aging: Based on a double vowel (노화에 따른 발화 시 입술움직임의 변화: 이중모음을 중심으로)

  • Park, Hee-June
    • Phonetics and Speech Sciences
    • /
    • v.13 no.1
    • /
    • pp.73-79
    • /
    • 2021
  • This study investigated the change in lip movement during speech according to aging. For the study, 15 elderly women with an average of 69 years and 15 young women with an average of 22 years were selected. To measure the movement of the lips, the ratio between the minimum point and the maximum point of movement when pronouncing a double vowel was analyzed in pixel units using image analysis software. For clinical utility, the software was produced by applying an automated algorithm and compared with the results of handwork. This study found that the range of the width and length of lips in double vowel tasks was smaller for the elderly than that of the young. A strong positive correlation was found between manual and automated methods, indicating that both methods are useful for extracting lip contours. Based on the above results, it was found that the range of the lips decreased when ignited as aging progressed. Therefore, monitoring the condition of lip performance by simply measuring the movement of lips before aging progresses, and performing exercises to maintain lip range, will prevent pronunciation problems caused by aging.

MuGenFBD: Automated Mutant Generator for Function Block Diagram Programs (MuGenFBD: 기능 블록 다이어그램 프로그램에 대한 자동 뮤턴트 생성기)

  • Liu, Lingjun;Jee, Eunkyoung;Bae, Doo-Hwan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.4
    • /
    • pp.115-124
    • /
    • 2021
  • Since function block diagram (FBD) programs are widely used to implement safety-critical systems, effective testing for FBD programs has become important. Mutation testing, a fault-based testing, is highly effective in fault detection but computationally expensive. To support testers for FBD programs, we propose an automated mutant generator for FBD programs. We designed the MuGenFBD tool with the cost and equivalent mutant issues in consideration. We conducted experiments on real industrial examples to present the performance of MuGenFBD. The results show that MuGenFBD can generate mutants for FBD programs automatically with low probability of equivalent mutants and low cost. This tool can effectively support mutation analysis and mutation-adequate test generation for FBD programs.

A Length-based File Fuzzing Test Suite Reduction Algorithm for Evaluation of Software Vulnerability (소프트웨어 취약성 평가를 위한 길이기반 파일 퍼징 테스트 슈트 축약 알고리즘)

  • Lee, Jaeseo;Kim, Jong-Myong;Kim, SuYong;Yun, Young-Tae;Kim, Yong-Min;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.231-242
    • /
    • 2013
  • Recently, automated software testing methods such as fuzzing have been researched to find software vulnerabilities. The purpose of fuzzing is to disclose software vulnerabilities by providing a software with malformed data. In order to increase the probability of vulnerability discovery by fuzzing, we must solve the test suite reduction problem because the probability depends on the test case quality. In this paper, we propose a new method to solve the test suite reduction problem which is suitable for the long test case such as file. First, we suggested the length of test case as a measure in addition to old measures such as coverage and redundancy. Next we designed a test suite reduction algorithm using the new measure. In the experimental results, the proposed algorithm showed better performance in the size and length reduction ratio of the test suite than previous studies. Finally, results from an empirical study suggested the viability of our proposed measure and algorithm for file fuzzing.

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning

  • Tunio, Muhammad Zahid;Luo, Haiyong;Wang, Cong;Zhao, Fang;Shao, Wenhua;Pathan, Zulfiqar Hussain
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.129-139
    • /
    • 2018
  • The crowdsourcing software development (CSD) is growing rapidly in the open call format in a competitive environment. In CSD, tasks are posted on a web-based CSD platform for CSD workers to compete for the task and win rewards. Task searching and assigning are very important aspects of the CSD environment because tasks posted on different platforms are in hundreds. To search and evaluate a thousand submissions on the platform are very difficult and time-consuming process for both the developer and platform. However, there are many other problems that are affecting CSD quality and reliability of CSD workers to assign the task which include the required knowledge, large participation, time complexity and incentive motivations. In order to attract the right person for the right task, the execution of action plans will help the CSD platform as well the CSD worker for the best matching with their tasks. This study formalized the task assignment method by utilizing different situations in a CSD competition-based environment in artificial intelligence (AI) planning. The results from this study suggested that assigning the task has many challenges whenever there are undefined conditions, especially in a competitive environment. Our main focus is to evaluate the AI automated planning to provide the best possible solution to matching the CSD worker with their personality type.

