• Title/Summary/Keyword: software testing

Search Result 1,291, Processing Time 0.023 seconds

Data Collection Methods to Standardize Protocols of Safety Supervision System (안전관제시스템 프로토콜 표준화를 위한 데이터 수집 방법)

  • Shin, Kwang-Ho;Um, Tae-Hwa;Lim, Dam-Sub;Ahn, Jin
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.159-169
    • /
    • 2016
  • The current railway control system in Korea is comprised of signaling, electric rail power, communication, and maintenance systems that are independent of each other. Further, these systems have different mediums and protocols for transmitting the field equipment data to the central control system. The Safety Supervision System has as its purpose the collecting of safety-related data from each system to predict and prevent accidents, this system utilizes standard protocol. Safety-related data need to be collected from field data transmission devices of the existing control system, the data should be collected without affecting the communication of the existing system. In this study, sniffing skill, which is typically used for network traffic monitoring or security, is used to collect data. The problems arising from the use of sniffing devices are noted, and the Packet Conversion Node is proposed as a solution to the problems. Further, functional and performance testing were completed for the prototype, and the software architecture and packet conversion process were verified.

Traffic Distributed Processing System Implementation on the Web Sever Networking (웹서버 네트워킹에서의 트래픽분산 처리 시스템 구현)

  • Park, Gil-Cheol;Sung, Kyung;Kim, Seok-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.846-853
    • /
    • 2004
  • This paper introduces implementation of a traffic distributed processing system on the Web Sever Networking. The study used two software packages (Packet Capture and Round-Robin Test Package) to check packet quantity from Virtual Network Structure (data generator, virtual server, Serve. 1, 2, 3), and could find out traffic distribution toward Server 1, 2, and 3. The functions of implemented Round-Robin Load Balancing Monitoring System include Round-Robin testing, system monitoring, and graphical indication of data transmission/packet quantity (figures & diagram). As the result of the study shows, Round-Robin Algorithm ensured definite traffic distribution, unless incoming data loads differ much. Although error levels were high in some cases, they were eventually alleviated by repeated tests for a long period of time.

Design of a GCS System Supporting Vision Control of Quadrotor Drones (쿼드로터드론의 영상기반 자율비행연구를 위한 지상제어시스템 설계)

  • Ahn, Heejune;Hoang, C. Anh;Do, T. Tuan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1247-1255
    • /
    • 2016
  • The safety and autonomous flight function of micro UAV or drones is crucial to its commercial application. The requirement of own building stable drones is still a non-trivial obstacle for researchers that want to focus on the intelligence function, such vision and navigation algorithm. The paper present a GCS using commercial drone and hardware platforms, and open source software. The system follows modular architecture and now composed of the communication, UI, image processing. Especially, lane-keeping algorithm. are designed and verified through testing at a sports stadium. The designed lane-keeping algorithm estimates drone position and heading in the lane using Hough transform for line detection, RANSAC-vanishing point algorithm for selecting the desired lines, and tracking algorithm for stability of lines. The flight of drone is controlled by 'forward', 'stop', 'clock-rotate', and 'counter-clock rotate' commands. The present implemented system can fly straight and mild curve lane at 2-3 m/s.

Automatic Expansion of ConceptNet by Using Neural Tensor Networks (신경 텐서망을 이용한 컨셉넷 자동 확장)

  • Choi, Yong Seok;Lee, Gyoung Ho;Lee, Kong Joo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.11
    • /
    • pp.549-554
    • /
    • 2016
  • ConceptNet is a common sense knowledge base which is formed in a semantic graph whose nodes represent concepts and edges show relationships between concepts. As it is difficult to make knowledge base integrity, a knowledge base often suffers from incompleteness problem. Therefore the quality of reasoning performed over such knowledge bases is sometimes unreliable. This work presents neural tensor networks which can alleviate the problem of knowledge bases incompleteness by reasoning new assertions and adding them into ConceptNet. The neural tensor networks are trained with a collection of assertions extracted from ConceptNet. The input of the networks is two concepts, and the output is the confidence score, telling how possible the connection between two concepts is under a specified relationship. The neural tensor networks can expand the usefulness of ConceptNet by increasing the degree of nodes. The accuracy of the neural tensor networks is 87.7% on testing data set. Also the neural tensor networks can predict a new assertion which does not exist in ConceptNet with an accuracy 85.01%.

Medical Image Classification and Retrieval Using BoF Feature Histogram with Random Forest Classifier (Random Forest 분류기와 Bag-of-Feature 특징 히스토그램을 이용한 의료영상 자동 분류 및 검색)

  • Son, Jung Eun;Ko, Byoung Chul;Nam, Jae Yeal
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.4
    • /
    • pp.273-280
    • /
    • 2013
  • This paper presents novel OCS-LBP (Oriented Center Symmetric Local Binary Patterns) based on orientation of pixel gradient and image retrieval system based on BoF (Bag-of-Feature) and random forest classifier. Feature vectors extracted from training data are clustered into code book and each feature is transformed new BoF feature using code book. BoF features are applied to random forest for training and random forest having N classes is constructed by combining several decision trees. For testing, the same OCS-LBP feature is extracted from a query image and BoF is applied to trained random forest classifier. In contrast to conventional retrieval system, query image selects similar K-nearest neighbor (K-NN) classes after random forest is performed. Then, Top K similar images are retrieved from database images that are only labeled K-NN classes. Compared with other retrieval algorithms, the proposed method shows both fast processing time and improved retrieval performance.

