• Title/Summary/Keyword: White box test

Search Result 22, Processing Time 0.027 seconds

A Study on the Standardization of System Support Software in the Combat Management System

  • Heo, Young-Dong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.147-155
    • /
    • 2020
  • System support software is one of the software that makes up ship combat management system and has the characteristics of being mounted in the combat management systems of all ships but with little functional change. However, despite these characteristics, software modifications due to equipment, etc. are inevitable in the application of new ships. Modification of software causes software reliability testing which is a key factor in increasing development costs. In this paper, the structure of the existing system support software was analyzed to identify and supplement the code change factors, and the system support standardization architecture was designed. The feature model elicited common and variable elements of system support software, and applied white-box reuse to improve software design. In addition, the results of comparing existing system support software with the new architecture in terms of development elements and time to perform reliability test were presented to verify the effectiveness of the new one.

MDPS Analysis Software Development (MDPS 해석 소프트웨어 개발)

  • Jang, Bongchoon;Kim, Joung-Hoon;Yang, Sung-Mo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.9
    • /
    • pp.5480-5486
    • /
    • 2014
  • Complete novel software for MDPS for the simulation and analysis is proposed for steering engineers. The software, MSAS, which can provide the functionality for MDPS Simulation, Analysis & Synthesis, is based on the steering system model, vehicle model and control logic. As the suppliers provide the control logic as a black box, this software is capable of using any type of black box logic or white box control logic that can be developed by logic designers. In addition, this software will be synthesized with the suppliers' s-function control logic and RMDPS together.

A Study on the Application of Risk Management for Medical Device Software Test (의료기기 소프트웨어 테스트 위험관리 적용 방안 연구)

  • Kim, S.H.;Lee, jong-rok;Jeong, Dong-Hun;Park, Hui-Byeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.495-497
    • /
    • 2012
  • Development of application risk management for medical device software test. First, Through questionnaires, Medical device manufacturers, Analysis of software validation and risk management status. Second, Analyzed by comparing the difference between black box testing and white box testing. Third, After analyzing the potential for software analysis tools using code derived factors were quantified, Finally, Medical device risk management process so that it can be applied to build the framework by FMEA(Failure Mode and Effect Analysis) technique. Through this Difficult to build software validation and risk management processes for manufacturers to take advantage of support in medical device GMP(Good Manufacture Practice).

  • PDF

Word Segmentation in Handwritten Korean Text Lines based on GAP Clustering (GAP 군집화에 기반한 필기 한글 단어 분리)

  • Jeong, Seon-Hwa;Kim, Soo-Hyung
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.6
    • /
    • pp.660-667
    • /
    • 2000
  • In this paper, a word segmentation method for handwritten Korean text line images is proposed. The method uses gap information to segment words in line images, where the gap is defined as a white run obtained after vertical projection of line images. Each gap is assigned to one of inter-word gap and inter-character gap based on gap distance. We take up three distance measures which have been proposed for the word segmentation of handwritten English text line images. Then we test three clustering techniques to detect the best combination of gap metrics and classification techniques for Korean text line images. The experiment has been done with 305 text line images extracted manually from live mail pieces. The experimental result demonstrates the superiority of BB(Bounding Box) distance measure and sequential clustering approach, in which the cumulative word segmentation accuracy up to the third hypothesis is 88.52%. Given a line image, the processing time is about 0.05 second.

  • PDF

Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption

  • Du, Jiajie;HelIl, Nurmamat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3274-3297
    • /
    • 2021
  • Permission delegation is an important research issue in access control. It allows a user to delegate some of his permissions to others to reduce his workload, or enables others to complete some tasks on his behalf when he is unavailable to do so. As an ideal solution for controlling read access on outsourced data objects on the cloud, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has attracted much attention. Some existing CP-ABE schemes handle the read permission delegation through the delegation of the user's private key to others. Still, these schemes lack the further consideration of granularity and traceability of the permission delegation. To this end, this article proposes a flexible and fine-grained CP-ABE key delegation approach that supports white-box traceability. In this approach, the key delegator first examines the relations between the data objects, read permission thereof that he intends to delegate, and the attributes associated with the access policies of these data objects. Then he chooses a minimal attribute set from his attributes according to the principle of least privilege. He constructs the delegation key with the minimal attribute set. Thus, we can achieve the shortest delegation key and minimize the time of key delegation under the premise of guaranteeing the delegator's access control requirement. The Key Generation Center (KGC) then embeds the delegatee's identity into the key to trace the route of the delegation key. Our approach prevents the delegatee from combining his existing key with the new delegation key to access unauthorized data objects. Theoretical analysis and test results show that our approach helps the KGC transfer some of its burdensome key generation tasks to regular users (delegators) to accommodate more users.

