• Title/Summary/Keyword: Codes Application

Search Result 503, Processing Time 0.028 seconds

A Method for Testing Web Applications by Using Black-box Tests based on User Screens and Web Interface Test Coverage (사용자 화면 중심의 블랙 박스 테스트와 웹 인터페이스 테스트 커버리지를 통한 웹 어플리케이션 테스트 방법)

  • Lim, Jeung-Hee;Lee, Si-Hyun;Jang, Jin-A;Choi, Byoung-Ju;Hwang, Sang-Cheol
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.706-717
    • /
    • 2009
  • A web application is implemented by reusing the library provided by framework and has hierarchical architecture. Also, to deal with the user request from a screen, the web application has an execution flow, called 'Business Logic', which starts with a screen, executes its composed component and comes back to the screen via database. To test web application effectively, it should reflect the characteristics of web application. In this paper we propose to test web applications via user screens with the black-box testing approach and verify its source codes with the web interface white-box test coverage that covers all the business logics of the test target and their corresponding interfaces. We analyze the proposing testing method through its tool: Testopiacov.

Application of unified equivalent frame method to two-way slab structures with beams

  • Choi, Seung-Ho;Lee, Deuck Hang;Oh, Jae-Yuel;Cho, Hae-Chang;Lee, Jae-Yeon;Kim, Kang Su
    • Computers and Concrete
    • /
    • v.22 no.4
    • /
    • pp.365-372
    • /
    • 2018
  • The current design codes present an equivalent frame method (EFM) for the analysis and design of two-way slab structures. However, since the EFM was developed to be suitable for two-way slab structures subjected to gravity loads only, it brings many problems in its application to the analysis of two-way slabs to which gravity and lateral loads are applied simultaneously. Therefore, authors proposed the unified equivalent frame method (UEFM) that can analyze the structural behavior of flat-plate slab systems subjected to gravity and lateral loads in their previous studies. In this study, the UEFM was modified to be applicable to the two-way slab system with beams. In addition, the accuracy of the proposed UEFM was then examined by comparing it to the lateral behaviors of the two-way slab specimens.

Concurrent flexural strength and deformability design of high-performance concrete beams

  • Ho, J.C.M.;Zhou, K.J.H.
    • Structural Engineering and Mechanics
    • /
    • v.40 no.4
    • /
    • pp.541-562
    • /
    • 2011
  • In the design of earthquake resistant reinforced concrete (RC) structures, both flexural strength and deformability need to be considered. However, in almost all existing RC design codes, the design of flexural strength and deformability of RC beams are separated and independent on each other. Therefore, the pros and cons of using high-performance materials on the flexural performance of RC beams are not revealed. From the theoretical results obtained in a previous study on flexural deformability of RC beams, it is seen that the critical design factors such as degree of reinforcement, concrete/steel yield strength and confining pressure would simultaneously affect the flexural strength and deformability. To study the effects of these factors, the previous theoretical results are presented in various charts plotting flexural strength against deformability. Using these charts, a "concurrent flexural strength and deformability design" that would allow structural engineers to consider simultaneously both strength and deformability requirements is developed. For application in real construction practice where concrete strength is usually prescribed, a simpler method of determining the maximum and minimum limits of degree of reinforcement for a particular pair of strength and deformability demand is proposed. Numerical examples are presented to illustrate the application of both design methods.

The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader (안전한 모바일 RFID 리더를 위한 개방형 임베디드 소프트웨어 플랫폼 구현 방안)

  • Park, Nam-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.785-793
    • /
    • 2010
  • The current excessive limitations to mobile RFID tags and readers make it impossible to apply present codes and protocols. The technology for information and privacy protection should be developed in terms of general interconnection among elements and their characteristics of mobile RFID in order to such technology that meets the RFID circumstances. In this paper, transplanting and extending security library for protecting mobile RFID information in secure mobile RFID terminal S/W platform system to support security application on the path of all data from RFID reader to application server.

A Study on the Implementation of Automation Network for Power Utility using UCA and Fieldbus (UCA와 필드버스를 이용한 전력 설비 자동화 통신망 구축 방안 연구)

  • Choe, In-Ho;Hwang, In-Hwi;Hong, Seung-Ho
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.49 no.6
    • /
    • pp.287-298
    • /
    • 2000
  • The UCA is a standard-based approach to utility communications which provides for wide scale integration of functional areas including customer interface, distribution, transmission, power plant, control center, and corporate information systems. Field devices in the power facilities require real-time communications, and they must be interconnected into fieldbus. This study introduces a method of implementing gateway that interfaces UCA and fieldbus. In this study, PROFIBUS and FOUNDATION Fieldbus are selected as candidate fieldbus protocols. Protocol interface in the gateway can be accomplished by mapping objects and services of UCA and fieldbus. MOst of the UCAs CASM objects and services are directly mapped into those of the application and user layers of fieldbus. However, some CASM services are not supported in the application and user layers of fieldbus. This study presents the method of implementing those services. In order to show that the implementation of interface is possible, this study presents pseudo-codes of interface program that maps the objects and services of UCA and fieldbus.