Wing weight estimation considering constraints of structural strength and stiffness in aircraft conceptual design

  • Bai, Chen;Mingqiang, Luo;Zhong, Shen;Zhe, Wu;Yiming, Man;Lei, Fang
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.15 no.4
    • /
    • pp.383-395
    • /
    • 2014
  • According to the requirement of wing weight estimation and frequent adjustments during aircraft conceptual design, a wing weight estimation method considering the constraints of structural strength and stiffness is proposed to help designers make wing weight estimations rapidly and accurately. This method implements weight predictions on the basis of structure weight optimization with stiffness constraints and strength constraints, which include achievement of wing shape parametric modeling, rapid structure layout, finite element (FE) model automated generation, load calculation, structure analysis, weight optimization, and weight computed based on modeling. A software tool is developed with this wing weight estimation method. This software can realize the whole process of wing weight estimation with the method and the workload of wing weight estimation is reduced because much of the work can be completed by the software. Finally, an example is given to illustrate that this weight estimation method is effective.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

Development of Test Simulator for Developing Fuel Quantity Measurement System for Supersonic Jet Trainer Conformal Fuel Tank (초음속항공기 보조연료탱크 연료량측정시스템 개발용 모사시험장치 개발)

  • Kim, Bong-Gyun;Park, Dae-Jin;Jeon, Hyeon-Wu;Lee, Sangchul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.26 no.2
    • /
    • pp.76-82
    • /
    • 2018
  • A test simulator is needed to develop a fuel quantity measurement system that takes into account the roll and pitch motion of the aircraft. In this paper, we develop a test simulator that consists of attitude simulation equipment, fueling equipment, and data storage equipment. The attitude simulation equipment simulates the aircraft attitude. It is manufactured to operate pitch angle and roll angle movement. The fueling equipment supplies fuel to the supplementary fuel tank. The data storage equipment collects and stores the measured data. We also develop an automation software that operates the test simulator and collects data automatically. The test simulator has been automated to prevent testers from being exposed to toxic fuel. Through automation software, the collection period is reduced by one quarter compared to manual collection. The developed fuel quantity measurement system is verified through the test simulator.

Big Data Analysis of Software Performance Trend using SPC with Flexible Moving Window and Fuzzy Theory (가변 윈도우 기법을 적용한 통계적 공정 제어와 퍼지추론 기법을 이용한 소프트웨어 성능 변화의 빅 데이터 분석)

  • Lee, Dong-Hun;Park, Jong-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.11
    • /
    • pp.997-1004
    • /
    • 2012
  • In enterprise software projects, performance issues have become more critical during recent decades. While developing software products, many performance tests are executed in the earlier development phase against the newly added code pieces to detect possible performance regressions. In our previous research, we introduced the framework to enable automated performance anomaly detection and reduce the analysis overhead for identifying the root causes, and showed Statistical Process Control (SPC) can be successfully applied to anomaly detection. In this paper, we explain the special performance trend in which the existing anomaly detection system can hardly detect the noticeable performance change especially when a performance regression is introduced and recovered again a while later. Within the fixed number of sampling period, the fluctuation gets aggravated and the lower and upper control limit get relaxed so that sometimes the existing system hardly detect the noticeable performance change. To resolve the issue, we apply dynamically tuned sampling window size based on the performance trend, and Fuzzy theory to find an appropriate size of the moving window.

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.