• Title/Summary/Keyword: 유효성 점검

Search Result 40, Processing Time 0.027 seconds

Improved Performance of the Test System for Flight Data Instrumentation Equipment (비행 데이터 계측장비를 위한 점검 시스템 성능 개선)

  • Kim, Sang Beom;Lee, Sun Young;Nam, Young Ho
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.54-59
    • /
    • 2021
  • Flight data acquired through flight instrumentation equipment during aircraft development play an important role in aircraft development and performance improvement. Therefore, as the reliability of flight instruments is required, inspection systems to check the soundness of flight instruments are very important. In this paper, we analyze the existing test system for flight data instrumentation equipment and present improvements in the hardware and software aspects of the test system. Based on this, we design and implement a test system with improved performance and present test results. Test system with improved performance improves cost savings, flexible application, and maintenance compared to the existing test system. Therefore, the robustness of the instrumentation equipment can be obtained, which can be expected to improve the reliability of flight data.

A Study on Automatic Test Equipment Validation in the Realm of Defense (국방 분야 자동화시험장비 유효성 확인 방안에 관한 연구)

  • Pak, Se-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.144-150
    • /
    • 2020
  • This study examined the current status of ATE in the development stage of the domestic guided weapons field, including the re-establishment of automatic test equipment (ATE), and attempted to develop methods to verify the validity of ATE in the defense sector. This study includes methods for confirming the repeatability and reproducibility of newly manufactured or replaced ATE. An error injection test is required for validation in the development phase. And pre-inspection steps are required for validation. When developing ATE, the use of an international standard testing script language ensures efficient validation and SW reliability. This ensures interoperability between the main and test equipment, and the tester can secure a test system platform that supports standardized testing methods, which is considered to be effective in validating specific ATE for each weapon system.

A Study on the Validation of Measured Data from the Seismic Accelerometers in the Safety Evaluation System of Public Buildings (공공건축물 안전성 평가를 위한 지진가속도 계측자료의 유효성 검증 방법에 대한 연구)

  • Jang, Won-Seok;Jeong, Seong-Hoon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.5
    • /
    • pp.150-157
    • /
    • 2020
  • In this study, an algorithm was developed to validate the seismic acceleration measurement data of the seismic acceleration measurement system using measurement data from public buildings currently in operation. Through the results of the study, an algorithm was developed to detect errors and abnormalities in the measurement data itself and the process of generating real-time data (MMA/sec) and event measurement data (MiniSEED), which are the main data generated by the system, and the basic data for determining the direction of inspection through measurement data analysis. It is expected that this will be used as a guideline to determine whether or not the seismic acceleration measurement system, which was managed as receiving/not receiving, is inspected and abnormal types of conditions.

Implementation of EDMS(Electric Document Management System) with Validity Verification (전자문서 유효기간 검증 기능을 탑재한 전자문서관리시스템 구현)

  • Park, Jung-Oh;Lee, Seung-Min;Kim, Sang-Geun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7B
    • /
    • pp.1043-1049
    • /
    • 2010
  • E-document deposit and issue service among other services is critical service in CEDA(Certified E-Document Deposit Authority) that assure reliability and stability of E-document. After owner's E-document is registered in CEDA, issuing partial information(a part of page) is to prevent exposure of superfluous information when owner issue E-document to 3rd party. Also we suggested that is able to verify validation of E-document as validation check module is inserted suggested system.

A Study on Targer Factor Value of Port State Control Inspection Using Absolute Measurement (절대평가법을 이용한 항만국통제 점검 표적점수 평가에 관한 연구)

  • Jang, Woon-Jae
    • Journal of Navigation and Port Research
    • /
    • v.34 no.6
    • /
    • pp.471-477
    • /
    • 2010
  • In recently, IMO consider including an marine casualty factor when Port State Control Inspection evaluate.. This paper proposes an evaluation to Target Factor Values of Port State Control Inspections(PSCITFV) using absolute measurement. To this solve, therefore, this paper used the absolute measurement which is informed compensate the defect and the more rational and objective methode, checked the effectiveness to compare an result with absolute measurement and PSCITFV of Tokyo MOU using Wilcoxson test. Finally, rate change of PSC was investigated by an experiment which changed the values of evaluation factors. As a result, it was evaluation factors of high rate change that was detention, ship's age, casualty factors. Therefore, this factors have to a priority management to do for prevent of PSC.

A Practical Effectiveness Analysis on Alert Verification Method Based on Vulnerability Inspection (취약점 점검을 활용한 보안이벤트 검증 방법의 실증적 효과분석)

  • Chun, Sung-Taek;Lee, Youn-Su;Kim, Seok-Hun;Kim, Kyu-Il;Seo, Chang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.39-49
    • /
    • 2014
  • Cyber threats on the Internet are tremendously increasing and their techniques are also evolving constantly. Intrusion Detection System (IDS) is one of the powerful solutions for detecting and analyzing the cyber attacks in realtime. Most organizations deploy it into their networks and operate it for security monitoring and response service. However, IDS has a fatal problem in that it raises a large number of alerts and most of them are false positives. In order to cope with this problem, many approaches have been proposed for the purpose of automatically identifying whether the IDS alerts are caused by real attacks or not. In this paper, we present an alert verification method based on correlation analysis between vulnerability inspection results for real systems that should be protected and the IDS alerts. In addition, we carry out practical experiments to demonstrate the effectiveness of the proposed verification method using two types of real data, i.e., the IDS alerts and the vulnerability inspection results.

