• Title/Summary/Keyword: Verification Software

Search Result 952, Processing Time 0.027 seconds

Development of a Communication Protocol for a Digital Traffic Signal Controller (디지털 교통신호제어기 통신체계 개발)

  • Kim, Min-Sung;Ko, Kwang-Yong;Lee, Choul-Ki;Jeong, Jun-Ha;Heo, Nak-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.1-10
    • /
    • 2013
  • Most of the current traffic signal controller use load switches to transmit high voltage power to the signal lamps. The direct transmission of high voltage power may cause a lot of problems like leakages of electric power, obstructions of pedestrian, environmental disfigurements. To overcome these problems, the development of digital type signal controller has been trying in the various methods. Digital communication between a master controller and signal lamps is the most important part to improve control performance in the digital type controller. A communication system for the digital signal controller was developed in this study. The system bases on CAN specification, includes ID structure for most peripheral devices like loops, signal lamps, push buttons, police switches. The operability of this system verified with a software based CAN simulation tool.

Internal Object Detection Monitoring System in Reinforced Concrete Structure using UWB-RF (UWB-RF를 이용한 콘크리트 구조물의 내부 물체 검출 모니터링 시스템)

  • Park, Dae-Hyuck;Kang, Eui-Sun
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1457-1464
    • /
    • 2017
  • This paper is to introduce the a system which monitors and detects the object position in reinforced the concrete structure using UWB-RF. This system is able to check any changes in the inside of the concrete structure using its penetration and reflection characteristics and it can also numerically measure the position of rebar in the concrete structure. For the verification of the performance of this system, we set up the internal compositions of concrete in 3 different types of test-bed. On the other hand, for the measuring of the location of rebar, which varies depending on the type of structure, the software which shows the distance in the structure were used. The result shows that the position in the concrete could be measured within the tolerance of ${\pm}1{\sim}4mm$ depending on the type of structure in the concrete.

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Design of a High-Performance Information Security System-On-a-Chip using Software/Hardware Optimized Elliptic Curve Finite Field Computational Algorithms (소프트웨어/하드웨어 최적화된 타원곡선 유한체 연산 알고리즘의 개발과 이를 이용한 고성능 정보보호 SoC 설계)

  • Moon, San-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.293-298
    • /
    • 2009
  • In this contribution, a 193-bit elliptic curve cryptography coprocessor was implemented on an FPGA board. Optimized algorithms and numerical expressions which had been verified through C program simulation, should be analyzed again with HDL (hardware description language) such as Verilog, so that the verified ones could be modified to be applied directly to hardware implementation. The reason is that the characteristics of C programming language design is intrinsically different from the hardware design structure. The hardware IP which was double-checked in view of hardware structure together with algoritunic verification, was implemented on the Altera CycloneII FPGA device equipped with ARM9 microprocessor core, to a real chip prototype, using Altera embedded system development tool kit. The implemented finite field calculation IPs can be used as library modules as Elliptic Curve Cryptography finite field operations which has more than 193 bit key length.

Distribution of Subgenus Lycoctonum in Korea: Analysis and Verification by GIS (한국산 진범 종집단의 서식상황: GIS를 이용한 분석과 검증)

  • Lee, Soo-Rang;Jeong, Jong-Chul;Park, Chong-Wook
    • Spatial Information Research
    • /
    • v.15 no.2
    • /
    • pp.135-146
    • /
    • 2007
  • The purpose of this study was to ascertain and analyze environmental factors of subgenus Lycoctonum in Korea for conservation and management of rare high land plant species by GIS. We derived the habitat model of Lycoctonum from GPS coordination, habitat factors and digital topology maps. Suitable altitude fur the subgenus Lycoctonum is from 470m to 1320m, and northern slopes(between 15.5 and 36 degrees) are ideal for the Lycoctonum populations. In addition to altitude, slope and aspect, deciduous forest and approximation to water source were found as important factor. Using GIS and the Lycoctonum habitat model, we overlaid elevation, aspect, slope and land cover layers and analyzed buffer from the water source on two topology maps, Yang-Soo and Mock-Dong. After making prediction map for Lycoctonum habitat, we verified the existence of Lycoctonum populations on the predicted sites through field survey. Through this research, we're convinced that GIS software is powerful tool for plants conservation, such as finding unknown habitat or selecting alternative habitat.

