• Title/Summary/Keyword: Code coverage

Search Result 104, Processing Time 0.035 seconds

Development of Multi-Type Soft X-ray Ionizer using Radiation Dose Overlapped Effect (선량 중첩을 이용한 멀티형 연 X-선 정전기 제거장치의 개발)

  • Lee, Su Hwan;Lee, Dong Hoon
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.2
    • /
    • pp.28-31
    • /
    • 2018
  • In display and semi-conductor manufacturing process, there are numerous unstable factors such as particle concentration, minimal vibration, changes in magnetic field, or electrostatic that becomes an issue to be managed and controlled. In the recent, X-ray ionization is widely used that is neutralized by separating air or gas molecules in the area where the static must be resolved. The mono-type of X-ray ionizer was not capable to be used in $8^{th}$ generation panels manufacturing plant due to its insufficient ionizing coverage since the panel itself is approximately in $2m{\times}3m$. To resolve the current problem, the development of new type called, "Multi-type X-ray ionizer" has resulted in covering enough ionizing space in $8^{th}$ generation panels industry. Comparing mono and multi types with MCNPX code simulation, the multi one indicates more X-ray flux, efficiency, and ionization performance in comparison with either a mono-type or multi-type in array format. In addition, the ionizing efficiency of overlapping area with multi-type showed 30% higher effectiveness rate as to the ordinary mono-type.

Reduction of Test Data and Power in Scan Testing for Digital Circuits using the Code-based Technique (코드 기반 기법을 이용한 디지털 회로의 스캔 테스트 데이터와 전력단축)

  • Hur, Yong-Min;Shin, Jae-Heung
    • 전자공학회논문지 IE
    • /
    • v.45 no.3
    • /
    • pp.5-12
    • /
    • 2008
  • We propose efficient scan testing method capable of reducing the test data and power dissipation for digital logic circuits. The proposed testing method is based on a hybrid run-length encoding which reduces test data storage on the tester. We also introduce modified Bus-invert coding method and scan cell design in scan cell reordering, thus providing increased power saving in scan in operation. Experimental results for ISCAS'89 benchmark circuits show that average power of 96.7% and peak power of 84% are reduced on the average without fault coverage degrading. We have obtained a high reduction of 78.2% on the test data compared the existing compression methods.

MAC Protocol based on Spreading Code Status-Sensing Scheme for Integrated Voice/Data Services (확산코드 상태 감지 기법에 의한 통합 음성/데이터 서비스 MAC 프로토콜)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.916-922
    • /
    • 2001
  • A medium access control protocol is proposed for integrated voice and data services in the packet CDMA network with a small coverage. Uplink channels are composed of time slots and multiple spreading codes for each slot. This protocol gives higher access priority to the delay-sensitive voice traffic than to the data traffic. During a talkspurt, voice terminals reserve a spreading code to transmit multiple voice packets. On the other hand, whenever generating a data packet, data terminals transmit a packet based on the status Information of spreading codes in the current slot, which is received from base station. In this protocol, voice packet does not come into collision with data packet. Therefore, this protocol can increase the maximum number of voice terminals.

  • PDF

A cooperative virtual MIMO system for moving networks (이동 네트워크를 위한 협력 가상 MIMO 시스템)

  • Kim, Jung-Hyun;Kim, Il-Hwan;You, Cheol-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.127-132
    • /
    • 2011
  • In this paper, we propose a cooperative communication scheme for high transmission efficiency and coverage extension under multipath fading environment of moving networks. The proposed scheme uses a Space-Time Block Code (STBC) for improvement of receiving performance by using virtual Multiple-Input Multiple-Output(MIMO) transmit diversity. It can also achieve faster transmission time than a conventional scheme by using virtual MIMO configurations. Simulation results have shown that the proposed scheme provides SNR improvement and has faster transmission time compared to the conventional scheme, since it can utilize the good properties of spatial diversity and coding gain by using virtual MIMO configuration. In this paper, we propose simulations of UWB communication system to show validity by using the MATLAB.

Computing Method for The Number of The Interaction Strength Based on Software Whitebox Testing (소프트웨어 화이트박스 테스트의 교호 강도 수 기반 테스트 방법)

  • Choi, Hyeong-Seob;Park, Hong-Seong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.29-36
    • /
    • 2009
  • Cost and Time for software test is gradually increasing as the software complexity increases. To cope with this problem, it is very important to reduce the number of test cases used in the software test. The interaction strength number is especially important in decision of the number of test cases for the unit test, where the interaction strength number means the number of arguments which affect the results of a function by the analysis of their combination used in source code of the function. This paper proposes the algorithm that computes the number of the interaction strength, where analyzes the patterns used in the source code of a function and increase its number when the pattern matches one of the specified patterns. The proposed algorithm is validated by some experiments finding coverage and the number of fault detection.