Analysis and Verification for Cloud Services in Microsoft (마이크로소프트 클라우드 서비스 안정성 점검 및 분석)

  • Young-Min Kim;Hyoung-Kee Choi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.239-240
    • /
    • 2024
  • OneDrive 는 Microsoft 에서 제공하는 클라우드 스토리지 서비스이다. OneDrive 데스크톱 앱은 사용자가 로그아웃한 이후 재로그인을 시도할 때 사용자 기기에 저장되어 있던 토큰을 사용해 로그인을 진행하며, 사용자의 패스워드를 추가로 요구하지 않는다. 이는 로그아웃한 사용자의 유효한 로그인 정보가 기기에 남아있음을 의미하며, 본 연구에서는 이를 활용해 OneDrive 의 토큰 저장소를 분석하고 토큰 이식 공격이 가능함을 보인다.

유비쿼터스 환경에서의 상황인식형 자가치유 시스템

  • 윤현상;박정민;이은석
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.259-268
    • /
    • 2004
  • 유비쿼터스환경으로 발전하기 위하여 네트웍을 구성하는 시스템들의 문제나 장애의 자가 진단 및 치유에 대한 요구가 높아지고 있다. 본 논문에서는 이러한 유비쿼터스환경에서 여러 시스템들이 스스로 자신의 오류나 문제를 관찰, 진단하고 치유할 수 있는 자가치유 시스템을 제안한다. 특히, 제안 시스템은 기존의 자가 치유시스템에서 연구되어왔던 일률적인 치유가 아닌 각각의 시스템의 상황을 인식하고 그것에 맞추어서 치유전략을 달리하는 상황인식 기능과 치유 결과 분석을 통해 치유전략을 자발적으로 개선해 나가는 기능을 제공한다. 구체적인 주요 기능은 다음과 같다: 치유대상들의 의존성 점검을 통한 근원적인 문제 해결, 자가치유를 위한 효율적인 리소스 사용, 벤더의 웹서버를 검색하여 치유정보를 수집, 벤더 의존성의 경감등, 치유프로세스의 개선은 물론 치유를 위한 관리자의 작업 부담을 상당 부분 경감할 수 있게 된다. 제안 시스템은 시뮬레이션을 통하여 그 유효성을 입증하고 있다.

  • PDF

A Validation of Effectiveness for Intrusion Detection Events Using TF-IDF (TF-IDF를 이용한 침입탐지이벤트 유효성 검증 기법)

  • Kim, Hyoseok;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1489-1497
    • /
    • 2018
  • Web application services have diversified. At the same time, research on intrusion detection is continuing due to the surge of cyber threats. Also, As a single-defense system evolves into multi-level security, we are responding to specific intrusions by correlating security events that have become vast. However, it is difficult to check the OS, service, web application type and version of the target system in real time, and intrusion detection events occurring in network-based security devices can not confirm vulnerability of the target system and success of the attack A blind spot can occur for threats that are not analyzed for problems and associativity. In this paper, we propose the validation of effectiveness for intrusion detection events using TF-IDF. The proposed scheme extracts the response traffics by mapping the response of the target system corresponding to the attack. Then, Response traffics are divided into lines and weights each line with an TF-IDF weight. we checked the valid intrusion detection events by sequentially examining the lines with high weights.

Adaptability of Process Evaluation in New and Renewable Energy Dissemination Program (신재생에너지 보급사업 평가에 있어 Process evaluation 적용 가능성 고찰)

  • Kim, Ji-Hyo;Park, Joo-Young;Heo, Eun-Nyeong
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.302-302
    • /
    • 2009
  • 미국 DOE(Department of energy) 산하 EERE(the office of energy efficiency and renewable energy)에서는 시행되고 있는 일반 프로그램 평가(General Program Evaluation) 중 하나인 과정 평가(Process Evaluation)는 프로그램의 수행의 효율성과 유효성을 평가하기 위해 수행된다. EERE에서는 프로그램 별로 매 2~3년에 한번, 프로그램의 진행에 장애요인을 시행하기 위해 부정기적으로 과정평가를 수행하여 프로그램의 진행과정을 개선할 것을 제안하고 있다. 과정평가의 방법론으로는 사례연구(case study), 내용분석(content analysis), 메타평가(meta evaluation), 델파이분석(delphi-analysis), 외부 동료평가(peer review) 등의 방법론이 사용될 수 있다. 특히, EERE는 "Peer Review Guide(2004)"을 발간하여 과정평가에서 있어 외부 동료평가의 방법론을 정리하였다. 과정평가를 통해 프로그램 수행결과의 중간점검과 동시에 프로그램의 발전을 위하 전문가의 제언을 수집할 수 있다. 따라서 과정평가의 결과는 프로그램의 개선에 도움을 줄 수 있으며, 장기 과제인 경우 프로그램 관리에 효과적으로 사용될 수 있다. 우리나라의 경우, 사업 수행 시 '진도보고'나 '중간결과 발표' 등을 통하여 동일한 내용의 평가를 시행하고 있으나, 평가의 항목.시기.예산 등에 대한 지침(guideline)이 구축되었다고 볼 수 없는 상황이다. 한국의 신재생에너지 보급사업은 국가적인 중요도, 투입예산의 규모 및 수행기간 등을 고려할 때 과정평가를 통해 정기적으로 사업의 진행과정을 점검할 필요가 있다 하겠다. 따라서 신재생에너지 분야의 사업의 관리에 적용될 수 있는 EERE의 과정평가를 한국의 상황에 맞게 수정하고 이를 정규적으로 시행하는 방안에 대한 논의가 필요하다 하겠다.

  • PDF