• Title/Summary/Keyword: software verification

Search Result 945, Processing Time 0.026 seconds

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

Study on Reliability Assessment for the Medical Device Software from the Viewpoint of Functional Safety (기능 안전 관점에서의 의료기기 소프트웨어 신뢰성 평가 방법에 관한 연구)

  • Kim, Sung Min;Ko, Byeonggak;Do, Gyeong-Hun;Kim, Hye Jin;Ham, Jung-Keol
    • Journal of Applied Reliability
    • /
    • v.16 no.3
    • /
    • pp.216-223
    • /
    • 2016
  • Purpose: This paper suggests the procedure to enhance the reliability of the software of the medical device that is to cure, treat, diagnose, and prevent a disease or an abnormal health conditions. Methods: After test requirements are classified by the software requirements specification for safety and backgrounds, reliability assessment methods are suggested. Results: Verification and validation for function and safety can be performed whether the medical device software are implemented as intended. Conclusion: Procedure on the static analysis, unit test, integration test, and system test are provided for the medical device software.

A study on hypothetical switching software through of the analysis of failure data (고장 데이터 분석을 통한 교환 소프트웨어 특성 연구)

  • 이재기;신상권;이영목
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.8
    • /
    • pp.1915-1925
    • /
    • 1998
  • The switching system software is large scale, real-time multi-task system which requires high reliability. The reliability assessment of large-scale software is very important for the success of software development project. For this raeson, the software quality measurement is much more important. In this paper, we have learned about the software reliability, metho of the analysis of failure data and estimation of software quality. To estimate the software reliability, using the failure data found during of the system test. We apply the two software reliability growth models, named Goel-Okumoto(G-O) and S-shaped model, to estimate the software reliability. Also, we compared with the results and we reviewed fully not only development cycle but validation and verification of the test data, for each software versions. This paper presents a software reliability model that suitale the software development project and the activeity of quality control for the switching system.

  • PDF

Development Methodology of Safety-Critical System Using Formal Method (정형기법을 이용한 Safety-Critical System 개발 방법론)

  • 성창훈;이나영;오승록;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.486-488
    • /
    • 2000
  • 본 연구는 정형기법을 사용하여 Safety-Critical System의 개발 방법론을 제시한다. Safety-Critical System의 전체적인 개발 과정을 제시하고 Safety-Critical System 중의 하나인 원자력 발전소 시스템 중 Reactor Protection System(RPS)을 정형 명세(Formal Specification)하고 정형 검증(Formal Verification)하는 과정과 그에 따른 각 과정의 Compliance를 확인하는 예를 든다. 여기서 정형 명세에는 Software Cost Reduction(SCR)이하는 도구가 사용되었고, 정형 검증에는 SPIN이, Compliance를 확인하는 데에는 Prototype Verification System(PVS)를 사용하였다.

  • PDF

Verification of Direct Back Analysis Software Using FLAC as a Subroutine (FLAC을 이용한 직접법 역해석 소프트웨어의 개발과 검증)

  • Kim Chee-Hwan
    • Tunnel and Underground Space
    • /
    • v.15 no.5 s.58
    • /
    • pp.344-351
    • /
    • 2005
  • Direct back analysis software is coded based on Simplex method using FLAC as a subroutine. For the verification of the software, 12 different cases are assumed combining various displacements in different measuring locations around a tunnel. The number of displacements for cases varies from 3 to 240. It is verified that the exact elasticity and the primary stress state of rock around a tunnel could be found through iterative calculation regardless of the locations and number of displacements and initial values needed for the direct back analysis.

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.

Process Algebra Based Formal Method for SDN Application Verification (SDN 응용 검증을 위한 프로세스 알지브라 기반 정형 기법)

  • Shin, Myung-Ki;Yi, Jong-Hwa;Choi, Yunchul;Lee, Jihyun;Lee, Seung-Ik;Kang, Miyoung;Kwak, Hee Hwan;Choi, Jin-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.387-396
    • /
    • 2014
  • Recently, there have been continuous efforts and progresses regarding the research on diverse network control and management platforms for SDN (Software Defined Networking). SDN is defined as a new technology to enable service providers/network operators easily to control and manage their networks by writing a simple application program. In SDN, incomplete or malicious programmable entities could cause break-down of underlying networks shared by heterogeneous devices and stake-holders. In this sense, any misunderstanding or diverse interpretations should be completely avoided. This paper proposes a new framework for SDN application verification and a prototype based on the formal method, especially with process algebra called pACSR which is an extended version of Algebra of Communicating Shared Resources (ACSR).