• Title/Summary/Keyword: Process Verification

Search Result 2,039, Processing Time 0.03 seconds

Practical Requirements and Verification Management for Requirements-based Development Process in Space Launch Vehicle Development Project (요구조건 기준의 개발 수행을 위한 우주발사체 개발사업의 실제적인 요구조건-검증 관리 체계)

  • Dong Hyun Cho;Jun Hyouk Jang;Il Sang Yoo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.56-63
    • /
    • 2023
  • For the success of system development, it is necessary to systematically manage the requirements that are the basis of system development and its verification results. In order to follow the principles of SE(Systems Engineering)-based V&V(Verification&Validation) process, requirements can be managed by securing the requirements and their establishments, design compliances, and verification compliances according to the system development lifecycle. Especially, in a large-complex system research and development project, such as a space launch vehicle development project, many participants establish, verify, and validate numerous requirements together during the project. Therefore, logical and systematic requirements management, including guarantee of data integrity, change history, and traceability, is very important for multiple participants to utilize numerous requirements together without errors. This paper introduces the practical requirements and verification management for the requirements-based development process in the space launch vehicle development project.

A study on Verification Process for LRT's Power Supply System Based on the ISO/IEC 15288 (국제표준 ISO/IEC 15288 기반의 경량전철 전력시스템 검증 프로세스에 관한 연구)

  • Choi, Won Chan;Bae, Joon Ho;Heo, Jae Hun;Lee, Sang Geun;Han, Seok Youn
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.9 no.1
    • /
    • pp.47-53
    • /
    • 2013
  • The object of this study is to define systematically for outputs of Verification Process among the system life cycle process based on ISO/IEC 15288 for power supply system, which is one of the importance sub-systems to configure the LRT system. Furthermore, to prevent various problem in advance that can occur in the Transition LRT's power supply to be completed Integration. For this purpose, traceability of verification requirement and outputs. should be managed to use verification for system requirement and data processing tool. by system engineering techniques of system life cycle process based on ISO/IEC 15288 to LRT system.

On the Improvement of the Design Verification Process for the Development of Railway Systems with Systems Safety Considered (철도시스템 개발에서 시스템 안전성을 고려한 설계검증 프로세스의 개선에 관한 연구)

  • Sim, Sang-Hyun;Lee, Jae-Chon
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.1
    • /
    • pp.51-60
    • /
    • 2013
  • As the human demand or desire on brand new systems otherwise equipped with new functions grows drastically, so does the complexity of the systems. With this trend, the systems are becoming bigger in scale and at the same time the safety requirements are more stringent in the development. Typical systems examples in such a situation may include high-speed railway systems, aero and space systems, marine systems, etc. Failure of those systems can cause serious damages on both the human being and wealth with social infrastructure. As such, it is quite necessary to ensure that the safety requirements be satisfied in the system development. To achieve this need, there could be a lot of solutions to take. In this paper, regarding safety, a special attention is given to the verification phase process, which is one of the intermediate phases of whole systems development process. More specifically, the ultimate concern is placed on how to carry out the design verification while ensuring the safety requirements. To do so, some improvements in the verification phase were proposed first. Then, the outcomes were combined with the systems safety process by generating an integrated process model to reach the goal. As a case study, application to a railway system was discussed, where strict safety requirements are usually necessary. It would be expected that the potential likelihood of failure with rail systems could be reduced if the results obtained are used effectively with some enhancement from further study.

Design of Seal Imprint Identification System for Personal Verification (본인확인을 위한 인감조합시스템의 설계)

  • 조기형;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.8
    • /
    • pp.793-800
    • /
    • 1991
  • In this paper, proposed the seal imprint verification system that could add on the redident information system. In the positioning process, used ring data and in the matching process, used XY pixel distribution. As a result of the verification experiment, the error verification ratio is about 1%. But could verify that this system could be added and operated on the resident information system through the eye-decision after subtacting and adding process.

  • PDF

VCB Control Algorithm Verifications of Korean High Speed Train (한국형 고속전철의 VCB 제어 알고리즘 검증)

  • Jeon, J.W.;Jeong, P.K.;Lee, J.H.;Park, D.Y.;Kim, Y.J.;Lee, B.S.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07b
    • /
    • pp.1362-1364
    • /
    • 2000
  • This paper presents the control algorithm verification process for VCB (Vacuum Circuit Breaker) of Korean High Speed Train. In order to enhance the reliability of the control algorithm, the verification process must be performed. The verification is conducted by comparing the pre-designed control algorithm with the pre-planned scenario by simulation tools such as SDL and MSC. This verification process will be applied to the other control algorithms of various control units of Korean High Speed Train.

  • PDF

A Study on the Requirement Verification in the Weapon System R&D (무기체계 연구개발 요구사항 검증에 관한 연구)

  • Kwon, Yong Soo;Kim, Kyoung Jin;Lee, Kyoung Haing
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.3 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • The requirement verification is the integral part of the weapon system R&D to reduce cost and schedule. And, a systems engineering is an interdisciplinary engineering management process that evolves and verifies an integrated, life-cycle balanced set of system solutions that satisfy customer needs. Therefore, this study analyzes the national defense need and acquisition management process, investigates the systems engineering verification activity. Through the requirement verification example in terms of technical evaluation this study presented the requirement verification approach in the weapon system R&D.

  • PDF

OSS (Open Source Software) Usage Considerations and Verification Method (OSS 활용 고려사항과 검증 방법)

  • Park, J.H.;Park, Y.S;Kim, H.K.;Kim, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.142-153
    • /
    • 2019
  • In this paper, we focus on the process of using open source software (OSS) and factors that should be considered when using project-based OSS. We also elaborate on how to avoid using OSS licenses in an OSS-based technology development process, why dual OSS licenses and security threats should be avoided, and the method of notification after use. In addition, the OSS license verification method and environment are described in the course of project development. In the verification method, the OSS license used for technology development in the course of project execution is validated in advance by the person who decides whether or not to use the OSS, and then additional verification using the tool after technology development. It is expected that this paper will be helpful for establishing the OSS usage consideration and the license verification procedure, and environment in the future.

Development and Application of Timeout Protocol on OR (수술실 타임아웃 프로토콜 개발 및 적용)

  • Park, Jeong-Sook;Kim, Eun-Hee;Lee, Hye-Ran
    • Korean Journal of Adult Nursing
    • /
    • v.20 no.2
    • /
    • pp.353-363
    • /
    • 2008
  • Purpose: This study was conducted to develop a timeout protocol as the process of patients verification in the operating room, and to evaluate its effects. Methods: The timeout protocol was developed based on the experience of practices and the universal protocol of JCAHO 2004. The subjects of this study were 192 surgical members working in the operating room at an university hospital in Daegu, Korea. Results: The timeout protocol was developed in six steps; participants verification, encouragement of compliance, verification of right 3 PSP, agreement of surgical team members, verification of the parties to a patient, patient agreement. The data which have been resulted from the experimental group show significantly higher than those of control group as follows; cognition(t = -6.580, p = .000), contents of performance; progress of anesthesiologist as leader(${\chi}^2$ = 29.029, p = .000), verification of right patient, right site and right procedure(${\chi}^2$ = 40.663, p = .000), participation of surgical team(${\chi}^2$ = 68.412, p = .000), and the number of cases of performance(${\chi}^2$ = 242.900, p = .000). Conclusion: It suggests that medical accidents caused by failures in a preoperative verification process can be prevented if a timeout is conducted active involvement and effective communication among surgical team members for a final verification of the correct patient, procedure, and site.

  • PDF

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.