• Title/Summary/Keyword: SW testing

Search Result 68, Processing Time 0.02 seconds

Weighted Finite State Transducer-Based Endpoint Detection Using Probabilistic Decision Logic

  • Chung, Hoon;Lee, Sung Joo;Lee, Yun Keun
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.714-720
    • /
    • 2014
  • In this paper, we propose the use of data-driven probabilistic utterance-level decision logic to improve Weighted Finite State Transducer (WFST)-based endpoint detection. In general, endpoint detection is dealt with using two cascaded decision processes. The first process is frame-level speech/non-speech classification based on statistical hypothesis testing, and the second process is a heuristic-knowledge-based utterance-level speech boundary decision. To handle these two processes within a unified framework, we propose a WFST-based approach. However, a WFST-based approach has the same limitations as conventional approaches in that the utterance-level decision is based on heuristic knowledge and the decision parameters are tuned sequentially. Therefore, to obtain decision knowledge from a speech corpus and optimize the parameters at the same time, we propose the use of data-driven probabilistic utterance-level decision logic. The proposed method reduces the average detection failure rate by about 14% for various noisy-speech corpora collected for an endpoint detection evaluation.

Improved Shamir's CRT-RSA Algorithm: Revisit with the Modulus Chaining Method

  • Lee, Seungkwang;Choi, Dooho;Choi, Yongje
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.469-478
    • /
    • 2014
  • RSA signature algorithms using the Chinese remainder theorem (CRT-RSA) are approximately four-times faster than straightforward implementations of an RSA cryptosystem. However, the CRT-RSA is known to be vulnerable to fault attacks; even one execution of the algorithm is sufficient to reveal the secret keys. Over the past few years, several countermeasures against CRT-RSA fault attacks have tended to involve additional exponentiations or inversions, and in most cases, they are also vulnerable to new variants of fault attacks. In this paper, we review how Shamir's countermeasure can be broken by fault attacks and improve the countermeasure to prevent future fault attacks, with the added benefit of low additional costs. In our experiment, we use the side-channel analysis resistance framework system, a fault injection testing and verification system, which enables us to inject a fault into the right position, even to within $1{\mu}s$. We also explain how to find the exact timing of the target operation using an Atmega128 software board.

State-of-the-art in Quantum Computing Software (양자컴퓨팅 소프트웨어 최신 기술 동향)

  • Cho, E.Y.;Kim, Y.C.;Jung, H.B.;Cha, G.I.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.67-77
    • /
    • 2021
  • Since Richard Feynman presented the concept of quantum computers, quantum computing have been identified today overcoming the limits of supercomputing in various applications. Quantum hardware has steadily developed into 50 to hundreds of qubits of various quantum hardware technologies based on superconductors, semiconductors, and trapped ions over 40 years. However, it is possible to use a NISQ (Noisy Intermediate Scale Quantum) level quantum device that currently has hardware constraints. In addition, the software environment in which quantum algorithms for problem solving in various applications can be executed is pursuing research with quantum computing software such as programming language, compiler, control, testing and verification. The development of quantum software is essential amid intensifying technological competition for the commercialization of quantum computers. Therefore, this paper introduces the trends of the latest technology, focusing on quantum computing software platforms, and examines important software component technologies.

Software Quality Evaluation Service (소프트웨어 품질인증 서비스)

  • Choi, Jong-Yol;Lee, Kong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.481-484
    • /
    • 2002
  • 소프트웨어는 매우 다양하며, 품질을 정량적으로 측정하기 어렵기 때문에 객관적인 소프트웨어 평가를 위하여 지속적인 연구가 이루어지고 있으며, 이와 관련한 국제 및 국내 표준이 개발 중에 있다. SW시험센터는 ISO/IEC 9126을 포함한 여러 표준을 기반으로 소프트웨어 품질인증 업무를 수행하고 있으며 품질 평가와 관련된 연구를 수행하고 있다. 본 논문에서는 현재 서비스중인 소프트웨어 품질인증 서비스와 품질인중 프레임웍에 대하여 기술하고자 한다.

  • PDF

Defect-Type Analysis of Regional SW Development Companies using CodeSonar (CodeSonar를 이용한 지역 SW개발 업체의 결함 유형분석)

  • Noh, Jeong-Hyun;Lee, Jong-Min;Park, Yoo-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.683-688
    • /
    • 2015
  • Recently, various static analysis tools for software defect detection are becoming widely used in practice. However, there is little public information of the most frequent defects in commercial areas until now. In this paper, we analyze the defects found by CodeSonar, a static analysis tool that finds defects in C/C++, Java programs. So we report the most frequent defects by various aspects in Dongnam area, Korea.