  • PDF

Stability and minimum bracing for stepped columns with semirigid connections: Classical elastic approach

  • Aristizabal-Ochoa, J. Dario
    • Structural Engineering and Mechanics
    • /
    • v.5 no.4
    • /
    • pp.415-431
    • /
    • 1997
  • Stability equations that evaluate the elastic critical axial load of stepped columns under extreme and intermediate concentrated axial loads in any type of construction with sidesway totally inhibited, partially inhibited and uninhibited are derived in a classical manner. These equations can be utilized in the stability analysis of framed structures (totally braced, partially braced, and unbraced) with stepped columns with rigid, semirigid, and simple connetions. The proposed column classification and the corresponding stability equations overcome the limitations of current methods which are based on a classification of braced and unbraced columns. The proposed stability equations include the effects of: 1) semirigid connections; 2) step variation in the column cross section at the point of application of the intermediate axial load; and 3) lateral and rotational restraints at the intermediate connection and at the column ends. The proposed method consists in determining the eigenvalue of a $2{\times}2$ matrix for a braced column at the two ends and of a $3{\times}3$ matrix for a partially braced or unbraced column. The stability analysis can be carried out directly with the help of a pocket calculator. The proposed method is general and can be extended to multi-stepped columns. Various examples are include to demonstrate the effectiveness of the proposed method and to verify that the calculated results are exact. Definite minimum bracing criteria for single stepped columns is also presented.

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

Design of Highly Skewed Propeller considering the Blade Strength (강도를 고려한 고스큐 프로펠러 날개의 형상 설계)

  • Song, In-Haeng;Nho, In-Sik;Lee, Tae-Goo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.45 no.4
    • /
    • pp.411-416
    • /
    • 2008
  • A strength problem of propeller blades for large container ships at astern condition has been occasionally reported due to the application of a highly skewed propeller which can reduce the hull surface fluctuation forces. A finite element analysis code for propeller blade was developed and utilized since 1985. Recently, however, further fine mesh modeling for finite element analysis is required to yield higher accuracy in the analysis. The present study shows an application of FE analysis code to the highly skewed propeller for large container ships. Results of FE analysis show that the number of FE mesh affects largely on strength, and also the calculated strength with fine mesh gives good agreements to those of other FEM codes. A method to enlarge strength near the trailing edge was introduced considering the strength criterion on the blade.

The Effectiveness of MOOS-IvP based Design of Control System for Unmanned Underwater Vehicles (MOOS-IvP를 이용한 무인잠수정 제어기 개발의 효용성)

  • Kim, Jiyeon;Lee, Dongik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.3
    • /
    • pp.157-163
    • /
    • 2014
  • This paper demonstrates the benefit of using MOOS-IvP in the development of control system for Unmanned Underwater Vehicles(UUV). The demand for autonomy in UUVs has significantly increased due to the complexity in missions to be performed. Furthermore, the increased number of sensors and actuators that are interconnected through a network has introduced a need for a middleware platform for UUVs. In this context, MOOS-IvP, which is an open source software architecture, has been developed by several researchers from MIT, Oxford University, and NUWC. The MOOS software is a communication middleware based on the publish-subscribe architecture allowing each application to communicate through a MOOS database. The IvP Helm, which is one of the MOOS modules, publishes vehicle commands using multi-objective optimization in order to implement autonomous decision making. This paper explores the benefit of MOOS-IvP in the development of control software for UUVs by using a case study with an auto depth control system based on self-organizing fuzzy logic control. The simulation results show that the design and verification of UUV control software based on MOOS-IvP can be carried out quickly and efficiently thanks to the reuse of source codes, modular-based architecture, and the high level of scalability.

Study on Outbound Traffic Monitoring with Bloom Filter (블룸필터를 이용한 아웃바운드 트래픽 모니터링 방안 연구)

  • Kang, Seong-Jung;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.327-334
    • /
    • 2018
  • When a PC is infected with a malicious code, it communicates with the control and command (C&C) server and, by the attacker's instructions, spreads to the internal network and acquires information. The company focuses on preventing attacks from the outside in advance, but malicious codes aiming at APT attacks are infiltrated into the inside somehow. In order to prevent the spread of the damage, it is necessary to perform internal monitoring to detect a PC that is infected with malicious code and attempts to communicate with the C&C server. In this paper, a destination IP monitoring method is proposed in this paper using Bloom filter to quickly and effectively check whether the destination IP of many packets is in the blacklist.