• 제목/요약/키워드: Automated software

검색결과 525건 처리시간 0.026초

Evaluation of Hippocampal Volume Based on Various Inversion Time in Normal Adults by Manual Tracing and Automated Segmentation Methods

  • Kim, Ju Ho;Choi, Dae Seob;Kim, Seong-hu;Shin, Hwa Seon;Seo, Hyemin;Choi, Ho Cheol;Son, Seungnam;Tae, Woo Suk;Kim, Sam Soo
    • Investigative Magnetic Resonance Imaging
    • /
    • 제19권2호
    • /
    • pp.67-75
    • /
    • 2015
  • Purpose: To investigate the value of image post-processing software (FreeSurfer, IBASPM [individual brain atlases using statistical parametric mapping software]) and inversion time (TI) in volumetric analyses of the hippocampus and to identify differences in comparison with manual tracing. Materials and Methods: Brain images from 12 normal adults were acquired using magnetization prepared rapid acquisition gradient echo (MPRAGE) with a slice thickness of 1.3 mm and TI of 800, 900, 1000, and 1100 ms. Hippocampal volumes were measured using FreeSurfer, IBASPM and manual tracing. Statistical differences were examined using correlation analyses accounting for spatial interpretations percent volume overlap and percent volume difference. Results: FreeSurfer revealed a maximum percent volume overlap and maximum percent volume difference at TI = 800 ms ($77.1{\pm}2.9%$) and TI = 1100 ms ($13.1{\pm}2.1%$), respectively. The respective values for IBASPM were TI = 1100 ms ($55.3{\pm}9.1%$) and TI = 800 ms ($43.1{\pm}10.7%$). FreeSurfer presented a higher correlation than IBASPM but it was not statistically significant. Conclusion: FreeSurfer performed better in volumetric determination than IBASPM. Given the subjective nature of manual tracing, automated image acquisition and analysis image is accurate and preferable.

노화에 따른 발화 시 입술움직임의 변화: 이중모음을 중심으로 (Change in lip movement during speech by aging: Based on a double vowel)

  • 박희준
    • 말소리와 음성과학
    • /
    • 제13권1호
    • /
    • pp.73-79
    • /
    • 2021
  • 본 연구에서는 노화에 따른 발화 시 입술 움직임의 변화를 알아보고자 하였다. 연구대상으로 평균 69세의 노인 여성 15명과 평균 22세의 젊은 여성 15명을 선정하였다. 입술 움직임을 측정하기 위해 이중모음 발화시 입술 움직임을 녹화하여 스틸 이미지로 저장한 다음 입술의 움직임이 최소인 부분과 최대한 길이를 영상분석 소프트웨어를 이용하여 pixel 단위로 수작업으로 분석하여 비교하였다. 임상적 활용성을 위해 자동화 알고리즘을 적용하여 소프트웨어를 제작했으며 수작업의 결과와 비교하였다. 연구결과 노년층의 경우 청년층에 비해 이중모음 과제에서 입술의 가로 및 세로의 길이 범위가 작은 것을 알 수 있었다. 수작업과 자동화 방법의 상관관계를 측정한 결과 강한 정적 상관관계가 나타나 두 방법 모두 입술 윤곽 추출 시 유용함을 알 수 있었다. 이상의 결과를 바탕으로 노화가 진행됨에 따라 발화 시 입술의 범위가 작아지는 것을 알 수 있었다. 따라서 노화가 진행되기 전 간단하게 입술의 움직임을 측정하여 본인의 상태를 모니터링하고 입술 범위를 유지할 수 있는 운동을 실시한다면 노화로 인한 발음 문제를 예방할 수 있을 것이다.

