• Title/Summary/Keyword: 검증(validation)

Search Result 2,491, Processing Time 0.028 seconds

Verification Checking Mechanisms of Business Processes based on Control Flow Path (컨트롤 흐름 경로 기반의 비즈니스 프로세스 타당성 검증 기법)

  • Kim, Hak-Soo;Park, Chan-Hee;Sul, Joo-Young;Son, Jin-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.14D no.5
    • /
    • pp.531-544
    • /
    • 2007
  • As the current trend in e-business has led to more various and complex business processes in recent years, problems in business process models have increased gradually. Accordingly, the concern to validation of business process models has been much larger but there are few validation checking mechanisms supported so far. On the other hand BPMN driven by BPMI is a standard graphical notation. Using the tool supporting BPMN, business process can be modeled graphically and analyzed easily. In this paper, we present technical mechanisms which can efficiently detect anomalies in a process composed of BPMN and are capable of avoiding higher unexpected costs during runtime.

Design of Validation Procedure for Certification for PKI Based Next Generation Mobile Networks (PKI 방식의 차세대 이동통신 망에 적용 가능한 인증서 검증 절차 설계)

  • Jeong, Jang-Min;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.22 no.A
    • /
    • pp.95-100
    • /
    • 2002
  • When the wireless PKI is applied to 3G/4G mobile network which requires mutual authentication among all entities, the wired PKI procedure is not feasible for validating visited network's certifications because of the wireless environmental limitations. Also, if we depend on WAP based PKI, we cannot support confidence about certification validation since the information offered from visited network is not authenticated. Therefore, in this paper we consider various and unique characteristics of mobile environment for certification validation at 3G/4G mobile networks based on wireless PKI and then propose two certification validation procedures.

  • PDF

Requirements Validation Plan for korean Rubber-Tired AGT System (한국형 고무차륜 경량전철시스템에 대한 요구사항 검증계획)

  • Mok, Jae-Gyun;Lee, An-Ho;Han, Seok-Yun
    • 시스템엔지니어링워크숍
    • /
    • s.1
    • /
    • pp.27-31
    • /
    • 2003
  • This study is in a part of requirements validation plan for korean rubber-tired AGT system on test track. The AGT system is consisted subsystems as vehicle, signalling, communication, power distribution and infrastructure for rubber tire running on track. The subsystems will be installed and integrated on test track till next year for test and evaluation. This paper shows overview for test and evaluation in terms of system requirements and its validation classification, test track configuration, measuring system requirements and its configuration. The whole process of system integration and its validation will be controlled by means of KMS including documentation.

  • PDF

Model Validation Methods of Population Pharmacokinetic Models (집단 약동학 모형을 위한 모형 진단과 적합도 검정에 대한 고찰)

  • Lee, Eun-Kyung
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.1
    • /
    • pp.139-152
    • /
    • 2012
  • The result of the analysis of a population pharmacokinetic model can directly influence the decision of the dose level applied to the targeted patients. Therefore the validation procedure of the final model is very important in this area. This paper reviews the validation methods of population pharmacokinetic models from a statistical viewpoint. In addition, the whole procedure of the analysis of population pharmacokinetics, from the base model to the final model (that includes various validation procedures for the final model) is tested with real clinical data.

Rubber O-ring defect detection system using K-fold cross validation and support vector machine (K-겹 교차 검증과 서포트 벡터 머신을 이용한 고무 오링결함 검출 시스템)

  • Lee, Yong Eun;Choi, Nak Joon;Byun, Young Hoo;Kim, Dae Won;Kim, Kyung Chun
    • Journal of the Korean Society of Visualization
    • /
    • v.19 no.1
    • /
    • pp.68-73
    • /
    • 2021
  • In this study, the detection of rubber o-ring defects was carried out using k-fold cross validation and Support Vector Machine (SVM) algorithm. The data process was carried out in 3 steps. First, we proceeded with a frame alignment to eliminate unnecessary regions in the learning and secondly, we applied gray-scale changes for computational reduction. Finally, data processing was carried out using image augmentation to prevent data overfitting. After processing data, SVM algorithm was used to obtain normal and defect detection accuracy. In addition, we applied the SVM algorithm through the k-fold cross validation method to compare the classification accuracy. As a result, we obtain results that show better performance by applying the k-fold cross validation method.

