• Title/Summary/Keyword: 1:1 검증

Search Result 15,925, Processing Time 0.046 seconds

Performance Verification Method of Receiver for DGPS Reference Station (DGPS 기준국용 수신기의 성능검증 방법)

  • Choi, Jin-Kyu;Cho, Deuk-Jae;Suh, Sang-Hyun;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.10
    • /
    • pp.859-864
    • /
    • 2007
  • In the future, it is necessary that using the Satellite-based radio navigation augmentation system such as Differential Global Positioning System(DGPS) to achieve a position accuracy of sub-meter level in port. Generally, the receiver for DGPS reference station should meet performance specifications of RSIM Ver. 1.1 presented by RTCM. This paper proposes a method to verify performance of the receiver for DGPS reference station according to the RSIM Ver. 1.1. And this paper presented that performance evaluation of the commercial receiver for DGPS reference station through the proposed method is satisfied with RSIM Ver. 1.1.

CodeAnt : Code Slicing Tool for Effective Software Verification (CodeAnt : 소프트웨어 검증 효율 향상을 위한 코드 슬라이싱 도구)

  • Park, Mingyu;Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Safety critical systems require exhaustive verification of safety properties, because even a single corner-case fault can cause a critical safety failure. However, existing verification approaches are too costly in terms of time and computational resource required, making it hard to be applied in practice. In this paper, we implemented a tool for minimizing the size of the verification target w.r.t. verification properties to check, based on program slicing technique[1]. The efficacy of program slicing using our tool is demonstrated in a case study with a verification target Trampoline[3], which is an open source automotive operating system compliant with OSEK/VDX[2]. Experiments have shown enhanced performance in verification, with a 71% reduction in the size of the code.

Web Usage Patterns Validation Based on Expert Belief Using Statistical Reasoning (통계적 추론을 이용한 전문가 Belief기반의 Web Usage 패턴 검증)

  • Ko, Se-Jin;Ahn, Kye-Sun;Jeong, Jun;Lee, Phill-Kyu
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10b
    • /
    • pp.148-150
    • /
    • 2001
  • 발견된 Web Usage 패턴들은 분석하는 전문가에게는 불필요하고 흥미롭지 못해 의사결정에 도움이 못되는 경우가 많다. 따라서 발견된 패턴에 대한 도메인 전문가의 사전 Belief에 기반한 패턴 검증 과정이 필요하다. 발견된 패턴의 유용성 여부는 패턴의 Unexpectedness를 측정함으로써 결정할 수 있다. 본 논문에서는 패턴의 Unexpectedness를 전문가의 Belief에 기반하여 검증하기 위한 새로운 방법론 제안한다. 발견된 패턴과 전문가 Belief를 매칭 알고리즘을 이용하여 패턴을 4가지(완전일치, 조건부 일치, 결과부 일치, 완전 불일치)로 분류하는 1차 검증과 1차 검증 결과의 4가지 분류데이터를 통계적 추론 방법인 Dempster-chafer에 적용한 2차 검증으로 나뉜다. 1차 검증 과정은 패턴의 분류 용이성을 부여하나 패턴의 Unexpectedness에 대한 신뢰성을 제공하지 못한다. 이 문제점을 2차 검증 과정을 통해 해결한다.

  • PDF

아리랑 2호 임무계획검증시스템 개발 및 자동화

  • Park, Seon-Ju;Jeong, Dae-Won;Sin, Jeong-Hun;Lee, Jae-Hyeon
    • Bulletin of the Korean Space Science Society
    • /
    • 2009.10a
    • /
    • pp.47.1-47.1
    • /
    • 2009
  • 관제시스템 중 임무계획시스템은 위성시스템을 이용한 일련의 임무를 수행하는데 있어, 위성의 상태를 고려하여 임무간 상호 충돌이 없도록 최적의 임무계획을 수립하는 시스템이다. 상용화 촬영임무의 증가로 인해 1일 촬영요청수가 증가한다면 임무간 시간충돌 및 자원에 의한 제한 사항을 검증하는데 많은 시간이 소요되고, 임무계획 작성의 오류 가능성이 증가하게 된다. 이러한 어려움을 해결하기 위해서 임무계획검증시스템이 제안되고 개발되었다. 임무계획검증시스템은 임무계획시스템과 연동되어 운영되도록 설계되었으며, 검증기능 외에도 교신 스케줄 자동생성 기능을 포함하고 있다. 임무계획검증시스템의 주요기능은 임무계획검증, 명령계획검증, 교신스케줄생성 기능을 가지고 있으며, 각 모듈에서 생성된 내용은 공통 데이터베이스로 운영된다.