MuGenFBD: 기능 블록 다이어그램 프로그램에 대한 자동 뮤턴트 생성기 (MuGenFBD: Automated Mutant Generator for Function Block Diagram Programs)

  • ;지은경;배두환
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제10권4호
    • /
    • pp.115-124
    • /
    • 2021
  • 기능 블록 다이어그램(Function Block Diagram, FBD) 프로그램이 안전 필수 시스템 구현에 널리 사용되면서 FBD 프로그램에 대한 효과적인 테스트가 중요해졌다. 뮤테이션 테스팅은 오류 기반 테스팅 기술로, 오류 탐지에 매우 효과적이지만 비용이 많이 든다. 본 연구에서는 FBD 프로그램 테스터를 지원하기 위한, FBD 프로그램 대상 자동 뮤턴트 생성기를 제안한다. MuGenFBD 도구는 뮤턴트 생성 비용과 동등 뮤턴트 문제를 고려하여 설계되었다. MuGenFBD 도구의 성능을 평가하기 위해 실제 산업 사례에 대한 실험을 수행한 결과, MuGenFBD를 활용하여 뮤턴트 생성 시 동등 뮤턴트를 생성할 비율이 낮으며 적은 비용으로 FBD 프로그램 대상 뮤턴트를 효과적으로 자동 생성할 수 있음을 확인하였다. 제안하는 도구는 FBD 프로그램에 대한 뮤테이션 분석 및 뮤테이션 충분성 기준을 만족시키는 테스트 생성을 효과적으로 지원할 수 있다.

소프트웨어 취약성 평가를 위한 길이기반 파일 퍼징 테스트 슈트 축약 알고리즘 (A Length-based File Fuzzing Test Suite Reduction Algorithm for Evaluation of Software Vulnerability)

  • 이재서;김종명;김수용;윤영태;김용민;노봉남
    • 정보보호학회논문지
    • /
    • 제23권2호
    • /
    • pp.231-242
    • /
    • 2013
  • 최근 소프트웨어의 취약점을 찾기 위해 퍼징과 같은 자동화된 테스팅 방법을 이용한 많은 연구가 진행되고 있다. 퍼징은 소프트웨어의 입력을 특정 규칙에 따라 자동으로 변형시켜 소프트웨어의 오작동 여부를 탐지하고 그 결과로부터 취약점을 발견하는 것이다. 이 때 소프트웨어에 입력되는 입력 값, 즉 테스트 케이스에 따라 취약점을 발견할 수 있는 확률이 달라지기 때문에 취약점 발견 확률을 높이기 위해서는 테스트 케이스의 집합인 테스트 슈트 축약 문제를 해결하여야 한다. 이에 본 논문에서는 파일과 같은 대용량 테스트 케이스를 대상으로 효과적으로 테스트 슈트 축약 문제를 해결할 수 있는 방법을 제안하고자 한다. 이를 위해 기존 연구에서 주로 사용되었던 커버리지와 중복도 이외에 새로운 척도인 테스트 케이스의 길이를 제시하고, 본 척도에 적합한 축약 알고리즘을 설계하였다. 실험을 통해 본 논문에서 제안한 알고리즘이 기존 연구의 알고리즘보다 높은 크기와 길이 축약율을 나타냄을 보임으로써 제안하는 알고리즘의 효율성을 증명할 수 있었다.

Crowdsourcing Software Development: Task Assignment Using PDDL Artificial Intelligence Planning

  • Tunio, Muhammad Zahid;Luo, Haiyong;Wang, Cong;Zhao, Fang;Shao, Wenhua;Pathan, Zulfiqar Hussain
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.129-139
    • /
    • 2018
  • The crowdsourcing software development (CSD) is growing rapidly in the open call format in a competitive environment. In CSD, tasks are posted on a web-based CSD platform for CSD workers to compete for the task and win rewards. Task searching and assigning are very important aspects of the CSD environment because tasks posted on different platforms are in hundreds. To search and evaluate a thousand submissions on the platform are very difficult and time-consuming process for both the developer and platform. However, there are many other problems that are affecting CSD quality and reliability of CSD workers to assign the task which include the required knowledge, large participation, time complexity and incentive motivations. In order to attract the right person for the right task, the execution of action plans will help the CSD platform as well the CSD worker for the best matching with their tasks. This study formalized the task assignment method by utilizing different situations in a CSD competition-based environment in artificial intelligence (AI) planning. The results from this study suggested that assigning the task has many challenges whenever there are undefined conditions, especially in a competitive environment. Our main focus is to evaluate the AI automated planning to provide the best possible solution to matching the CSD worker with their personality type.

