• Title/Summary/Keyword: source code

Search Result 1,250, Processing Time 0.023 seconds

The Process of Software Quality Assurance About Initial Product in Weapon System (무기체계 최초양산품 소프트웨어 품질보증 프로세스 연구)

  • Yu, Jiseon;Song, Chi-Hoon;Kwon, Soonmo;Park, Byeonghun;Oh, Jinwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.285-293
    • /
    • 2021
  • This study evaluated the process of software quality assurance about the initial product in a weapon system. The software quality assurance of the initial product was insufficient before this study. Therefore, the process of the software quality assurance about the initial product in a weapon system is suggested. The process has three parts. First, the completeness of computer files, such as source code and execute files, were checked. Second, the suitability of the software technical data was checked. Finally, the connectivity of software technical data and the Korean defense specification were assessed. Overall, there is a need to toughen the software quality assurance in the research and development step and achieve early stabilization of mass production by preventing the problems that prevent the production of a product due to the insufficient software technical data.

Development of teaching and learning materials using Arduino and piezo buzzer

  • Lee, Eun-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.349-357
    • /
    • 2020
  • In this paper, I propose a presentation examples of the development of teaching materials using Arduino. For this purpose, a six-step low-cost microcontroller teaching-learning development model was used, the steps being topic selection, exploration of implementation methods, experimentation, production of teaching and learning materials, implementing lesson plans, and improvement. After analyzing the composition of the source code and circuits introduced in the existing Arduino book, this content was reconstructed to fit the programming education context. A simple method of constructing a circuit using materials such as Arduino and a piezo buzzer is proposed to save time on circuit composition. Using this circuit, examples of use in teaching-learning activities for various programming content elements are presented. The core concept of this study is that it provides a direct experience of the content of C language programming exercises that can only be found on existing screens.

Real-time Phishing Site Detection Method (피싱사이트 실시간 탐지 기법)

  • Sa, Joon-Ho;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.819-825
    • /
    • 2012
  • Nowadays many phishing sites contain HTTP links to victim web-site's contents such as images, bulletin board etc. to make the phishing sites look more real and similar to the victim web-site. We introduce a real-time phishing site detection system which makes use of the characteristic that the phishing sites' URLs flow into the victim web-site via the HTTP referer header field when the phishing site is visited. The detection system is designed to adopt an out-of-path network configuration to minimize effect on the running system, and a phishing site source code analysis technique to alert administrators in real-time when phishing site is detected. The detection system was installed on a company's web-site which had been targeted for phishing. As result, the detection system detected 40 phishing sites in 6 days of test period.

Deterministic Parallelism for Symbolic Execution Programs based on a Name-Freshness Monad Library

  • Ahn, Ki Yung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we extend a generic library framework based on the state monad to exploit deterministic parallelism in a purely functional language Haskell and provide benchmarks for the extended features on a multicore machine. Although purely functional programs are known to be well-suited to exploit parallelism, unintended squential data dependencies could prohibit effective parallelism. Symbolic execution programs usually implement fresh name generation in order to prevent confusion between variables in different scope with the same name. Such implementations are often based on squential state management, working against parallelism. We provide reusable primitives to help developing parallel symbolic execution programs with unbound-genercis, a generic name-binding library for Haskell, avoiding sequential dependencies in fresh name generation. Our parallel extension does not modify the internal implementation of the unbound-generics library, having zero possibility of degrading existing serial implementations of symbolic execution based on unbound-genecrics. Therefore, our extension can be applied only to the parts of source code that need parallel speedup.

Performance Evaluation of the new AODV Routing Protocol with Cross-Layer Design Approach (교차 계층 설계 기법을 사용한 새로운 AODV 라우팅 프로토콜 설계 및 성능평가)

  • Jang, Jaeshin;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.768-777
    • /
    • 2020
  • In this paper, we describe recent research results on AODV routing protocol, which is widely deployed at mobile ad hoc networks, and AODV related routing protocols with multi-path routing schemes. We suggest the critical problems which minimum hop routing schemes have, such as AODV routing protocol, and then, propose a new C-AODV routing protocol with two routing metrics: the primary metric is the hop count, the secondary metric is the sum of link delay times. We implemented C-AODV protocol by modifying AODV at the NS-3, and thus, elaborate on how we change the original AODV source code of NS-3 in order to implement the C-AODV scheme. We show numerical comparison of C-AODV scheme with the original AODV scheme and then, discuss how much the C-AODV enhances routing performance over AODV protocol. In conclusion, we present future research items.

A Study on the Development Method of Android App GUI Test Automation Tool (안드로이드 앱 GUI 테스트 자동화 툴 개발 방법에 관한 연구)

  • Park, Se-jun;Kim, Kyu-jung
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.403-412
    • /
    • 2021
  • As the number of mobile apps increases exponentially, automation of tests performed in the app development process is becoming more important. Until the app is released, iterative verification is performed through various types of tests, and this study was conducted focusing on the GUI test among various types of tests. This study is meaningful in that it can contribute to the stable app distribution of the developer by suggesting the development direction of the GUI test. To develop Android's GUI test tool, I collected basic data before presenting the development method by researching Android's UI controls and Material design guideline. After that, for the existing GUI test automation tool, two tools based on screen capture test and four tools based on source code analysis test were studied. Through this, it was found that existing GUI test tools don't consider visual design, usability, and component arrangement. In order to supplement the shortcomings of existing tools, a new GUI test automation tool development method was presented based on the basic data previously studied.

