• Title/Summary/Keyword: Weapon Embedded Software

Search Result 22, Processing Time 0.026 seconds

Development of the Engagement Control Software Architecture Based on UML 2.0 Model (UML 2.0 모델 기반의 교전통제 소프트웨어 아키텍처 개발)

  • Yoo, Myong-Hwan;Bae, Jung-Il;Shin, Jin-Hwa;Cho, Kil-Seok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • The engagement control software embedded in the weapon control computer of the fire control center for air defense missile system is large-scale real-time software. The use of typical software development methodologies is not appropriate to develop such large-scale embedded software in terms of reusability, reliability, and productivity for the reason that it is significantly complicated, and highly dependent on hardware platforms and developers. In this paper, a model-based software architecture using components based on UML 2.0 for the engagement control software is presented in order to solve these problems. This software architecture is verified using the black-box test, the scenario-based test, and the Ethernet packet monitoring test methods. The results demonstrate that the developed software architecture can be employed to enhance reusability, maintainability, and productivity of large-scale embedded software.

An Efficient Software Reliability Testing Method for the Model based Embedded Software (모델 기반 내장형 소프트웨어의 효율적 신뢰성 시험 기법)

  • Park, Jang-Seong;Cho, Sung-Bong;Park, Hyun-Yong;Kim, Do-Wan;Kim, Seong-Gyun
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.25-32
    • /
    • 2018
  • This paper presents an efficient software reliability testing method for the model based auto-generated code and reify a dynamic test procedure. The benefits of executing the model-based each static/dynamic reliability test before the code-based static/dynamic reliability test are described. Also, The correlations of code/model based reliability test are demonstrated by using model testing tool, Model Advisor and Verification and Validation, and the code testing tool, PolySpace and LDRA. The result of reliability test is indicated in this paper.

Design of CBD Methodology for Weapon System Embedded Software (컴포넌트 기반의 무기체계 임베디드 소프트웨어 개발방법론 설계)

  • Lee, Jong-Lee;Yun, Hui-Byeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.301-304
    • /
    • 2006
  • 본 논문은 컴포넌트 기반의 무기체계 임베디드 소프트웨어 개발방법론을 제안한다. 이를 위해 먼저 국방 소프트웨어 개발 관련 규정, 무기체계 임베디드 소프트웨어, 컴포넌트 기반의 개발 방법 그리고 임베디드 소프트웨어 개발방법의 특징을 바탕으로 기존 CBD 방법론을 분석한다. 그런 다음 개발방법론 설계 고려요소를 도출하고, 고려요소를 바탕으로 컴포넌트 기반의 소프트웨어개발(CBSD)과 컴포넌트 개발(CD)에 대해 어떻게 설계를 할 것인가, 산출물간에 어떤 상호작용을 하는지를 설명하는 컴포넌트 기반의 무기체계 임베디드 소프트웨어 표준 개발방법론을 제시한다.

  • PDF

A Model-based Test Approach and Case Study for Weapon Control System (모델기반 테스트 기법 및 무장통제장치 적용 사례)

  • Bae, Jung Ho;Jang, Bucheol;Koo, Bongjoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.688-699
    • /
    • 2017
  • Model-based test, a well-known method of the black box tests, is consisted of the following four steps : model construction using requirement, test case generation from the model, execution of a SUT (software under test) and detection failures. Among models constructed in the first step, state-based models such as UML standard State Machine are commonly used to design event-based embedded systems (e.g., weapon control systems). To generate test cases from state-based models in the next step, coverage-based techniques such as state coverage and transition coverage are used. Round-trip path coverage technique using W-Method, one of coverage-based techniques, is known as more effective method than others. However it has a limitation of low failure observability because the W-Method technique terminates a testing process when arrivals meet states already visited and it is hard to decide the current state is completely same or not with the previous in the case like the GUI environment. In other words, there can exist unrevealed faults. Therefore, this study suggests a Extended W-Method. The Extended W-Method extends the round-trip path to a final state to improve failure observability. In this paper, we compare effectiveness and efficiency with requirement-item-based technique, W-Method and our Extended W-Method. The result shows that our technique can detect five and two more faults respectively and has the performance of 28 % and 42 % higher failure detection probability than the requirement-item-based and W-Method techniques, respectively.