Wing weight estimation considering constraints of structural strength and stiffness in aircraft conceptual design

  • Bai, Chen;Mingqiang, Luo;Zhong, Shen;Zhe, Wu;Yiming, Man;Lei, Fang
    • International Journal of Aeronautical and Space Sciences
    • /
    • 제15권4호
    • /
    • pp.383-395
    • /
    • 2014
  • According to the requirement of wing weight estimation and frequent adjustments during aircraft conceptual design, a wing weight estimation method considering the constraints of structural strength and stiffness is proposed to help designers make wing weight estimations rapidly and accurately. This method implements weight predictions on the basis of structure weight optimization with stiffness constraints and strength constraints, which include achievement of wing shape parametric modeling, rapid structure layout, finite element (FE) model automated generation, load calculation, structure analysis, weight optimization, and weight computed based on modeling. A software tool is developed with this wing weight estimation method. This software can realize the whole process of wing weight estimation with the method and the workload of wing weight estimation is reduced because much of the work can be completed by the software. Finally, an example is given to illustrate that this weight estimation method is effective.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • 인터넷정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

초음속항공기 보조연료탱크 연료량측정시스템 개발용 모사시험장치 개발 (Development of Test Simulator for Developing Fuel Quantity Measurement System for Supersonic Jet Trainer Conformal Fuel Tank)

  • 김봉균;박대진;전현우;이상철
    • 한국항공운항학회지
    • /
    • 제26권2호
    • /
    • pp.76-82
    • /
    • 2018
  • A test simulator is needed to develop a fuel quantity measurement system that takes into account the roll and pitch motion of the aircraft. In this paper, we develop a test simulator that consists of attitude simulation equipment, fueling equipment, and data storage equipment. The attitude simulation equipment simulates the aircraft attitude. It is manufactured to operate pitch angle and roll angle movement. The fueling equipment supplies fuel to the supplementary fuel tank. The data storage equipment collects and stores the measured data. We also develop an automation software that operates the test simulator and collects data automatically. The test simulator has been automated to prevent testers from being exposed to toxic fuel. Through automation software, the collection period is reduced by one quarter compared to manual collection. The developed fuel quantity measurement system is verified through the test simulator.

가변 윈도우 기법을 적용한 통계적 공정 제어와 퍼지추론 기법을 이용한 소프트웨어 성능 변화의 빅 데이터 분석 (Big Data Analysis of Software Performance Trend using SPC with Flexible Moving Window and Fuzzy Theory)

  • 이동헌;박종진
    • 제어로봇시스템학회논문지
    • /
    • 제18권11호
    • /
    • pp.997-1004
    • /
    • 2012
  • In enterprise software projects, performance issues have become more critical during recent decades. While developing software products, many performance tests are executed in the earlier development phase against the newly added code pieces to detect possible performance regressions. In our previous research, we introduced the framework to enable automated performance anomaly detection and reduce the analysis overhead for identifying the root causes, and showed Statistical Process Control (SPC) can be successfully applied to anomaly detection. In this paper, we explain the special performance trend in which the existing anomaly detection system can hardly detect the noticeable performance change especially when a performance regression is introduced and recovered again a while later. Within the fixed number of sampling period, the fluctuation gets aggravated and the lower and upper control limit get relaxed so that sometimes the existing system hardly detect the noticeable performance change. To resolve the issue, we apply dynamically tuned sampling window size based on the performance trend, and Fuzzy theory to find an appropriate size of the moving window.

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권1호
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.