• Title/Summary/Keyword: device-to-device verification

Search Result 478, Processing Time 0.028 seconds

Design of PCI Express Endpoint Core Verification Model Using SystemC (SystemC를 이용한 PCI Express 종단장치 코어의 검증 모델 설계)

  • Kim, Sun-Wook;Kim, Young-Woo;Park, Kyoung
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.167-170
    • /
    • 2003
  • In this paper, a design and experiment of PCI Express Core verification Model is described. The model targeting Endpoint core verification is designed by using newly-emerging SystemC which is a system design language based on a new C++ class library and simulation engine. In the verification model, we developed a SystemC Host System model which act as a Root Complex and Device Driver dedicated to the PCI Express Endpoint RTL Core. The test of Host System Model is guided by scenarios which implements and acts point of Device Driver and Root Complex and shows the result of simulation. Also, We present the full structure of verification model and Host model.

  • PDF

The Study on the Actual Examination of the Bidirectional Protection Device in the 22.9[kV] Distribution Power System Interconnected with the DG (분산전원이 연결된 22.9[kV] 배전계통의 양방향 보호기기 실증시험 연구)

  • Lee, Heung-Jae;Choi, Myeong-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.25 no.10
    • /
    • pp.102-108
    • /
    • 2011
  • The existing power flow has a single direction to the line end but the bidirectional power flow will possibly occur depending on the output capacity in the 22.9[kV] distribution power system connected with the dispersed generation(DG). So these characteristics would influence the power system management. The DG have many advantages such as assistance source, Load share etc. So the utility must apply the bidirectional protection system so as to maximize an advantage of DG. This paper describes the field test case of bidirectional protective device in order to investigate the device performance when applied to bidirectional power system. We have tested in the power system test site of KEPCO and these tests provide the basis for performance verification test of bidirectional protective device in the power system.

Software Risk Management and Cyber Security for Development of Integrated System Remotely Monitoring and Controlling Ventilators (인공호흡기 원격 통합 모니터링 및 제어 시스템 개발을 위한 소프트웨어 위험관리 및 사이버보안)

  • Ji-Yong Chung;You Rim Kim;Wonseuk Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.2
    • /
    • pp.99-108
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.

Study on Reliability Assessment for the Medical Device Software from the Viewpoint of Functional Safety (기능 안전 관점에서의 의료기기 소프트웨어 신뢰성 평가 방법에 관한 연구)

  • Kim, Sung Min;Ko, Byeonggak;Do, Gyeong-Hun;Kim, Hye Jin;Ham, Jung-Keol
    • Journal of Applied Reliability
    • /
    • v.16 no.3
    • /
    • pp.216-223
    • /
    • 2016
  • Purpose: This paper suggests the procedure to enhance the reliability of the software of the medical device that is to cure, treat, diagnose, and prevent a disease or an abnormal health conditions. Methods: After test requirements are classified by the software requirements specification for safety and backgrounds, reliability assessment methods are suggested. Results: Verification and validation for function and safety can be performed whether the medical device software are implemented as intended. Conclusion: Procedure on the static analysis, unit test, integration test, and system test are provided for the medical device software.

Security Core Technology Implementation for MTM Hardware-Based Smart Devices (MTM하드웨어 기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1455-1459
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study will inspect features of hardware-based smart device security technology. Furthermore, this study will propose a realization method in MTM hardware-based secure smart device execution environment for application software runs that in smart device.

A Mobile OS Integrity Verification Using Bootloader & Physically Independent Storage Device (부트로더와 물리적으로 독립된 저장장치를 이용한 모바일 운영체제 무결성 검증)

  • Park, Jae-Kyung;Lee, Sang-Hun;Kwon, Mi-Young;Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.123-132
    • /
    • 2014
  • In this paper, we study the verification techniques for OS integrity that can be more fatal than applications in case of security issues. The dissemination of smartphones is rapidly progressing and there are many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are active researches on a system that can comprehensively respond to this. As a way to prevent these risks, integrity checking method on operation system is being researched. As most integrity checking algorithms are classified by verification from the levels before booting the OS and at the time of passing on the control to the OS, in which, there are minor differences in the definitions of integrity checking or its methods. In this paper, we suggests the integrity verification technique of OS using a boot loader and a physically independent storing device in the mobile device.

