• 제목/요약/키워드: Program Verification

검색결과 1,065건 처리시간 0.027초

Z-map 기반 가공 검증모델을 이용한 칩부하 제어기 (Chip Load Control Using a NC Verification Model Based on Z-Map)

  • 백대균;고태조;박정환;김희술
    • 한국정밀공학회지
    • /
    • 제22권4호
    • /
    • pp.68-75
    • /
    • 2005
  • This paper presents a new method for the optimization of feed rate in sculptured surface machining. A NC verification model based on Z-map was utilized to obtain chip load according to feed per tooth. This optimization method can regenerate a new NC program with respect to the commanded cutting conditions and the NC program that was generated from CAM system. The regenerated NC program has not only the same data of the ex-NC program but also the updated feed rate in every block. The new NC data can reduce the cutting time and produce precision products with almost even chip load to the feed per tooth. This method can also reduce tool chipping and make constant tool wear.

Z-map 기반 NC 검증모델을 이용한 칩부하 제어 (Chip Load Control Using A NC Verification Model Based on Z-Map)

  • 백대균;고태조;김희술
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2000년도 추계학술대회 논문집
    • /
    • pp.801-805
    • /
    • 2000
  • This paper presents a new method of tool path optimization. A NC verification model based Z-map was utilized to obtain chip load in feed per tooth. This developed software can regenerate a NC program from cutting condition and the NC program that was generated in CAM. The regenerated NC program has not only all same data of the ex-NC program but also the new feed rates in every block. The new NC data can reduce the cutting time and manufacture precision dies with the same chip load in feed per tooth. This method can also prevent tool chipping and make constant tool wear. This paper considered the effects of acceleration and deceleration in feed rate change.

  • PDF

암호모듈 검증 정책에 관한 연구 (A Study on the Policy of Cryptographic Module Verification Program)

  • 최명길;정재훈
    • 한국산학기술학회논문지
    • /
    • 제12권1호
    • /
    • pp.255-262
    • /
    • 2011
  • 정보통신분야의 발전은 해킹 등의 역기능을 발생에 따라 정보보호를 위한 암호모듈의 한 수요가 급증한다. 국내 암호모듈 평가 기준의 불명확성과 모듈 선정의 어려움은 모듈 및 제품 상호간의 운용 및 호환성 확보를 어렵게 한다. 본 연구는 국외 암호모듈 평가 프로그램인 CMVP(Cryptographic Module Verification Program)를 분석하여 국내 암호모듈 암호 모듈 검증 기준 및 평가 절차, 검증 정책 발전 방향을 제안한다. 본 연구는 국내 암호모듈 발전정책을 제안하여 암호모듈 국제 표준화, 국제 암호모듈 제도에 대한 공조를 기반을 제공한다.

자궁경부암 근접치료 시 선량 검증 프로그램을 통한 임상적 위험성 평가 (Clinical Risk Evaluation Using Dose Verification Program of Brachytherapy for Cervical Cancer)

  • 강동진;신영주;강진규;정재용;이우진;백태성;이보람
    • 대한방사선기술학회지:방사선기술과학
    • /
    • 제45권6호
    • /
    • pp.553-560
    • /
    • 2022
  • The purpose of this study is to evaluate the clinical risk according to the applicator heterogeneity, mislocation, and tissue heterogeneity correction through a dose verification program during brachytherapy of cervical cancer. We performed image processing with MATLAB on images acquired with CT simulator. The source was modeled and stochiometric calibration and Monte-Carlo algorithm were applied based on dwell time and location to calculate the dose, and the secondary cancer risk was evaluated in the dose verification program. The result calculated by correcting for applicator and tissue heterogeneity showed a maximum dose of about 25% higher. In the bladder, the difference in excess absolute risk according to the heterogeneity correction was not significant. In the rectum, the difference in excess absolute risk was lower than that calculated by correcting applicator and tissue heterogeneity compared to the water-based calculation. In the femur, the water-based calculation result was the lowest, and the result calculated by correcting the applicator and tissue heterogeneity was 10% higher. A maximum of 14% dose difference occurred when the applicator mislocation was 20 mm in the Z-axis. In a future study, it is expected that a system that can independently verify the treatment plan can be developed by automating the interface between the treatment planning system and the dose verification program.

프로그램 증명을 위한 중간 증명 언어-Why3와 Boogie (Intermediate Verification Languages for Program Verification-Why3 and Boogie)

  • 김익순
    • 전자통신동향분석
    • /
    • 제30권4호
    • /
    • pp.54-58
    • /
    • 2015
  • 수리 논리 기반의 프로그램 증명방법은 매우 유용한 프로그램 분석방법이지만, 수리 논리식에 대한 증명을 사람이 직접 수행하는 것은 매우 힘들고 고된 작업이다. 본고에서는 이러한 수리 논리 기반의 프로그램 증명을 자동화하기 위하여 개발된 중간 증명 언어(Intermediate Verification Language)에 대하여 살펴보고자 한다.

  • PDF

Logical 모델을 활용한 자동차 차체 조립 라인의 시뮬레이션 적용을 위한 방안 연구 및 적용 (A Study and Application of Methodology for Applying Simulation to Car Body Assembly Line using Logical Model)

  • 구락조;박상철;왕지남
    • 한국CDE학회논문집
    • /
    • 제14권4호
    • /
    • pp.225-233
    • /
    • 2009
  • The objective of this paper is to examine a construction method and verify PLC logic using the logical modeling and simulation of a virtual plant has complex manufacturing system and the domain of application is car body assembly line of automotive industrial operated by PLC Program. The proposed virtual plant model for the analysis of the construction method consists of three types of components which are virtual device, intermediary transfer and controller is modeled by logical model but it the case of the verification of PLC program, HMI and PLC logic in the field substitute for the controller. The implementation of the proposed virtual plant model is conducted PLC Studio which is an object-oriented modeling language based on logical model. As a result, proposed methods enable 3D graphics is designed in the analysis step to use for verification of PLC program without special efforts.

과도 안정도 해석 데이터 검증 모듈 개발 (The Development of the Data Verification Module For Transient Stability Analysis)

  • 심규상;황정희;조을성;권세혁;장길수;김태균;추진부
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.21-23
    • /
    • 2004
  • The purpose of this paper is to explain the techniques of the data verification module achieved while developing a transient stability program which is suitable to korean power system. It concentrates on the concrete explanation about modeling of the dynamic models and the method of the data verification. This proposed module enhances the performance of the developing program. This developing module has been tested with the KEPCO system, and the simulation results obtained from the program are compared to those of commercial programs.

  • PDF

Development Status of Operation Concept and Procedures for KASS

  • Son, Minhyuk;Yun, Youngsun;Lee, ByungSeok
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제11권1호
    • /
    • pp.51-58
    • /
    • 2022
  • Korea Augmentation Satellite System (KASS) is a Satellite Based Augmentation System (SBAS) system under development in South Korea and aims to provide air navigation services after 2023. In order to provide reliable service, detailed design for the operation of this system is required. This paper proposes a detailed operation-based designs based on mission, architecture, operation definition of the system. For the stable operation of the system, an operation organization was designed and operation activities were classified in consideration of the architecture and function of the system. Detailed operation procedures were designed according to this classification and operation procedures related to the command and configuration of subsystem were verified on the Integration, Verification and Qualification (IVQ) platform for integrated testing and verification. The proposed operation concepts and procedures will be continuously confirmed and verified during verification, qualification and service preparation, and will be updated event after official KASS service.

웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법 (Fuzzing Method for Web-Assembly Module Safety Validation)

  • 박성현;강상용;김연수;노봉남
    • 정보보호학회논문지
    • /
    • 제29권2호
    • /
    • pp.275-285
    • /
    • 2019
  • 웹 어셈블리는 웹 브라우저 자바스크립트의 성능 향상을 위해 설계된 새로운 바이너리 표준이다. 웹 어셈블리는 효율적인 실행 및 간결한 표현과 여러 언어를 바탕으로 작성된 코드를 네이티브에 가까운 속도로 구동될 수 있는 새로운 웹 표준으로 자리 잡고 있다. 하지만 현재 웹 어셈블리 취약성 검증은 웹 어셈블리 인터프리터 언어에 제한되어 있으며, 웹 어셈블리 바이너리 자체에 대한 취약성 검증은 부족한 상황이다. 따라서 웹 어셈블리의 자체적인 안전성 검증이 필요한 실정이다. 본 논문에서는 먼저 웹 어셈블리의 구동 방식과 현재 웹 어셈블리의 안전성 검증 방법에 대해서 분석한다. 또한 기존에 발생하였던 웹 어셈블리 안전성 검증 방식에 대해 살펴보고, 이에 따른 기존 안전성 검증 방식의 한계점을 분석한다. 최종적으로 기존 안전성 검증 방법의 한계점을 극복하기 위한 웹 어셈블리 API 기반 퍼징 방법을 소개한다. 이는 기존 안전성 검증 도구로 탐지할 수 없었던 크래시를 탐지함으로써 제안하는 퍼징의 효용성을 검증한다.