• Title/Summary/Keyword: Process Verification

Search Result 2,041, Processing Time 0.03 seconds

A Study on Improving the Constructing System of Railway Safety Test Facilities (철도안전성능시험설비 구축 체계 개선에 관한 연구)

  • Kim, Yun-Mi;Choi, Kyoung-Jin;Cho, Youn-Ok
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.2034-2039
    • /
    • 2010
  • As a mass transportation system, a railway contains potential risks that may result in a high death rate and property losses. Accordingly, Railroad Safety Technology R&D Corps. is adopting the plan of the construction of Railway Safety Test Facilities as a part of the Railway Total Safety Project to enhance the railway safety, and carrying out researches on effective project management methods with Systems Engineering techniques. When a system or a service is realized, such as the Railway Total Safety Project, it needs to be verified by requirements and the process of verification is to check whether customers/stakeholders requirements have been properly transformed into a system or a service. Recently, building the standardized verification system up could be the solution to reduce possible system-failed risks. To support that, we propose the more effectual verification method of constructing the Railway Safety Test Facilities applying the systems engineering tool to the research.

  • PDF

Verification Experiment and Analysis for 6 kW Solar Water Heating System(Part 1: Verification Experiment) (6kW급 태양열 온수급탕 시스템의 실증실험 및 분석(제1보 실증실험))

  • 김진홍;김성수;최봉수;홍희기
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.16 no.2
    • /
    • pp.128-134
    • /
    • 2004
  • In order to verify and take measures against a variety of troubles which cannot be predicted in a well-controlled laboratory, it is necessary that solar system should be experimented in an actual situation during a long period. Through this experiment it can be also understood how the load pattern and operational conditions expected in a design process become different to those in the actual running, which can be applied to a new system design. We installed 6 kW solar hot water heating system with a shower facility and operated during 7 months. As a result, average 8.3 persons took a shower a day; solar fraction is 71% and total collector efficiency is 40% during the periods from March to September. We confirmed several troubles encountered in the actual situation and considered practical center-measures.

An analysis of tests process for verification of DC Traction system performance (직류 급전시스템 성능검증을 위한 시험방안 분석)

  • Jung, Ho-Sung;Han, Moon-Seob;Jang, Dong-Uk;Lee, Ki-Won
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.499-504
    • /
    • 2008
  • DC substation of urban transit supplies a suitable DC power on electricity vehicles by being supplied from KEPCO. DC substation is verified electrical safety of system through pre-operation inspection on electrical installations to be supplied power from KEPCO. However, because test items and method for DC traction system are unprepared on pre-operation inspection, the general safety and performance verification of DC traction system are very insufficient. Therefore this paper analyze the overseas test examples such as factory equipment tests, factory combined tests and railway tests for the safety and performance verification of DC traction system and present a suitable test items and test standard in domestic.

  • PDF

Probability Adjustment Scheme for the Dynamic Filtering in Wireless Sensor Networks Using Fuzzy Logic (무선 센서 네트워크에서 동적 여과를 위한 퍼지 기반 확률 조절 기법)

  • Han, Man-Ho;Lee, Hae-Young;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.159-162
    • /
    • 2008
  • Generally, sensor nodes can be easily compromised and seized by an adversary because sensor nodes are hostile environments after dissemination. An adversary may be various security attacks into the networks using compromised node. False data injection attack using compromised node, it may not only cause false alarms, but also the depletion of the severe amount of energy waste. Dynamic en-route scheme for Filtering False Data Injection (DEF) can detect and drop such forged report during the forwarding process. In this scheme, each forwarding nodes verify reports using a regular probability. In this paper, we propose verification probability adjustment scheme of forwarding nodes though a fuzzy rule-base system for the Dynamic en-route filtering scheme for Filtering False Data Injection in sensor networks. Verification probability determination of forwarding nodes use false traffic rate and distance form source to base station.

  • PDF

Efficient Simulation Acceleration by FPGA Compilation Avoidance (FPGA 컴파일 회피에 의한 효과적인 시뮬레이션 가속)

  • Shim, Kyu-Ho;Park, Chang-Ho;Yang, Sei-Yang
    • The KIPS Transactions:PartA
    • /
    • v.14A no.3 s.107
    • /
    • pp.141-146
    • /
    • 2007
  • In this paper, we proposed an efficient FPGA-based simulation acceleration method based on FPGA compilation avoidance, which can effectively decrease the long debugging turnaround time incurred from the every debugging process in the functional verification. The proposed method had been experimentally applied to the functional verification for a microcontroller design. It had clearly shown that the debugging turnaround time was greatly reduced while the high simulation speed of the simulation acceleration was still maintained.

