• Title/Summary/Keyword: Code coverage

Search Result 104, Processing Time 0.031 seconds

Study on Coverage Analysis using Interference Cancellation in WCDMA System (WCDMA시스템에서 간섭제거기를 적용한 통화권 분석에 관한 연구)

  • 박태준;박재원;박용완
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.7
    • /
    • pp.693-701
    • /
    • 2002
  • In this paper, we analyze the coverage of asynchronous IMT(International Mobile Telecommunication)-2000 reverse link with a MUD(Multi-User Detector) system. The MUD system is utilized to increase the coverage of reverse link. Also we have considered a propagation loss model and an interference effect. Because it is very difficult that we have calculated the interference accurately, so a fractional cell loading factor(F) is used in this paper. We make use of a MUD efficiency($\beta$) to analyze the performance; this efficiency is presented the MAI of reduction. A simulation utilizes Hata's model, we calculated the coverage according to voice and data services. In this paper, we have assumed that the frequency of carrier has 800 MHz or 1.9 GHz, and a bandwidth is decided 3.84 MHz. We have predicted the performance of actual system by the analysis of capacity and coverage.

Graph based Binary Code Execution Path Exploration Platform for Dynamic Symbolic Execution (동적 기호 실행을 이용한 그래프 기반 바이너리 코드 실행 경로 탐색 플랫폼)

  • Kang, Byeongho;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.437-444
    • /
    • 2014
  • In this paper, we introduce a Graph based Binary Code Execution Path Exploration Platform. In the graph, a node is defined as a conditional branch instruction, and an edge is defined as the other instructions. We implemented prototype of the proposed method and works well on real binary code. Experimental results show proposed method correctly explores execution path of target binary code. We expect our method can help Software Assurance, Secure Programming, and Malware Analysis more correct and efficient.

Automated Building Fuzzing Environment Using Test Framework (테스트 프레임워크를 활용한 라이브러리 퍼징 환경 구축 자동화)

  • Ryu, Minsoo;Kim, Dong Young;Jeon Sanghoonn;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.587-604
    • /
    • 2021
  • Because the library cannot be run independently and used by many applications, it is important to detect vulnerabilities in the library. Fuzzing, which is a dynamic analysis, is used to discover vulnerabilities for the library. Although this fuzzing technique shows excellent results in terms of code coverage and unique crash counts, it is difficult to apply its effects to library fuzzing. In particular, a fuzzing executable and a seed corpus are needed that execute the library code by calling a specific function sequence and passing the input of the fuzzer to reproduce the various states of the library. Generating the fuzzing environment such as fuzzing executable and a seed corpus is challenging because it requires both understanding about the library and fuzzing knowledge. We propose a novel method to improve the ease of library fuzzing and enhance code coverage and crash detection performance by using a test framework. The systems's performance in this paper was applied to nine open-source libraries and was verified through comparison with previous studies.

About the Location of Base Stations for a UMTS System: Analytical Study and Simulations

  • Zola Enrica;Barcelo Francisco
    • Journal of Communications and Networks
    • /
    • v.8 no.1
    • /
    • pp.49-58
    • /
    • 2006
  • One of the first decisions that a radio network designer must take is the location of base stations and the distance between them in order to give the best coverage to a region and, possibly, to reduce deployment costs. In this paper, the authors give an insight to this matter by presenting a possible solution to a real problem: Planning the base stations layout for a universal mobile telecommunications system (UMTS) in the city of Barcelona. At the basis of this problem, there is the interdependence between coverage and capacity in a wideband-code division multiple access (W-CDMA) system, which is a new element in the planning of BS layout for mobile communications. This aspect has been first treated with an analytical study of the cell coverage range for a specific environment and service. The achieved results have been checked with the help of snapshot simulations together with a geographical information system (GIS) tool incorporated in the simulator that allows to perform analysis and to visualize results in a useful way. By using the simulator, it is also possible to study a more complex environment, that of a set of base stations providing multiple services to a large number of users.

SVC Video Transmission Method Improving Multicast Broadcast Single Frequency Networks Service Coverage (Multicast Broadcast Single Frequency Networks 서비스 영역 개선을 위한 SVC 비디오 전송방법)

  • Cho, Yong-Woo;Lee, Yong-Hun;Suh, Doug-Young;Cho, Jai-Hyung
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.845-850
    • /
    • 2010
  • In this paper, a method for transmitting layered SVC streams in differentiated MBSFN channels is presented. Scalable coded video streams are transmitted in modulation channels of different efficiency that it achieves reduced resource consumption compared to non-scalable AVC stream. When utilizing with Raptor FEC, the combined effect is enhanced service coverage with providing minimum video quality at the edge of the service area, than the case of AVC.

Using Finite Element Analysis for Mechanical Properties of Coronary Stents (유한요소법을 이용한 스텐트의 기계적 성능 비교 및 평가)

  • 조승관;김한성;이상헌;탁계래;탁승제
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1306-1309
    • /
    • 2003
  • In the present paper, finite element analyses were carried out to evaluate the most important feature of a stent, that is. high radial strength and flexibility. Palmaz-Schatz 154 stent and two new models(stent A, stent B) were selected because they are the most representatives of tubular stents. Finite element analyses for the stent system were performed using ABAQUS/Explicit code. As a result, Palmaz-Schatz 154 stent shows sufficient radial strength but it needs some improvement in general properties such as high flexibility, low elastic recoil, low longitudinal contraction and low metal coverage area. Other two models show that sufficient flexibility, foreshortening and longitudinal recoil.

