• Title/Summary/Keyword: safety verification

Search Result 1,127, Processing Time 0.027 seconds

Development for Verification Tool Guaranteeing Reliability of Rail Signal Control Protocol (신뢰성확보를 위한 철도 신호제어용 프로토콜 검정기 개발)

  • Seo, Mi-Seon;Hwang Jin-Ho;Hwang Jong-Gyu;Lee Jae-Ho;Kim Sung-Un
    • Proceedings of the KSR Conference
    • /
    • 2004.06a
    • /
    • pp.1452-1455
    • /
    • 2004
  • In this paper, we develope a protocol verification tool that verifies the correctness of rail signal control protocol type 2 specified in LTS(Labeled Transition System) by using model checking method. This tool automatically checks several properties for deadlock, livelock and reachability of states and actions on LTS. and removes many errors and ambiguities of an informal method used in the past, so saves down expenditures and times required in the protocol development. Therefore it is expected that there will be an increase in safety, reliability and efficiency in terms of the maintenance of the signaling system by using the developed verification tool.

  • PDF

Software Fault Injection Test Methodology for the Software Verification of ISO 26262 Standards-based (ISO 26262 표준 기반의 소프트웨어 검증을 위한 소프트웨어 결함 주입 기법)

  • Lee, Sangho;Shin, Seunghwan
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.3
    • /
    • pp.68-74
    • /
    • 2014
  • As the number of ECUs (Electronic control units) are increasing, reliability and functional stability of a software in an ECU is getting more important. Therefore the application of functional safety standards ISO 26262 is making the software more reliable. Software fault injection test (SFIT) is required as a verification technique for the application of ISO 26262. In case of applying SFIT, an artificial error is injected to inspect the vulnerability of the system which is not easily detected during normal operation. In this paper, the basic concept of SFIT will be examined and the application of SIFT based on ISO26262 will be described.

A Robust On-line Signature Verification System

  • Ryu, Sang-Yeun;Lee, Dae-Jong;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.1
    • /
    • pp.27-31
    • /
    • 2003
  • This paper proposes a robust on-line signature verification system based on a new segmentation method and fusion scheme. The proposed segmentation method resolves the problem of segment-to-segment comparison where the variation between reference signature and input signature causes the errors in the location and the number of segments. In addition, the fusion scheme is adopted, which discriminates genuineness by calculating each feature vector's fuzzy membership degree yielded from the proposed segmentation method. Experimental results show that the proposed signature verification system has lower False Reject Rate(FRR) for genuine signature and False Accept Rate(FAR) for forgery signature.

A Study on Verification of Rail Signal Control Protocol specified in I/O FSM (I/O FSM으로 명세화된 철도 신호제어용 프로토콜 검정에 관한 연구)

  • Seo Mi-Seon;Hwang Jong-Gyu;Lee Jae-Ho;Kim Sung-Un
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1241-1246
    • /
    • 2004
  • The verification confirms a correspondence between requirements and a specification before implementing. The problem in the formal method verifying a protocol specification using model checking is that the protocol behaviors must be always specified in L TS(Label Transition System). But if Region Automata is applied to the model checking, it is enable to verify whether properties are true on specification specified in I/O FSM(Input/Output Finite State Machine) as well as LTS. In this paper, we verify the correctness of rail signal control protocol type 1 specified in I/O FSM by using model checking method and region automata. This removes many errors and ambiguities of an informal method used in the past and saves down expenditures and times required in the protocol development. Therefore it is expected that there will be an increase in safety, reliability and efficiency in terms of the maintenance of the signaling system by using the proposed verification methods.

  • PDF

Applying Methodology for the Safety-Critical S/W Development of Railway Signaling with the Z and Statechart Formal Method (Z와 Statechart에 의한 열차제어시스템 바일탈 소프트웨어 개발 방법 분석)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Yoon, Yong-Ki
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.2
    • /
    • pp.65-71
    • /
    • 2008
  • Recently, many critical control systems are developed using formal methods. When software applied to such systems is developed, the employment of formal methods in the software requirements specification and verification will provide increased. assurance for such applications. Earlier error of overlooked requirement specification can be detected using formal specification method. Also the testing and full verification to examine all reachable states using model checking to undertake formal verification are able to be completed. In this paper, we propose an eclectic approach to incorporate Z(Zed) formal language and 'Statemate MAGNUM' which is formal method tools using Statechart for applying to the railway signaling systems.