  • PDF

A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services (온라인 서비스의 본인확인 요구사항 분석 기반의 차등화된 본인확인서비스 적용 방안)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.201-208
    • /
    • 2020
  • Recently, the application of personal proofing service based on social security number(SSN) replacement means for verifying identity in non-face-to-face transactions is increasing. In this paper, we propose a method of applying differentiated personal proofing service on whether identity verification is necessary in the online service provided by ISP and if it is appropriate to apply a certain level of assurance. By analyzing the requirements related to personal proofing required by current ISPs, we analyze the risks for each of the requirements and propose a method of applying differentiated personal proofing service according to the level of identity assurance guarantee to minimize the risks. In applying the proposed method to online service provision, it is possible to reduce user's unnecessary authentication cost by minimizing the application of personal proofing service based on alternative means, and to help protect user personal information by minimizing excessively collected personal information.

A Design and Implementation of Educational Mobile Robot System including Remote Control Function (원격 제어 기능을 포함한 교육용 모바일 로봇 시스템의 설계 및 구현)

  • Chung, Joong-Soo;Jung, Kwang-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.4
    • /
    • pp.33-40
    • /
    • 2015
  • This paper presents the design and implementation of the educational remote controlled robot system including remote sensing in the embedded environment. The design of sensing information processing, software design and template design mechanism for the programming practice are introduced. LPC1769 using Cortex-M3 core as CPU, LPCXPRESSO as debugging environment, C language as firmware development language and FreeRTOS as OS are used in development environment. The control command is received via RF communication by the server and the robot system which is operated by driving the various sensors. The educational procedure is from robot demo operation program as hands-on practice and then compiling, loading of the basic robot operation program, already supplied. Thereafter the verification is checked by using the basic robot operation to allow demo operation such as hands-on-training procedure. The original protocol is designed via RF communication between server and robot system, and the satisfied performance result is presented by analyzing the robot sensing data processing.

P2P Traffic Classification using Advanced Heuristic Rules and Analysis of Decision Tree Algorithms (개선된 휴리스틱 규칙 및 의사 결정 트리 분석을 이용한 P2P 트래픽 분류 기법)

  • Ye, Wujian;Cho, Kyungsan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.45-54
    • /
    • 2014
  • In this paper, an improved two-step P2P traffic classification scheme is proposed to overcome the limitations of the existing methods. The first step is a signature-based classifier at the packet-level. The second step consists of pattern heuristic rules and a statistics-based classifier at the flow-level. With pattern heuristic rules, the accuracy can be improved and the amount of traffic to be classified by statistics-based classifier can be reduced. Based on the analysis of different decision tree algorithms, the statistics-based classifier is implemented with REPTree. In addition, the ensemble algorithm is used to improve the performance of statistics-based classifier Through the verification with the real datasets, it is shown that our hybrid scheme provides higher accuracy and lower overhead compared to other existing schemes.

Study on Wireless Acquisition of Vibration Signals (진동신호 무선 수집에 대한 연구)

  • Lee, Sunpyo
    • Journal of Sensor Science and Technology
    • /
    • v.27 no.4
    • /
    • pp.254-258
    • /
    • 2018
  • A Wi-Fi signal network (WSN) system is introduced in this paper. This system consists of several data-transmitting sensor modules and a data-receiving server. Each sensor module and the server contain a unique intranet IP address. A piezoelectric accelerometer with a bandwidth of 12 kHz, a 24-bit analog-digital converter with a sampling rate of 15.625 kS/s, a 32-bit microprocessor unit, and a 1-Mbps Wi-Fi module are used in the data-transmitting sensor module. A 300-Mbps router and a PC are used in the server. The system is verified using an accelerometer calibrator. The voltage output from the sensor is converted into 24-bit digital data and transmitted via the Wi-Fi module. These data are received by a Wi-Fi router connected to a PC. The input frequencies of the accelerometer calibrator (320 Hz, 640 Hz, and 1280 Hz) are used in the data transfer verification. The received data are compared to the data retrieved directly from the analog-to-digital converter used in the sensor module. The comparison shows that the developed system represents the original data considerably well. Theoretically, the system can acquire vibration signals from 600 sensor modules at an accelerometer bandwidth of 15.625 kHz. However, delay exists owing to software processes, multiplexing between sensor modules, and the use of non-real time operating system. Hence, it is recommended that this system may be used to acquire vibration signals with up to 10 kHz, which is approximately 70% of the theoretical maximum speed of the system. The system can be upgraded using parts with higher performance