• Title/Summary/Keyword: 검증(validation)

Search Result 2,491, Processing Time 0.027 seconds

Validation Method of Simulation Model Using Wavelet Transform (웨이블릿 변환을 이용한 시뮬레이션 모델 검증 방법)

  • Shin, Sang-Mi;Kim, Youn-Jin;Lee, Hong-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.127-135
    • /
    • 2010
  • The validation of a simulation model is a key to demonstrate that the simulation model is reliable. However, among various validation methods have been introduced, it is very poor to research the specific techniques for the time series data. Therefore, this paper suggests the methodology to verify the simulation using the time series data by Wavelet Transform, Power Spectrum and Coherence. This method performs 2 steps as followed. Firstly, we get spectrum using the Wavelet transform available for non-periodic signal separation. Secondly, we compare 2 patterns of output data from simulation model and actual system by Coherence Analysis. As a result of comparing it with other validation techniques, the suggested way can judge simulation model accuracy more clearly. By this way, we can make it possible to perform the simulation validation test under various situations using detailed sectional validation method, which has been impossible using a single statistics for the whole model.

Design of Validation System for a Crypto-Algorithm Implementation (암호 알고리즘 구현 적합성 평가 시스템 설계)

  • Ha, Kyeoung-Ju;Seo, Chang-Ho;Kim, Dae-Youb
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.242-250
    • /
    • 2014
  • Conventional researches of standard tool validating cryptographic algorithm have been studied for the internet environment, for the mobile internet. It is important to develop the validation tool for establishment of interoperability and convenience of users in the information systems. Therefore, this paper presents the validation tool of Elliptic Curve Cryptography algorithm that can test if following X9.62 technology standard specification. The validation tool can be applied all information securities using DES, SEED, AES, SHA-1/256/384/512, RSA-OAEP V2.0, V2.1, ECDSA, ECKCDSA, ECDH, etc. Moreover, we can enhance the precision of validation through several experiments and perform the validation tool in the online environment.

An Efficient Validation Method for XML Data Updates (XML 데이타 갱신에 대한 효율적인 유효 검증 기법)

  • Lee, Ji-Hyun;Park, Myung-Jae;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.34 no.2
    • /
    • pp.153-165
    • /
    • 2007
  • XML is widely used in various applications as the standard for representing and exchanging data on the Web. XML Schema is the standard schema for XML and an XML document generated based on the XML Schema is called 'Valid XML document'. The XML Schema validity should be guaranteed after the XML document is updated. In this paper, we design an efficient method that verifies XML Schema validity before update, and so eliminates unnecessary validations. Also, we propose validation algorithms for each update. In addition, we propose the mapping between XML data and XML Schema and a storage method for XML Schema in order to efficiently extract the schema information for the validation. Finally, we compare the performance of the validation according to the storage methods.

Sequence Group Validation based on Boundary Locking for Valid XML Documents (유효한 XML 문서에 대한 경계 로킹에 기반한 시퀀스 그룹 검증 기법)

  • Choi, Yoon-Sang;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.32 no.6
    • /
    • pp.628-640
    • /
    • 2005
  • The XML is well accepted in several different Web application areas. As soon as many users and applications work concurrently on the same collection of XML documents, isolating accesses and modifications of different transactions becomes an important issue. When an XML document correctly corresponds to the rules laid out in a DTD or XML schema, it is also said to be valid. The valid XML document's validity should be guaranteed after the document is updated. The validation method mentioned above, however, results in lower degree of concurrency. For getting higher degree of concurrency and minimizing the range of the XML document validity, a new validation method based on a specific locking method is required. In this paper we propose the sequence group validation method for minimizing the range of the XML document validity. We also propose the boundary locking method for isolating accesses and modifications of different transactions while supporting the valid XML document's validity. Finally, the results of some experiments show the validation and locking methods increase the degree of transaction concurrency.

Application of Time-series Cross Validation in Hyperparameter Tuning of a Predictive Model for 2,3-BDO Distillation Process (시계열 교차검증을 적용한 2,3-BDO 분리공정 온도예측 모델의 초매개변수 최적화)

  • An, Nahyeon;Choi, Yeongryeol;Cho, Hyungtae;Kim, Junghwan
    • Korean Chemical Engineering Research
    • /
    • v.59 no.4
    • /
    • pp.532-541
    • /
    • 2021
  • Recently, research on the application of artificial intelligence in the chemical process has been increasing rapidly. However, overfitting is a significant problem that prevents the model from being generalized well to predict unseen data on test data, as well as observed training data. Cross validation is one of the ways to solve the overfitting problem. In this study, the time-series cross validation method was applied to optimize the number of batch and epoch in the hyperparameters of the prediction model for the 2,3-BDO distillation process, and it compared with K-fold cross validation generally used. As a result, the RMSE of the model with time-series cross validation was lower by 9.06%, and the MAPE was higher by 0.61% than the model with K-fold cross validation. Also, the calculation time was 198.29 sec less than the K-fold cross validation method.