Application of BIM on Drawing Verification of Firefighting

  • Chang, Ya-Chun;Shr, Jin-Fang;Huang, Xuan-Chao
    • International Journal of Aerospace System Engineering
    • /
    • v.2 no.2
    • /
    • pp.15-18
    • /
    • 2015
  • In general, most of the function and using of building is for single purpose. However, current buildings combine several functions that causes a lot of problems not on firefighting only but also on environment engineering. Because of hard integration on different fields that causes a lot of conflict. That wastes cost and time. That also threaten the safety of firefighting. This search focuses on the drawing verification and field inspection on firefighting. These two items both remain paper work. To complete the current work, it needs to bring a great amount of drawing papers in the field. By BIM, integrated data can be extracted. It makes the drawing verification and field inspection easier and increases the efficiency. That is the main point of this research.

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • Gee-hee Yun;Kyoung-jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

A Study on the Design and Implementation of E-AV Models for University Academic Qualification Verification (대학 학력 검증을 위한 E-AV 모델 설계와 구현 방법에 관한 연구)

  • Jung-Oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.5
    • /
    • pp.133-142
    • /
    • 2023
  • In recent years, the problem of academic credential falsification is not simply the manipulation of certificates generated by educational institutions, but also the difficulty of trusting automated relationship verification and verification itself, such as falsely recording completion as graduation while still in school. This is due to the lack of sharing of educational background databases among university institutions and the establishment/operation of independent systems that make it difficult to track educational backgrounds. This study designs and implements an E-AV model for academic credential verification centered on university institutions. It summarizes and stores the linked information on the existing academic background in an encrypted database and implements it with web standard technology considering the compatibility and scalability of the existing system. The results of sample data verification show that it improves safety against forgery and complies with storage space and execution performance. This study aims to contribute to the improvement of online verification services such as academic records management in domestic universities.

The Improvement of China's Nuclear Safety Supervision Technical Support Ability

  • Han Wu;Guoxin Yu;Xiangyang Zheng;Keyan Teng
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.20 no.4
    • /
    • pp.523-531
    • /
    • 2022
  • The International Atomic Energy Agency (IAEA) entails independent decision-making for the safety supervision of civil nuclear facilities. To evaluate and review the safety of nuclear facilities, the national regulatory body usually consults independent institutions or external committees. Technical Support Organizations (TSOs) include national laboratories, research institutions, and consulting organizations. Support from professional organizations in other countries may also be required occasionally. Most of the world's major nuclear power countries adopt an independent nuclear safety supervision model. Accordingly, China has continuously improved upon the construction of such a system by establishing the National Nuclear Safety Administration (NNSA) as the decision-making department for nuclear and radiation safety supervision, six regional safety supervision stations, the Nuclear and Radiation Safety Center (NSC), a nuclear safety expert committee, and the National Nuclear and Radiation Safety Supervision Technology R&D Base, which serves as the test, verification, and R&D platform for providing consultation and technical support. An R&D system, however, remains to be formed. Future endeavors must focus on improving the technical support capacity of these systems. As an enhancement from institutional independence to capability independence is necessary for ensuring the independence of China's nuclear safety regulatory institution, its regulatory capacity must be improved in the future.

Validation of FDS for Fire in Underventilated Condition with Two rooms (환기가 제한된 두 개 격실 화재에서 FDS 검증분석)

  • Bae, Young-Bum;Keum, O-Hyun;Kim, Yun-Il;Ryu, Su-Hyun;Kim, Wee-Kyung;Park, Jong-Seuk
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.438-443
    • /
    • 2008
  • Fire model shall be verified and validated to reliably show the predictive capabilities for a specific use. In the process of model verification and validation, both the acceptable uses and limitation of fire model are established. In this study, the results of FDS simulation are compared with the data of PRISME experiment such as temperature, heat release rate, heat flux, product concentrations in the under-ventilated two-room condition. Furthermore, the sensitivity of FDS under ventilation condition changes are evaluated. FDS provide the reliable prediction for under-ventilated two-room fire scenario with slightly deviation.

  • PDF