• Title/Summary/Keyword: Code Checking system

Search Result 71, Processing Time 0.032 seconds

A Study on Enhanced Self-Checking Characteristics in Redundant Communication System (여분을 갖는 통신시스템에서의 자기검사특성 향상에 관한 연구)

  • 신덕호;김현기;이재훈;이창훈;이기서
    • Proceedings of the KSR Conference
    • /
    • 2000.05a
    • /
    • pp.352-359
    • /
    • 2000
  • In this paper, the method is used that each system isolates the part in which faults are occurred in case of fault occurrence since total system is designed in the type of hot standby sparing system construction and self-checking circuit in each system is attached to the memory being of the high failure rate in common communication system. Thus reliability and availability in system are improved. In this thesis, self-checking circuit was designed using 2 out of 6 code and didn't have any effect to the system operation. For the purpose of verification, each system attached with self-checking circuit was simulated through fault injection arid the continuity of each system in hot standby sparing system was tested in case that the system was switched when faults in the system were occurred.

  • PDF

A Study on Routing of In-Core Instrumentation Guide Tubes from Reactor (원자로 노내 계측기안내관 배열에 관한 연구)

  • 조덕상;손용수
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1993.04a
    • /
    • pp.159-164
    • /
    • 1993
  • This paper presents a computer design program for In-Core Instrumentation(ICI) guide tube routing and locations on support system, and checking the interference between ICI guide tubes in the reactor coolant system of typical Pressurized Water Reactor. The program, ICITRIC, has been written in FORTRAN language which is available under UNIX environment. Results of this program are compared with those of the commercial code, PATRAN, and both results are almost same Also the results may provide input data for ICI system static and dynamic analysis performed by the commercial code, SUPER PIPE. This program can simulate ICI guide tube routing and locations on support system, and checking the interference between ICI guide tubes. Through a process of iteration, the designer can apply initial conditions, and modify the routing until satisfied with the overall system performance.

  • PDF

A Function Network Analyzer for Efficient Analysis of Automotive Operating System

  • Yu, Lu Zheng;Choi, Yunja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.972-975
    • /
    • 2013
  • This work developed a code analysis & extraction tool named Function Network Analyzer (FNA) to reduce the cost of software safety analysis. FNA analyzes functions and variables which a given function depends on, and extracts subset of code that can be compiled of automotive operating system, final resulting a well-ordered code sequence that can be compiled for model checking technique. And the experimental result illustrates that FNA can get 100% accurate rate and over 96% reduction rate by testing API functions from trampoline system.

Automated Scenario Generation for Model Checking Trampoline Operating System

  • Chowdhury, Nahida Sultana;Choi, Yunja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1342-1345
    • /
    • 2011
  • A valid scenario generation is essential for model checking software. This paper suggests an automated scenario generation technique through the analysis of function called-by graphs and call graphs of the program source code. We provide the verification process including the scenario generation and show application results on the Trampoline operating system using CBMC as a back-end model checker.

Code-Reuse Attack Detection Using Kullback-Leibler Divergence in IoT

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.54-56
    • /
    • 2016
  • Code-reuse attacks are very dangerous in various systems. This is because they do not inject malicious codes into target systems, but reuse the instruction sequences in executable files or libraries of target systems. Moreover, code-reuse attacks could be more harmful to IoT systems in the sense that it may not be easy to devise efficient and effective mechanism for code-reuse attack detection in resource-restricted IoT devices. In this paper, we propose a detection scheme with using Kullback-Leibler (KL) divergence to combat against code-reuse attacks in IoT. Specifically, we detect code-reuse attacks by calculating KL divergence between the probability distributions of the packets that generate from IoT devices and contain code region addresses in memory system and the probability distributions of the packets that come to IoT devices and contain code region addresses in memory system, checking if the computed KL divergence is abnormal.

A study on the Development of BIM-based Quality Pre-checking System in Architecture Design Phase

  • Shin, Jihye;Choi, Jungsik;Kim, Inhan
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.284-288
    • /
    • 2015
  • Recently, the mandate on utilizing BIM implemented by public institutions of many countries has great impact on the significantly increasing practices of BIM. The improvement of work efficiency and productivity, which is occurred by BIM adoption, depends on the consistency and accuracy of data. To maximize the benefit of BIM, the interests in BIM data quality have been enlarging all over the world. The BIM data quality pre-check, which is conducted by designer in the design phase, offers opportunities for quality improvement by continuously assessing BIM data. However, BIM quality pre-check is being conducted under arbitrary interpretation of users because of the absence of specific review factors and assessment methods for checking BIM quality. The purpose of this study is to establish an automated BIM quality pre-checking system to improve BIM design quality effectively and efficiently. It could be expected to meet the owner's requirements and to minimize the cost and time occurred additionally from revising and reproducing data by constructing consistency and accuracy of it.