Verification Methods for Vulnerabilities of Airborne Object-Oriented Software (항공용 객체지향 소프트웨어에 대한 취약점 검증 방안)

  • Jang, Jeong-hoon;Kim, Sung-su;Lee, Ji-hyun
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • As the scale of airborne system software increases, the use of OOT (Object-Oriented Technology) is increasing for functional expansion, efficient development, and code reuse, but the verification method for airborne object-oriented software is conducted from the perspective of the existing procedure-oriented program. The purpose of this paper was to analyze the characteristics of OOT and the vulnerabilities derived from the functional characteristics of OOT, and present a verification method applicable to each software development process (Design, Coding and Testing) to ensure the functional safety integrity of aviation software to which OOT is applied. Additionally, we analyzed the meaning of the static analysis results among the step-by-step verification measures proposed by applying LDRA, a static analysis automation tool, to PX4, an open source used to implement flight control software.

Performance Improvement of SCAM Climate Model using PGI Compiler with OpenACC (SCAM 기상모델의 성능향상을 위한 PGI Compiler의 OpenACC 활용)

  • Lee, Chang-Hyun;Kang, Bol-Kyung;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.3
    • /
    • pp.189-197
    • /
    • 2022
  • With the development of high-performance computing technology and the advancement of numerical model, it is possible to predict the better weather forecasting. The purpose of this paper is the performance improvement for the SCAM climate model for the model running time excluding the compilation time. Therefore, the model previously performed using the Intel Fortran Compiler was changed to PGI Fortran Compiler. To this end, we reconfigure system environment variables, reset compilation options, install dependencies SW and library, and modify source code. In addition, we proposed and applied the 'PGI Compile with OpenACC' method. As a result, when the compiler was changed from intel to PGI, it led to an improvement of 6.08% in running time and when the openACC method was applied, it led to an improvement of 43.05% in running time. This demonstrates that the PGI Compile with OpenACC method proposed in this paper leads to excellent performance.

Modeling and numerical simulation of electrostrictive materials and structures

  • Pechstein, Astrid;Krommer, Michael;Humer, Alexander
    • Smart Structures and Systems
    • /
    • v.30 no.3
    • /
    • pp.221-237
    • /
    • 2022
  • This paper is concerned with nonlinear modeling and efficient numerical simulation of electrostrictive materials and structures. Two types of such materials are considered: relaxor ferroelectric ceramics and electrostrictive polymers. For ceramics, a geometrically linear formulation is developed, whereas polymers are studied in a geometrically nonlinear regime. In the paper, we focus on constitutive modeling first. For the reversible constitutive response under consideration, we introduce the augmented Helmholtz free energy, which is composed of a purely elastic part, a dielectric part and an augmentation term. For the elastic part, we involve an additive decomposition of the strain tensor into an elastic strain and an electrostrictive eigenstrain, which depends on the polarization of the material. In the geometrically nonlinear case, a corresponding multiplicative decomposition of the deformation gradient tensor replaces the additive strain decomposition used in the geometrically linear formulation. For the dielectric part, we first introduce the internal energy, to which a Legendre transformation is applied to compute the free energy. The augmentation term accounts for the contribution from vacuum to the energy. In our formulation, the augmented free energy depends not only on the strain and the electric field, but also on the polarization and an internal polarization; the latter two are internal variables. With the constitutive framework established, a Finite Element implementation is briefly discussed. We use high-order elements for the discretization of the independent variables, which include also the internal variables and, in case the material is assumed incompressible, the hydrostatic pressure, which is introduced as a Lagrange multiplier. The elements are implemented in the open source code Netgen/NGSolve. Finally, example problems are solved for both, relaxor ferroelectric ceramics and electrostrictive polymers. We focus on thin plate-type structures to show the efficiency of the numerical scheme and its applicability to thin electrostrictive structures.

Analysis of Building Object Detection Based on the YOLO Neural Network Using UAV Images (YOLO 신경망 기반의 UAV 영상을 이용한 건물 객체 탐지 분석)

  • Kim, June Seok;Hong, Il Young
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.381-392
    • /
    • 2021
  • In this study, we perform deep learning-based object detection analysis on eight types of buildings defined by the digital map topography standard code, leveraging images taken with UAV (Unmanned Aerial Vehicle). Image labeling was done for 509 images taken by UAVs and the YOLO (You Only Look Once) v5 model was applied to proceed with learning and inference. For experiments and analysis, data were analyzed by applying an open source-based analysis platform and algorithm, and as a result of the analysis, building objects were detected with a prediction probability of 88% to 98%. In addition, the learning method and model construction method necessary for the high accuracy of building object detection in the process of constructing and repetitive learning of training data were analyzed, and a method of applying the learned model to other images was sought. Through this study, a model in which high-efficiency deep neural networks and spatial information data are fused will be proposed, and the fusion of spatial information data and deep learning technology will provide a lot of help in improving the efficiency, analysis and prediction of spatial information data construction in the future.