  • PDF

The introductory study for MIMO techniques over satellite systems

  • Kang, Yeon-Su;Kang, Kun-Suk;Ahn, Do-Seob
    • Journal of Satellite, Information and Communications
    • /
    • v.2 no.2
    • /
    • pp.80-84
    • /
    • 2007
  • In this paper, the introductory study of the multi input multi output (MIMO) techniques for satellite communication systems is presented. Because of the advantage of wide coverage of satellite, it has been considered for broadcasting services and fill-in services. On the other hand, state of the art multi input multi output (MIMO) techniques such as space time code (STC) and spatial multiplexing (SM) makes the terrestrial system increase link performance and their coverage, and also increase the link throughput. For these regard, in order to satisfy the requirements of the next generation communications and coexists with terrestrial systems harmoniously, the studying about satellite MIMO techniques is necessary. In this paper, we introduce some system model and scenarios to apply MIMO technique to intermediate module repeater (IMR). The possibility of these techniques and technical requirements are also considered. Especially, Space time code is used to enhance IMRs coverage and increase the link performance, and space time multiplexing is utilized to multiplex satellite broadcasting signals with local broadcasting signal in IMR cell.

  • PDF

Dynamic Analysis based on AOP for Checking Security Vulnerability (보안 취약점 검사를 위한 AOP 기반의 동적 분석)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.773-778
    • /
    • 2010
  • OWASP announced most of vulnerabilities result from the data injection by user in 2010 after 2007. Because the contaminated input data is determined at runtime, those data should be checked dynamically. To analyze data and its flow at runtime, dynamic analysis method usually inserts instrument into source code. Intermediate code insertion makes it difficult to manage and extend the code so that the instrument code would be spreaded out according to increase of analysis coverage and volume of code under analysis. In addition, the coupling gets strong between instrument modules and target modules. Therefore developers will struggle against modify or extend the analysis code as instrument. To solve these problem, this paper defines vulnerabilities as a concern using AOP, and suggest the flexible and extensible analysis method to insertion and deletion without increase of coupling.

A Review of the Medical Nutrition Therapy (MNT) of the U.S. Medicare System (미국 임상영양치료(MNT)의 법제화 과정 및 수가 체계)

  • 박은철;김현아;이해영;이영은;양일선
    • Korean Journal of Community Nutrition
    • /
    • v.7 no.6
    • /
    • pp.852-862
    • /
    • 2002
  • The purposes of this study were 1) to review the Medical Nutrition Therapy (MNT) Act of the United States, 2) to introduce the efforts of the American Dietetic Association (ADA) to expand the Medicare coverage for MNT and 3) to provide information about the reimbursement under Medicare Part B for the cost of MNT. The MNT Act defined MNT services as “the nutritional diagnostic, therapeutic, and counseling services provided by a Registered Dietitian or nutritional professional for the purpose of managing diabetes or renal diseases”. Also, the MNT Act defined “conditions for coverage of MNT”, “limitations on coverage of MNT”, and “qualifications of MNT service provider”. To expand the coverage of Medicare to include MNT, the ADA realized the need for development of a protocol for MNT, as well as studies to evaluate the effectiveness and cost-effectiveness of the MNT protocol developed. Therefore, the ADA supported the studies to develop a strong database of scientific investigations of nutritional services. Furthermore, the ADA needed credible data that could be used by Policy makers, so the ADA contracted with the Lewin Group to if out the study to gather the additional data needed to strengthen the ADA's position. In the report of the Lewin Group, which was entitled, “The Cost of Covering Medical Nutrition Therapy under Medicare : 1998 through 2004”, it was concluded, that if coverage for MNT in the Part B portion of Medicare had begun in 1998, by 2004, approximately $ 2.3 billion would have been saved through reduced hospital spending under Part A of Medicare ($ 1.2 billion) and reduced physician visits under Part B ($ 1.1 billion) Effective January 1 2002, the US Congress extended Medicare coverage to include MNT to beneficiaries with diabetes or renal diseases. The Centers for Medicare and Medicaid Services (CMS) established the duration and frequency for the MNT based on published reports or generally accepted protocols (for example, protocols suggested by the ADA). The number of hours covered by Medicare is 3 hours for the initial MNT and 2 hours for a follow-up MM. In 2002, a Medicare coverage policy was made to define the Physician's Current Procedural Terminology (CPT) codes 97802, 97803, and 97804 for MNT.

Testbench Implementation for FPGA based Nuclear Safety Class System using OVM

  • Heo, Hyung-Suk;Oh, Seungrohk;Kim, Kyuchull
    • Journal of IKEEE
    • /
    • v.18 no.4
    • /
    • pp.566-571
    • /
    • 2014
  • A safety class field programmable gate array based system in nuclear power plant has been developed to improve the diversity. Testbench is necessary to satisfy the technical reference, IEC-62566, for verification and validation of register transfer level code. We use the open verification methodology(OVM) developed by standard body. We show that our testbench can use random input for test. And also we show that reusability of block level testbench for the integration level testbench, which is very efficient for large scale system like nuclear reactor protection system.