• Title/Summary/Keyword: Operation Verification

Search Result 886, Processing Time 0.023 seconds

Development Status of Operation Concept and Procedures for KASS

  • Son, Minhyuk;Yun, Youngsun;Lee, ByungSeok
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.1
    • /
    • pp.51-58
    • /
    • 2022
  • Korea Augmentation Satellite System (KASS) is a Satellite Based Augmentation System (SBAS) system under development in South Korea and aims to provide air navigation services after 2023. In order to provide reliable service, detailed design for the operation of this system is required. This paper proposes a detailed operation-based designs based on mission, architecture, operation definition of the system. For the stable operation of the system, an operation organization was designed and operation activities were classified in consideration of the architecture and function of the system. Detailed operation procedures were designed according to this classification and operation procedures related to the command and configuration of subsystem were verified on the Integration, Verification and Qualification (IVQ) platform for integrated testing and verification. The proposed operation concepts and procedures will be continuously confirmed and verified during verification, qualification and service preparation, and will be updated event after official KASS service.

Multi-operation-based Constrained Random Verification for On-Chip Memory

  • Son, Hyeonuk;Jang, Jaewon;Kim, Heetae;Kang, Sungho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.3
    • /
    • pp.423-426
    • /
    • 2015
  • Current verification methods for on-chip memory have been implemented using coverpoints that are generated based on a single operation. These coverpoints cannot consider the influence of other memory banks in a busy state. In this paper, we propose a method in which the coverpoints account for all operations executed on different memory banks. In addition, a new constrained random vector generation method is proposed to reduce the required random vectors for the multi-operation-based coverpoints. The simulation results on NAND flash memory show 100% coverage with 496,541 constrained random vectors indicating a reduction of 96.4% compared with conventional random vectors.

Study on Academic Satisfaction and Economic Effectiveness Influenced By Operation System for Coffee Related Certification Verification - Survey To Those Whom Worked in Coffee Related Industry - (커피관련 자격검정의 운영체제가 커피직무능력의 학업만족도와 경제적 효율성에 미치는 영향에 관한 연구 -커피관련 산업체 종사자를 대상으로-)

  • SHIN, HyeKyung
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.41-55
    • /
    • 2018
  • This research analyzes how operation system and method of barista private certification implemented in Korea influence on the academic satisfaction of coffee work skills and how such system and method has an effect on the economic effectiveness to utilize for the improvement of work performance skills and for job seeking and changing. For this purpose, author conducted a survey to coffee specialists who had obtained barista certification and who have been working in coffee related industry. The result shows that the operation system and method of coffee certification verification system has a partially positive effect on the academic satisfaction of work performance skills and economic effectiveness. The contents of the coffee related certification verification system as well as specialized and reliable systematic operation of such verification system have an influence on the academic satisfaction of work performance skills and have further influence on the economic effectiveness such as seeking or changing jobs. Therefore, the research on the professionalism and reliability of the qualification verification system must be continued.

Verification of System using Master-Slave Structure (Master-Slave 기법을 적용한 System Operation의 동작 검증)

  • Kim, In-Soo;Min, Hyoung-Bok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.1
    • /
    • pp.199-202
    • /
    • 2009
  • Scan design is currently the most widely used structured Design For Testability approach. In scan design, all storage elements are replaced with scan cells, which are then configured as one or more shift registers(also called scan chains) during the shift operation. As a result, all inputs to the combinational logic, including those driven by scan cells, can be controlled and all outputs from the combinational logic, including those driving scan cells, can be observed. The scan inserted design, called scan design, is operated in three modes: normal mode, shift mode, and capture mode. Circuit operations with associated clock cycles conducted in these three modes are referred to as normal operation, shift operation, and capture operation, respectively. In spite of these, scan design methodology has defects. They are power dissipation problem and test time during test application. We propose a new methodology about scan shift clock operation and present low power scan design and short test time.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Formal Analysis of Distributed Shared Memory Algorithms

  • Muhammad Atif;Muhammad Adnan Hashmi;Mudassar Naseer;Ahmad Salman Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.192-196
    • /
    • 2024
  • The memory coherence problem occurs while mapping shared virtual memory in a loosely coupled multiprocessors setup. Memory is considered coherent if a read operation provides same data written in the last write operation. The problem is addressed in the literature using different algorithms. The big question is on the correctness of such a distributed algorithm. Formal verification is the principal term for a group of techniques that routinely use an analysis that is established on mathematical transformations to conclude the rightness of hardware or software behavior in divergence to dynamic verification techniques. This paper uses UPPAAL model checker to model the dynamic distributed algorithm for shared virtual memory given by K.Li and P.Hudak. We analyse the mechanism to keep the coherence of memory in every read and write operation by using a dynamic distributed algorithm. Our results show that the dynamic distributed algorithm for shared virtual memory partially fulfils its functional requirements.

