• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.023 seconds

A Cost Estimation Technique using the PRICE S Model for Embedded Software in Weapon Systems (PRICE S 모델을 이용한 무기체계 내장형 소프트웨어 비용 추정 기법)

  • Shin, Eon-Hee;Kang, Sung-Jin
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.717-724
    • /
    • 2006
  • The cost estimation of software is getting more important as the portion of software is increasing in acquiring weapon systems. However, the cost estimation of embedded software in a weapon system follows the cost estimation method for general purpose softwares and uses the PRICE S model as a tool. However, any validation result of the estimated cost through an evaluated software size is not well known. Hence, we propose an approach to estimate the cost through evaluating the embedded software site in weapon systems. In order to achieve our research goal, we evaluate the software size of using the line of codes and function points which are produced by the PRICE S model. Finally, we compare the estimated cost data the actual cost data provided by the production company. As a result, we propose an approach to estimate the size and the cost of embedded software in weapon systems which are not easy to estimate objectively. We also expect that the Proposed approach is used for the cost validation and negotiation in the acquisition of weapon systems in the future.

Design and Implementaion of IPv4/IPv6 Translation Protocol (IPv4/IPv6 변환 프로토콜의 설계 및 구현)

  • Park, Seok-Cheon;Lee, Gwang-Bae
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.783-792
    • /
    • 2001
  • It is well known that, in the near future, the lifetime of the IPv4 address space will be limited and available 32-bit IP network addresses will not be left any more. In order to solve such IPv4 address space problem in an effective way, the transition to the new version using IPv6 architecture is inevitably required. At present, it is impossible to convert IPv4 into IPv6 at a time, since the coverage and the size of today's Internet is too huge. Therefore, the coexistence of both IPv4 and IPv6 must be arranged in a special and practical fashion for rapid conversion on the whole. IP protocol translation has been proposed to ease the translation of the Internet from IPv4 to IPv6. This paper presents the design and implementation of a transparent transition service that translates packet header as they cross between IPv4 and IPv6 networks. IPv4/IPv6 Translation Protocol is written in c source code and is tested by the local test recommended by ISO, which has the most excellent error detection function. The test was processed with a test scenario and it was found that the results were successful.

  • PDF

A Configuration Change Control Procedure for Software Maintenance (소프트웨어 유지보수를 위한 형상변경통제절차)

  • Choe, Gwang-Jun;Kim, Gi-Bong;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2745-2755
    • /
    • 1997
  • Many large-scale enterprises have developed software systems to build management information system for their business. However, it is hard to maintain share ability of data, compatibility of operation methedology, and interoperability among subsystems when the development project progresses since each distributed team prepares a development plan for its subsystem and must have poor communication problem among those teams. We must apply software configuration management to the whole life cycle of the software system in order to solve those Problems. We need a model and a repository in order to execute configuration management on configuration products like document, data, and source code which are generated through the life cycle of software development. In this paper, we suggest a model for configuration change control where cross- referencing among life cycle Phases and data-sharing are highlighted, and define ER model to use IRDS(Information Resource Dictionary system) and IRD schemas.

  • PDF

Effect of pH, Redox Potential (Eh) and Carbonate Concentration on Actinides Solubility in a Deep Groundwater of Korea

  • Keum Dong-Kwon;Lee Han-Soo;Lee Chang-Woo
    • Nuclear Engineering and Technology
    • /
    • v.36 no.2
    • /
    • pp.196-202
    • /
    • 2004
  • KAERI (Korea Atomic Energy Research Institute) is at present preparing a preliminary performance assessment to set up the HLW disposal concept of Korea. The solubility of the radionuclides contained in HLW is necessary as a source term in order to predict their potential migration in both the near and far fields. The solubility of actinides (Th, Am, U, Np and Pu) for a reference deep groundwater of Korea has been calculated using a geochemical code with thermodynamic data selected by a peer review of existing thermodynamic databases and literature. The solubilities from the experimental study and/or field observations from natural analogue studies are compared. The sensitivity of solubility to the variability of three main parameters of groundwater (pH, Eh, and carbonate concentration) is also investigated. The results of the sensitivity analysis show that the solubility of actinides strongly depends on the parameters considered. Within the range of parameter values studied (pH=7 to 10, Eh=-0.4 to -0.1V, and carbonate concentration=1.E-5 to 1.E-2 mol/L), the solubility of each actinide exists between 1.4E-10 and 1.6E-6 mol/L for Am, 4.9E-9 and 2.8E-6 mol/L for Th, 3.2E-9 and 5.7E-4 mol/L for U, 1.1E-9 and 1.0E-7 mol/L for Np, and 4.0E-11 and 2.8E-6 mol/L for Pu, respectively.

