• Title/Summary/Keyword: Standard Conformance Test

Search Result 59, Processing Time 0.039 seconds

OpenGL ES 1.1 Implementation Using OpenGL (OpenGL을 이용한 OpenGL ES 1.1 구현)

  • Lee, Hwan-Yong;Baek, Nak-Hoon
    • The KIPS Transactions:PartA
    • /
    • v.16A no.3
    • /
    • pp.159-168
    • /
    • 2009
  • In this paper, we present an efficient way of implementing OpenGL ES 1.1 standard for the environments with hardware-supported OpenGL API, such as desktop PCs. Although OpenGL ES was started from the existing OpenGL features, it becomes a new three-dimensional graphics library customized for embedded systems through introducing fixed-point arithmetic operations, buffer management with fixed-point data type supports, completely new texture mapping functionalities and others. Currently, it is the official three dimensional graphics library for Google Android, Apple iPhone, PlayStation3, etc. In this paper, we achieved improvements on the arithmetic operations for the fixed-point number representation, which is the most characteristic data type for OpenGL ES. For the conversion of fixed-point data types to the floating-point number representations for the underlying OpenGL, we show the way of efficient conversion processes even with satisfying OpenGL ES standard requirements. We also introduced a simple memory management scheme to mange the converted data for the buffer containing fixed-point numbers. In the case of texture processing, the requirements in both standards are quite different and thus we used completely new software-implementations. Our final implementation result of OpenGL ES library provides all of over than 200 functions in OpenGL ES 1.1 standard and completely passed its conformance test, to show its compliance with the standard. From the efficiency viewpoint, we measured its execution times for several OpenGL ES-specific application programs and achieved at most 33.147 times improvements, to become the fastest one among the OpenGL ES implementations in the same category.

A Study on the Design and Validation Methodology of Communication Protocols Using International Communication Standard Languages (국제 통신 표준 언어를 이용한 통신 프로토콜 설계 및 검증 방법론 연구)

  • Ro, Cheul-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.31-42
    • /
    • 2002
  • In this paper, We set up the development methodology of communication protocols as well as the concrete design concept concerning for how to define and use the PDU, SDU, SAP, and service primitives using SDL, which is recommended by ITU-T, and other international standard languages such as ASN.l, MSC, and TTCN. This methodology covers the SDL design of extended lures protocol, a well known protocol example, insertion of ASN.1 message for transportation of bit string, generation of MSC for validation of design specification, generation of test cases using TTCN from validation, and performance of conformance test.

  • PDF

OpenGL ES 2.0 Emulation on Desktop PCs (데스크탑 상에서의 OpenGL ES 2.0 에뮬레이션)

  • Baek, Nakhoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.125-128
    • /
    • 2014
  • OpenGL ES(OpenGL for Embedded System) 2.0 is one of the most widely used 3D graphics API(application progrma interface) standard for smart phones and tablet PCs at this time. During programming with this API, they prefer desktop environment rather than the target mobile environment, which has relatively low computing power. Thus, we need to emulate the OpenGL ES 2.0 API on the desktop PCs, where only OpenGL API libraries are available. In this paper, we present technical difficulties and their solutions to emulate OpenGL ES 2.0 on desktop PCs. Our final implementation of OpenGL ES 2.0 emulation library works on desktop PCs and passed over more than 96% of the official CTS(conformance test suites) to prove the correctness of our implementation. Additionally, for the commercially available benchmark programs, our implementation shows equivalent execution speeds to the previous commercial OpenGL ES 2.0 implementations.

A Study on the Extension of TTCN using Object-Oriented Model (객체 지향 모형을 이용한 TTCN 확장에 관한 연구)

  • 최준규;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.12
    • /
    • pp.1423-1434
    • /
    • 1991
  • This paper extends TTCN, a conformance test notation, using object oriented concepts including object, class and inheritance. In distributed system environments, since test systems that should test the implementations for application protocols whether they conform to the standard protocol include protocol test behaviours executed in parallel, the converntional TTCN can't describe whole thest suites explicitly. ISO is working the extension of TTCN including parallel notations, but concurrently if TTCN could be applied by the object model that regards a parallel test component as a object, we would gain the advantages of reliability and software reusability, and make TTCN a test language.