Template Mask based Parking Car Slots Detection in Aerial Images

  • Wirabudi, Andri Agustav;Han, Heeji;Bang, Junho;Choi, Haechul
    • Journal of Broadcast Engineering
    • /
    • v.27 no.7
    • /
    • pp.999-1010
    • /
    • 2022
  • The increase in vehicle purchases worldwide is having a very significant impact on the availability of parking spaces. In particular, since it is difficult to secure a parking space in an urban area, it may be of great help to the driver to check vehicle parking information in advance. However, the current parking lot information is still operated semi-manually, such as notifications. Therefore, in this study, we propose a system for detecting a parking space using a relatively simple image processing method based on an image taken from the sky and evaluate its performance. The proposed method first converts the captured RGB image into a black-and-white binary image. This is to simplify the calculation for detection using discrete information. Next, a morphological operation is applied to increase the clarity of the binary image, and a template mask in the form of a bounding box indicating a parking space is applied to check the parking state. Twelve image samples and 2181 total of test, were used for the experiment, and a threshold of 40% was used to detect each parking space. The experimental results showed that information on the availability of parking spaces for parking users was provided with an accuracy of 95%. Although the number of experimental images is somewhat insufficient to address the generality of accuracy, it is possible to confirm the possibility of parking space detection with a simple image processing method.

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.

Automated Generation of Wrapper to Test Components (컴포넌트 테스트를 위한 래퍼의 자동 생성에 관한 연구)

  • Song, Ho-Jin;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.8
    • /
    • pp.704-716
    • /
    • 2005
  • Assembling new software systems from Prepared components is an attractive alternative to traditional software development method to reduce development cost and schedule dramatically. However, if separately developed components are tested, integrated and verified with unreasonable effort and high cost, it would not be an effective way to software development. Components are not distributed in the shape of white-box source code so that should be hard to validate and test in new application environment. For solving this problem, built-in tester components are suggested to check the contract-compliance of their server components. If components have various and complex function, built-in tester should be heavy and unflexible to test in composition of components. This paper suggests enhancing automated wrapper technique which substitutes with built-in tester components and shows the usability of the wrapper by design and implementation. Component testing in this way reduces the cost and effort associated with preparation of component testing and makes the various test experiments in components assembly.

Architecture Design for Real-time Mobile Embedded Software Test Tools (실시간 이동형 내장 소프트웨어 시험 도구의 구조 설계)

  • Kim, Sang-Il;Lee, Nam-Yong;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.4
    • /
    • pp.388-401
    • /
    • 2006
  • A tool for analyzing and testing software in real-time is required for the efficient development of highly reliable real-time mobile embedded software This too] requires various technologies, such as source code based white-box test and real-time system monitoring and control. The tool also should be designed to improve reusability and portability by considering the interaction with other kinds of real-time system. This paper identifies and analyzes the functional requirements for the test tool on real-time mobile embedded software and suggests an adequate tool architecture based on the collected requirements. It also suggests the specific implementation technology and architecture design pattern to support the tool's expandability and portability.

Soft computing based mathematical models for improved prediction of rock brittleness index

  • Abiodun I. Lawal;Minju Kim;Sangki Kwon
    • Geomechanics and Engineering
    • /
    • v.33 no.3
    • /
    • pp.279-289
    • /
    • 2023
  • Brittleness index (BI) is an important property of rocks because it is a good index to predict rockburst. Due to its importance, several empirical and soft computing (SC) models have been proposed in the literature based on the punch penetration test (PPT) results. These models are very important as there is no clear-cut experimental means for measuring BI asides the PPT which is very costly and time consuming to perform. This study used a novel Multivariate Adaptive regression spline (MARS), M5P, and white-box ANN to predict the BI of rocks using the available data in the literature for an improved BI prediction. The rock density, uniaxial compressive strength (σc) and tensile strength (σt) were used as the input parameters into the models while the BI was the targeted output. The models were implemented in the MATLAB software. The results of the proposed models were compared with those from existing multilinear regression, linear and nonlinear particle swarm optimization (PSO) and genetic algorithm (GA) based models using similar datasets. The coefficient of determination (R2), adjusted R2 (Adj R2), root-mean squared error (RMSE) and mean absolute percentage error (MAPE) were the indices used for the comparison. The outcomes of the comparison revealed that the proposed ANN and MARS models performed better than the other models with R2 and Adj R2 values above 0.9 and least error values while the M5P gave similar performance to those of the existing models. Weight partitioning method was also used to examine the percentage contribution of model predictors to the predicted BI and tensile strength was found to have the highest influence on the predicted BI.