• 제목/요약/키워드: 신뢰 모델

검색결과 3,235건 처리시간 0.032초

NHPP Unification Scheme for the Software Reliability Estimation (소프트웨어 신뢰도 산출에 관한 NHPP이론의 단일화 방안)

  • 최규식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2004년도 가을 학술발표논문집 Vol.31 No.2 (2)
    • /
    • pp.457-459
    • /
    • 2004
  • 본 논문에서는 NHPP에 기초한 여러 기존 소프트웨어 신뢰도 모델들이 가중 산술, 가중 기하, 또는 가중 조화평균의 개념을 적용하여 어떻게 유도되는가를 기술한다. 그 외에도, 이러한 3개의 가중치 평균에 근거하여 유사산술의 관점으로부터 좀더 일반적인 NHPP 모델을 제안한다. 상기 3개 평균 외에 변환의 파라미터 계열을 포함한 좀더 일반적인 변환을 공식화한다. 이러한 일반적인 프레임웍 하에서 기존의 NHPP를 입증하고 여러 가지 새로운 NHPP클 유도한다. 우리는 이러한 접근법들이 상이한 조건 하의 여러 가지 잘 알려진 모델들을 포함하는 것으로 한다.

  • PDF

IT Division in Konyang University (일정 테스트와 웨이블 테스트의 연구)

  • 장원석;최규식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2001년도 가을 학술발표논문집 Vol.28 No.2 (1)
    • /
    • pp.409-411
    • /
    • 2001
  • 본 논문에서는 소프트웨어 테스트 단계중에 발생되는 테스트노력 소요량을 고려한 소프트웨어 신뢰도 성장 모델을 제시하여 시간종속적인 테스트 노력소요량 동태를 일정 테스트 노력일 때와 웨이블 테스트 노력일 때를 비교하여 연구한다. 테스트 단계중에 소요되는 테스트노력의 양에 대한 결함 검출비를 현재의 절함 내용에 비례하는 것으로 가정하여 모델을 NHPP로 공식화하되, 이 모델을 이용하여 소프트웨어 신뢰도 척도에 대한 데이터 분식기법을 개발한다. 테스트 시간의 경과와 신뢰도와의 관계를 연구한다. 목표신뢰도를 만족시키는 최적발행시각을 정한다.

  • PDF

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • 제15C권6호
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

Development for Reliability Quality and Performance Evaluate Model of Fingerprint Recognition System (지문인식시스템의 신뢰성 품질 성능 평가모델 개발)

  • Eom, Woo-Sik;Jeon, In-Oh
    • The Journal of the Korea Contents Association
    • /
    • 제11권2호
    • /
    • pp.79-87
    • /
    • 2011
  • Although products with the fingerprint recognition system currently show a rapid growth in quantity, it is also true that efforts to consider the product quality have been lacking until now. Accordingly, this paper analyzed technological elements with domestic and foreign market situations for products with the fingerprint recognition system to develop an evaluation model to support the quality increase by evaluating aspects of product quality for the knowledge information security, identifying the level of quality and deriving directions for improvements. A model for the reliability quality evaluation was constructed that can be applied comprehensively to non-functional elements that have not been done in the existing evaluations central to the security functions by analyzing requirements for the security, performance and reliability in consideration of features on products. It is considered that this paper can make contributions to the overall quality increase for products with the knowledge information security by reflecting features and trends for the fingerprint recognition products and building a model for the reliability and evaluation to perform evaluations by product.

A Study on the Optimum Release Model of a Developed Software with Weibull Testing Efforts (웨이블 시험노력을 이용한 개발 소프트웨어의 최적발행 모델에 관한 연구)

  • Choe, Gyu-Sik;Jang, Yun-Seung
    • The KIPS Transactions:PartD
    • /
    • 제8D권6호
    • /
    • pp.835-842
    • /
    • 2001
  • We propose a software-reliability growth model incoporating the amount of testing effort expended during the software testing phase. The time-dependent behavior of testing effort expenditures is described by a Weibull curve. Assuming that the error detection rate to the amount of testing effort spent during the testing phase is proportional to the current error content, a software-reliability growth model is formulated by a nonhomogeneous Poisson process. Using this model the method of data analysis for software reliability measurement is developed. After defining a software reliability, we discuss the relations between testing time and reliability and between duration following failure fixing and reliability are studied in this paper. The release time making the testing cost to be minimum is determined through studying the cost for each condition. Also, the release time is determined depending on the conditions of the specified reliability. The optimum release time is determined by simultaneously studying optimum release time issue that determines both the cost related time and the specified reliability related time.

  • PDF

Design Reliability Estimation of Low Energy Exploding Foil Initiator (LEEFI형 착화장치의 설계 신뢰도 추정)

  • Lee, Minwoo;Back, Seungjun;Son, Youngkap;Jang, Seung-gyo
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • 제22권5호
    • /
    • pp.40-48
    • /
    • 2018
  • This paper presents a simulation-based design reliability estimation method of a low-energy exploding foil initiator (LEEFI) using a meta-model and describes the design reliability estimation results. The flyer velocity of the LEEFI is critical to initiate the explosive. Evaluation of the flyer velocity from mechanistic models in open literature requires a long computation time due to the multi-physical phenomena that generate the velocity. Moreover, the higher levels of confidence required for an initiator with high reliability incur higher computation costs. Thus, a meta-model of the flyer velocity over time was constructed in order to increase the computational efficiency for a reliable estimation. For different distributions and sigma levels of the design variables, the design reliability estimation results using the meta-model are provided. Additionally, the computational efficiency and accuracy of the estimation method are analyzed.

