• Title/Summary/Keyword: white paper

Search Result 1,891, Processing Time 0.027 seconds

Automated Generation of Wrapper to Test Components (컴포넌트 테스트를 위한 래퍼의 자동 생성에 관한 연구)

  • Song, Ho-Jin;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.8
    • /
    • pp.704-716
    • /
    • 2005
  • Assembling new software systems from Prepared components is an attractive alternative to traditional software development method to reduce development cost and schedule dramatically. However, if separately developed components are tested, integrated and verified with unreasonable effort and high cost, it would not be an effective way to software development. Components are not distributed in the shape of white-box source code so that should be hard to validate and test in new application environment. For solving this problem, built-in tester components are suggested to check the contract-compliance of their server components. If components have various and complex function, built-in tester should be heavy and unflexible to test in composition of components. This paper suggests enhancing automated wrapper technique which substitutes with built-in tester components and shows the usability of the wrapper by design and implementation. Component testing in this way reduces the cost and effort associated with preparation of component testing and makes the various test experiments in components assembly.

An Analysis of Statistical Indicators on the Infrastructure of Science and Technology Culture in Korea (과학기술문화 하부구조에 관한 통계지표 분석)

  • Song, Sung-Soo
    • Journal of Science and Technology Studies
    • /
    • v.6 no.2 s.12
    • /
    • pp.185-205
    • /
    • 2006
  • This article analyzes statistical indicators on the infrastructure of S&T culture in Korea. In the case of visible infrastructure, science museums, S&T programs in TV, and S&T books are not sufficiently secured except for internet. The utilization of visible infrastructure tends to be increased but in rudimentary stage. In relation to invisible infrastructure, public interest and understanding of &T is underdeveloped, social status of S&T personnel is low compared to social importance, and participation in S&T policy of S&T personnel and citizens organization is limited. For the development of statistical indicators in S&T culture, personal, institutional, and social contexts should be much considered, surveys on the particular social groups are systematically pursued, and a white paper on the S&T culture in Korea needs to be published.

  • PDF

A Study on Improvement in Digital Image Restoration by a Recursive Vector Processing (순환벡터처리에 의한 디지털 영상복원에 관한 연구)

  • 이대영;이윤현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.8 no.3
    • /
    • pp.105-112
    • /
    • 1983
  • This paper discribes technique of the recursive restoration for the images degraded by linear space invariant blur and additive white Gaussian noise. The image is characterized statistically by tis mean and correlation function. An exponential autocorrelation function has been used to model neighborhood model. The vector model was used because of analytical simplicitly and capability to implement brightness correlation function. Base on the vector model, a two-dimensional discrete stochastic a 12 point neighborhood model for represeting images was developme and used the technique of moving window processing to restore blurred and noisy images without dimensionality increesing, It has been shown a 12 point neighborhood model was found to be more adequate than a 8 point pixel model to obtain optimum pixel estimated. If the image is highly correlated, it is necessary to use a large number of points in the neighborhood in order to have improvements in restoring image. It is believed that these result could be applied to a wide range of image processing problem. Because image processing thchniques normally required a 2-D linear filtering.

  • PDF

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

Performance Analysis of BPM UWB Multiple Access System Using PN Code Based Time Hopping Sequence in Indoor Wireless Channels (실내 무선 환경에서 PN 부호 기반 시간 도약 시퀀스를 이용하는 BPM UWB 다원 접속 시스템의 성능 분석)

  • 양석철;신요안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.187-198
    • /
    • 2004
  • In this paper, we analyze the performance of BPM (Bi-Phase Modulation) UWB (Ultra Wide Band) multiple access system using PN (Pseudo Noise) code based time hopping sequence in indoor wireless channels. In particular, we compare BPM UWB multiple access system with PPM (Pulse Position Modulation) UWB multiple access system in terms of signalling and demodulation schemes. Moreover, we analytically evaluate the performance of these UWB systems by deriving the bit error rate expressions under the assumption that pulse energy and data transmission rate are identical for both systems. Simulation results in additive white Gaussian noise and realistic indoor multipath wireless channels show that the performance of BPM scheme is approximately 1 dB better than that of PPM scheme. However, the performance discrepancy becomes negligible as the number of users increases.

