B. Park, S. Moon, K. Kim, W. Jang, R. Kim, C. Carlson
{"title":"Refining an Assessing Model for Simplified TMM","authors":"B. Park, S. Moon, K. Kim, W. Jang, R. Kim, C. Carlson","doi":"10.1109/PLATCON.2016.7456820","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456820","url":null,"abstract":"Certification models, e.g. CMMI and TMMi, are hard to use most small software development organizations in Korea. Moreover, some companies do not have their own teams in charge of testing. To solve this issue, we propose the assessment method of a simplified test maturity model for small SW development organizations in local environment and. For the proposed assessment method, we consider the environment surrounding the local software industry and development teams, and then determine how to establish the assessment method. We show the proposed assessment method to apply local SMEs for their conditions, and reduces cost and labor as well as shortens the time spent on assessment in contrast to the previous models.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131829992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study of Flipped Learning in Pre-Service Science Teachers Class","authors":"Mabyong Yoon, Haksung Kim, Jongha Lee","doi":"10.1109/PLATCON.2016.7456786","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456786","url":null,"abstract":"This study planned lectures on 'theory of science education' for pre-service science teachers with flipped learning teaching method, and applied them to classes. Through this, the study aimed to explore applicability of flipped learning teaching-learning method, and gain implications regarding practical ways of flipped learning classes. Flipped learning emphasizes learner-oriented 'learning', from teacher-oriented 'teaching'. It is a teaching method that the most affected classes can be made with student-oriented activities, hence flipped learning draws active learning of students, mate-support learning and advantages of problem-solving learning. In flipped learning classes, a place for an active communication was provided, where students met friends of the same age, spent time together, sympathized with each other and received support.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116698982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Firmware Cryptographic Modules on Various MCU Environments","authors":"Hyunjung An, Seunghwan Yun, Okyeon Yi","doi":"10.1109/PLATCON.2016.7456815","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456815","url":null,"abstract":"With the development of IoT(Internet of Things), the combination of ICT(Information and Communications Technologies) is active in devices and systems on off-line and the Hyper Connectivity Age is becoming. This provides convenience and usefulness to users, at the same time provides threats of IT security issue to users. It is possible to utilize the cryptographic module in order to solve the security problems. However applying a cryptographic module in legacy devices gives considerably greater effect on the limited resource of devices and system itself. So it is necessary to select an appropriate level of device environment in order to solve this problem. Therefore, in this paper, after shipping the firmware cryptographic module in a similar environment to MCU chips well known relatively large, it is trying to measure the processing speed of cryptographic functions and to compare and to analyze. It is expected that there will be able to provide an indication of choice of devices for applying the cryptographic functions.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distinguishing Attack on XO-64","authors":"Tran Song Dat Phuc, Changhoon Lee","doi":"10.1109/PLATCON.2016.7456794","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456794","url":null,"abstract":"XO-64 block cipher provides a high performance with small hardware requirement in implementation. It is designed in improvement of high applicability, high flexibility, and high reliability in fast and efficient telecommunication system, based on conception of data-dependent operation (DDO); same as some other ciphers MD-64, KT-64, Eagle-64, Eagle-128...; and substitution permutation network (SPN). Besides achieving high-speed rate in FPGA devices, this cipher also shows high secure against known attacks, such as differential attack, linear attack. In this paper, by constructing related-key differential characteristics with high probability on 6-round reduced XO-64, we explore the possibility to distinguish between a 6-round reduced XO-64 and a 64-bit random permutation. A distinguishing attack on a 6-round reduced XO-64 is proposed, requires complexities of 244 in data, 247 in memory, and 265 in computation time. In future, our attack method is expected to extend to related-key recovery attack on this cipher algorithm, and other ciphers with same type of structure designs so far.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SW Visualization Framework for Safe Software","authors":"S. Moon, B. Park, R. Kim","doi":"10.1109/PLATCON.2016.7456829","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456829","url":null,"abstract":"Today, it has been increasing software in most applications of most industry fields. Likewise, diverse industries (such as cars, aviation, and medical equipment) not only have adopted software, SW-related safety issues but also have emerged. Despite the concerns over SW quality, the competitiveness of local SW quality has diminished. With Safe SW technology, we need to reduce the socio- economic damages resulting from SW defects, and to enhance the competitiveness in global market. This paper proposes a SW visualization framework to develop error-free and safe software.