• Title/Summary/Keyword: integrity checking

Search Result 61, Processing Time 0.026 seconds

Study on Two-Failure GPS RAIM Problem (GPS RAIM에서의 2개 파라미터 고장진단에 대한 연구)

  • 유창선;이상정
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.194-194
    • /
    • 2000
  • In aviation navigation by GPS, requirements on availability and integrity must be absolutely satisfied for safety. Current study on accomplishing this integrity includes RAM(Receiver Autonomous Integrity Monitoring), checking integrity internally in GPS receiver itself. However RAIM techniques have be investigated and presented under assumption that there is included only one fault in measurements from GPS, In case of multiple fault, an interaction among bias errors sometimes results in decreasing the effect of multiple fault. This may make an exact fault detection and identification difficult, and study on mutiple fault RAIM focused on. This paper explains the reasons that techniques applied on single fault are not adequate to extend directly to two faults case and shows that RAIM solution on two fault may be given in revised parity space.

  • PDF

Integrating a Machine Learning-based Space Classification Model with an Automated Interior Finishing System in BIM Models

  • Ha, Daemok;Yu, Youngsu;Choi, Jiwon;Kim, Sihyun;Koo, Bonsang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.24 no.4
    • /
    • pp.60-73
    • /
    • 2023
  • The need for adopting automation technologies to improve inefficiencies in interior finishing modeling work is increasing during the Building Information Modeling (BIM) design stage. As a result, the use of visual programming languages (VPL) for practical applications is growing. However, undefined or incorrect space designations in BIM models can hinder the development of automated finishing modeling processes, resulting in erroneous corrections and rework. To address this challenge, this study first developed a rule-based automated interior finishing detailing module for floors, walls, and ceilings. In addition, an automated space integrity checking module with 86.69% ACC using the Multi-Layer Perceptron (MLP) model was developed. These modules were integrated into a design automation module for interior finishing, which was then verified for practical utility. The results showed that the automation module reduced the time required for modeling and integrity checking by 97.6% compared to manual work, confirming its utility in assisting BIM model development for interior finishing works.

Using Model Checking to Verify an Automotive Electric Parking Brake System (자동차 전자식 주차 브레이크 시스템 안전 요구사항 검증을 위한 모델검증 적용)

  • Choi, Jun Yeol;Cho, Joon Hyung;Choi, Yun Ja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.4
    • /
    • pp.167-176
    • /
    • 2017
  • There are increasing policies and safeguards to prevent various human resource losses with the development of automotive industry. Currently ISO26262 $1^{st}$ edition has been released in 2011 to ensure functional safety of electrical and electronic systems and the $2^{nd}$ edition will be released in the second half of 2016 as part of a trend. The E/E (Electrical & Electronics) system requirements verification is required through walk-through, 인스펙션, semi-formal verification and formal verification in ISO 26262. This paper describe the efficiency of model checking for the E/E system requirements verification by applying the product development project of ASIL (Automotive Safety Integrity Level) D for the electrical parking brake system.

A Rule-Based Database Verification System Based on the Integrity Constranints (무결성 제약에 기초한 규칙 기반 데이타베이스 검증 시스템)

  • Ryu, Myeong-Chun;Park, Chang-Hyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.77-86
    • /
    • 1996
  • In managing a certain database, the integrity of data is very important. The important. The integrity constrains thus should be considered carefully when a database is designed and, after the database is created, it is required for a database manager to check continuously if some data contained in the database violate the integrity constraints considered. It is however not easy to check the violateion of integrity constraints when the size and the complexity of database are increased. This paper suggests a rule-based database verification system to relax the difficulty of checking the integrity violation, in which a database is coupled with a rule-based system including the knowledge about the integrity constraints. The rule-database verification system suggested accepts the model descriptions of an application domain, generates the knowledge base consisting of rules and facts by analyzing the model description and proceeds the verification process to check the integrity of the database.