A Study on the Verification of Electrical Power Subsystem for LEO Satellite (저궤도 위성의 전력시스템 검증에 관한 연구)

  • Park, Hee-Sung;Park, Sung-Woo;Jang, Jin-Bak;Jang, Sung-Soo;Lee, Sang-Kon
    • Proceedings of the KIPE Conference
    • /
    • 2007.07a
    • /
    • pp.52-54
    • /
    • 2007
  • The LEO satellite generates the power during day and consumes the power during night, so the power changes repeatedly. The power fluctuation must be verified, because it affects the mission operation and lifetime of satellite. This study describes the test-set for verification of Electrical Power Subsystem and two verification items using it. The verification test of EPS will be useful to predict the mission lifetime and to decide the mission operation of satellite.

  • PDF

Formal Verification of PLC Program Safety in Manufacturing Automation System (생산자동화시스템 PLC 제어프로그램의 안전성 정형검증에 관한 연구)

  • Park, Chang Mok
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.179-192
    • /
    • 2015
  • In an automated industry PLC plays a central role to control the automation system. Therefore, fault free operation of PLC controlled automation system is essential in order to maximize a firm's productivity. A prior test of control system is a practical way to check fault operations, but it is a time consuming job and can not check all possible fault operation. A formal verification of PLC program could be a best way to check all possible fault situation. Tracing the history of the study on formal verification, we found three problems, the first is that a formal representation of PLC control system is incomplete, the second is a state explosion problem and the third is that the verification result is difficult to use for the correction of control program. In this paper, we propose a transformation method to reproduce the control system correctly in formal model and efficient procedure to verify and correct the control program using verification result. To demonstrate the proposed method, we provided a suitable case study of an automation system.

A Study on the SIL Allocation and Demonstration for Train Control System (열차제어시스템 SIL할당 및 입증에 관한 연구)

  • Shin, Duc-Ko;Baek, Jong-Hyen;Lee, Kang-Mi;Lee, Jae-Ho
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.855-859
    • /
    • 2009
  • In this paper, we introduce the estimation method by Risk or SIL(Safety Integrity Level) for the criterion of safety assurance and summarize each application method and target. IEC 62278(EN 50126) which is international standard for the specification and verification of the railway system RAMS indicate a criterion of safety assurance. Especially, it recommend the safety verification by continuous verification as the order of requirement establishment, design, manufacture, installation, operation, and maintenance for the equipment not easy to quantify the operation environment. In this paper, we study the SIL requirement allocation method relating to internal new system development and existing system improvement by analysing SIL recommendations which were used to understand SIL for a train control equipment in 1990s in IRSE and theoretically their allocation background. This paper help the safety management of Korea train control system to develope the quantitative management procedure as international level by analyzing the SIL requirement allocation by operation agency and the right SIL verification procedure by manufacture and indicating the example to assure safety because it is necessary for improvement and localization for the Korea train control system having highly dependence on aboard technology.

  • PDF

Development of the CAD/CAM System for CNC Universal Cylindrical Grinding Machines (CNC 만능 원통연삭기의 CAD/CAM 시스템 개발)

  • 조재완;김석일
    • Korean Journal of Computational Design and Engineering
    • /
    • v.5 no.4
    • /
    • pp.312-318
    • /
    • 2000
  • In this study, an exclusive CAD/CAM system is developed for enhancing the effectiveness and productivity of CNC universal cylindrical grinding machines on which the external/facing/internal grinding cycles and the wheel dressing cycles are integratively carried out. The CAD/CAM system can manage the various processes such as geometry design, NC code generation, NC code verification, DNC operation, and so on. Especially, the feature-based modeling concept is introduced to improve the geometry design efficiency. And the NC code verification is realized by virtual manufacturing technique based on the real-time analysis of NC codes and the boolean operation between workpiece and wheel.

  • PDF