Performance of 8SQAM System in a Nonlinearly Amplified Channel Environment (비선형 증폭 채널 환경에서 8SQAM 시스템의 성능)

  • 성봉훈;서종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.669-677
    • /
    • 2003
  • A new Modem technique - 8SQAM(8-state Superposed Quadrature Amplitude Modulation) - for use in power and bandwidth limited digital communication system is proposed. 8SQAM is free of inter-symbol interference(ISI) and generates output signals which have a smooth and continuous phase transition and a reduced envelope fluctuation by keeping correlation between amplitudes and phases of two subsequent symbols. Accordingly, 8SQAM, as compared with a conventional 8PSK, is influenced a little by ISI and inter-modulation(IM) caused by nonlinear distortions. In this paper, the performance of the 8SQAM system, in a nonlinearly amplified channel impaired by additive white Gaussian noise(AWGN), ISI and IM, is analyzed via computer simulation. The simulation result shows that 8SQAM outperforms 8PSK with roll-off value of $\alpha$=0.25 by 2.5dB in CNR to maintain BER=1$\times$10$^{-4}$ when input back-off(IBO) of HPA is 3dB.

Time Delay Estimation Using LASSO (Least Absolute Selection and Shrinkage Operator) (LASSO를 사용한 시간 지연 추정 알고리즘)

  • Lim, Jun-Seok;Pyeon, Yong-Guk;Choi, Seok-Im
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.10
    • /
    • pp.715-721
    • /
    • 2014
  • In decades, many researchers have studied the time delay estimation (TDE) method for the signals in the two different receivers. The channel estimation based TDE is one of the typical TDE methods. The channel estimation based TDE models the time delay between two receiving signals as an impulse response in a channel between two receivers. In general the impulse response becomes sparse. However, most conventional TDE algorithms cannot have utilized the sparsity. In this paper, we propose a TDE method taking the sparsity into consideration. The performance comparison shows that the proposed algorithm improves the estimation accuracy by 10 dB in the white gaussian source. In addition, even in the colored source, the proposed algorithm doesn't show the estimation threshold effect.

Real-Time Frequency Interference Analysis System for Performance Degradation Analysis of MIMO-OFDM WLAN Due to WPAN Interferer (WPAN 간섭원에 의한 MIMO-OFDM WLAN의 성능 열화 분석을 위한 실시간 주파수 간섭 분석 시스템)

  • Yoon, Hyungoo;Park, Jin-Soo;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.1
    • /
    • pp.88-91
    • /
    • 2016
  • In this paper, we have proposed the frequency interference analysis system using both LabVIEW and Universal Software Radio Peripheral(USRP) for performance degradation analysis of Multi Input Multi Output-Orthogonal Frequency Division Multiplexing(MIMO-OFDM) Wireless Local Area Network(WLAN) due to Wireless Local Area Network(WPAN) interferer. The proposed system consists of three part, i.e., victim, channel, and interferer. Both victim and interferer are implemented by LaBVIEW and a USRP board. Then interfering signal and additive white Gaussian noise are combined with the wanted signals of a victim. Measured Bit Error Rate(BER) at the victim receiver is compared with theoretical BER according to various signal to interference plus noise power ratio (SINR) values. Measured and theoretical BER curves show good agreement.

A Study on Growth of the Green Leaf Lettuce Depends on PPFD and Light Quality of LED Lighting Source for Growing Plant (식물재배용 LED 광원의 광질과 PPFD에 따른 청치마상추의 성장에 관한 연구)

  • Yang, Jun-Hyuk;Choi, Won-Ho;Park, Noh-Joon;Park, Dae-Hee
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.28 no.2
    • /
    • pp.142-147
    • /
    • 2015
  • The artificial light sources for growth of plant are usually high-pressure sodium lamp, metal haloids lamp, and fluorescent light; however, these light sources have relatively weaker Red and Blue lights that are necessary for growth of plants. Especially the effect of Photosynthetic Photon Flux Density (PPFD) is pointed out as the weakness. Meanwhile, LED light source can be selected by specific wavelength to greatly improve the effect of PPFD. In this regard, this paper aims to investigate the promotion of plant growth by measuring photosynthetic photon flux density (hereafter referred to as PPFD) according to changes in light quality of the LED light sources. Towards this end, LED light sources for plant growth were produced with 4 kinds of mono-chromatic lights and 6 kinds of combined lights by mixing red, blue, green and white lights. A comparative analysis was conducted to investigate the effects of optical properties and PPFD on plants (green leaf lettuce) using the produced light sources. The results monochromatic light has fastest growth rate, but plant growth conditions have poor. This being so, mixed light is suitable for the green leaf lettuce.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF