• Title/Summary/Keyword: Verification Control

Search Result 1,763, Processing Time 0.026 seconds

Flight Control System Design and Verification Process (비행제어시스템 설계 및 검증 절차)

  • Kim, Chong-Sup
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.8
    • /
    • pp.824-836
    • /
    • 2008
  • Relaxed static stability(RSS) concept has been applied to improve aerodynamic performance of modern version supersonic jet fighter aircraft. Therefore, flight control systems are necessary to stabilize an unstable aircraft, and provides adequate handling qualities and achieve performance enhancements. Standard FCSDVP (Flight Control System Design and Verification Process) is provided to reduce development period of the flight control system. In addition, if this process is employed in developing flight control system, it reduces the trial and error for development and verification of flight control system. This paper addresses the flight control system design and verification process for the RSS aircraft utilizing design goal based on military specifications, linear and nonlinear system design and verification based on universal software, handling quality test based on HILS(Hardware In-the-Loop Simulator) environment, and ground and flight test results to verify aircraft dynamic flight responses.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

The study of verification for reliability in train control embedded system (열차 제어 임베디드 시스템에서의 신뢰성 검증에 관한 연구)

  • Hong, Hyo-Sik
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.483-494
    • /
    • 2009
  • Since the embedded system is more intelligent, the importance of the reliability in the embedded system is a lot more visible. Especially the reliability of the embedded system in the train control system is even better important. As the special quality of the embedded system, the hardware of the system is directly controlled by the software in the embedded system. As the expansion of complexity, the expense amd the time for verification is required more and more. This paper is presented the verification of the reliability as the method with background of failure Embedded system is gradually, the importance of 'A built-in on the system embedded system's reliability is focused. In particular, in the train control system built-in of the embedded system, reliability is even more important. The embedded system of the system controls over hardware, software with built-in directly. The more complex system is, the more increasable of depending on the reliability of the time verification and expensive is. This paper is about he characteristics of the reliability and verification of embedded system under the failure mechanisms, based on the verification methodology suggested by in the train control system.

  • PDF

Formal Verification of PLC Program Safety in Manufacturing Automation System (생산자동화시스템 PLC 제어프로그램의 안전성 정형검증에 관한 연구)

  • Park, Chang Mok
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.179-192
    • /
    • 2015
  • In an automated industry PLC plays a central role to control the automation system. Therefore, fault free operation of PLC controlled automation system is essential in order to maximize a firm's productivity. A prior test of control system is a practical way to check fault operations, but it is a time consuming job and can not check all possible fault operation. A formal verification of PLC program could be a best way to check all possible fault situation. Tracing the history of the study on formal verification, we found three problems, the first is that a formal representation of PLC control system is incomplete, the second is a state explosion problem and the third is that the verification result is difficult to use for the correction of control program. In this paper, we propose a transformation method to reproduce the control system correctly in formal model and efficient procedure to verify and correct the control program using verification result. To demonstrate the proposed method, we provided a suitable case study of an automation system.

Preparation and Consideration of Sample Collection in Undeclared Areas for Denuclearization Verification

  • Kim, Dong Yeong;Kim, Giyoon;Lee, Jun;Lim, Kyung Taek;Chung, Heejun;Seo, Jihye;Kim, Myungsoo
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.19 no.4
    • /
    • pp.479-489
    • /
    • 2021
  • The Republic of Korea is expected to participate in the denuclearization verification activities by the International Atomic Energy Agency (IAEA) in case any neighboring countries declared denuclearization. In this study, samples for the verification of nuclear activities in undeclared areas were selected for the denuclearization of neighboring countries, and the appropriateness of the procedures was considered. If a country with nuclear weapons declares denuclearization, it must be accompanied by the IAEA's verification regarding nuclear materials and weapons in the declared and undeclared areas. The analysis of the process samples or on-site environmental samples and the verification of undeclared nuclear facilities and materials aid in uncovering any evidence of concealment of nuclear activity in undeclared areas. Therefore, a methodology was established for effective sampling and analysis in accordance with proper procedures. Preparations for sampling in undeclared areas were undertaken for various potential scenarios, such as, the establishment of zones according to radiation dose, methods of supplying electricity, wireless communication networks, targets of sampling according to characteristics of nuclides, manned sampling method, and unmanned sampling method. Through this, procedures were established for pre- and post-site settings in preparation for hazards and limiting factors at nuclear inspection sites.

The Analysis of Formal Methods for Applying to Vital S/W in Train Control Systems (열차제어시스템 바이탈 소프트웨어를 위한 정형기법 적용 방안 분석)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Yoon, Yong-Ki
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1000-1007
    • /
    • 2007
  • Recently, many critical control systems are developed using formal methods. When software applied to such systems is developed, the employment of formal methods in the software requirements specification and verification will provide increased assurance for such applications. Earlier error of overlooked requirement specification can be detected using formal specification method. Also the testing and full verification to examine all reachable states using model checking to undertake formal verification are able to be completed. In the comparison of other formal specification methods, we choose the Z formal language for applying to the train control system. Using Z is able to realize higher correctness in the requirement specification, and we propose the Statemate of the best solution in formal verification tools for the system modeling and verification. The Statemate makes it possible to prove thoroughly the system execution from the simple graphical modeling of the complicated train control system. Then we can expect that the model-based formal method combining Z with Statemate will be utilized widely for the railway systems due to various strong points.

  • PDF

VCB Control Algorithm Verifications of Korean High Speed Train (한국형 고속전철의 VCB 제어 알고리즘 검증)

  • Jeon, J.W.;Jeong, P.K.;Lee, J.H.;Park, D.Y.;Kim, Y.J.;Lee, B.S.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07b
    • /
    • pp.1362-1364
    • /
    • 2000
  • This paper presents the control algorithm verification process for VCB (Vacuum Circuit Breaker) of Korean High Speed Train. In order to enhance the reliability of the control algorithm, the verification process must be performed. The verification is conducted by comparing the pre-designed control algorithm with the pre-planned scenario by simulation tools such as SDL and MSC. This verification process will be applied to the other control algorithms of various control units of Korean High Speed Train.

  • PDF

A Study on the Verification Method for KASS Control Station

  • Kim, Koontack;Won, Dae Hee;Park, Yeol;Lee, Eunsung
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.10 no.3
    • /
    • pp.221-228
    • /
    • 2021
  • The Korea Augmentation Satellite System (KASS) is a Korean Satellite Based Augmentation System (SBAS) that has been under development since 2014 with the goal of providing Approach Procedure with Vertical guidance (APV)-I Safety of Life (SoL) services. KASS Control Station (KCS) is a subsystem that controls and monitors KASS systems. It also serves to store data generated by KASS. KCS has now completed detailed design and implementation and verification is in progress. This paper presents verification procedures and verification items for KCS verification activities and presents management measures for defects occurring during the verification phase.

Compliance and Verification Mechanism of STCW'95 and Its Implementation in China

  • Hao, Yong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2000.06a
    • /
    • pp.33-40
    • /
    • 2000
  • To improve the compliance and verification mechanism is one of the important reasons to revise the STCW Convention. The mechanism includes the assessment of competence, control, precision of description of competence, quality standard system, communication of information and so on. Chinese seaman's education an training institute & the organization of evaluating and issuing certificates should enhance realizing the importance of compliance and verification mechanism and carry out it down to earth. The current work that should be reinforced is to control the qualified evaluation effectively.

  • PDF

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.