• 제목/요약/키워드: Automated software

Search Result 534, Processing Time 0.021 seconds

Big Data Analysis of Software Performance Trend using SPC with Flexible Moving Window and Fuzzy Theory (가변 윈도우 기법을 적용한 통계적 공정 제어와 퍼지추론 기법을 이용한 소프트웨어 성능 변화의 빅 데이터 분석)

  • Lee, Dong-Hun;Park, Jong-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.11
    • /
    • pp.997-1004
    • /
    • 2012
  • In enterprise software projects, performance issues have become more critical during recent decades. While developing software products, many performance tests are executed in the earlier development phase against the newly added code pieces to detect possible performance regressions. In our previous research, we introduced the framework to enable automated performance anomaly detection and reduce the analysis overhead for identifying the root causes, and showed Statistical Process Control (SPC) can be successfully applied to anomaly detection. In this paper, we explain the special performance trend in which the existing anomaly detection system can hardly detect the noticeable performance change especially when a performance regression is introduced and recovered again a while later. Within the fixed number of sampling period, the fluctuation gets aggravated and the lower and upper control limit get relaxed so that sometimes the existing system hardly detect the noticeable performance change. To resolve the issue, we apply dynamically tuned sampling window size based on the performance trend, and Fuzzy theory to find an appropriate size of the moving window.

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.

Design of Integrated Control Software for Automated Observing System

  • Ji, Tae-Geun;Lee, Hye-In;Pak, Soojong;Im, Myungshin;Lee, Sang-Yun;Gibson, Coyne A.;Kuehne, John;Marshall, Jennifer
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.1
    • /
    • pp.57.2-57.2
    • /
    • 2017
  • Remote and robotic telescopes are the most effective instrument for astronomical survey projects. The system is based on the dynamic operation of all astronomical instruments such as dome and telescope control system (TCS), focuser, filter wheel and data taking camera. We adopt the ASCOM driver platform to control the instruments through the integrated software. It can convert different interface libraries from various manufacturers into a uniform standard library. This allows us to effectively control astronomical instruments without modifying codes. We suggest a conceptual design of software for automation of a small telescope such as the new wide-field 0.25m telescope at McDonald Observatory. It can also be applied to operation of multi-telescopes in future projects.

  • PDF

A Study on Measurement System for Water Volume of the Reservoir using Drone and Sensors (드론과 센서를 이용한 저수지 수량 측정 시스템에 관한 연구)

  • Kim, Hyeong-gyun;Hwang, Jun;Bang, Jong-ho
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.47-54
    • /
    • 2019
  • Social dredging of various river facilities, such as dams and agricultural reservoirs currently being constructed, should be done to ensure stable reservoirs. However, it is difficult to find a system that tells the exact amount of water in real-time in a reservoir or dam. These measurements require an automated system to collect and analyze highly accurate data in real time. In this study, we propose a method to measure the amount of water and soil of reservoir in real time through multi-division volume calculation using a drone, and this method can detect sediment conditions in real time and determine the exact timing and scale of dredging.

Development of Integrated Design and Optimization Software for the High Temperature Furnace Design (초고온 진공로 통합설계 최적화 소프트웨어 개발)

  • Jin, YuXuan;Lee, Jaewoo;Byun, Yunghwan
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.1 no.1
    • /
    • pp.14-19
    • /
    • 2005
  • High temperature vacuum furnaces or high standard electric furnaces demand high technology level and high production cost. Therefore, an iterative design process and the optimization approach under integrated computing environment are required to reduce the development risk. Moreover, it also required to develop an integrated design software that can manage the centralized database system between factory and design department, and the automated furnace design and analysis. The developed software is dedicated to the development of the vacuum (electric) furnaces. Based on the distribute middleware system, the GUI module, the CAD module, the thermal analysis module and the optimization module are integrated. For the DBMS, Microsoft Access is employed, the GUI is developed using Visual Basic language, and AutoCAD is utilized for the configuration design. By investigating the analysis code interface, the analysis and optimization process, and the data communication method, the overall system architecture, the method to integrate the optimizer and ana lysis codes, and the method to manage the data flow are proposed and verified through the optimal furnace design.

  • PDF

Improved Single Packet Authentication and Network Access Control Security Management in Software Defined Perimeter (소프트웨어 정의 경계의 단일 패킷 인증 및 네트워크 접근통제 보안관리 개선)

  • Jung, Jin-kyo;Lee, Sang-ku;Kim, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.407-415
    • /
    • 2019
  • As the IT environment changes with cloud computing and smart work, the existing perimeter security model is showing its limitations and Software Defined Perimeter is being discussed as an alternative. However, SDP Spec 1.0 does not specify the device registration procedure, policy distribution process and authentication key generation and sharing process.In this paper, we propose a method to solve the problem of SDP access control by improving the operation procedure of Single Packet Authentication. This paper suggests that the proposed method can implement a consistent and automated integrated access control policy compared to the existing access control methods.