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • Gee-hee Yun;Kyoung-jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

Method for Delegating Remote Attestation Verification and Establishing a Secure Channel (대리자를 통한 원격증명 검증 및 보안 연결 성립 방법)

  • Lee, Kyeong-Ryong;Cho, Yeong-Pil;You, Jun-seung;Paek, Yun-Heung
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.267-269
    • /
    • 2021
  • Trusted Execution Environment(TEE) is an execution environment provided by CPU hardware to gain guarantee that the execution context is as expected by the execution requester. Remote attestation of the execution context naturally arises from the concept of TEEs. Many implementations of TEEs use cryptographic remote attestation methods. Though the implementation of attestation may be simple, the implementation of verification may be very complex and heavy. By using a server delegating the verification process of attestation information, one may produce lightweight binaries that may verify peers and establish a secure channel with verified peers.

Embedded Fingerprint Verification Algorithm Using Various Local Information (인근 특징 정보를 이용한 임베디드용 지문인식 알고리즘)

  • Park Tea geun;Jung Sun kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4C
    • /
    • pp.215-222
    • /
    • 2005
  • In this paper, we propose a fingerprint verification algorithm for the embedded system based on the minutia extracted using the image quality, the minutia structure, and the Sequency and the orientation of ridges. After the pre- and the post-processing, the true minutia are selected, thus it shows high reliability in the fingerprint verification. In matching process, we consider the errors caused by shift, rotation, and pressure when acquiring the fingerprint image and reduce the matching time by applying a local matching instead of a full matching to select the reference pair. The proposed algorithm has been designed and verified in Arm920T environment and various techniques for the realtime process have been applied. Time taken from the fingerprint registration through out the matching is 0.541 second that is relevant for the realtime applications. The FRR (False Reject Rate) and FAR (False Accept Rate) show 0.079 and 0.00005 respectively.

Shot Boundary Verification using Visual Rhythm (시각 율동을 이용한 샷 경계 검증)

  • Kim, Heyeok-Man;Lee, Jin-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.3
    • /
    • pp.201-209
    • /
    • 2000
  • Recent works regarding video shot change detection algorithms show that abrupt shot changes are detected fairly well. However, gradual shot changes including wipes and dissolves are often missed or falsely detected. A robust shot change detection system, therefore, must include a shot verification step to further enhance the overall system performance. In this paper, we introduce the concept of the visual rhythm which is a single image, a subsampled version of a full video. On the visual rhythm, the different video edit effects such as cuts, wipes and dissolves manifest themselves as different patterns. Using this characteristic, it becomes possible, without sequentially playing the entire video, to find false positive shots as well as undetected shots. Thus, inclusion of the visual rhythm in the shot boundary verification process will aid the operator to exclude falsely detected shots as well as to find undetected shots fast and efficiently. For this purpose we have developed a new tool, a shot verifier incorporating the visual rhythm. The usefulness of the visual rhythm during the shot verification process will be presented.

  • PDF

Development of Automatic Test Equipment for Hardware Verification of Aircraft Stores Management Computer (항공기용 무장관리컴퓨터 하드웨어 검증을 위한 자동시험 장비 개발)

  • Oh, Soo-heon;Jeon, Eun-seon;Kim, Kap-dong;Park, Jun-hyun
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.377-383
    • /
    • 2021
  • In this paper, we describe the case of automatic test equipment development for hardware verification of stores management computer mounted on aircraft. Recently, the required functions of aircraft have been diversified and the related technologies of avionics equipment have developed, and the types and quantity of interfaces required for avionics equipment have increased. In addition to the existing old stores, the stores management computer also needs to control the interface in large quantities as the requirements for the new stores are added. For this reason, the time and manpower required for the inspection of avionic equipment are also increasing, and if the test process of avionic equipment can be automated and unmanned, more efficient inspection system operation will be possible. Therefore, this paper introduces the case of designing test software and test scenario to automate the structural design contents and verification process of test equipment required for the verification of hardware function of stores management computer.