Development of a Stereotactic Device for Gamma Knife Irradiation of Small Animals

  • Chung, Hyun-Tai;Chung, Young-Seob;Kim, Dong-Gyu;Paek, Sun-Ha;Cho, Keun-Tae
    • Journal of Korean Neurosurgical Society
    • /
    • v.43 no.1
    • /
    • pp.26-30
    • /
    • 2008
  • Objective : The authors developed a stereotactic device for irradiation of small animals with Leksell Gamma Knife Model C. Development and verification procedures were described in this article. Methods : The device was designed to satisfy three requirements. The mechanical accuracy in positioning was to be managed within 0.5 mm. The strength of the device and structure were to be compromised to provide enough strength to hold a small animal during irradiation and to interfere the gamma ray beam as little as possible. The device was to be used in combination with the Leksell G-$frame^{(R)}$ and $KOPF^{(R)}$ rat adaptor. The irradiation point was determined by separate imaging sequences such as plain X-ray images. Results : The absolute dose rate with the device in a Leksell Gamma Knife was 3.7% less than the value calculated from Leksell Gamma $Plan^{(R)}$. The dose distributions measured with $GAFCHROMIC^{(R)}$ MD-55 film corresponded to those of Leksell Gamma $Plan^{(R)}$ within acceptable range. The device was used in a series of rat experiments with a 4 mm helmet of Leksell Gamma Knife. Conclusion : A stereotactic device for irradiation of small animals with Leksell Gamma Knife Model C has been developed so that it fulfilled above requirements. Absorbed dose and dose distribution at the center of a Gamma Knife helmet are in acceptable ranges. The device provides enough accuracy for stereotactic irradiation with acceptable practicality.

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

An Automatic Signature Verification Algorithm for Smart Devices

  • Kim, Seong-Hoon;Fan, Yunhe;Heo, Gyeongyong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.10
    • /
    • pp.15-21
    • /
    • 2015
  • In this paper, we propose a stable automatic signature verification algorithm applicable to various smart devices. The proposed algorithm uses real and forgery data all together, which can improve the verification rate dramatically. As a tool for signature acquisition in a smart device, two applications, one using touch with a finger and the other using a pressure-sensing-stylus pen, are developed. The verification core is based on SVM and some modifications are made to include the characteristics of signatures. As shown in experimental results, the minimum error rate was 1.84% in the SVM based method, which can easily defeat 4.38% error rate with the previous parametric approach. Even more, 2.43% error rate was achieved with the features excluding pressure-related features, better than the previous approach including pressure-related features and only about 0.6% more error than the best result, which means that the proposed algorithm can be applied to a smart device with or without pressure-sensing-stylus pens and used for security purposes.

Design of 850 nm Near Infrared and Galvanic Current Based Eyeglass-Type Device for Periorbital Wrinkle Treatment and Verification of Treatment Performance through Image Analysis (850 nm 파장대 근적외선과 갈바닉 전류기반의 눈가 주름 치료기 개발 및 영상 분석을 통한 치료성능 검증)

  • Ahn, Sung Su;Kwon, Ki Jin
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.12
    • /
    • pp.1379-1386
    • /
    • 2018
  • In this paper, we proposed eyeglass type periorbital wrinkle treatment device for reducing and improving periorbital wrinkles using near infrared LED of 850nm wavelength and galvanic current. The proposed periorbital wrinkle treatment device is equipped with a control system based on F-PCB. It consists of eight near-infrared LEDs and four indicator LEDs for treatment of right and left periorbital wrinkles. The eyeglass frame is coated with conductive material, so galvanic current can flow to the skin of periorbital wrinkle contacted to it. One male adult in the mid-40s was allowed to use the device for 10 minutes every day for 4 weeks. After 4 weeks, image analysis using optical equipment for measuring wrinkles indicated that wrinkle indexes were reduced.