COMPARISON BETWEEN EXPERIMENTALLY MEASURED AND THERMODYNAMICALLY CALCULATED SOLUBILITIES OF UO2 AND THO2 IN KURT GROUND WATER

  • Kim, Seung-Soo;Baik, Min-Hoon;Kang, Kwang-Cheol;Choi, Jong-Won
    • Nuclear Engineering and Technology
    • /
    • v.41 no.6
    • /
    • pp.867-874
    • /
    • 2009
  • Solubility of a radionuclide is important for defining the release source term of a radioactive waste in the safety and performance assessments of a radioactive waste repository. When the pH and redox potential of the KURT groundwater were changed by an electrical method, the concentrations of uranium and thorium released from $UO_2$(cr) and $ThO_2$(cr) at alkali pH(8.1 ${\sim}$ 11.4) and reducing potential (Eh < -0.2 V) conditions were less than $10^{-7}mole/L$. Unexpectedly, the concentration of tetravalent thorium is slightly higher than that of uranium at pH = 8.1 and Eh= -0.2 V conditions, and this difference may be due to the formation of hydroxide-carbonate complex ions. When $UO_2$(s) and $UO_2$(am, hyd.), and $ThO_2$(s) and $Th(OH)_4(am)$ were assumed as solubility limiting solid phases, the concentrations of uranium and thorium in the KURT groundwater calculated by the PHREEQC code were comparable to the experimental results. The dominating aqueous species of uranium and thorium were presumed as $UO_2(CO_3)_3^{4-}$ and $Th(OH)_3CO_3^-$ at pH = 8.1 ${\sim}$ 9.8, and $UO_2(OH)_3^-$ and $Th(OH)_4(aq)$ at pH = 11.4.

Swell Correction of Shallow Marine Seismic Reflection Data Using Genetic Algorithms

  • park, Sung-Hoon;Kong, Young-Sae;Kim, Hee-Joon;Lee, Byung-Gul
    • Journal of the korean society of oceanography
    • /
    • v.32 no.4
    • /
    • pp.163-170
    • /
    • 1997
  • Some CMP gathers acquired from shallow marine seismic reflection survey in offshore Korea do not show the hyperbolic trend of moveout. It originated from so-called swell effect of source and streamer, which are towed under rough sea surface during the data acquisition. The observed time deviations of NMO-corrected traces can be entirely ascribed to the swell effect. To correct these time deviations, a residual statics is introduced using Genetic Algorithms (GA) into the swell correction. A new class of global optimization methods known as GA has recently been developed in the field of Artificial Intelligence and has a resemblance with the genetic evolution of biological systems. The basic idea in using GA as an optimization method is to represent a population of possible solutions or models in a chromosome-type encoding and manipulate these encoded models through simulated reproduction, crossover and mutation. GA parameters used in this paper are as follows: population size Q=40, probability of multiple-point crossover P$_c$=0.6, linear relationship of mutation probability P$_m$ from 0.002 to 0.004, and gray code representation are adopted. The number of the model participating in tournament selection (nt) is 3, and the number of expected copies desired for the best population member in the scaling of fitness is 1.5. With above parameters, an optimization run was iterated for 101 generations. The combination of above parameters are found to be optimal for the convergence of the algorithm. The resulting reflection events in every NMO-corrected CMP gather show good alignment and enhanced quality stack section.