A Study of the DEVOPS Test Automation Module for Integrated Development Environment (통합 개발환경에서 데브옵스 기반 테스트 자동화 모듈 개발에 대한 연구)

  • Jung Kwang Lak;Kim Sun Joo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.3-9
    • /
    • 2022
  • The role of the integrated development environment is very important in software development of a development project. After many developers develop different modules, software product is completed through compile, debugging, integration, testing, and distribution. However, bugs and various issues in the development process cause problems such as quality deterioration of software product and dissatisfaction with requirements. So the need for automated testing to avoid these problems and improve quality has increased. In this study, we propose test automation modules of four perspectives to improve quality throughout the test automation in an integrated development environment. Each automation module operates through the tool chain of an integrated build framework implemented on the devops.

IVAG: An Integrative Visualization Application for Various Types of Genomic Data Based on R-Shiny and the Docker Platform

  • Lee, Tae-Rim;Ahn, Jin Mo;Kim, Gyuhee;Kim, Sangsoo
    • Genomics & Informatics
    • /
    • v.15 no.4
    • /
    • pp.178-182
    • /
    • 2017
  • Next-generation sequencing (NGS) technology has become a trend in the genomics research area. There are many software programs and automated pipelines to analyze NGS data, which can ease the pain for traditional scientists who are not familiar with computer programming. However, downstream analyses, such as finding differentially expressed genes or visualizing linkage disequilibrium maps and genome-wide association study (GWAS) data, still remain a challenge. Here, we introduce a dockerized web application written in R using the Shiny platform to visualize pre-analyzed RNA sequencing and GWAS data. In addition, we have integrated a genome browser based on the JBrowse platform and an automated intermediate parsing process required for custom track construction, so that users can easily build and navigate their personal genome tracks with in-house datasets. This application will help scientists perform series of downstream analyses and obtain a more integrative understanding about various types of genomic data by interactively visualizing them with customizable options.

Hybrid Learning Architectures for Advanced Data Mining:An Application to Binary Classification for Fraud Management (개선된 데이터마이닝을 위한 혼합 학습구조의 제시)

  • Kim, Steven H.;Shin, Sung-Woo
    • Journal of Information Technology Application
    • /
    • v.1
    • /
    • pp.173-211
    • /
    • 1999
  • The task of classification permeates all walks of life, from business and economics to science and public policy. In this context, nonlinear techniques from artificial intelligence have often proven to be more effective than the methods of classical statistics. The objective of knowledge discovery and data mining is to support decision making through the effective use of information. The automated approach to knowledge discovery is especially useful when dealing with large data sets or complex relationships. For many applications, automated software may find subtle patterns which escape the notice of manual analysis, or whose complexity exceeds the cognitive capabilities of humans. This paper explores the utility of a collaborative learning approach involving integrated models in the preprocessing and postprocessing stages. For instance, a genetic algorithm effects feature-weight optimization in a preprocessing module. Moreover, an inductive tree, artificial neural network (ANN), and k-nearest neighbor (kNN) techniques serve as postprocessing modules. More specifically, the postprocessors act as second0order classifiers which determine the best first-order classifier on a case-by-case basis. In addition to the second-order models, a voting scheme is investigated as a simple, but efficient, postprocessing model. The first-order models consist of statistical and machine learning models such as logistic regression (logit), multivariate discriminant analysis (MDA), ANN, and kNN. The genetic algorithm, inductive decision tree, and voting scheme act as kernel modules for collaborative learning. These ideas are explored against the background of a practical application relating to financial fraud management which exemplifies a binary classification problem.

  • PDF

Android Intent Based Component Interaction Diagram Generation and Test Scenarios Design Techniques (안드로이드 인텐트 기반 컴포넌트 상호작용 다이어그램 생성 및 테스트 시나리오 설계기법)

  • Baek, Tae-San;Lee, Woo Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.4
    • /
    • pp.165-170
    • /
    • 2016
  • Using the intent of the Android application, an application can execute other application's components. However, if interaction between these components are not processed normally, such problems as incorrect component execution and unhandled system broadcast may be occurred. In this paper, to generate test scenarios for inter application interaction, a testing approach is proposed using a merged intent list and a single merged diagram. The proposed method can effectively be carried out to check the abnormal interaction among the applications which was not considered in existing testing approaches.