• Title/Summary/Keyword: 1:1 Verification

Search Result 4,031, Processing Time 0.031 seconds

Implemention of ID-CZP pattern for system verification through FPGA board (FPGA board를 통한 시스템 검증용 1D-CZP 패턴의 구현)

  • Park, Jung-Hwan;Jang, Won-Woo;Lee, Sung-Mok;Kim, Joo-Hyun;Kang, Bong-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.131-134
    • /
    • 2007
  • In this paper, we propose the 1D-CZP pattern for FPGA verification. The algorithm that was implemented by Verilog-HDL on FPGA board is verified before the chip is producted. Input through the external sensor might not be enough to verify the algorithm on FPGA board. Hence, both external input and internal input can lead the verification of the algorithm. This paper suggests the hardware implementation of compact 1D-CZP pattern that has the random input. It is useful to analyze the characteristics of the filter frequencies and organized as ROM Table which is efficient to Modulus operation.

  • PDF

Development of Comparative Verification System for Reliability Evaluation of Distribution Line Load Prediction Model (배전 선로 부하예측 모델의 신뢰성 평가를 위한 비교 검증 시스템)

  • Lee, Haesung;Lee, Byung-Sung;Moon, Sang-Keun;Kim, Junhyuk;Lee, Hyeseon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.1
    • /
    • pp.115-123
    • /
    • 2021
  • Through machine learning-based load prediction, it is possible to prevent excessive power generation or unnecessary economic investment by estimating the appropriate amount of facility investment in consideration of the load that will increase in the future or providing basic data for policy establishment to distribute the maximum load. However, in order to secure the reliability of the developed load prediction model in the field, the performance comparison verification between the distribution line load prediction models must be preceded, but a comparative performance verification system between the distribution line load prediction models has not yet been established. As a result, it is not possible to accurately determine the performance excellence of the load prediction model because it is not possible to easily determine the likelihood between the load prediction models. In this paper, we developed a reliability verification system for load prediction models including a method of comparing and verifying the performance reliability between machine learning-based load prediction models that were not previously considered, verification process, and verification result visualization methods. Through the developed load prediction model reliability verification system, the objectivity of the load prediction model performance verification can be improved, and the field application utilization of an excellent load prediction model can be increased.

Patients Setup Verification Tool for RT (PSVTS) : DRR, Simulation, Portal and Digital images (방사선치료 시 환자자세 검증을 위한 분석용 도구 개발)

  • Lee Suk;Seong Jinsil;Kwon Soo I1;Chu Sung Sil;Lee Chang Geol;Suh Chang Ok
    • Radiation Oncology Journal
    • /
    • v.21 no.1
    • /
    • pp.100-106
    • /
    • 2003
  • Purpose : To develop a patients' setup verification tool (PSVT) to verify the alignment of the machine and the target isocenters, and the reproduclbility of patients' setup for three dimensional conformal radiotherapy (3DCRT) and intensity modulated radiotherapy (IMRT). The utilization of this system is evaluated through phantom and patient case studies. Materials and methods : We developed and clinically tested a new method for patients' setup verification, using digitally reconstructed radiography (DRR), simulation, porial and digital images. The PSVT system was networked to a Pentium PC for the transmission of the acquired images to the PC for analysis. To verify the alignment of the machine and target isocenters, orthogonal pairs of simulation images were used as verification images. Errors in the isocenter alignment were measured by comparing the verification images with DRR of CT Images. Orthogonal films were taken of all the patients once a week. These verification films were compared with the DRR were used for the treatment setup. By performing this procedure every treatment, using humanoid phantom and patient cases, the errors of localization can be analyzed, with adjustments made from the translation. The reproducibility of the patients' setup was verified using portal and digital images. Results : The PSVT system was developed to verify the alignment of the machine and the target isocenters, and the reproducibility of the patients' setup for 3DCRT and IMRT. The results show that the localization errors are 0.8$\pm$0.2 mm (AP) and 1.0$\pm$0.3 mm (Lateral) in the cases relating to the brain and 1.1$\pm$0.5 mm (AP) and 1.0$\pm$0.6 mm (Lateral) in the cases relating to the pelvis. The reproducibility of the patients' setup was verified by visualization, using real-time image acquisition, leading to the practical utilization of our software Conclusions : A PSVT system was developed for the verification of the alignment between machine and the target isocenters, and the reproduclbility of the patients' setup in 3DCRT and IMRT. With adjustment of the completed GUI-based algorithm, and a good quality DRR image, our software may be used for clinical applications.

