• Title/Summary/Keyword: 검증절차

Search Result 1,350, Processing Time 0.025 seconds

A Functional Verification Techniques in Software Reverse Engineering (소프트웨어 역공학에서 기능성 검증 기법)

  • Hwang, Sun-Myung;Jin, Young-Taek
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2546-2555
    • /
    • 1998
  • Existing Systems need to be modified due to the change of environment, the emergence of new technology and the requirement of change. One of the features of system transformation is how functions of the old system is preserved in the transformed system after reverse-engineering. But, the techniques to evaluate and verigy the transformed system have proceeded more partially and fragmentarily. In this paper, we have proposed the functional coverage and developed the tool and techniques for verifying functional euivalence between a procedural software and a transformed object-oriented software. The tool and methods are efficiently used to verigy whehter the transformed program preserves the same functionality as the existing program.

  • PDF

A Traffic Simulation Model Verification Method Using GPS Equipment (GPS를 활용한 교통 시뮬레이션 모형 검증)

  • Hu, Hyejung;Baek, Jongdae;Han, Sangjin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.5
    • /
    • pp.62-69
    • /
    • 2012
  • Traffic simulation models have been used for assessing various transportation strategies. Through comparing results from a simulation model and real field data, researchers try to show how close the model can reproduce the real world traffic. This model verification step is one of the most essential tasks in modeling procedure. Traffic counts and speeds have been frequently used for the verification or validation. Authors modeled severe PM peak bottleneck situation on the I-40 corridor in Raleigh, North Carolina using DYNASMART-P, a mesoscopic traffic simulation tool and verified the model. NCDOT has Traffic Information Management System which has archive capability for the traffic speeds on the I-40 corridor. However, the authors selected travel time as the field measure for model verification and collected the data using a GPS equipment because the speed data from NCDOT speed detectors are spot speeds which are not appropriate for comparison with link average speed from the simulation model. This paper describes the GPS field data collection procedure, the model verification method, and the results.

Procedure and Method of Equipment Qualification for Solenoid-Operated Valves Used in Nuclear Power Plants (원전용 솔레노이드 밸브의 기기검증 절차 및 방법)

  • Lim, Byung-Ju;Park, Chang-Dae;Chung, Kyung-Yul
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.6
    • /
    • pp.683-691
    • /
    • 2011
  • In order to develop technology for an equipment qualification (EQ) test, which is an important process in localizing solenoid-operated valves used in nuclear power plants, we analyzed related regulations, test procedures, conditions, equipment, and acceptance criteria. EQ regulations for the solenoid-operated valve are classified as law, guide, and standard, and are subdivided according to test specimens and contents. The EQ test is composed of functional, normal-, and accident- condition tests. The solenoid-operated valve is aged under normal and accident conditions, which are predicted in the design conditions of a nuclear power plant, and the performance of the valve is measured by a functional test. The test method and procedure analyzed in this paper might be very useful for manufacturers as well as EQ testers.

Validation Testing of Safety-critical Software (Safety-critical 소프트웨어의 검증시험)

  • Kim, Hang-Bae;Han, Jai-Bok
    • Nuclear Engineering and Technology
    • /
    • v.27 no.3
    • /
    • pp.385-392
    • /
    • 1995
  • A software engineering process has been developed for the design of safety critical software for Wolsong 2/3/4 project to satisfy the requirement of the regulatory body. Among the process, this paper described the detail process of validation testing peformed to ensure that the software with its hardware, developed by the design group, satisfies the requirements of the functional specification prepared by the independent functional group. To perform the test, test facility and test software ore developed and actual safety system computer was connected. Three kinds of test cases, i.e., functional test performance test and self-check test were programmed and run to verify each functional specifications. Test failures ore fedback to the design group to revise the software and test result were analyzed and documented in the report to submit to the regulatory body. The test methodology and procedure were very efficient and satisfactory to perform the systematic and automatic test. The test results were also acceptable and successful to verify the software acts as specified in the program functional specification. This methodology can be applied to the validation of other safety-critical software.

