The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to make high quality software and high reliability software, systematic development management and organizational support are essential needed. Since 1990's Software process models such as ISO/IEC 15504 and CMMI have been used to improve organization capability. Korean Software Process Quality Certification is established by law in 2008 year. The way of eastern Asian's thinking and western...
This paper analyzes the detection probability of FMCW-UWB radar based on Doppler frequency and ADC bit for oil tank level gauge. The FMCW-UWB radar system consists of a transmitted part and a received part and uses an additive white Gaussian noise (AWGN) channel. The system model is verified through analysis and simulation. The performance degradation of detection does not occur in FMCW-UWB radar...
For radar systems, target detection procedures need to be conducted with a received signal amplitude that exceeds the CFAR (Constant False Alarm Rate) threshold. An Ordered Statistics CFAR (OS-CFAR), based on a sorting algorithm, is useful for an automotive radar system in a multi-target situation. However, it has a limitation in that it requires a higher computation effort than a typical Cell Averaging...
Multiple-Input Multiple-Output (MIMO) spatial multiplexing is a promising technique to increase the channel capacity without increasing bandwidth. One of the key to successful application of this technique is in receiver design. Recently, a low complexity receiver algorithm, based on asymmetrical poly-diagonalization and trellis decoding, is investigated. It can provide tradeoff between performance...
This paper proposes an efficient multicast-like transfer mechanism for on-demand video streaming. The rapid growth of Internet video services such as YouTube has caused increased traffic and network congestion. Network driven multicast-like transfer is a desirable protocol to suppress unicast-based video traffic efficiently using multicastlike packet forwarding. To analyze the applicability of this...
ICT systems have been investigated for flexible systems configuration, systems operation cost reduction, environmental impact reduction, etc. Cloud computing has attracted attention as technology that solves these. In the U.S., business Cloud services, such as Amazon EC2/S3, Google Apps, Force.com, and Windows Azure, are gaining more and more users. Additionally, study of Cloud computing, such as...
This work focuses on modeling router-level network topologies. We studied global optimization models to deal with realistic network conditions that engineers face in the design process. Appropriate network conditions must be applied to the models. Our interest is in analyzing what network conditions lead to power-law networks, which is regarded as a feature of real networks. Evaluations of these network...
While information and communication technologies (ICT) are expected to improve energy efficiency, the spread of ICT will also increase power consumption by server loads and network traffic. In this paper, we present a traffic management scheme to control traffic volume and server load by using a virtual machine (VM) in cloud architecture. The proposed scheme solves the inefficiency concerning the...
This paper presents a mobile-carrier choice modeling to analyze customer preference and understand customer choice behavior in the mobile phone market. Due to severe competitive conditions, there are a few differences among mobile phone services provided by mobile-carriers. We propose a new mobile-carrier choice modeling considering incentive factors and restrictive factors as decision-making factors...
Specification-based testing of concurrent software systems always faces strong challenges. One main reason is that there exists nondeterminism in both the specifications and the corresponding programs. For this reason, it is not easy to generate test cases on the basis of a specification, the execution of a test case may not follow a specification trace (or scenario) as expected, and the testing result...
This paper proposes a business process testing scenario generation based on test cases composition. Just like path oriented testing technique in structure testing area, this testing method focuses on finding the logical error in the process implementation according to the formal business process presentation. The test cases against a node of process designed by the techniques such as boundary value...
This paper presents an approach to capturing safety properties for safety critical systems using the Structured Object-oriented Formal Language (SOFL). The approach features a process and five keys for capturing safety properties that need to be verified based on a software model. The five keys include constraints of functions, domain knowledge for functions, developer's experience, real-time constraints...
The modelling and verifying of hybrid systems attract more and more attentions recently. Hybrid automaton is widely used to model discrete and continuous behaviors of hybrid systems. In this paper, a hybrid interface automaton(HIA) is proposed based on hybrid automaton to model the interface behaviors of hybrid components. According to the interface type of components, we define two kinds of HIA to...
As size and complexity have increased, formal verification of hardware designs is a challenge to us. This paper presents a case study for verification of a full adder design using the axiom system of Propositional Projection Temporal Logic (PPTL). The paper focuses on the functional verification of the adder. To this end, the syntax, semantics and axiom system for PPTL are briefly introduced. Further,...
Due to the stochastic nature and time constrains, it is important to quantitatively verify the reliability of Web applications as well as the usability. However, the reliability involves different kinds of QoS metrics, which is hard to be verified by the "yes" or "no" assertion in general model checking. This paper proposes a verification approach to analyzing the performance of...
Appearance of social media cloud system can provide media services and open tools for share own ideas, opinions, experience and etc. Also, the increase in mobile device with mobility has increased the need for a tool of media information sharing and a user-created content circulation through the network. Therefore service providers of social media are developing virtualization rule to constitute resource...
Migration systems in server virtualization environments distribute workloads and solve resource shortage problems by moving a virtual machine in hotspot to a physical server having residual resources. Most of the migration systems use the first-fit algorithm known as an efficient solution for bin packing problem to determine the migration policies. Since the resource usages of virtual servers continuously...
In recent year, rapid advancement of UPnP technology cause development of a variety of UPnP devices. In addition, various UPnP services developed for the devices. In home network environment, user needs continual UPnP service. However, the services based on UPnP are not provided continually, because of imperfect matching among the heterogeneous devices. To solve these problems, this paper proposes...
In recent years, rapid advancement of internet and communication technologies as a way of social communications has emerged as the SNS. This way of communication needs social data analysis method for the meaningful information. In addition, rapidly increasing social data causes the lack of reliability of the information in the community. Therefore, an effective semantic analysis method is required...
In recent years, social network service based on mobile devices has obtained lots of interests from many users, developers as well as service providers. However, many users do not gain high quality social media services due to the fact that mobile devices have bad performance of hardware. In order to overcome the limitation of hand devices, most providers are applying cloud computing techniques, especially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.