Candidate Points and Representative Cross-Validation Approach for Sequential Sampling (후보점과 대표점 교차검증에 의한 순차적 실험계획)

  • Kim, Seung-Won;Jung, Jae-Jun;Lee, Tae-Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.31 no.1 s.256
    • /
    • pp.55-61
    • /
    • 2007
  • Recently simulation model becomes an essential tool for analysis and design of a system but it is often expensive and time consuming as it becomes complicate to achieve reliable results. Therefore, high-fidelity simulation model needs to be replaced by an approximate model, the so-called metamodel. Metamodeling techniques include 3 components of sampling, metamodel and validation. Cross-validation approach has been proposed to provide sequnatially new sample point based on cross-validation error but it is very expensive because cross-validation must be evaluated at each stage. To enhance the cross-validation of metamodel, sequential sampling method using candidate points and representative cross-validation is proposed in this paper. The candidate and representative cross-validation approach of sequential sampling is illustrated for two-dimensional domain. To verify the performance of the suggested sampling technique, we compare the accuracy of the metamodels for various mathematical functions with that obtained by conventional sequential sampling strategies such as maximum distance, mean squared error, and maximum entropy sequential samplings. Through this research we team that the proposed approach is computationally inexpensive and provides good prediction performance.

A Strategy for Validation in Preliminary Design Stage using The Simulation of Model Behavior (모델 행동 양식의 시뮬레이션을 이용한 초기 디자인 검증 방법)

  • Shin, Seung-Hun;Park, Seung-Kyu;Choi, Kyung-Hee
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.153-160
    • /
    • 2010
  • Most part of errors in software development process are included during the stage of requirements definition and design. And correction or elimination of errors from those stages requires much more efforts and costs than those from the later part of software development process. However, despite of the importance of the validation of requirement definition and design stages, several kinds of problem have made it hard to be done successfully. Therefore, in this paper, we introduce a novel validation process for the preliminary design stage. The validation process is based on simulations of model and it can be used to validate requirements and model simultaneously. Models in the validation process will take only the behavior of software and be built on Ptolemy framework. The usability of our validation process is confirmed with a case study over DNS system environment. And the result of simulation shows well-known errors or vulnerabilities can be found with simulations of model which has the behavior of software. This means our validation process can be used as a process to validate requirements and models during the early stage of software development process.

A Real-Time Certificate Status Validation Protocol for Reducing the Computational Time in Client and Server - RCSVP (클라이언트와 서버의 연산시간을 줄여주는 실시간 인증서 상태 검증에 관한 연구)

  • Lee Young-Sook;Cho Seok-Hyang;Won Dong-Ho;Lee Young-Gyo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.2
    • /
    • pp.95-105
    • /
    • 2005
  • As a research on PKI is being very popular, the study relating to certificate status validation is being grown with aim to reduce an overhead of the protocol and to provide an efficient operation. The OCSP of the standard protocol related to the study enables applications to determine the revocation state of an identified certificate. However, the OCSP server can not service millions of certificate status validation requests from clients in a second on E-commerce because of the computational time for signature and verification. So, we propose the Real-time Certificate Status Validation Protocol(RCSVP) that has smaller computational time than OCSP. RCSVP server reduce the computational time of certificate status validation using hash function and common secret value. Also RCSVP client does not need the computational time of certificate verification to acquire the public key from an identified certificate. Therefore, the proposed protocol enables server to response millions of certificate status validation requests from clients in a second on E-commerce.

  • PDF

Specification Validation Method for Improving KML Interoperability (KML 호환성 개선을 위한 명세서 검증 방안)

  • Kang, Jihun;Kim, Jung Ok;Lee, Jun Seok
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.4_1
    • /
    • pp.353-361
    • /
    • 2014
  • The study has planned to analyze the most typical specification validation in Korea and the other countries, which shows the well-formed and schema validation, in purpose to enhance users' conveniences. Also, we suggested the validation system to provide the information compatibility regarding to application programs for non-expert. The featured KML specification supported by the VWorld 3D Desktop and the Google Earth. Based on this above estimation, the system has been designed to inform potential problems and the applicability in 3D Desktop and Google Earth for the user. The KML information passed through the proposed validation is simply expressed on the map, so as instructed the information on the program selection and additional details instruct users as a text file. When not being suitable for the proposed program, another program can be considered, and the problems which may be occurred are also announced to increase the compatibility of KML.

Sensitivity Validation Technique for Sequential Kriging Metamodel (순차적 크리깅 메타모델의 민감도 검증법)

  • Huh, Seung-Kyun;Lee, Jin-Min;Lee, Tae-Hee
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.8
    • /
    • pp.873-879
    • /
    • 2012
  • Metamodels have been developed with a variety of design optimization techniques in the field of structural engineering over the last decade because they are efficient, show excellent prediction performance, and provide easy interconnections into design frameworks. To construct a metamodel, a sequential procedure involving steps such as the design of experiments, metamodeling techniques, and validation techniques is performed. Because validation techniques can measure the accuracy of the metamodel, the number of presampled points for an accurate kriging metamodel is decided by the validation technique in the sequential kriging metamodel. Because the interpolation model such as the kriging metamodel based on computer experiments passes through responses at presampled points, additional analyses or reconstructions of the metamodels are required to measure the accuracy of the metamodel if existing validation techniques are applied. In this study, we suggest a sensitivity validation that does not require additional analyses or reconstructions of the metamodels. Fourteen two-dimensional mathematical problems and an engineering problem are illustrated to show the feasibility of the suggested method.