Verification of Effectiveness of Soccer Shoe Brand 3I Model: Applying the Bootstrap BC Method (축구화 브랜드의 3i 모델 효과성 검증: 붓스트랩 BC법 적용 )

  • Shin, Jin-Ho
    • Journal of the Korean Applied Science and Technology
    • /
    • 제38권4호
    • /
    • pp.1156-1164
    • /
    • 2021
  • This study sought to provide basic data on the soccer shoe brand strategy method by verifying the effectiveness of the soccer shoe brand 3i model to derive the importance and implications of the brand 3i model. Therefore, the sample was selected for those who have purchased soccer shoes for the past three years, and 421 copies of the data were applied to the final analysis. Data processing performed frequency analysis, internal consistency, confirmatory factor analysis, correlation analysis, and structural equation model analysis, all of which utilized SPSS (ver. 21.0) and AMOS (ver. 20.0) programs. The conclusions of this study are as follows. First, soccer shoe brand 3i model had a significant influence on brand trust. Second, brand trust had a significant influence on consumer purchasing behavior. Third, soccer shoe brand 3i model had a significant influence on consumer purchasing behavior. Lastly, brand trust between soccer shoe brand 3i model and consumer purchasing behavior showed partial mediated effect.

Application of Blockchain Technology to Verify Reliability of Life Cycle BIM Model for Civil Engineering Project (블록체인기술을 활용한 토목공사 생애주기 BIM 모델의 신뢰성 확보 방안)

  • Lee, Jaehee;Moon, Hyounseok;Kang, Leenseok
    • Korean Journal of Construction Engineering and Management
    • /
    • 제22권1호
    • /
    • pp.116-124
    • /
    • 2021
  • As the utilization of the BIM model increases in the design and construction stages of a construction project, the utilization of BIM in the maintenance stage can also increase. In the maintenance stage, BIM objects created in the design and construction stages that have already been completed are used. Therefore, it is necessary to verify the reliability of whether the used BIM object is a certified model created in the design stage. In particular, the reliability of the BIM model becomes more important in a project such as railway facilities composed of various construction activities with civil engineering, architecture, electricity, signal, and track work. This study proposes a methodology of using blockchain technology as a way to secure the reliability of the BIM model used in the maintenance phase, and constructs the block structure and detailed process for applying the blockchain technology to BIM. In addition, by applying this process to the BIM model of an actual facility to generate a block, it was confirmed that the blockchain technology can be used as a tool to secure the reliability of the BIM model.

ZigBee Network Formation based on Trust Model and Trustworthiness Measurement (신뢰모델기반의 ZigBee 네트워크 구성 및 신뢰성 측정)

  • Hwang, Jae-Woo;Park, Ho-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제14권5호
    • /
    • pp.1284-1294
    • /
    • 2010
  • The ZigBee is one of the most important technologies for composing USN. It is one of the IEEE 802.15.4 standards to support personal area networks. It uses a hierarchical routing or an on-demand route discovery strategy as an address allocation method. A hierarchical routing doesn't use a routing table but only uses a child node or a parent node as an intermediate node for data delivery. Therefore, the ZigBee network's topology greatly affects the overall network performance. In this paper, we propose a more trustworthy algorithm than only using the depth and widely variable LQI during network formation, and moreover we propose an algorithm to measure network's trustworthiness. We simulate our algorithm using the NS-2 and implement our network using the MG2400 ZigBee module for verifying performance.

딥러닝을 활용한 선박가치평가 모델 개발

  • Choi, Jung-suk;Kim, Donggyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 한국항해항만학회 2020년도 추계학술대회
    • /
    • pp.108-110
    • /
    • 2020
  • 본 연구의 목적은 딥러닝 기법의 하나인 인공신경망 모델을 활용하여 선박의 가치평가 모델을 개발하는 것이다. 선박의 가치는 해운시장 변화와 밀접한 관계가 있으며, 경기 변동성이 크고 시장 민감성이 높은 해운시장의 특성상 가치의 불확실성 역시 높게 나타나고 있다. 이러한 선박가치의 중요성에도 불구하고 국내외적으로 선박가치평가의 체계 개선 및 평가모델의 객관성과 신뢰성을 제고시키기 위한 연구는 부족한 실정이다. 따라서 본 연구에서는 딥러닝 방법을 통해 선박의 가치를 산출하는 새로운 평가모델을 제시하고자 한다. 가치평가의 대상은 중고 VLCC선이며, 선행연구를 통해 선박의 가치 변화를 유발하는 주요 요인들을 선별하여 변수를 설정하고 2010년 1월부터 현재까지의 해당 데이터를 확보하였다. 교차검증을 통해 파라미터들을 추정하여 인공신경망의 최적 구조를 식별하고 이에 대한 객관성과 신뢰성을 검증한 결과 인공신경망 모델의 가치평가 정확성이 우수함을 확인하였다. 본 연구는 선박가치평가의 전통적 방법론에서 탈피하여 기계학습 기반의 딥러닝 모델을 활용한 측면에서 독창적인 의미가 있다.

  • PDF