• 제목/요약/키워드: Model verification

검색결과 3,287건 처리시간 0.037초

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

AddSIM 환경에서의 사용자 코드 동적 검증 방법론 (Dynamic Verification Methodology of User Code in AddSIM Environment)

  • 양지용;최창범
    • 한국시뮬레이션학회논문지
    • /
    • 제28권1호
    • /
    • pp.41-47
    • /
    • 2019
  • 국방 시뮬레이션은 여러 무기체계를 실험하고 그 효용성을 평가하기 위해 활발히 사용된다. AddSIM 환경의 경우 국방 시뮬레이션에서 다루는 무기체계들을 보다 통합적인 관점에서 지원하기 위해 고안된 시뮬레이션 프레임워크로 재사용성과 확장성을 고려하여 설계되었다. AddSIM에서 사용되는 모델의 경우 기본 모델 구조에 대한 정보와 실제 무기 체계의 설계를 위해 사용되는 사용자 코드 영역에서의 검증이 통합적이며 정확한 시뮬레이션을 위해 필요하다. 따라서 본 논문에서는 AddSIM에서 사용되는 모델들에 대한 완전성을 위해 사용된 동적 검증 방법에 대해 설명한다. 사용자 코드 동적 검증 방법에 대해서는 명세 기법과 검증을 위한 알고리즘에 대해 설명한다. 또한, 검증 명세 기법 및 알고리즘을 바탕으로 구현된 동적 검증기 프로토타입에 대해 소개하며, 사례 연구에서는 AddSIM 환경에서 구현된 시뮬레이션 예제를 바탕으로 수행한 검증 결과를 분석한다.

전화망을 위한 어구 종속 화자 확인 시스템 (Text-dependent Speaker Verification System Over Telephone Lines)

  • 김유진;정재호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1999년도 추계종합학술대회 논문집
    • /
    • pp.663-667
    • /
    • 1999
  • In this paper, we review the conventional speaker verification algorithm and present the text-dependent speaker verification system for application over telephone lines and its result of experiments. We apply blind-segmentation algorithm which segments speech into sub-word unit without linguistic information to the speaker verification system for training speaker model effectively with limited enrollment data. And the World-mode] that is created from PBW DB for score normalization is used. The experiments are presented in implemented system using database, which were constructed to simulate field test, and are shown 3.3% EER.

  • PDF

통합평가 계획수립을 위한 시스템적 접근 프로세스 (Systematic approach process for Integrated Validation & verification Plan)

  • 김진훈;신광복;유원희;구동희
    • 시스템엔지니어링워크숍
    • /
    • 통권1호
    • /
    • pp.9-14
    • /
    • 2003
  • The paper aims at presenting a systematic approach process and a method of requirement validation and system verification. Validation is applied during concept development to ensure conceptual validity, requirements validity, and design validity. Verification work is applied subsequent to the design work on test articles and early production items to produce evidence that the design solutions do, in fact, satisfy th requirements. In this paper, we present a requirements validation model and a system verification model. This models are applied to the development of TTX(Tilting Train Express)system with systems engineering tool, CORE.

  • PDF

Automatic Speech Database Verification Method Based on Confidence Measure

  • Kang Jeomja;Jung Hoyoung;Kim Sanghun
    • 대한음성학회지:말소리
    • /
    • 제51호
    • /
    • pp.71-84
    • /
    • 2004
  • In this paper, we propose the automatic speech database verification method(or called automatic verification) based on confidence measure for a large speech database. This method verifies the consistency between given transcription and speech using the confidence measure. The automatic verification process consists of two stages : the word-level likelihood computation stage and multi-level likelihood ratio computation stage. In the word-level likelihood computation stage, we calculate the word-level likelihood using the viterbi decoding algorithm and make the segment information. In the multi-level likelihood ratio computation stage, we calculate the word-level and the phone-level likelihood ratio based on confidence measure with anti-phone model. By automatic verification, we have achieved about 61% error reduction. And also we can reduce the verification time from 1 month in manual to 1-2 days in automatic.