  • PDF

Validation of NCS based Vocational Curriculum Procedures Developing Models Recognized by National Competency Standards Experts (국가직무능력표준 개발 전문가들이 인식하는 NCS 기반 직업교육과정 개발 절차 모형의 타당화)

  • Kim, Dong-Yeon;Kim, Jinsoo
    • 대한공업교육학회지
    • /
    • v.40 no.1
    • /
    • pp.64-86
    • /
    • 2015
  • The objective of this study is to develop NCS-based vocational curriculum procedures developing models recognized by experts in the National Skill Standards and to verify them. As for a research method for efficiently achieving this study, Delphi research has been conducted three times based on the result of preliminary Delphi investigation, contents of in-depth interview (review and advice), and consideration of previous studies and literature research related to NCS in Korea and abroad. Major results of study in regard of validation of NCS-based vocational curriculum procedures developing models recognized by experts of National Skill Standards are as follows. First, validity of conceptual model(plan) of NCS-based vocational curriculum developing procedures was verified. According to the result of implementing it on 10 members of verification for Delphi preliminary investigation tools, the average was higher than 4.70, and validity of contents was turned out to be outstanding in 1.00. Secondly, validity of conceptual model(plan) of NCS-based vocational curriculum developing procedures was verified by using Delphi preliminary investigation tools. According to the result of verifying it in order on 10 members of verification for Delphi preliminary investigation tools, validity of contents on questions in each area from the development procedures model(plan) was all 1.00, and appropriateness of contents on the components was turned out to be outstanding in 1.00. In addition, validity of contents on interrelation and comprehensiveness of components in the development procedures model(plan) was all turned out to be very satisfying in 1.00. Third, Delphi investigation was implemented in three rounds on 26 Delphi panel members for the verification. As a result consistency rate of interrelation and comprehensiveness among questions in each area of development procedures model(plan), components on the contents, and elements was turned out to be outstanding in .75 from all of three rounds. Here, consistency rate from all three rounds was turned out to be 1.00, and convergence rate was shown to be .00 that very well satisfied the conditions(except for 1 question out of 29). Therefore, it was confirmed that opinion from Delphi panel members was completely consistent in the third round of Delphi investigation research. Such a result in the study was from how Delphi selection criteria were strictly reinforced, and, at the same time, implies how will of participation of Delphi panel members was important.

Case Study for Construction Cost Saving by means of Economic Pile Design Procedure (말뚝기초의 경제적인 설계절차에 의한 건설비용 절감 사례 연구)

  • Choi, Yong-Kyu;Lim, Jong-Seok;Kwon, Oh-Kyun
    • Journal of the Korean GEO-environmental Society
    • /
    • v.4 no.4
    • /
    • pp.73-84
    • /
    • 2003
  • In this study, the economic pile design procedure using the proof test results was proposed. In order to improve the inappropriate pile design routine, the proof test for 6 pile cases were performed and the construction saving effect were analyzed. The saving rate of construction cost with the small diameter piles and the large diameter drilled shafts were 34 - 47 and 0 - 55 %, respectively.

  • PDF

Construction of Validation Procedure for Better Discharge Data (유량자료 정확도 향상을 위한 검증시스템 구축)

  • Jung Sung-won;Kim Dong-gu;Kim Chi-Young;Hwang Seok Hwan;Han Myung-Sun;Lee Chan-Ju
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.204-208
    • /
    • 2005
  • 수문학 분야에서 가장 어려움을 겪고 있는 것 중의 하나는 정도 높은 수문자료의 부재이다. 특히, 유량자료의 경우 그 중요성에 비해 자료의 정확도가 매우 떨어지고 있어 수자원 계획 및 운영, 수문설계, 수질관리, 관련 기초연구 등에서 많은 어려움을 겪고 있는 것이 현실이다. 부정확한 유량자료는 예산의 부족, 전담인력의 부재, 전문장비의 미비 등 하드웨어 측면에서 근본적인 원인이 있는 것으로 판단되나, 유량자료의 처리절차가 실제적으로 이루어지지 않는 데에도 중요한 한 원인이 있다. 따라서 이러한 소프트웨어 측면의 원인을 보완하기 위하여 2004년 건설교통부 유량측정사업에서 자료처리절차를 강화하는 유량측정 검증시스템을 도입하여 운영한 바 있다. 본 논문에서는 건설교통부의 유량측정사업의 효율적 수행을 위해 처음 도입된 유량측정 검증시스템을 소개하고, 섬진강과 낙동강 수계에 적용하여 개선된 유량자료의 결과를 소개하고자 한다.