  • PDF

Testing Android Applications Considering Various Contexts Inferred from Permissions (안드로이드 어플리케이션 개발에서 퍼미션 분석을 사용한 다양한 테스트 환경 조건 생성 기법)

  • Song, Kwangsik;Han, Ah-Rim;Jeong, Sehun;Cha, Sungdeok
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1022-1030
    • /
    • 2015
  • The context-awareness of mobile applications yields several issues for testing, since mobile applications should be able to be tested in any environment and under any contextual input. In previous studies of testing for Android applications as an event-driven system, many researchers have focused on using generated test cases considering only Graphical User Interface (GUI) events. However, it is difficult to find failures that could be detected when considering the changes in the context in which applications run. It is even more important to consider various contexts since the mobile applications adapt and use the new features and sensors of mobile devices. In this paper, we provide a method of systematically generating various executing contexts from permissions. By referring to the lists of permissions, the resources used by the applications for running Android applications can be easily inferred. To evaluate the efficiency of our testing method, we applied the method on two open source projects and showed that it contributes to improve the statement code coverage.

A Software Complexity Measurement Technique for Object-Oriented Reverse Engineering (객체지향 역공학을 위한 소프트웨어 복잡도 측정 기법)

  • Kim Jongwan;Hwang Chong-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.9
    • /
    • pp.847-852
    • /
    • 2005
  • Over the last decade, numerous complexity measurement techniques for Object-Oriented (OO) software system have been proposed for managing the effects of OO codes. These techniques may be based on source code analysis such as WMC (Weighted Methods per Class) and LCOM (Lack of Cohesion in Methods). The techniques are limited to count the number of functions (C++). However. we suggested a new weighted method that checks the number of parameters, the return value and its data type. Then we addressed an effective complexity measurement technique based on the weight of class interfaces to provide guidelines for measuring the class complexity of OO codes in reverse engineering. The results of this research show that the proposed complexity measurement technique ECC(Enhanced Class Complexity) is consistent and accurate in C++ environment.

A Testing Method for Web-Based Banking Applications Using Formal Specification (정형 명세를 이용한 웹 기반 은행 어플리케이션의 테스트 기법)

  • Ahn, Young-Hee;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.855-864
    • /
    • 2004
  • Programmers can be got the test-related information for implementation without interference of source code complexity by use of the formal specification. Especially the external inputs and system responses can be represented precisely by formal specification in testing phase of web-based software systems. This paper suggests a method of extracting test cases by use of formal specification. Object-Z formal specification represents various test-related information for complex functions of web-based applications. State Transition Models could be built from the formal specification so that test scenarios were extracted from STDs from the highest level to detail levels. The target system for verification of this method is a web-based banking system which is necessary to be secured and critical on errors. This method would be an important factor in automatizing test procedure for web-based application software systems combining the user-base test technique.

A Low-Complexity Alamouti Space-Time Transmission Scheme for Asynchronous Cooperative Systems (비동기 협력 통신 시스템을 위한 저복잡도 Alamouti 시공간 전송 기법)

  • Lee, Young-Po;Chong, Da-Hae;Lee, Young-Yoon;Song, Chong-Han;Yoon, Seok-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5C
    • /
    • pp.479-486
    • /
    • 2010
  • In this paper, we propose a novel low-complexity Alamouti coded orthogonal frequency division multiplexing (OFDM) scheme for asynchronous cooperative communications. Exploiting the combination of OFDM symbols at the source node and simple operations including sign change and complex product at the relay node, the proposed scheme can achieve cooperative diversity gain without use of time-reversion and shifting operations that the conventional scheme proposed by Li and Xia needs. In addition, by using the cyclic prefix (CP) removal and insertion operations at the relay node, the proposed scheme does not suffer from a considerable degradation of bit-error-rate (BER) performance even though perfect timing synchronization is not achieved at the relay node. From the simulation results, it is demonstrated that the BER performance of the proposed scheme is much superior to that of the conventional scheme in the presence of timing synchronization error at the relay node. It is also shown that the proposed scheme obtains two times higher diversity gain compared with the conventional scheme at the cost of half reduction in transmission efficiency.