  • PDF

Design and Implementation of code generator to remove the parameter boundary failure in the unit test (단위테스트 중 매개변수 경계오류제거를 위한 코드 자동생성 시스템 설계와 구현)

  • Park, Youngjo;Bang, Hyeja
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.1-10
    • /
    • 2015
  • As programs get more complicated and they are developed by various hands, the possibility that there are program bugs in the code has been increasing. And developers usually run unit tests to find these problems in the code. Besides, the developers are at the pain of getting stability of the code when they have to modify a code very often for clients requirements. In the methodlogy of TDD(Test Driven Development), developers write a unit test code first, and then write a program code for passing the unit test. The unit test must include the boundary condition test the reason why the possibility of occurring the bugs is very high. When failed to pass the test because of the value of a function is incorrect, not existed, out of the range or not matched etc, the program code will return the error code or occur the exception. In the document, the system is designed and implemented in order to insert the generated code automatically or suggest it to the developer, when the boundary condition test is failed. In conclusion, it is possible that the developer will get the code stability by searching the code and checking the code to be omitted automatically through this system.

Comparison of Path Exploration and Model Checking Techniques for Checking Automotive API Call Safety (차량전장용 소프트웨어의 API 제약사항 위배여부 탐지를 위한 실행경로 탐색방법과 모델검증 방법의 비교)

  • Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.12
    • /
    • pp.615-622
    • /
    • 2016
  • Automotive control software can be a source of critical safety issues when developers do not comply system constraints. However, a violation is difficult to identify in complicated source code if not supported by an automated verification tool. This paper introduces two possible approaches that check whether an automotive control software complies API call constraints to compare their performance and effectiveness. One method statically analyzes the source code and explores all possible execution paths, and the other utilizes a model checker to monitor constraint violations for a given set of constraint automata. We have implemented both approaches and performed a series of experiments showing that the approach with model-checking finds constraint violations more accurately and scales better.

Code Generation for Integrity Constraint Check in Objectivity/C++ (Objectivity/C++에서 무결성 제약조건 확인을 위한 코드 생성)

  • Kim, In-Tae;Kim, Gi-Chang;Yu, Sang-Bong;Cha, Sang-Gyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.416-425
    • /
    • 1999
  • 복잡한 무결성 제약 조건을 효율적으로 확인하기 위해 제약 조건들을 룰 베이스(rule base)에 저장하고 별도의 룰 관리 시스템과 제약 조건 관리 시스템을 통해 제약 조건을 확인하는 기법이 많은 연구자들에 의해 연구되고 발표되었다. 그러나 제약 조건 관리 시스템이 실행시간에 응용 프로그램을 항상 모니터링하고 있다가 데이타의 수정이 요청될 때마다 개입하여 프로세스를 중단시키고 관련 제약 조건을 확인하는 기존의 방법들은 처리 시간의 지연을 피할 수 없다. 본 논문은 컴파일 시간에 제약 조건 확인 코드를 응용 프로그램에 미리 삽입할 것을 제안한다. 응용 프로그램 자체 내에 제약 조건 확인 코드가 삽입되기 때문에 실행 시간에 다른 시스템의 제어를 받지 않고 직접 제약 조건의 확인 및 데이타베이스의 접근이 가능해져서 처리 시간의 지연을 피할 수 있을 것이다. 이를 위해 어떤 구문이 제약 조건의 확인을 유발하는 지를 추적하였고, 컴파일러가 그러한 구문을 어떻게 전처리 과정에서 검색하는지 그리고 그러한 구문마다 어떻게 해당 제약 조건 확인 코드를 삽입할 수 있는 지를 객체지향1) 데이타베이스 언어인 Objectivity/C++에 대해 gcc의 YACC 코드를 변경함으로써 보여 주었다.Abstract To cope with the complexity of handling integrity constraints, numerous researchers have suggested to use a rule-based system, where integrity constraints are expressed as rules and stored in a rule base. A rule manager and an integrity constraint manager cooperate to check the integrity constraints efficiently. In this approach, however, the integrity constraint manager has to monitor the activity of an application program constantly to catch any database operation. For each database operation, it has to check relevant rules with the help of the rule manager, resulting in considerable delays in database access. We propose to insert the constraints checking code in the application program directly at compile time. With constraints checking code inserted, the application program can check integrity constraints by itself without the intervention of the integrity constraint manager. We investigate what kind of statements require the checking of constraints, show how the compiler can detect those statements, and show how constraints checking code can be inserted into the program, by modifying the GCC YACC file for Objectivity/C++, an object-oriented database programming language.

Establishment of Cosmetic Raw Material Weighing and Bulk Manufacturing Management System Using Bar Code, QR Code and Database (바코드, 큐알코드와 데이터베이스를 활용한 화장품 원료 칭량 및 벌크제조 관리시스템 구축)

  • Lee, Chung-Hee;Bae, Jun-Tae;Hong, Jin-Tae
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.45 no.3
    • /
    • pp.277-285
    • /
    • 2019
  • In this study, effective cosmetic raw material weighing and bulk manufacturing management system were constructed by using bar code or quick response code (QR code) and database. Raw material labels and weighing labels for bulk manufacturing were published in web environment using the information entered in the database using ScriptX, a print component of Medi&Co. By checking the weighing and manufacturing process by using scanner, tablet and PC, it was possible to remarkably improve the product error caused by erroneous amount or misapplication which is the most cause of error in the production of cosmetic bulk. In conclusion, applying a database that utilizes bar code and QR code to cosmetics manufacturing can reduce the various problems in the process, thereby improving quality control and productivity of cosmetics.