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.

A Study on the Perlormance Variations of the Mobile Phone Speaker Verification System According to the Various Background Speaker Properties (휴대폰음성을 이용한 화자인증시스템에서 배경화자에 따른 성능변화에 관한 연구)

  • Choi, Hong-Sub
    • Speech Sciences
    • /
    • v.12 no.3
    • /
    • pp.105-114
    • /
    • 2005
  • It was verified that a speaker verification system improved its performances of EER by regularizing log likelihood ratio, using background speaker models. Recently the wireless mobile phones are becoming more dominant communication terminals than wired phones. So the need for building a speaker verification system on mobile phone is increasing abruptly. Therefore in this paper, we had some experiments to examine the performance of speaker verification based on mobile phone's voices. Especially we are focused on the performance variations in EER(Equal Error Rate) according to several background speaker's characteristics, such as selecting methods(MSC, MIX), number of background speakers, aging factor of speech database. For this, we constructed a speaker verification system that uses GMM(Gaussin Mixture Model) and found that the MIX method is generally superior to another method by about 1.0% EER. In aspect of number of background speakers, EER is decreasing in proportion to the background speakers populations. As the number is increasing as 6, 10 and 16, the EERs are recorded as 13.0%, 12.2%, and 11.6%. An unexpected results are happened in aging effects of the speech database on the performance. EERs are measured as 4%, 12% and 19% for each seasonally recorded databases from session 1 to session 3, respectively, where duration gap between sessions is set by 3 months. Although seasons speech database has 10 speakers and 10 sentences per each, which gives less statistical confidence to results, we confirmed that enrolled speaker models in speaker verification system should be regularly updated using the ongoing claimant's utterances.

  • PDF

Online Signature Verification Method using General Handwriting Data and 1-class SVM (일반 필기 데이터와 단일 클래스 SVM을 이용한 온라인 서명 검증 기법)

  • Choi, Hun;Heo, Gyeongyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1435-1441
    • /
    • 2018
  • Online signature verification is one of the simple and efficient methods of identity verification and has less resistance than other biometric technologies. To handle signature verification as a classification problem, it is necessary to gather forgery signatures, which is not easy in most practical applications. It is not easy to obtain a large number of genuine signatures either. In this paper, one class SVM is used to tackle the forgery signature problem and someone else's signatures are used as general handwriting data to solve the genuine signature problem. Someone else's signature does not share shape-based features with the signature to be verified, but it contains the general characteristics of a signature and useful in verification. Verification rate can be improved by using the general handwriting data, which can be confirmed through the experimental results.

Design and Verification Standard for Safety and Cybersecurity of Autonomous Cars: ISO/TR 4804 (자율주행자동차의 안전 및 보안을 위한 설계 및 검증 표준: ISO/TR 4804)

  • Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.571-577
    • /
    • 2021
  • This paper describes ISO/TR 4804, an international standard to describe how to design and verify autonomous cars to ensure safety and cybersecurity. Goals of ISO/TR 4804 are (1) positive risk balance and (2) avoidance of unreasonable risk. It also 12 principles of safety and cybersecurity to achieve these goals. In the design procedures, it describes (1) 13 capabilities to achieve these safety and cybersecurity principles, (2) hardware and software elements to achieve these capabilities, and (3) a generic logical architecture to combine these elements. In the verification procedures, it describes (1) 5 challenges to ensure safety and cybersecurity, (2) test goals, platforms, and solutions to achieve these challenges, (3) simulation and field operation methods, and (4) verification methods for hardware and software elements. Especially, it regards deep neural network as a software component and it describe design and verification methods of autonomous cars.