  • PDF

Video Integrity Checking Scheme by Using Merkle Tree (머클트리를 활용한 영상무결성 검사 기법 )

  • Yun-Hee Kang;Eun-Young CHANG;Taeun Kwonk
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.39-46
    • /
    • 2022
  • Recently, digital contents including video and sound are created in various fields, transmitted to the cloud through the Internet, and then stored and used. In order to utilize digital content, it is essential to verify data integrity, and it is necessary to ensure network bandwidth efficiency of verified data. This paper describes the design and implementation of a server that maintains, manages, and provides data for verifying the integrity of video data. The server receives and stores image data from Logger, a module that acquires image data, and performs a function of providing data necessary for verification to Verifier, a module that verifies image data. Then, a lightweight Merkle tree is constructed using the hash value. The light-weight Merkle tree can quickly detect integrity violations without comparing individual hash values of the corresponding video frame changes of the video frame indexes of the two versions. A lightweight Merkle tree is constructed by generating a hash value of digital content so as to have network bandwidth efficiency, and the result of performing proof of integrity verification is presented.

The Model of Conflict Detection between Permission Assignment Constraints in Role-Based Access Control (RBAC 에서 권한 할당 제약사항들 간의 충돌 탐지 모델)

  • Im Hyun-Soo;Cho Eun-Ae;Moon Chang-Joo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.51-55
    • /
    • 2005
  • Assuring integrity of permission assignment (PA) constraints is a difficult task in role-based access control (RBAC) because of the large number of constraints, users, roles and permissions in a large enterprise environment. We provide solutions for this problem using the conflict concept. This paper introduces the conflict model in order to understand the conflicts easily and to detect conflicts effectively. The conflict model is classified as a permission-permission model and a role-permission model. This paper defines two type conflicts using the conflict model. The first type is an inter-PA-constraints (IPAC) conflict that takes place between PA constraints. The other type is a PA-PAC conflict that takes place between a PA and a PA constraint (PAC) Also, the conditions of conflict occurrence are formally specified and proved. We can assure integrity on permission assignment by checking conflicts before PA and PA constraints are applied.

  • PDF

Using Deep Learning for automated classification of wall subtypes for semantic integrity checking of Building Information Models (딥러닝 기반 BIM(Building Information Modeling) 벽체 하위 유형 자동 분류 통한 정합성 검증에 관한 연구)

  • Jung, Rae-Kyu;Koo, Bon-Sang;Yu, Young-Su
    • Journal of KIBIM
    • /
    • v.9 no.4
    • /
    • pp.31-40
    • /
    • 2019
  • With Building Information Modeling(BIM) becoming the de facto standard for data sharing in the AEC industry, additional needs have increased to ensure the data integrity of BIM models themselves. Although the Industry Foundation Classes provide an open and neutral data format, its generalized schema leaves it open to data loss and misclassifications This research applied deep learning to automatically classify BIM elements and thus check the integrity of BIM-to-IFC mappings. Multi-view CNN(MVCC) and PointNet, which are two deep learning models customized to learn and classify in 3 dimensional non-euclidean spaces, were used. The analysis was restricted to classifying subtypes of architectural walls. MVCNN resulted in the highest performance, with ACC and F1 score of 0.95 and 0.94. MVCNN unitizes images from multiple perspectives of an element, and was thus able to learn the nuanced differences of wall subtypes. PointNet, on the other hand, lost many of the detailed features as it uses a sample of the point clouds and perceived only the 'skeleton' of the given walls.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

A Study on the Improvement of Operation Performance of Wet Bell Diving System in the Salvage Ship (고장 사례 분석을 통한 수중함용 디젤엔진 건전성에 관한 연구)

  • Choi, Woo-Suk;Min, Tae-Kyu;Kim, Byeong-Ho;Chang, Ho-Seong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.98-106
    • /
    • 2020
  • This study examined the integrity of diesel engines for underwater vessels through failure analysis, analyzed the causes of abnormal diesel engine stoppage during building and examined the integrity of secondary damages. The diesel engine stoppage was analyzed by checking the temperature change of the piston before and after the abnormality and checking the damage. In addition, in order to analyze the secondary damage caused by the explosion, the tensile and compressive stresses transmitted to the crankshaft, the core part of the diesel engine, were calculated, and the stress distribution was examined through finite element analysis, but the crankshaft was designed by safety. It was confirmed that there was no damage to the crankcase even when the diesel engine was taken out of the ship and closely inspected. The integrity of the crank shaft was verified in advance for the occurrence of diesel engine emergency shutdown accidents through this research result. Therefore, the inspection and restoration were carried out to the minimum extent, and the quality of diesel engines was secured. This study is expected to be used as a reference for ensuring soundness in any future review of diesel engine quality problems.