  • PDF

Training Method and Speaker Verification Measures for Recurrent Neural Network based Speaker Verification System

  • 김태형
    • 한국통신학회논문지
    • /
    • 제34권3C호
    • /
    • pp.257-267
    • /
    • 2009
  • This paper presents a training method for neural networks and the employment of MSE (mean scare error) values as the basis of a decision regarding the identity claim of a speaker in a recurrent neural networks based speaker verification system. Recurrent neural networks (RNNs) are employed to capture temporally dynamic characteristics of speech signal. In the process of supervised learning for RNNs, target outputs are automatically generated and the generated target outputs are made to represent the temporal variation of input speech sounds. To increase the capability of discriminating between the true speaker and an impostor, a discriminative training method for RNNs is presented. This paper shows the use and the effectiveness of the MSE value, which is obtained from the Euclidean distance between the target outputs and the outputs of networks for test speech sounds of a speaker, as the basis of speaker verification. In terms of equal error rates, results of experiments, which have been performed using the Korean speech database, show that the proposed speaker verification system exhibits better performance than a conventional hidden Markov model based speaker verification system.

사장교 케이블 댐퍼시스템 개발과 검증실험 (Development of Cable Damper System and Its Verification Test)

  • 서주원;김남식;서정인;정운
    • 한국지진공학회:학술대회논문집
    • /
    • 한국지진공학회 2001년도 춘계학술대회 논문집
    • /
    • pp.394-402
    • /
    • 2001
  • In order to lessen cable vibration, new cable damper system with high damping rubber was developed using the basis of the LRB design scheme. The analysis model of cable damper system incorporate voigt-kelvin damper model into the nonlinear cable analysis model. To achieve maximum damping capacity both reducing damper stiffness and developing high damping rubber were performed. As a result of verification test, the high damping rubber damper show its effectiveness in improving cable damping capacity.

  • PDF

RELIABILITY ANALYSIS OF CHECKPOINTING MODEL WITH MULTIPLE VERIFICATION MECHANISM

  • Lee, Yutae
    • 대한수학회보
    • /
    • 제56권6호
    • /
    • pp.1435-1445
    • /
    • 2019
  • We consider a checkpointing model for silent errors, where a checkpoint is taken every fixed number of verifications. Assuming generally distributed i.i.d. inter-occurrence times of errors, we derive the reliability of the model as a function of the number of verifications between two checkpoints and the duration of work interval between two verifications.

병렬 객체지향 시스템의 검증 (Model Checking of Concurrent Object-Oriented Systems)

  • 조승모;김영곤;배두환;변성원;김상택
    • 한국정보과학회논문지:소프트웨어및응용
    • /
    • 제27권1호
    • /
    • pp.1-12
    • /
    • 2000
  • 모델체킹은 검증하려는 대상 시스템의 동작 모델이, 그 시스템이 만족해야 할 성질을 만족시키는지를, 시스템의 상태공간을 검사해 봄으로써 알아보는 정형 검증 기법의 하나이다. 이러한 모델체킹 기법을 병렬 객체지향 시스템에 적용하기 위해 기존의 모델체커인 SPIN에서 지원하는 모델링 언어인 Promela를 병렬객체지향 개념을 추가하여 확장한 언어인 APromela를 제안하였다. 이는 Promela가 프로세스를 단위로 하는 병렬성만을 지원하는데 반해, 액터 모델에 기반한 객체지향 병렬성을 지원한다. 또한 우리는 이 언어로 작성된 모델을 자동으로 Promela로 변환하는 규칙을 제안하였다. 이를 통해, 기존의 모델체커를 이용해 병렬 객체지향 시스템의 검증을 수행할 수 있다. 이 언어의 응용으로 UML 로 기술된 명세의 검증을 수행하는 과정을 제시하였다.

  • PDF

Blind speech segmentation과 에너지 가중치를 이용한 문장 종속형 화자인식기의 성능 향상 (Performance improvement of text-dependent speaker verification system using blind speech segmentation and energy weight)

  • 김정곤;김형순
    • 대한음성학회지:말소리
    • /
    • 제47호
    • /
    • pp.131-140
    • /
    • 2003
  • We propose a new method of generating client models for HMM based text-dependent speaker verification system with only a small amount of training data. To make a client model, statistical methods such as segmental K-means algorithm are widely used, but they do not guarantee the quality or reliability of a model when only limited data are avaliable. In this paper, we propose a blind speech segmentation based on level building DTW algorithm as an alternative method to make a client model with limited data. In addition, considering the fact that voiced sounds have much more speaker-specific information than unvoiced sounds and energy of the former is higher than that of the latter, we also propose a new score evaluation method using the observation probability raised to the power of weighting factor estimated from the normalized log energy. Our experiment shows that the proposed methods are superior to conventional HMM based speaker verification system.

  • PDF