A Study on the Realtime Cert-Validation of Certification based on DARC (DARC 기반에서의 실시간 인증서 유효성 검증에 관한 연구)

  • Jang, Heung-Jong;Lee, Seong-Eun;Lee, Jeong-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.517-524
    • /
    • 2001
  • There are cases that revoke the certification because of disclosure of private key, deprivation of qualification and the expiration of a term of validity based on PKI. So, a user have to confirm the public key whether valid or invalid in the certification. There are many method such as CRL, Delta-CRL, OCSP for the cert-validation of certification. But these method many problems which are overload traffic on network and the CRL server because of processing for cert-validation of certification. In this paper we proposed the realtime cert-validation of certification method which solved problems that are data integrity by different time between transmission and receiving for CRL, and overload traffic on network and the CRL server based on DARC.

  • PDF

Automatic Validation of the Geometric Quality of Crowdsourcing Drone Imagery (크라우드소싱 드론 영상의 기하학적 품질 자동 검증)

  • Dongho Lee ;Kyoungah Choi
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_1
    • /
    • pp.577-587
    • /
    • 2023
  • The utilization of crowdsourced spatial data has been actively researched; however, issues stemming from the uncertainty of data quality have been raised. In particular, when low-quality data is mixed into drone imagery datasets, it can degrade the quality of spatial information output. In order to address these problems, the study presents a methodology for automatically validating the geometric quality of crowdsourced imagery. Key quality factors such as spatial resolution, resolution variation, matching point reprojection error, and bundle adjustment results are utilized. To classify imagery suitable for spatial information generation, training and validation datasets are constructed, and machine learning is conducted using a radial basis function (RBF)-based support vector machine (SVM) model. The trained SVM model achieved a classification accuracy of 99.1%. To evaluate the effectiveness of the quality validation model, imagery sets before and after applying the model to drone imagery not used in training and validation are compared by generating orthoimages. The results confirm that the application of the quality validation model reduces various distortions that can be included in orthoimages and enhances object identifiability. The proposed quality validation methodology is expected to increase the utility of crowdsourced data in spatial information generation by automatically selecting high-quality data from the multitude of crowdsourced data with varying qualities.

An Efficient Certificate Status and Path Validation System for Client-Server Environment (클라이언트-서버환경에 적합한 효율적인 인증서상태 및 경로검증 시스템)

  • 최영철;박상준;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.99-113
    • /
    • 2003
  • As a research on PKI(Public Key Infrastructure) is being very popular, the study relating to certificate status and path validation is being grown with aim to reduce an overhead of the protocol and to provide an efficient operation. But in spite of a lot of related research there is still almost no protocol that we can use for real-time based client-server environment with large scale like internet banking. In this paper, we shows that the existing standards or protocols are not suitable to be used for such a real-time based client-server environment with large scale, and then proposes an efficient certificate status and path validation system.

On the SEED Validation System (SEED 구현 적합성 검증 시스템에 관한 연구)

  • Kim, Yeok;Jung, Chang-Ho;Jang, Yoon-Seok; Lee, Sang-Jin;Lee, Sung-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.69-85
    • /
    • 2003
  • In this paper, we discuss a validation test for cryptographic algorithms. The cryptographic algorithms decide on the security and the confidence of a security system protecting sensitive information. So. the implementation of cryptographic algorithms is very critical of the system. The validation lest specifies the procedures involved in validating implementations of the cryptographic standards and provides conformance testing for components or procedures of the algorithm. We propose a SEED Validation System(SVS) to verify that the implementation correctly performs the SEED algorithm. The SVS is composed of two types of validation tests, the Known Answer test and the Monte Carlo test. The System generates the testing data for the Known Answer tests and the random data for the Monte Carlo tests. This system can be used to validate and certify the cryptographic product.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.