  • PDF

Design of Automatic Model Verification for System Integration Laboratory (통합시험환경 모델 검증 자동화 설계)

  • Yang, Seung-Gu;Cho, Yeon-Je;Jo, Kyoung-Yong;Ryu, Chang-Myung
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.361-366
    • /
    • 2019
  • In developing the avionics system, a system integration laboratory (SIL) is established to verify the function and interworking of individual components. In case of individual verification of SIL's components and system integration, a SIL model that simulates the function and interworking of each equipment is developed and used. A SIL model shall be pre-verified against all data defined in the interface control document (ICD) before interworking with the actual equipment and reverified even when the ICD changes or functions change. However, if the verification of the SIL model is performed manually, the verification of the individual SIL model takes considerable time. For this reason, selective regression tests are often performed to determine a impact of SIL models on ICD changes and some functional changes. In this paper, we designed SIL model verification automation method to perform regession test by reducing verification time of SIL model and verify the usefulness of verification automation design by developing SIL model verification automation tool.

Is the t-test insensitive than the bootstrap method in the P300-based concealed information test? (P300 숨긴정보검사에서 t 검증이 부트스트랩 방법보다 덜 민감한가?)

  • Eom, Jin-sup;Sohn, Jin-Hun;Park, Mi-Sook
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.1
    • /
    • pp.21-36
    • /
    • 2020
  • In P300-based concealed information test (P300 CIT), it evaluates whether the P300 amplitude for the probe is significantly greater than that of the irrelevant to determine if the suspect is telling a lie. An independent sample t-test or a bootstrap method can be used as a statistical test to make that decision. Rosenfeld et al. (2004) used the bootstrap method, claiming that "t tests on single sweeps are too insensitive to use to compare mean probe and irrelevant P300s within individuals" and their method has been accepted to date. The purpose of the study is to evaluate whether the power of t-test is lower than that of the bootstrap method in the P300 CIT. The Monte Carlo study was conducted by using EEG collected from 39 participants. The results showed that the type I error rates of the t-test and the percentile bootstrap method were similar and the power of the percentile bootstrap method was slightly higher than that of the t-test. The type I error rates of the t-test and the percentile bootstrap method were slightly lower than the significance level and the powers of the two tests were also slightly lower than that of the theoretical t-test. On the other hand, the type I error rate and power of the standard error Bootstrap method were the same as those of the theoretical t-test and its power was .012 ~ .081 higher than that of t-test depending on experimental conditions.

  • PDF

Delegated Attribute Certificate Validation And Protocol (PMI 인증서 검증 위임 및 검증 프로토콜)

  • 이승훈;송주석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.59-67
    • /
    • 2003
  • PMI(Privilege Management Infrastructure) certificates as well as Public-Key certificates must be validated before being used. Validation for a PMI certificate requires PMI certificate path validation, and PKC(Public-Key Certificate) path validations for each entity in the PMI certificate path. This validation work is quite complex and burdened to PMI certificate verifiers. Therefore, this paper suggests a delegated PMI certificate validation that uses specialized validation server, and defines a validation protocol which is used between validation server and client.

Implementation of Validation Tool for Cryptographic Modules (암호기술 구현물 검증도구 구현)

  • 이종후;김충길;이재일;이석래;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.45-58
    • /
    • 2001
  • There are relatively many research results of the validation of the cryptography. But few researches on the validation of cryptography implementations were accomplished. However, developer\`s misunderstanding the crypto-algorithm or a mistake in implementation of the crypto-a1gorithm leads to lose reliability of security products. Therefore, as validation of the crypto-algorithm itself also validation of the implementation is important. The major objective of this paper is to propose Security Products Validation Tool. Our tool validates implementation of the public key algorithm (RSA. KCDSA) and hash algorithm (SHA-1, HAS-170). The validation process is composed of several items and our tool performs validation teats for conformance to related standard.

발사체 성능 검증위성 탑재소프트웨어 상세 설계

  • 최은정;박석준;채장수
    • Bulletin of the Korean Space Science Society
    • /
    • 2004.04a
    • /
    • pp.46-46
    • /
    • 2004
  • 한국항공우주산업(주) 우주개발연구센타에서는 고흥의 외나로도 우주센터에서 국내 최초로 발사되는 소형위성 발사체인 KSLV-1(Korea Space Launch Vehicle-1)의 성능검증을 위해 탑재되는 발사체 성능 검증위성(Korea Demonstration Satellite)을 개발하고 있다. 탑재소프트웨어는 검증위성의 임무를 수행하기 위하여 요구되는 데이터를 처리하고, 위성을 제어하는 역할을 수행한다. 이에 따라 검증위성의 탑재소프트웨어의 주요 기능은 발사체 환경 측정 및 비디오 영상 자료의 획득, GPS로부터 위성체 궤도자료의 저장, 밧데리 충방전 제어, 태양 지향 및 지상과의 통신 등을 고려한 자세제어이다. (중략)

  • PDF