  • PDF

PKI 제품의 적합성 시험

  • 이종후;김충길;이석래;이재일;김학범;류재철
    • Review of KIISC
    • /
    • v.11 no.2
    • /
    • pp.27-37
    • /
    • 2001
  • PKI 정보보호 제품의 개발에 있어서 반드시 고려해야 하는 요소 가운데 하나는 PKI 정보보호 제품이 안전성, 신뢰 성 등의 요구조건을 만족하며, 확장성 및 상호연동성을 갖도록 개발되었는지 확인하는 것이다. 만약 이와 같은 사항들 이 만족되지 못한다면, 사용자는 PKI 정보보호 제품의 안전성 및 신뢰성을 의심할 수밖에 없다. 또한 다른 PKI 제품 들과의 연동에 있어서 문제를 일으킬 수밖에 없으며, 이는 결과적으로 사용자에게 불이익을 가져다 주게 된다. 이러한 문제를 방지하기 위해서는 개발 단계에서부터 X.509 등 관련된 기술 표준을 정확하게 준수하여야 한다. 또한 표준 적 합성 확인을 위해서 PKI 정보보호 제품이 표준에 따라 적합하게 구현되었는지 검증하는 절차가 필요하다. 즉, PKI 정 보보호 제품의 표준 적합성 여부에 대한 검증을 전문적으로 수행할 수 있는 시험도구의 개발이 요구된다. 본 논문에서는 PKI 정보보호 제품의 표준 적합성 여부를 판단할 수 있는 시험 절차를 제시하고, 이에 따라 PKI 정 보보호 제품에 대한 검증을 수행할 수 있는 시험도구를 구현하였다. 즉, PKI 정보보호 제품이 인증 서비스 제공을 위 해 사용하는 X.509 등 인증 관련 기술이 표준을 준수하고, 이를 통해 PKI 제품 간의 상호운용성을 지원할 수 있는지 여부를 검증하려는 것이다.

  • PDF

Study of Acquiring the Credibility for Weapon System M&S with V&V Process (검증 및 확인(V&V) 절차를 통한 무기체계 M&S 신뢰도 확보에 관한 연구)

  • Kim, Seok-Woo;Park, Sanghyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.3
    • /
    • pp.1-8
    • /
    • 2015
  • Verification, Validation & Accreditation (VV&A) process is widely applied in various disciplines as a method of acquiring the credibility for M&S tools. The guideline of VV&A states that the detailed process can be established flexibly according to the needs and the availability of resources. For example, DAPA (Defense Acquisition Program Administration) guideline suggests that the accreditation process in the VV&A can be omitted if necessary. On this study, we first introduce and describe V&V process. Accreditation process is omitted due to limited time and resources. However, the proposed V&V is sufficient for our needs. Finally, we apply the proposed process of V&V to the System-Integrated Simulator of "Raybolt", Medium-Range Infantry Missile System, for the acquisition of the M&S credibility.

영국의 보안검증표시 스킴에 관한 분석

  • Yoo, Jung-Hyun;Son, Kyung-Ho;Yi, Wan-S.;Kwak, Jin
    • Review of KIISC
    • /
    • v.19 no.1
    • /
    • pp.91-102
    • /
    • 2009
  • 최근 정보보호의 중요성이 부각됨에 따라 보안성이 검증된 정보보호 제품/서비스에 대한 선호도가 높아지고 있다. 또한 보안성 평가로 검증된 정보보호 제품/서비스의 보안 기능에 대한 안전성과 신뢰성을 보증하기 위해서 보안검증표시 스킴의 필요성이 증대되고 있다. 이에 따라 본 고에서는 영국의 보안검증표시 스킴에서 규정하는 보안검증표시 스킴의 체계, 절차, 검증 제품에 대해서 분석하고자 한다.