Proposal of a framework for evaluating the operational impact of cyber attacks on aviation weapons systems(EOICA) (항공무기체계 사이버공격에 대한 작전영향성평가 프레임워크 제안)

  • Hong, Byoung-jin;Kim, Wan-ju;Lee, Soo-jin;Lim, Jae-sung
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.35-45
    • /
    • 2020
  • Cyber attacks on the aviation weapon system, a state-of-the-art asset, have become a reality and are approaching as a constant threat. However, due to the characteristics of embedded software of the current aviation weapon system, it is managed and operated without connection to the network in peacetime, so the response management to cyber attacks is relatively weak. Therefore, when a cyber attack becomes a reality, it is urgent to prepare and evaluate measures for the adverse effects that such attack will have on the execution of the Air Tasking Order(ATO). In this paper, we propose a framework for operational impact assessment in order to avoid confusion in ATO execution and systematic response to cyber attacks on aviation weapons systems. The proposed framework is designed to minimize the negative impact on operations against cyber attacks that may occur under no warning by analyzing the impact on air operations for each aviation weapon system and standardizing countermeasures for this. In addition, it supports the operational commander to make a quick decision to command for the execution of the operation even in a situation where a cyber attack occurs.

A Study on Korean Defense Specification Practice Standard Development Initiative (국방규격작성 방법 발전방안에 관한 연구)

  • Song, Jae-Yong;Son, Seung-Hyun;Sung, In-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.6
    • /
    • pp.90-101
    • /
    • 2008
  • Korean defense specifications are the technical criteria of military products and major factor of acquisition system. Weapon systems and acquisition technique have been advanced dramatically after 1990's, but Korean defense specification practice standard has stayed after early 1980's except embedded software. The current status of current Korean defense specification practice standard and trend of related design and acquisition techniques like M&S, SBA, and digital manufacturing have been reviewed. This paper suggests that transfer to product, IT oriented specification structure, adaptation of digital product model and reinforcement of engineering management systems to establish a development initiative of Korean defense specification practice standard.

Design of the TFM Based System Test Model for embedded Software of Weapon Systems (TFM 기반 무기체계 소프트웨어의 시스템 테스트 모델 설계)

  • Kim Jae-Hwan;Yoon Hee-Byung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.172-174
    • /
    • 2006
  • 본 연구에서는 시간 요소를 고려한 무기체계 소프트웨어의 시스템 테스트 모델을 제시한다. 이를 위해 컴포넌트 기반의 UML 표기법과 무기체계의 시간 제약 특징을 고려한 무기체계 소프트웨어의 시스템 테스트 모델인 TFM(Time Factor Method) 모델을 제안한다. TFM 모델은 세 가지 요소인 (X.Y,Z)으로 구성되어 있는데. "X" 에서는 최대시간경로를 선정하는 알고리즘을 통해 테스트 케이스가 도출되고, "Y" 에서는 Sequence Diagram과 관련된 컴포넌트(오브젝트)를 식별하고, "Z"에서는 Timing Diagram을 통하여 식별된 각각의 컴포넌트의 실행시간을 측정한다. 또한 제안된 TFM 모델의 적용사례를 들어 테스트 케이스를 도출한다.

  • PDF

Extraction of Quality Attribute for Designing the S/W Architecture in Weapon Systems Embedded Software (무기체계 임베디드 S/W 아키텍처 설계를 위한 품질속성 추출)

  • Im, Jong-Sam;Yun, Hui-Byeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.268-271
    • /
    • 2006
  • 본 논문은 S/W 아키텍처 일반 모델 및 무기체계 S/W 특징을 분석하여 무기체계 S/W 품질속성을 추출한다. 이를 위해 먼저 4+1 View 모델, SEI 모델, Siemens 모델, RM-ODP 모델, Rational ADS 모델을 분석하고 무기체계 임베디드 S/W 특징을 분석하여 품질속성을 추출한다. 그런 다음 품질속성 측정매트릭스를 작성하여 품질속성 추출자료를 매핑하고 최종적으로 필수 이해당사자 관점에서 최종 평가하여 무기체계 S/W 품질속성을 추출한다.

  • PDF

Automatic Test case Generation Mechanism from the Decision Table of Requirement Specification Techniques based on Metamodel (메타모델 기반 요구사항 명세 기법인 의사 결정표를 통한 자동 테스트 케이스 생성 메커니즘)

  • Hyun Seung Son
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.228-234
    • /
    • 2023
  • As the increasing demand for high-quality software, there is huge requiring for quality certification of international standards, industrial functional safety (IEC 61508), automotive (ISO 26262), embedded software guidelines for weapon systems, etc., in the industry. Software companies are very difficult to systematically acquire the quality certification in terms of cost and manpower of Startup, venture small-sized companies. For their companies one test case automatic generation is considered as a core technique to evaluate or improve software quality. This paper proposes a test case automatic generation method based on the design decision table for system and software design verification. We apply the proposed method with OMG's standard techniques of metamodel and model transformation for automatically generating test cases. To do this, we design the metamodels of design decision table (Model) and test case document (Text) and define model transformation to automatically generate test cases, which will expect to easily work MC/DC coverage.