• Title/Summary/Keyword: Functional verification

Search Result 331, Processing Time 0.033 seconds

A Study on Development and Analysis of Accident Influence Factor Verification Tools for the Elderly People in the Welfare Facilities for the Aged (노인주거 복지시설 거주 노인의 안전사고 영향변수 검증도구 개발 및 분석에 관한 연구)

  • You, Jong-Ok;Park, Jae-Seung
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.3
    • /
    • pp.242-248
    • /
    • 2011
  • According to a study on the accident patterns of older people in 2006 by Korea Consumer Agency (CISS), the number of accidents of the elderly at home reached 486, and the figure has increased every year. As Korea is about to enter into the aged society, it is important to investigate the factors that cause an accident in the welfare facilities for the aged and establish the barrier-free construction standards. The accident influence factors include facility environmental, physical functional, socio demographic and socio psychological factors. In terms of the verification tools, there are Facility Evaluation Index, FIM, MMSE-K and General Feature. In terms of analysis method, in addition, there are real number, percentage, t-test, ANOVA and logistic regression. In conclusion, this paper attempts to reveal correlations among the accident influence factors using the Facility Evaluation Standards (115 items in total) for facility environmental factor, FIM (3 items) for physical functional factor, MMSE-K (6 items) for socio psychological factor and questionnaire (5 items) for socio demographic factor.

Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification

  • Liang, Xinyu;Chen, Jing;Du, Ruiying;Zhao, Tianrui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2507-2528
    • /
    • 2022
  • Blockchain interoperability, which refers in particular to the ability to access information across blockchain systems, plays the key role for different blockchains to communicate with each other, and further supports the superstructure built on top of the cross-chain mechanism. Nowadays, blockchain interoperability technology is still in its infancy. The existing cross-chain scheme such as BTCRelay requires that the smart contract in a blockchain to download and maintain block headers of the other blockchain, which is costly in maintenance and inefficient to use. In this paper, we propose a supervision mechanism between blockchains, called Surveillant. Specially, the new entities called dual-functional nodes are introduced to commit the real-time information from the blockchain under supervision to the supervising blockchain, which enables users to have efficient cross-chain verification. Furthermore, we introduce Merkle mountain range for blocks aggregation to deal with the large-scale committing data. We propose the design of long orphan branch counter to trace the bifurcations in the blockchain under supervision. The existing incentive mechanism is improved to encourage the behaviors of dual-functional nodes. In Surveillant, the analysis and experimental results demonstrate that users are able to have efficient cross-chain verification with low maintenance overhead.

Multi-operation-based Constrained Random Verification for On-Chip Memory

  • Son, Hyeonuk;Jang, Jaewon;Kim, Heetae;Kang, Sungho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.3
    • /
    • pp.423-426
    • /
    • 2015
  • Current verification methods for on-chip memory have been implemented using coverpoints that are generated based on a single operation. These coverpoints cannot consider the influence of other memory banks in a busy state. In this paper, we propose a method in which the coverpoints account for all operations executed on different memory banks. In addition, a new constrained random vector generation method is proposed to reduce the required random vectors for the multi-operation-based coverpoints. The simulation results on NAND flash memory show 100% coverage with 496,541 constrained random vectors indicating a reduction of 96.4% compared with conventional random vectors.

A Study for the Next-Generation Satellite Communication System Design and Modem Functional Verification based on DVB-RCS2 (DVB-RCS2 기반 차세대 위성 통신 시스템 구축 및 모뎀 기능 검증에 관한 연구)

  • Wang, Do-Huy;oh, Deock-Gil
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.62-67
    • /
    • 2015
  • This paper we introduce next-generation VSAT system based on DVB-RCS2 which is second-generation satellite communication standard. We construct a test-bed for the functional verification of return link modem and discuss the results. According to this, we expect to efficient use of technology for the next-generation VSAT services and broadcasting services.

