• Title/Summary/Keyword: 1:1 Verification

Search Result 4,031, Processing Time 0.03 seconds

A study on Verification Process for LRT's Power Supply System Based on the ISO/IEC 15288 (국제표준 ISO/IEC 15288 기반의 경량전철 전력시스템 검증 프로세스에 관한 연구)

  • Choi, Won Chan;Bae, Joon Ho;Heo, Jae Hun;Lee, Sang Geun;Han, Seok Youn
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.9 no.1
    • /
    • pp.47-53
    • /
    • 2013
  • The object of this study is to define systematically for outputs of Verification Process among the system life cycle process based on ISO/IEC 15288 for power supply system, which is one of the importance sub-systems to configure the LRT system. Furthermore, to prevent various problem in advance that can occur in the Transition LRT's power supply to be completed Integration. For this purpose, traceability of verification requirement and outputs. should be managed to use verification for system requirement and data processing tool. by system engineering techniques of system life cycle process based on ISO/IEC 15288 to LRT system.

Rayleigh-Ritz procedure for determination of the critical load of tapered columns

  • Marques, Liliana;Da Silva, Luis Simoes;Rebelo, Carlos
    • Steel and Composite Structures
    • /
    • v.16 no.1
    • /
    • pp.45-58
    • /
    • 2014
  • EC3 provides several methodologies for the stability verification of members and frames. However, when dealing with the verification of non-uniform members in general, with tapered cross-section, irregular distribution of restraints, non-linear axis, castellated, etc., several difficulties are noted. Because there are yet no guidelines to overcome any of these issues, safety verification is conservative. In recent research from the authors of this paper, an Ayrton-Perry based procedure was proposed for the flexural buckling verification of web-tapered columns. However, in order to apply this procedure, Linear Buckling Analysis (LBA) of the tapered column must be performed for determination of the critical load. Because tapered members should lead to efficient structural solutions, it is therefore of major importance to provide simple and accurate formula for determination of the critical axial force of tapered columns. In this paper, firstly, the fourth order differential equation for non-uniform columns is derived. For the particular case of simply supported web-tapered columns subject to in-plane buckling, the Rayleigh-Ritz method is applied. Finally, and followed by a numerical parametric study, a formula for determination of the critical axial force of simply supported linearly web-tapered columns buckling in plane is proposed leading to differences up to 8% relatively to the LBA model.

Integrity Verification in Vehicle Black Box Video Files with Hashing Method (차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법)

  • Choi, Jin-young;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.241-249
    • /
    • 2017
  • Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.

A Study of Product Information Quality Verification in Database Construction of Naval Ship Product Models (실적선 데이터베이스 구축을 위한 함정 제품모델의 데이터 품질검증에 관한 연구)

  • Oh, Dae-Kyun;Shin, Jong-Gye;Choi, Yang-Ryul
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.1
    • /
    • pp.57-68
    • /
    • 2009
  • In automotive industries, reusability of product information is increasing through database construction of previous product data. The product data is stored by data quality management in product information systems. For naval ships, have the functional similarity by the ships of the same classification and class, that are built by series. Information of hull structures as well as embarked equipments are similar. So it would be effective to use database systems that are considered product information quality of previous ships in design and production processes. In this paper we discuss product information quality in database construction of naval ship product models. For this, we propose a basic concept and reference model for data quality verification. Based on this concept, A verification guideline is defined and it is applied for the case study of the digital naval ship which was built to the naval ship product model.

Automated Formal Verification of Korean Standard Block Cipher Using Cryptol (Cryptol을 이용한 국내 표준 블록 암호 모듈의 자동 정형 검증)

  • Choi, Won-bin;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.53-60
    • /
    • 2018
  • Cryptographic algorithms are being standardized globally, and the security of cryptographic algorithms has been well proven. However, there is a need for an improved verification method to verify that the existing verification method is correctly implemented according to the standard, because there is a weakness in implementation and it can cause serious damage. Therefore, in this paper, we selected ARIA and LEA to be verified among 128-bit or more block cipher modules performed by the National Intelligence Service, and propose a method to verify whether it is implemented correctly using Cryptol for high-assurance cryptographic module.

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.

Methodology of CO2 Emission Factor Verification and Quantitative Assessment in Ethylene Product Processes (에틸렌 생산에서의 CO2 국가배출계수 검증 및 정량평가 방법론)

  • Youk, Soo Kyung;Jeon, Eui-Chan;Yoo, Kyung Seun
    • Journal of Climate Change Research
    • /
    • v.9 no.1
    • /
    • pp.69-74
    • /
    • 2018
  • The purpose of this study is to suggest the methodology of $CO_2$ Emission Factor Verification and Quantitative Assessment in Ethylene Product Processes. At first, this study compare the IPCC (Intergovernmental Panel on Climate Change) 1996 Guideline and 2006 Guideline. And analyse methodology for estimating $CO_2$ emission and $CO_2$ emission factor in Ethylene product process. Also analyse cases of estimating $CO_2$ emission factor based on material balance. Methodology of $CO_2$ Emission Factor Verification and Quantitative Assessment are following the categories proposed by GIR (Greenhouse Gas Inventory and Research Center). There are total 12 factors in 8 categories and give 5 or 10 points according to their importance. Also this study suggests necessary data of document to meet the conditions. The result would help estimate accuracy Greenhouse Gas Inventory. Also contribute to establish policy on environmental assessment, air conservation, etc.

An Watermarking Algorithm for Multimodal Biometric Systems (다중 생체인식 시스템에 적합한 워터마킹 알고리즘)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.93-100
    • /
    • 2005
  • In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects on verification accuracy quantitatively. To hide biometric data with watermarking techniques, we first consider possible two scenarios. In the scenario 1, we use a fingerprint image as a cover work and hide facial features into it. On the contrary, we hide fingerprint features into a facial image in the Scenario 2. Based on the experimental results, we confirm that the Scenario 2 is superior to the Scenario 1 in terms of the verification accuracy of the watermarking image.

Trends of Artificial Intelligence Product Certification Programs

  • Yejin SHIN;Joon Ho KWAK;KyoungWoo CHO;JaeYoung HWANG;Sung-Min WOO
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.3
    • /
    • pp.1-5
    • /
    • 2023
  • With recent advancements in artificial intelligence (AI) technology, more products based on AI are being launched and used. However, using AI safely requires an awareness of the potential risks it can pose. These concerns must be evaluated by experts and users must be informed of the results. In response to this need, many countries have implemented certification programs for products based on AI. In this study, we analyze several trends and differences in AI product certification programs across several countries and emphasize the importance of such programs in ensuring the safety and trustworthiness of products that include AI. To this end, we examine four international AI product certification programs and suggest methods for improving and promoting these programs. The certification programs target AI products produced for specific purposes such as autonomous intelligence systems and facial recognition technology, or extend a conventional software quality certification based on the ISO/IEC 25000 standard. The results of our analysis show that companies aim to strategically differentiate their products in the market by ensuring the quality and trustworthiness of AI technologies. Additionally, we propose methods to improve and promote the certification programs based on the results. These findings provide new knowledge and insights that contribute to the development of AI-based product certification programs.