• 제목/요약/키워드: Operation Verification

검색결과 886건 처리시간 0.024초

Development Status of Operation Concept and Procedures for KASS

  • Son, Minhyuk;Yun, Youngsun;Lee, ByungSeok
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제11권1호
    • /
    • pp.51-58
    • /
    • 2022
  • Korea Augmentation Satellite System (KASS) is a Satellite Based Augmentation System (SBAS) system under development in South Korea and aims to provide air navigation services after 2023. In order to provide reliable service, detailed design for the operation of this system is required. This paper proposes a detailed operation-based designs based on mission, architecture, operation definition of the system. For the stable operation of the system, an operation organization was designed and operation activities were classified in consideration of the architecture and function of the system. Detailed operation procedures were designed according to this classification and operation procedures related to the command and configuration of subsystem were verified on the Integration, Verification and Qualification (IVQ) platform for integrated testing and verification. The proposed operation concepts and procedures will be continuously confirmed and verified during verification, qualification and service preparation, and will be updated event after official KASS service.

Multi-operation-based Constrained Random Verification for On-Chip Memory

  • Son, Hyeonuk;Jang, Jaewon;Kim, Heetae;Kang, Sungho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제15권3호
    • /
    • pp.423-426
    • /
    • 2015
  • Current verification methods for on-chip memory have been implemented using coverpoints that are generated based on a single operation. These coverpoints cannot consider the influence of other memory banks in a busy state. In this paper, we propose a method in which the coverpoints account for all operations executed on different memory banks. In addition, a new constrained random vector generation method is proposed to reduce the required random vectors for the multi-operation-based coverpoints. The simulation results on NAND flash memory show 100% coverage with 496,541 constrained random vectors indicating a reduction of 96.4% compared with conventional random vectors.

커피관련 자격검정의 운영체제가 커피직무능력의 학업만족도와 경제적 효율성에 미치는 영향에 관한 연구 -커피관련 산업체 종사자를 대상으로- (Study on Academic Satisfaction and Economic Effectiveness Influenced By Operation System for Coffee Related Certification Verification - Survey To Those Whom Worked in Coffee Related Industry -)

  • 신혜경
    • 디지털융복합연구
    • /
    • 제16권8호
    • /
    • pp.41-55
    • /
    • 2018
  • 본 연구에서는 국내에서 실시하고 있는 바리스타 민간자격제도의 운영체제와 방법이 커피직무능력의 학업만족도에 미치는 영향을 알아보고 직무능력 향상, 입직이나 전직에 활용하려는 경제적 효용도에 미치는 영향을 살펴보았다. 이를 위하여 자격증을 취득하였고 관련 업체에 종사하고 있는 자를 대상으로 설문을 실시하였다. 커피자격검정제도의 운영체제 및 방법이 직무수행능력의 학업만족도와 경제적 효율성에 부분적으로 정(+)의 영향을 미치고 있었고, 커피자격검정을 통해서 얻어지는 직무수행능력의 학업만족도도 직업의 경제적 효율성에도 부분적인 정(+)의 영향을 미치고 있었다. 즉, 커피관련 자격검정제도의 내용 및 전문적이고 신뢰할 만한 체계적인 관리와 운영은 직무수행능력의 학업만족도에 영향을 주고 있었고, 나아가 입직이나 전직 등의 경제적 효율에도 영향을 미치는 것을 알 수 있었다. 따라서 자격검정제도의 전문성과 공정성에 대한 연구는 지속되어야 할 것이다.

Master-Slave 기법을 적용한 System Operation의 동작 검증 (Verification of System using Master-Slave Structure)

  • 김인수;민형복
    • 전기학회논문지
    • /
    • 제58권1호
    • /
    • pp.199-202
    • /
    • 2009
  • Scan design is currently the most widely used structured Design For Testability approach. In scan design, all storage elements are replaced with scan cells, which are then configured as one or more shift registers(also called scan chains) during the shift operation. As a result, all inputs to the combinational logic, including those driven by scan cells, can be controlled and all outputs from the combinational logic, including those driving scan cells, can be observed. The scan inserted design, called scan design, is operated in three modes: normal mode, shift mode, and capture mode. Circuit operations with associated clock cycles conducted in these three modes are referred to as normal operation, shift operation, and capture operation, respectively. In spite of these, scan design methodology has defects. They are power dissipation problem and test time during test application. We propose a new methodology about scan shift clock operation and present low power scan design and short test time.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Formal Analysis of Distributed Shared Memory Algorithms