High-Level Design Verification Techniques for Hardware-Software Codesign Systems (하드웨어-소프트웨어 통합 설계 시스템을 위한 상위 단계에서의 검증 기법)

  • Lee, Jong-Suk;Kim, Chung-Hee;Shin, Hyun-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.448-456
    • /
    • 2000
  • As the system complexity increases, it is important to develop high-level verification techniques for fast and efficient design verifications. In this research, fast verification techniques for hardware and software co-design systems have been developed by using logic emulation and algorithm-level simulation. For faster and superior functional verification, we partition the system being designed into hardware and software parts, and implement the divided parts by using interface modules. We also propose several hardware design techniques for efficient hardware emulation. Experimental results, obtained by using a Reed-Solomon decoder system, show that our new verification methodology is more than 12,000 times faster than a commercial simulation tool for the modified Euclid's algorithm block and the overall verification time is reduced by more than 50%.

  • PDF

Mathematical Verification of a Nuclear Power Plant Protection System Function with Combined CPN and PVS

  • Koo, Seo-Ryong;Son, Han-Seong;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.31 no.2
    • /
    • pp.157-171
    • /
    • 1999
  • In this work, an automatic software verification method for Nuclear Power Plant (NPP) protection system is developed. This method utilizes Colored Petri Net (CPN) for system modeling and Prototype Verification System (PVS) for mathematical verification. In order to help flow-through from modeling by CPN to mathematical proof by PVS, an information extractor from CPN models has been developed in this work. In order to convert the extracted information to the PVS specification language, a translator also has been developed. ML that is a higher-order functional language programs the information extractor and translator. This combined method has been applied to a protection system function of Wolsong NPP SDS2(Steam Generator Low Level Trip). As a result of this application, we could prove completeness and consistency of the requirement logically. Through this work, in short, an axiom or lemma based-analysis method for CPN models is newly suggested in order to complement CPN analysis methods and a guideline for the use of formal methods is proposed in order to apply them to NPP Software Verification and Validation.

  • PDF

Executable Specification based Design Methodology - MPEG Audio IMDCT Design and Functional Verification (Executable Specification 기법을 이용한 MPEG Audio용 IMDCT 설계 및 기능검증)

  • 박원태;조원경
    • Proceedings of the IEEK Conference
    • /
    • 2000.06b
    • /
    • pp.173-176
    • /
    • 2000
  • Silicon semiconductor technology agree that the number of transistors on a chip will keep growing exponentially, and it is pushing technology toward the System-On-Chip. In SoC Design, Specification at system level is key of success. Executable Specification reduce verification time. This Paper describe the design of IMDCT for MPEG Audio Decoder employing system-level design methodology and Executable Specification Methodology in the VHDL simulator with FLI environment.

  • PDF

Requirements Analysis and Verification of Guiding Robots for Visually Impaired Person (시각장애인을 위한 길안내 로봇의 요구사항 분석과 검증)

  • Rhew, Sung-Yul;Kim, Duck-Un
    • Journal of Information Technology Services
    • /
    • v.5 no.2
    • /
    • pp.189-198
    • /
    • 2006
  • This study assumed that the best road guidance system for the vision impaired is a robot and analyzed and verified the requirements of road guidance system. In order to do so, the characteristics and inconveniences of the vision impaired as passengers and pedestrians were examined and their reactions to warnings and dangerous situations were analyzed. Users' needs and robots' functional requirements were applied to analyze the requirements of road guidance system. To verify whether the proposed requirements would be applied to robots effectively, a service scenario was used.

Design and Implementation of Simulator for Link-16 Network Operational Performance Analysis (Link-16 네트워크 운용성능분석을 위한 시뮬레이터 설계 및 구현)

  • Lee, Sangtae;Wi, Sounghyouk;Kim, Youngseung;Lee, Jungsik;Jee, Seungbae;Lee, Seungchan
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.33-43
    • /
    • 2019
  • Link-16 is a data link that provides joint interoperability to the US Navy, Air Force and NATO. Currently, the military relies entirely on foreign SW and tools for test environment, tactical simulation training and interoperability verification test for Link-16 operation. Therefore, it is necessary to develop Link-16 based operation environment test tool. In this paper, Link-16 network operational performance analysis simulator was developed by analyzing the function of Link-16 foreign tools. It also implements the SIMPLE standard interface for interworking with foreign SW and tools. The functional model for Link-16 network operation performance analysis consists of pre-analysis, real-time operational analysis, and post-analysis functional model. Each functional model test was performed through SIMPLE interworking with foreign SW and tools. Link-16 network operation performance analysis If we replace foreign SW through simulator, we can perform tactical training, network design verification and operation (scenario) verification for our military.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.