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code Complexity on Before and After Applying Design Pattern through SW Visualization","authors":"S. Moon, B. Park, R. Kim","doi":"10.1109/PLATCON.2016.7456787","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456787","url":null,"abstract":"Software is actually depended on his/her coding maturity of each developer. Software is inevitably used in all fields due to ICT convergence, which is increasing on the issue of code quality. His/her developer avoids to show source codes to other persons, and also repeats to modify them, which finally makes spaghetti codes. Therefore, it will be possible to increase bug occurrence, and also fall below legibility and understanding of the code. Its code quality is depended on the maturity of a developer. To protect this problem, we apply SW visualization with GOF design pattern to make good design structure. Design pattern is a verified solution to provide with object oriented design. Code complexity is essentially referred to software quality, which has low complexity to easily understand, and has low possible to occur errors. In this paper, the SW Visualization method is applied to compare the relationship between each code complexity Before and After applying design pattern to enhance the quality of codes.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UX Design Guideline for Health Mobile Application to Improve Accessibility for the Visually Impaired","authors":"W. Kim, I. Kim, Man Ki Jeon, Jongoh Kim","doi":"10.4018/978-1-5225-5270-3.CH012","DOIUrl":"https://doi.org/10.4018/978-1-5225-5270-3.CH012","url":null,"abstract":"A Health Mobile Application (App) has enabled users to access personal health record at any time and place. As an App provides health service to users, it is crucial for an App to be accessible to every user. However, it is often an App does not provide proper visual aid for users who are visually impaired. We restrict the range of visually impaired to retinitis pigmentosa (RP) patients in this paper. RP is a rare type of progressive retinal disease which is hard to cure. Unfortunately, there are no established guidelines to assist RP patients in using their degrading sense of vision. In this paper, we review MWAG(Mobile Web Accessibility Guidelines) specified by W3C and analyze the UX designs of 140 popular health apps chosen based on the number of download counts in app stores and we propose a set of standard-compliant UX design guidelines to assist the visually impaired(RP) in accessing visual data.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134021855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Reducing Energy Consumption Using Inter-Process Scheduling in Preemptive Multitasking OS","authors":"S. Mostafa, S. Kusakabe","doi":"10.1109/PLATCON.2016.7456832","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456832","url":null,"abstract":"In this paper, we propose a new approach to efficiently reduce energy consumption when running multithreaded processes concurrently. Current proportional sharing schedulers of general purpose OSs don't take into account greedy behavior of multithreaded process (processes with more threads receive more aggregate CPU time from the scheduler relative to processes with fewer threads) when scheduling threads. In order to reduce energy consumption for simultaneous multithreaded (SMT) architectures, we investigate the effect of adjusting the weights of running sibling threads (threads forked from the same process) using novel proportional sharing scheduler, Thread Weight Readjustment Scheduler (TWRS), which aims to reduce the greedy behavior and the number of context switches. The context switches time is a pure overhead because the system does no useful work while switching. Reducing such overhead leads to minimizing energy consumption. TWRS provides a practical solution for multitasking OSs because it operates in concert with existing kernels. We have implemented TWRS in Linux 2.6.24-1, which represents the most prevalent scheduler design, e.g. Completely Fair Scheduler (CFS). The proposed scheduler based on a modification on the Linux kernel to schedule multithreaded processes in a multitasking OS environment. Our evaluation shows that our scheduler reduces energy consumption.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114710264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae-Gon Kim, June-Young Bang, Seungkil Lim, Byunghoon Kim
{"title":"Framework of Lot Order Pegging for Semiconductor Manufacturing","authors":"Jae-Gon Kim, June-Young Bang, Seungkil Lim, Byunghoon Kim","doi":"10.1109/PLATCON.2016.7456800","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456800","url":null,"abstract":"Presented in the paper are a framework and applications of a lot pegging system for semiconductor manufacturing. The lot pegging system evaluates the completion times and the status of lots assigned to customers' orders, and informs the resulting information to the Marketing and Sales and the customers for customer service. The proposed lot pegging system is being imple-mented for a couple of IC chip makers in Korea.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114792176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transaction Authentication Scheme Based on Enhanced Signature RTD for NFC Payment Service Environments","authors":"Sung-wook Park, Imyeong Lee","doi":"10.1109/PLATCON.2016.7456833","DOIUrl":"https://doi.org/10.1109/PLATCON.2016.7456833","url":null,"abstract":"Recently, the combination of mobile and NFC aroused great momentum for Activation of NFC services market. Especially, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of credit card information hacking by POS terminal based on KS X 6928, standard. we proposed a secure transaction authentication scheme based on enhanced signature RTD in NFC payment service environments to using signature RTD standard and KS X 6928 standard.","PeriodicalId":247342,"journal":{"name":"2016 International Conference on Platform Technology and Service (PlatCon)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126679700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}