• Title/Summary/Keyword: Network Verification Test

Search Result 137, Processing Time 0.027 seconds

Verification of failover effects from distributed control system communication networks in digitalized nuclear power plants

  • Min, Moon-Gi;Lee, Jae-Ki;Lee, Kwang-Hyun;Lee, Dongil;Lim, Hee-Taek
    • Nuclear Engineering and Technology
    • /
    • v.49 no.5
    • /
    • pp.989-995
    • /
    • 2017
  • Distributed Control System (DCS) communication networks, which use Fast Ethernet with redundant networks for the transmission of information, have been installed in digitalized nuclear power plants. Normally, failover tests are performed to verify the reliability of redundant networks during design and manufacturing phases; however, systematic integrity tests of DCS networks cannot be fully performed during these phases because all relevant equipment is not installed completely during these two phases. In additions, practical verification tests are insufficient, and there is a need to test the actual failover function of DCS redundant networks in the target environment. The purpose of this study is to verify that the failover functions works correctly in certain abnormal conditions during installation and commissioning phase and identify the influence of network failover on the entire DCS. To quantify the effects of network failover in the DCS, the packets (Protocol Data Units) must be collected and resource usage of the system has to be monitored and analyzed. This study introduces the use of a new methodology for verification of DCS network failover during the installation and commissioning phases. This study is expected to provide insight into verification methodology and the failover effects from DCS redundant networks. It also provides test results of network performance from DCS network failover in digitalized domestic nuclear power plants (NPPs).

A Study on the Testing System for Network Equipments (네트워크장비 시험체계에 관한 연구)

  • 이준원
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.2
    • /
    • pp.61-67
    • /
    • 2004
  • This paper describes the importance of the network equipment markets and the necessity of the testing and the verification for the network equipments and the effective system for network equipment test. With the rapid internet service development, the demands of the network equipments(for example, router, switching equipment etc.) are expanded. The network equipments request the high love technologies, so the foreign network equipments are prevailed in the domestic market. But the development of the network equipments in korea is in the beginning stage. To deploy the network equipments into the real network the network equipments should be tested and verified by the certified test labs. To get the verification from the foreign test lab, it takes a lot of expenses and times. For the competitiveness of our products in the international markets, the technique of the test and verification on the network equipments should be level-up. This paper investigates the network equipments market condition and the network equipments test condition in Korea. For the competitiveness of our commodities in the international markets, this paper proposes the testing strategy for network equipments.

  • PDF

Verification Methods of ATE for TICN System (전술정보통신체계 ATE 유효성 검증 방안)

  • Bak, HyeonJeong;Kim, JinSung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.4
    • /
    • pp.17-27
    • /
    • 2020
  • In this paper, we proposed verification methods to prove the effectiveness of automatic test equipment (ATE) for weapon systems. Since the test results from the unproven ATE is not reliable and its use is limited as objective data, it is essential to verify the test equipment in order to guarantee the quality level of the unit under test (UUT). Through the suggested methods, it is applied to the ATE of the tactical information communications network (TICN) system to confirm the verification results and to describe the validation results.

Global Network Verification Test for Docker-based Secured mobile VoIP (Docker 기반의 Secured mobile VoIP를 위한 글로벌 네트워크 실증 테스트)

  • Cha, ByungRae;Kang, EunJu
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the computing paradigm has been changing and VoIP technology is being revisited to support various services in ICT field. In this paper, we have designed and implemented the systems of software PBX open source Asterisk using light-weighted virtualization Docker technique, hardware platform, and mobile devices to support voice service based on secured mobile VoIP. And we verified the delay test of network traffics and the secured voice communication test in global real network environment.

Design and Implementation of Simulator for Link-16 Network Operational Performance Analysis (Link-16 네트워크 운용성능분석을 위한 시뮬레이터 설계 및 구현)

  • Lee, Sangtae;Wi, Sounghyouk;Kim, Youngseung;Lee, Jungsik;Jee, Seungbae;Lee, Seungchan
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.33-43
    • /
    • 2019
  • Link-16 is a data link that provides joint interoperability to the US Navy, Air Force and NATO. Currently, the military relies entirely on foreign SW and tools for test environment, tactical simulation training and interoperability verification test for Link-16 operation. Therefore, it is necessary to develop Link-16 based operation environment test tool. In this paper, Link-16 network operational performance analysis simulator was developed by analyzing the function of Link-16 foreign tools. It also implements the SIMPLE standard interface for interworking with foreign SW and tools. The functional model for Link-16 network operation performance analysis consists of pre-analysis, real-time operational analysis, and post-analysis functional model. Each functional model test was performed through SIMPLE interworking with foreign SW and tools. Link-16 network operation performance analysis If we replace foreign SW through simulator, we can perform tactical training, network design verification and operation (scenario) verification for our military.