A SW Testing Procedure for Information Technology Security Evaluation and Vulnerability Analysis (정보 보안 평가 및 취약점 분석을 위한 SW 테스팅 절차)

  • Kim, Dong-Jin;Jeong, Youn-Sik;Cho, Seong-Je;Park, Min-Kyu;Lee, Jin-Young;Kim, Il-Gon;Lee, Tae-Seung;Kim, Hong-Geun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.80-82
    • /
    • 2012
  • 다양한 정보보호 제품이 개발됨에 따라, 정보보호 제품 보증을 위해 자체의 보안성 평가 및 인증이 중요시되고 있다. 정보보호 제품의 평가 및 인증을 위해서는 보안기능 검사와 취약점 분석 단계가 매우 중요하지만 이를 위한 정보보호 제품의 보안기능 시험과 취약성 분석을 위한 테스팅 절차에 대한 연구는 그 중요성에 비해 많이 수행되지 않았다. 현재까지는 보안제품을 기능별로 제품을 분류하여 보안성을 평가하였는데, 본 논문에서는 보안 제품들에서 공격에 취약한 SW 모듈 중심으로 테스팅 대상을 분류하는 방법을 제안한다. 분류된 SW 모듈별로 적합한 보안 테스팅 기법을 정의하고, 보안제품의 취약점을 효과적으로 탐지하기 위해 공개되어 있는 관련 취약점도 분석하였다. 이를 통해 정보보호 제품의 취약점 분석 및 제품 보안성 평가를 위한 SW 모듈별 보안 테스팅 절차를 수립하고, 테스트하였다. 실험을 통해 취약한 SW 모듈별 적절한 공격 기법 선정 시 제안 절차가 정보보호 제품 평가 인증에 활용될 수 있음을 확인하였다.

Development of Basic Practice Cases for Recurrent Neural Networks (순환신경망 기초 실습 사례 개발)

  • Kyeong Hur
    • Journal of Practical Engineering Education
    • /
    • v.14 no.3
    • /
    • pp.491-498
    • /
    • 2022
  • In this paper, as a liberal arts course for non-major students, a case study of recurrent neural network SW practice, which is essential for designing a basic recurrent neural network subject curriculum, was developed. The developed SW practice case focused on understanding the operation principle of the recurrent neural network, and used a spreadsheet to check the entire visualized operation process. The developed recurrent neural network practice case consisted of creating supervised text completion training data, implementing the input layer, hidden layer, state layer (context node), and output layer in sequence, and testing the performance of the recurrent neural network on text data. The recurrent neural network practice case developed in this paper automatically completes words with various numbers of characters. Using the proposed recurrent neural network practice case, it is possible to create an artificial intelligence SW practice case that automatically completes by expanding the maximum number of characters constituting Korean or English words in various ways. Therefore, it can be said that the utilization of this case of basic practice of recurrent neural network is high.

VPN (Virtual Private Network) SW's examination example analysis (VPN(Virtual Private Network) SW의 시험사례분석)

  • Kim, Kyung-Muk;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3012-3020
    • /
    • 2010
  • VPN can give safety in connection in Timbuc-too, by corporation's basis communication means today that transfer user support in Timbuc-too is required compulsorily, VPN is activated. This research wishes to investigate base technology of VPN software field and investigate VPN software market trend and standard and develop estimation model of VPN software. For this special quality of VPN software investigation / analyze and investigate or analyze market trend and standard this to VPN software to base deduction of estimation item and estimation model develop.

The Artificial Intelligence Literacy Scale for Middle School Students

  • Kim, Seong-Won;Lee, Youngjun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.225-238
    • /
    • 2022
  • Although the importance of literacy in Artificial Intelligence (AI) education is increasing, there is a lack of testing tools for measuring such competency. To address this gap, this study developed a testing tool that measures AI literacy among middle school students. This goal was achieved through the establishment of an expert group that was enlisted to determine the relevant factors and items covered by the proposed tool. To verify the reliability and validity of the developed tool, a field review, exploratory factor analysis, and confirmatory factor analysis were conducted. These procedures resulted in a testing tool comprising six domains that encompass 30 items. The domains are the social impact of AI (eight items), the understanding of AI (six items), AI execution plans (five items), problem solving with AI (five items), data literacy (four items), and AI ethics (two questions). The items are to be rated using a five-point Likert scale. The internal consistency of the tool was .970 (total), while that of the domains ranged from .861 to .939. This study can serve as reference for developing the analysis of AI literacy, teaching and learning, and evaluation in AI education.

A Testing Technique based on Virtual Prototype for Embedded Software (가상 프로토타입 기반 임베디드 소프트웨어의 테스트 기법)

  • Ryu, Hodong;Jeong, Sooyong;Lee, Sunghee;Kim, Jihun;Park, Heungjun;Lee, Seungmin;Lee, Woo Jin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.9 no.6
    • /
    • pp.307-314
    • /
    • 2014
  • Recently, software reliability and safety issues are seriously considered since failures of embedded systems may cause the damages of human lifes. For verifying and testing embedded software, execution environment including sensors and actuators should be prepared in the actual plants or virtual forms on PC. In this paper, we provide the virtual prototype based code simulation techniques and testing framework on PC. Virtual prototypes are generated by combining the Adobe's Flash SWF images corresponding to the state machine of HW or environment components. Code simulation on PC is possible by replacing the device drivers into virtual drivers which connect to virtual prototypes. Also, testing is performed by controlling the states of virtual prototype and simulators. By using these tools, embedded software can be executed in the earlier development phase and the efficiency and SW quality can be enhanced.