A Temporal Logic for Specification of Dynamic Systems and Its Verification (동적 시스템 명세를 위한 시제논리언어와 그 검증)

  • Cho, Seung-Mo;Kim, Hyung-ho;Cha, Sung-Deok;Bae, Doo-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.7
    • /
    • pp.450-464
    • /
    • 2002
  • Many modern complex systems, including most object-oriented systems, have dynamic characteristics that their components are dynamical]y configured during run-time. However, few analysis techniques are available that consider the dynamic nature of systems explicitly. We propose a specification and analysis method for these dynamic systems. We design a new temporal logic, called HDTL, to specify the properties of dynamically evolving systems, and tune up the tableau method for this logic. HDTL incorporates variables and quantifiers that enable the automatic analysis. Using HDTL and the analysis method, we can specify the correctness requirements of systems and check whether the system actually agree with the requirements or not. An experiment shows that HDTL is suitable for specifying dynamic properties and the analysis technique works well.

Design Process Suggestion of Vibrotactile Interface applying Haptic Perception Factor Analysis (햅틱 인지 요인 분석을 적용한 진동 촉감 인터페이스 설계 프로세스 제안)

  • Heo, Yong-Hae;Kim, Seung-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.79-87
    • /
    • 2021
  • This study suggests a design process for vibrotactile interface that can apply haptic perception factors reflecting human tactile mechanisms. This process consists of 4 stages: the haptic sense requirement analysis stage, the haptic element analysis stage, the haptic perception factor analysis stage, the haptic requirement detailed design, and the prototype implementation stage. The advantage of this design process is that unnecessary tasks can be excluded in deriving and implementing user requirements, by applying haptic perception factor analysis, and the biggest feature is that research results on ergonomic mechanisms can be reflected in the haptic design, completes prototype development simultaneously while determining the haptic requirements statement by performing user evaluation, usability testing, and haptic feature optimization tasks simultaneously. This design process includes all stages from user requirements to haptic function detailed design and prototype implementation, so it is expected that general developers who lack expertise in haptic will also be able to design user-centered designs, enabling design and implementation of haptic functions at a certain level.

A Study on Numerical Analysis for GPR Signal Characterization of Tunnel Lining Cavities (터널 라이닝 공동에 대한 GPR 신호 특성 분석을 위한 수치해석 연구)

  • Go, Gyu-Hyun;Lee, Sung Jin
    • Journal of the Korean Geotechnical Society
    • /
    • v.37 no.10
    • /
    • pp.65-76
    • /
    • 2021
  • There is a possibility of cavities occurring inside and behind the lining of an aged tunnel structure. In most cases, it is not easy to check the cavity because it exists in a place where visual inspection is impossible. Recently, attempts have been made to evaluate the condition of the tunnel lining and the backfill materials using non-destructive tests such as Ground Penetrating Radar, and various related model tests and numerical analysis studies have been conducted. In this study, the GPR signal characteristics for tunnel lining model testing were analyzed using gprMax software, which was compared with model test results. The numerical model applied to the model test reasonably simulated the electromagnetic wave signal according to the change of the material such as tunnel lining and internal cavity. Using the verified GPR model, B-scan data for the development of the GPR signal analysis technique were obtained, which can evaluate the thickness of the tunnel lining, the presence of the cavity, the effect of the waterproof membrane, and the frequency band.

Automated Applying Greybox Fuzzing to C/C++ Library Using Unit Test (유닛테스트를 활용한 c/c++ 라이브러리 그레이박스 퍼징 적용 자동화)

  • Jang, Joon Un;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.807-819
    • /
    • 2019
  • Greybox fuzzing is known as an effective method to discover unknown security flaws reside in software and has been actively researched today. However, most of greybox fuzzing tools require an executable file. Because of this, a library, which cannot be executed by itself requires an additional executable file for greybox fuzzing. Generating such an executable file is challengeable because it requires both understanding of the library and fuzzing. In this research, we suggest the approach to generate an executable file automatically for a library and implement this approach as a tool based on the LLVM framework. This tool shows that executable files and seed files can be generated automatically by static/dynamic analysis of a unit test in the target project. A generated executable file is compatible with various greybox fuzzers like AFL because it has a common interface for greybox fuzzers. We show the performance of this tool as code coverage and discovered unknown security bugs using generated executable files and seed files from open source projects through this tool.

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory (블루투스 비컨을 사용한 스마트 팩토리에서의 무선인터넷 보안 연결 시스템 구현)

  • Jang, Yun Seong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1705-1713
    • /
    • 2018
  • It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.