  • Muhammad Atif;Muhammad Adnan Hashmi;Mudassar Naseer;Ahmad Salman Khan
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.192-196
    • /
    • 2024
  • The memory coherence problem occurs while mapping shared virtual memory in a loosely coupled multiprocessors setup. Memory is considered coherent if a read operation provides same data written in the last write operation. The problem is addressed in the literature using different algorithms. The big question is on the correctness of such a distributed algorithm. Formal verification is the principal term for a group of techniques that routinely use an analysis that is established on mathematical transformations to conclude the rightness of hardware or software behavior in divergence to dynamic verification techniques. This paper uses UPPAAL model checker to model the dynamic distributed algorithm for shared virtual memory given by K.Li and P.Hudak. We analyse the mechanism to keep the coherence of memory in every read and write operation by using a dynamic distributed algorithm. Our results show that the dynamic distributed algorithm for shared virtual memory partially fulfils its functional requirements.

저궤도 위성의 전력시스템 검증에 관한 연구 (A Study on the Verification of Electrical Power Subsystem for LEO Satellite)

  • 박희성;박성우;장진백;장성수;이상곤
    • 전력전자학회:학술대회논문집
    • /
    • 전력전자학회 2007년도 하계학술대회 논문집
    • /
    • pp.52-54
    • /
    • 2007
  • The LEO satellite generates the power during day and consumes the power during night, so the power changes repeatedly. The power fluctuation must be verified, because it affects the mission operation and lifetime of satellite. This study describes the test-set for verification of Electrical Power Subsystem and two verification items using it. The verification test of EPS will be useful to predict the mission lifetime and to decide the mission operation of satellite.

  • PDF

생산자동화시스템 PLC 제어프로그램의 안전성 정형검증에 관한 연구 (Formal Verification of PLC Program Safety in Manufacturing Automation System)

  • 박창목
    • 대한안전경영과학회지
    • /
    • 제17권1호
    • /
    • pp.179-192
    • /
    • 2015
  • In an automated industry PLC plays a central role to control the automation system. Therefore, fault free operation of PLC controlled automation system is essential in order to maximize a firm's productivity. A prior test of control system is a practical way to check fault operations, but it is a time consuming job and can not check all possible fault operation. A formal verification of PLC program could be a best way to check all possible fault situation. Tracing the history of the study on formal verification, we found three problems, the first is that a formal representation of PLC control system is incomplete, the second is a state explosion problem and the third is that the verification result is difficult to use for the correction of control program. In this paper, we propose a transformation method to reproduce the control system correctly in formal model and efficient procedure to verify and correct the control program using verification result. To demonstrate the proposed method, we provided a suitable case study of an automation system.

열차제어시스템 SIL할당 및 입증에 관한 연구 (A Study on the SIL Allocation and Demonstration for Train Control System)

  • 신덕호;백종현;이강미;이재호
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2009년도 춘계학술대회 논문집
    • /
    • pp.855-859
    • /
    • 2009
  • In this paper, we introduce the estimation method by Risk or SIL(Safety Integrity Level) for the criterion of safety assurance and summarize each application method and target. IEC 62278(EN 50126) which is international standard for the specification and verification of the railway system RAMS indicate a criterion of safety assurance. Especially, it recommend the safety verification by continuous verification as the order of requirement establishment, design, manufacture, installation, operation, and maintenance for the equipment not easy to quantify the operation environment. In this paper, we study the SIL requirement allocation method relating to internal new system development and existing system improvement by analysing SIL recommendations which were used to understand SIL for a train control equipment in 1990s in IRSE and theoretically their allocation background. This paper help the safety management of Korea train control system to develope the quantitative management procedure as international level by analyzing the SIL requirement allocation by operation agency and the right SIL verification procedure by manufacture and indicating the example to assure safety because it is necessary for improvement and localization for the Korea train control system having highly dependence on aboard technology.

  • PDF

CNC 만능 원통연삭기의 CAD/CAM 시스템 개발 (Development of the CAD/CAM System for CNC Universal Cylindrical Grinding Machines)

  • 조재완;김석일
    • 한국CDE학회논문집
    • /
    • 제5권4호
    • /
    • pp.312-318
    • /
    • 2000
  • In this study, an exclusive CAD/CAM system is developed for enhancing the effectiveness and productivity of CNC universal cylindrical grinding machines on which the external/facing/internal grinding cycles and the wheel dressing cycles are integratively carried out. The CAD/CAM system can manage the various processes such as geometry design, NC code generation, NC code verification, DNC operation, and so on. Especially, the feature-based modeling concept is introduced to improve the geometry design efficiency. And the NC code verification is realized by virtual manufacturing technique based on the real-time analysis of NC codes and the boolean operation between workpiece and wheel.

  • PDF