Uncertainty analysis of UAM TMI-1 benchmark by STREAM/RAST-K

  • Jaerim Jang;Yunki Jo;Deokjung Lee
    • Nuclear Engineering and Technology
    • /
    • v.56 no.5
    • /
    • pp.1562-1573
    • /
    • 2024
  • This study rigorously examined uncertainty in the TMI-1 benchmark within the Uncertainty Analysis in Modeling (UAM) benchmark suite using the STREAM/RAST-K two-step method. It presents two pivotal advancements in computational techniques: (1) Development of an uncertainty quantification (UQ) module and a specialized library for the pin-based pointwise energy slowing-down method (PSM), and (2) Application of Principal Component Analysis (PCA) for UQ. To evaluate the new computational framework, we conducted verification tests using SCALE 6.2.2. Results demonstrated that STREAM's performance closely matched SCALE 6.2.2, with a negligible uncertainty discrepancy of ±0.0078% in TMI-1 pin cell calculations. To assess the reliability of the PSM covariance library, we performed verification tests, comparing calculations with Calvik's two-term rational approximation (EQ 2-term) covariance library. These calculations included both pin-based and fuel assembly (FA-wise) computations, encompassing hot zero-power and hot full-power operational conditions. The uncertainties calculated using both the EQ 2-term and PSM resonance treatments were consistent, showing a deviation within ±0.054%. Additionally, the data compression process yielded compression ratios of 88.210% and 92.926% for on-the-fly and data-saving approaches, respectively, in TMI fuel assembly calculations. In summary, this study provides a comprehensive explanation of the PCA process used for UQ calculations and offers valuable insights into the robustness and reliability of newly developed computational methods, supported by rigorous verification tests.

Two-Dimensional Joint Bayesian Method for Face Verification

  • Han, Sunghyu;Lee, Il-Yong;Ahn, Jung-Ho
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.381-391
    • /
    • 2016
  • The Joint Bayesian (JB) method has been used in most state-of-the-art methods for face verification. However, since the publication of the original JB method in 2012, no improved verification method has been proposed. A lot of studies on face verification have been focused on extracting good features to improve the performance in the challenging Labeled Faces in the Wild (LFW) database. In this paper, we propose an improved version of the JB method, called the two-dimensional Joint Bayesian (2D-JB) method. It is very simple but effective in both the training and test phases. We separated two symmetric terms from the three terms of the JB log likelihood ratio function. Using the two terms as a two-dimensional vector, we learned a decision line to classify same and not-same cases. Our experimental results show that the proposed 2D-JB method significantly outperforms the original JB method by more than 1% in the LFW database.

Text-Independent Speaker Verification Using Variational Gaussian Mixture Model

  • Moattar, Mohammad Hossein;Homayounpour, Mohammad Mehdi
    • ETRI Journal
    • /
    • v.33 no.6
    • /
    • pp.914-923
    • /
    • 2011
  • This paper concerns robust and reliable speaker model training for text-independent speaker verification. The baseline speaker modeling approach is the Gaussian mixture model (GMM). In text-independent speaker verification, the amount of speech data may be different for speakers. However, we still wish the modeling approach to perform equally well for all speakers. Besides, the modeling technique must be least vulnerable against unseen data. A traditional approach for GMM training is expectation maximization (EM) method, which is known for its overfitting problem and its weakness in handling insufficient training data. To tackle these problems, variational approximation is proposed. Variational approaches are known to be robust against overtraining and data insufficiency. We evaluated the proposed approach on two different databases, namely KING and TFarsdat. The experiments show that the proposed approach improves the performance on TFarsdat and KING databases by 0.56% and 4.81%, respectively. Also, the experiments show that the variationally optimized GMM is more robust against noise and the verification error rate in noisy environments for TFarsdat dataset decreases by 1.52%.