Study on Error Correction Method for Advanced Terrestrial DMB (고품질 지상파 DMB를 위한 오류정정방식 연구)

  • Choi, Gyoo-Seok;Jeon, Byung-Chan;Park, In-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.69-75
    • /
    • 2010
  • Advanced T-DMB(Terrestial DMB )system which is a new portable mobile broadcasting system has been developed to increase data rate up to double of conventional T-DMB in same bandwidth while maintaining backward compatibility, using hierarchical modulation method. The Advanced T-DMB system realize high qualification of conventional T-DMB system by adding BPSK signal or QPSK signal as enhanced layer to existing DQPSK signal. The enhanced layer signal should be small enough to maintain backward compatibility and to minimize the coverage loss of existing T-DMB service area. But this causes the enhanced layer signal of Advanced T-DMB susceptible to fading effect in transmission channel. In this paper we applied the duo-binary turbo code which has powerful error correction capability to the enhanced layer signal for compensating channel distortion. And the computer simulation results about the performance of the duo-binary turbo code in Advanced T-DMB system are presented along with analysis comments.

Formal Description and Reference Implementation Code Generation for a Security Algorithm using VDM-SL (VDM-SL을 이용한 보안 알고리즘의 형식적 표현과 참조구현 코드 생성)

  • Kim, Young-Gil;Kim, Ki-Su;Kim, Young-Wha;Ryou, Jae-Cheol;Jang, Chung-Ryong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.67-84
    • /
    • 1996
  • VDL-SL (Vienna Development Method-Specification Language) is one of the FSL(Formal Specification Language) which is being presented for the correct description of the security relevant standards. Several tools are being developed for the correctness and the convenience in the description and executable code generation of security relevant standards using VDM-SL. The IFAD VDM-SL Toolbox is one that has many functions : syntax checking, type checking, c++ code generation, test coverage information. This paper describes a formal method for description and implementation of MD4 algorithm using VDM-SL and IFAD VDM-SL Toolbox, and examines the result applied to secure hash algorithm, and proposes the relation to strict conformance test which recently suggested as a security test method.

A Out-of-Bounds Read Vulnerability Detection Method Based on Binary Static Analysis (바이너리 정적 분석 기반 Out-of-Bounds Read 취약점 유형 탐지 연구)

  • Yoo, Dong-Min;Jin, Wen-Hui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.687-699
    • /
    • 2021
  • When a vulnerability occurs in a program, it is documented and published through CVE. However, some vulnerabilities do not disclose the details of the vulnerability and in many cases the source code is not published. In the absence of such information, in order to find a vulnerability, you must find the vulnerability at the binary level. This paper aims to find out-of-bounds read vulnerability that occur very frequently among vulnerability. In this paper, we design a memory area using memory access information appearing in binary code. Out-of-bounds Read vulnerability is detected through the designed memory structure. The proposed tool showed better in code coverage and detection efficiency than the existing tools.

A Study on the Automatic Generation of Test Case Based on Source Code for Quality Improvement (소프트웨어 품질향상을 위한 소스코드 기반의 테스트 케이스 자동 생성에 관한 연구)

  • Son, Ung-Jin;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.186-192
    • /
    • 2015
  • This paper proposes an automatic generation technology of test case based on API in source code for software's quality improvement. The proposed technology is comprised of four processes which are analyzing source code by using the Doxygen open source tool, defining API specification by using analyzed results, creating test design, generating a test case by adapting Pairwise test technology. Analyzing source code by using the Doxygen open source tool is the phase in which API information in source code such as the API name, input parameter and return parameter are extracted. Defined API specification by using analyzed results is the phase where API informations, which is needed to generate test case, are defined as a form of database by SQLite database on the basis of extracted API information. Creating test design is the phase in which the scenario is designed in order to be composed as database by defining threshold of input and return parameters and setting limitations based on the defined API. Generating a test case by adapting Pairwise test technique is the phase where real test cases are created and changed into database by adapting Pairwise technique on the base of test design information. To evaluate the efficiency of proposed technology, the research was conducted by begin compared to specification based test case creation. The result shows wider test coverage which means the more cases were created in the similar duration of time. The reduction of manpower and time for developing products is expected by changing the process of quality improving in software developing from man-powered handwork system into automatic test case generation based on API of source code.

A lightweight detection mechanism of control flow modification for IoT devices (IoT 기기를 위한 경량의 소프트웨어 제어 변조 탐지 기법)

  • Pak, Dohyun;Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1449-1453
    • /
    • 2015
  • Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.