Short utterance speaker verification using PLDA model adaptation and data augmentation (PLDA 모델 적응과 데이터 증강을 이용한 짧은 발화 화자검증)

  • Yoon, Sung-Wook;Kwon, Oh-Wook
    • Phonetics and Speech Sciences
    • /
    • v.9 no.2
    • /
    • pp.85-94
    • /
    • 2017
  • Conventional speaker verification systems using time delay neural network, identity vector and probabilistic linear discriminant analysis (TDNN-Ivector-PLDA) are known to be very effective for verifying long-duration speech utterances. However, when test utterances are of short duration, duration mismatch between enrollment and test utterances significantly degrades the performance of TDNN-Ivector-PLDA systems. To compensate for the I-vector mismatch between long and short utterances, this paper proposes to use probabilistic linear discriminant analysis (PLDA) model adaptation with augmented data. A PLDA model is trained on vast amount of speech data, most of which have long duration. Then, the PLDA model is adapted with the I-vectors obtained from short-utterance data which are augmented by using vocal tract length perturbation (VTLP). In computer experiments using the NIST SRE 2008 database, the proposed method is shown to achieve significantly better performance than the conventional TDNN-Ivector-PLDA systems when there exists duration mismatch between enrollment and test utterances.

Blockchain and Cryptocurrency Distributed Testing Methods

  • Lee, Taegyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, a large number of cryptocurrencies and block chains have been continuously released. However, these cryptocurrencies and block chains are open to users without authorized verification and testing procedures, causing various reliability problems. Existing cryptocurrencies and blockchain test methods build a blockchain Testnet for a certain period of time by the developer without external verification by a third party, and after repeatedly self-testing and self-operating processes, commercialization is in progress by switching to the Mainnet. This self-verification method does not guarantee objectivity and publicness, and high reliability of customers cannot be realized. This study proposes a cryptocurrency and blockchain test interface and test control system as a third-party open test method.

Training Method and Speaker Verification Measures for Recurrent Neural Network based Speaker Verification System

  • Kim, Tae-Hyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3C
    • /
    • pp.257-267
    • /
    • 2009
  • This paper presents a training method for neural networks and the employment of MSE (mean scare error) values as the basis of a decision regarding the identity claim of a speaker in a recurrent neural networks based speaker verification system. Recurrent neural networks (RNNs) are employed to capture temporally dynamic characteristics of speech signal. In the process of supervised learning for RNNs, target outputs are automatically generated and the generated target outputs are made to represent the temporal variation of input speech sounds. To increase the capability of discriminating between the true speaker and an impostor, a discriminative training method for RNNs is presented. This paper shows the use and the effectiveness of the MSE value, which is obtained from the Euclidean distance between the target outputs and the outputs of networks for test speech sounds of a speaker, as the basis of speaker verification. In terms of equal error rates, results of experiments, which have been performed using the Korean speech database, show that the proposed speaker verification system exhibits better performance than a conventional hidden Markov model based speaker verification system.

Fingerprint Verification Based on Invariant Moment Features and Nonlinear BPNN

  • Yang, Ju-Cheng;Park, Dong-Sun
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.6
    • /
    • pp.800-808
    • /
    • 2008
  • A fingerprint verification system based on a set of invariant moment features and a nonlinear Back Propagation Neural Network(BPNN) verifier is proposed. An image-based method with invariant moment features for fingerprint verification is used to overcome the demerits of traditional minutiae-based methods and other image-based methods. The proposed system contains two stages: an off-line stage for template processing and an on-line stage for testing with input fingerprints. The system preprocesses fingerprints and reliably detects a unique reference point to determine a Region-of-Interest(ROI). A total of four sets of seven invariant moment features are extracted from four partitioned sub-images of an ROI. Matching between the feature vectors of a test fingerprint and those of a template fingerprint in the database is evaluated by a nonlinear BPNN and its performance is compared with other methods in terms of absolute distance as a similarity measure. The experimental results show that the proposed method with BPNN matching has a higher matching accuracy, while the method with absolute distance has a faster matching speed. Comparison results with other famous methods also show that the proposed method outperforms them in verification accuracy.

A Study on WiBro Application to Telematics Wireless Communications Network (휴대인터넷의 텔레매틱스 무선통신 방식으로의 활용 방안)

  • Oh, Kil-Nam;Kim, Bong-Soo;Choi, Wan-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.276-278
    • /
    • 2005
  • This paper introduces the testbed configuration for telematics wireless communications using WiBro network, one of the next generation wireless communication networks. We review the architecture and core technology of WiBro network, and investigate WiBro based telematics services, WiBro testbed configuration, and function verification and test method for WiBro wireless communication access module.

  • PDF