  • PDF

Design of MPEG-2 Video Decoder Compliance Test Bitstreams (MPEG-2 비디오 디코더 적합성 검사용 비트열의 제작)

  • Kim, Chul-Min;Lee, Byung-Uk;Park, Rae-Hong
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.10
    • /
    • pp.83-93
    • /
    • 1999
  • In MPEG-2 video standard, there are many parameters to support profiles and levels. It is necessary to verify that a decoder is compliant with the MPEG-2 standard. This paper proposes a design principle of the test bitstreams which confirms that an MPEG video decoder is correct by observing the final image of the decoder under test. The presented test bitstream is composed of two parts. The first part generates a test pattern by varying a selected test parameter. And the following predictive coded picture generates a complementary pattern to the previous image by motion compensation and DCT coefficients. Then it will result in a uniform pattern. We present several bitstreams following the proposed principle. Also we analyze and compare the characteristics of the test bitstreams presented in the MPEG conformance test and the proposed test bistreams.

  • PDF

Application Methodology of XML Test Assertion for BioAPI Standard Conformance Tests in Distributed Environment (분산 환경에서의 생체인증 API 표준 적합성을 위한 XML Test Assertion 적용 방안)

  • Son, Min-Woo;Kim, Yong-Chai;Shin, Dong-Il;Shin, Dong-Kyoo;Sin, Yong-Nyeo;Kim, Jae-Seong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.562-567
    • /
    • 2007
  • 분산 환경에서 신분 확인을 위한 생체인증기기가 이용되는 경우 그 기기가 생체인증 표준인 BioAPI를 준용하여 제대로 구현된 것인가에 대한 적합성 시험이 필요하게 된다. 이러한 적합성 시험은 분산 환경의 사용자 및 서비스 제공자에게 표준 규격을 준용한 제품이라는 신뢰성을 주게 된다. 기존에 제공되는 있는 BioAPI(Biometric Application Programming Interface) v2.0 기반의 BSP(Biometric Service Provider)는 오프라인 상에서 BioAPI기반의 제품의 준용 여부만을 평가하기 때문에 분산 환경에서 여러 사람이 동시에 준용 여부를 평가 받기 힘들며 이에 따른 동시 서비스 제공도 불가능하다. 본 논문에서는 BioAPI v2.0 기반의 제품들이 분산 환경에서 제공되는 9개 모델의 표준화된 환경으로 구분하고, 원활한 적합성 시험을 위하여 XML기반의 Test Assertion을 설계하여 생체인증 API 표준 적합성을 시험하였다. XML Test Assertion을 이용한 생체인증 적합성 시험을 위한 메시지 플로우를 밝혀 그 타당성을 입증하였다.

  • PDF

Study for item of Receiver Conformance Test Standard for T-DMB Automatic Emergency Alert Service (지상파 DMB 재난경보방송 수신기 표준적합성 시험 항목 연구)

  • Jung, Hyun-Chul;Jeon, In-Chan;Choi, Seong-Jong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.11a
    • /
    • pp.325-328
    • /
    • 2009
  • 지상파 DMB가 널리 보급되고, 이를 활용한 재난경보서비스가 시험방송을 준비 중이다. 그러나 검증되지 않은 수신기들이 대량으로 출시되어 BIFS 대란과 같은 문제점도 발생하였다. 재난경보방송은 정확한 정보 전달이 매우 중요하므로, 이와 같은 문제가 발생하지 않도록 하기 위한 '지상파 디지털멀티미디어방송(DMB) 재난경보방송 수신기 표준적합성 시험'을 두고 있다. 이 표준을 분석한 결과 추가되어야 할 시험 방목이 몇 가지 발견되었다. 이 논문에서는 '지상파 디지털멀티미디어방송(DMB) 재난경보방송'의 메시지 포맷을 분석하여 각 필드가 모순되는 경우와, 사용하지 않는 값이라 명시하였으나 시험 항목에 누락된 부분을 파악하여 보충하였다. 이러한 시험 항목을 이용하면 표준을 보완하고, 결함이 더 적은 수신기를 개발하는데 도움이 될 것이다.

  • PDF

Experimental tensile test and micro-mechanic investigation on carbon nanotube reinforced carbon fiber composite beams

  • Emrah Madenci;Yasin Onuralp Ozkilic;Ahmad Hakamy;Abdelouahed Tounsi
    • Advances in nano research
    • /
    • v.14 no.5
    • /
    • pp.443-450
    • /
    • 2023
  • Carbon nanotubes (CNTs) have received increased interest in reinforcing research for polymer matrix composites due to their exceptional mechanical characteristics. Its high surface area/volume ratio and aspect ratio enable polymer-based composites to make the most of its features. This study focuses on the experimental tensile testing and fabrication of carbon nanotube reinforced composite (CNTRC) beams, exploring various micromechanical models. By examining the performance of these models alongside experimental results, the research aims to better understand and optimize the mechanical properties of CNTRC materials. Tensile properties of neat epoxy and 0.3%; 0.4% and 0.5% by CNT reinforced laminated single layer (0°/90°) carbon fiber composite beams were investigated. The composite plates were produced in accordance with ASTM D7264 standard. The tensile test was performed in order to see the mechanical properties of the composite beams. The results showed that the optimum amount of CNT was 0.3% based on the tensile capacity. The capacity was significantly reduced when 0.4% CNT was utilized. Moreover, the experimental results are compared with Finite Element Models using ABAQUS. Hashin Failure Criteria was utilized to predict the tensile capacity. Good conformance was observed between experimental and numerical models. More importantly is that Young' Moduli of the specimens is compared with the prediction Halpin-Tsai and Mixture-Rule. Although Halpin-Tsai can accurately predict the Young's Moduli of the specimens, the accuracy of Mixture-Rule was significantly low.

Implementation of Validation Tool for Cryptographic Modules (암호기술 구현물 검증도구 구현)

  • 이종후;김충길;이재일;이석래;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.45-58
    • /
    • 2001
  • There are relatively many research results of the validation of the cryptography. But few researches on the validation of cryptography implementations were accomplished. However, developer\`s misunderstanding the crypto-algorithm or a mistake in implementation of the crypto-a1gorithm leads to lose reliability of security products. Therefore, as validation of the crypto-algorithm itself also validation of the implementation is important. The major objective of this paper is to propose Security Products Validation Tool. Our tool validates implementation of the public key algorithm (RSA. KCDSA) and hash algorithm (SHA-1, HAS-170). The validation process is composed of several items and our tool performs validation teats for conformance to related standard.

An Efficient Technique to Protect AES Secret Key from Scan Test Channel Attacks

  • Song, Jae-Hoon;Jung, Tae-Jin;Jung, Ji-Hun;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.286-292
    • /
    • 2012
  • Scan techniques are almost mandatorily adopted in designing current System-on-a-Chip (SoC) to enhance testability, but inadvertently secret keys can be stolen through the scan test channels of crypto SoCs. An efficient scan design technique is proposed in this paper to protect the secret key of an Advanced Encryption Standard (AES) core embedded in an SoC. A new instruction is added to IEEE 1149.1 boundary scan to use a fake key instead of user key, in which the fake key is chosen with meticulous care to improve the testability as well. Our approach can be implemented as user defined logic with conventional boundary scan design, hence no modification is necessary to any crypto IP core. Conformance to the IEEE 1149.1 standards is completely preserved while yielding better performance of area, power, and fault coverage with highly robust protection of the secret user key.