• Title/Summary/Keyword: Processing verification

Search Result 984, Processing Time 0.021 seconds

Bottom-up Composition and Verification of Embedded Software (내장형 소프트웨어 컴포넌트의 상향식 합성과 검증)

  • Choi, Yun-Ja
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.415-422
    • /
    • 2010
  • This paper proposes service-oriented composition and verification techniques for incrementally extracting high-level abstract behavior of unit components in a systematic manner. Proposed techniques include the definition for abstract component, which is a basic building-block of the abstraction process, an algorithm for port-based synchronized abstraction, and projection abstraction. A verification framework is developed using the proposed techniques and its efficiency is demonstrated through a case example.

Development of LiDAR Drone-based Point Cloud Data Accuracy Verification Technology (드론 LiDAR를 활용한 점군 데이터 정확도 검증 기술 개발)

  • Jae-Woo Park;Dong-Jun Yeom
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.6_3
    • /
    • pp.1233-1241
    • /
    • 2023
  • This paper investigates the efficient application of drone LiDAR technology for acquiring precise point cloud data in construction and civil engineering. A structured workflow encompassing data acquisition, processing, and accuracy verification is introduced. Practical testing on a construction site affirms that drone LiDAR surveying yields accurate and reliable data across various applications. With a focus on accuracy and verification, the results contribute to the progression of surveying methodologies in construction and civil engineering. The findings provide valuable insights into the dynamic technological landscape of these fields, establishing a foundation for more effective and precise surveying techniques. This study underscores the transformative potential of drone LiDAR technology in shaping the future of construction and civil engineering survey practices.

The Verification System of the Customer Barcode for the Advanced Automatic Processing of the Mail Items (우편물 자도처리 촉진을 위한 우편용 고객 바코드 검증 시스템)

  • Park, Mun-Seong;Song, Jae-Gwan;U, Dong-Jin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.968-976
    • /
    • 1999
  • Currently, in the most mail automatic processing centers, after facing and canceling, envelope mail is passed through an Optical Character Recognition/Barcode Sorter(OCR/BS) to read the address and 3 of 5 fluorescent(luminescent) barcode is applied. Normally, 30%∼35% of this mail is rejected. The usual reasons for read failure are poor printing quality of address and barcode, script printing and failure to locate the address. This paper describes a verification system of the postal 3 of 5 customer barcode for solving this problem. The certification system of the 3 of 5 customer barcode consists of barcode verification system and postal address database. The purpose of certification system of the customer barcode verifies the postal 3 of 5 customer barcode and tests matching of mail piece postal address, and retrieves postal code.

  • PDF

Verification of the Global Numerical Weather Prediction Using SYNOP Surface Observation Data (SYNOP 지상관측자료를 활용한 수치모델 전구 예측성 검증)

  • Lee, Eun-Hee;Choi, In-Jin;Kim, Ki-Byung;Kang, Jeon-Ho;Lee, Juwon;Lee, Eunjeong;Seol, Kyung-Hee
    • Atmosphere
    • /
    • v.27 no.2
    • /
    • pp.235-249
    • /
    • 2017
  • This paper describes methodology verifying near-surface predictability of numerical weather prediction models against the surface synoptic weather station network (SYNOP) observation. As verification variables, temperature, wind, humidity-related variables, total cloud cover, and surface pressure are included in this tool. Quality controlled SYNOP observation through the pre-processing for data assimilation is used. To consider the difference of topographic height between observation and model grid points, vertical inter/extrapolation is applied for temperature, humidity, and surface pressure verification. This verification algorithm is applied for verifying medium-range forecasts by a global forecasting model developed by Korea Institute of Atmospheric Prediction Systems to measure the near-surface predictability of the model and to evaluate the capability of the developed verification tool. It is found that the verification of near-surface prediction against SYNOP observation shows consistency with verification of upper atmosphere against global radiosonde observation, suggesting reliability of those data and demonstrating importance of verification against in-situ measurement as well. Although verifying modeled total cloud cover with observation might have limitation due to the different definition between the model and observation, it is also capable to diagnose the relative bias of model predictability such as a regional reliability and diurnal evolution of the bias.

A Technique for On-line Automatic Signature Verification based on a Structural Representation (필기의 구조적 표현에 의한 온라인 자동 서명 검증 기법)

  • Kim, Seong-Hoon;Jang, Mun-Ik;Kim, Jai-Hie
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2884-2896
    • /
    • 1998
  • For on-line signature verification, the local shape of a signature is an important information. The current approaches, in which signatures are represented into a function of time or a feature vector without regarding of local shape, have not used the various features of local shapes, for example, local variation of a signer, local complexity of signature or local difficulty of forger, and etc. In this paper, we propose a new technique for on-line signature verification based on a structural signature representation so as to analyze local shape and to make a selection of important local parts in matching process. That is. based on a structural representation of signature, a technique of important of local weighting and personalized decision threshold is newly introduced and its experimental results under different conditions are compared.

  • PDF

A Study on Utterance Verification Using Accumulation of Negative Log-likelihood Ratio (음의 유사도 비율 누적 방법을 이용한 발화검증 연구)

  • 한명희;이호준;김순협
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.3
    • /
    • pp.194-201
    • /
    • 2003
  • In speech recognition, confidence measuring is to decide whether it can be accepted as the recognized results or not. The confidence is measured by integrating frames into phone and word level. In case of word recognition, the confidence measuring verifies the results of recognition and Out-Of-Vocabulary (OOV). Therefore, the post-processing could improve the performance of recognizer without accepting it as a recognition error. In this paper, we measure the confidence modifying log likelihood ratio (LLR) which was the previous confidence measuring. It accumulates only those which the log likelihood ratio is negative when integrating the confidence to phone level from frame level. When comparing the verification performance for the results of word recognizer with the previous method, the FAR (False Acceptance Ratio) is decreased about 3.49% for the OOV and 15.25% for the recognition error when CAR (Correct Acceptance Ratio) is about 90%.

An Object Model Verification System based on the Constraint Language (제약 언어를 이용한 객체 모델 검증시스템)

  • Kim, Jin-Soo;Kang, Kwon;Lee, Kyung-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1453-1467
    • /
    • 1996
  • A software development process is regarded as the process of building a series of various models. But developers had no method to verify these models which created subjectively. This paper has adopted initiative of verification tools to an early phase of analysis, whereas the existing verification tools have been used for implementations. This paper has defined a constraint language that expresses disciplines suggested in the system has been built upon the constraint language, which is proven to enhance the quality and consistency of models constructed by object model editor.

  • PDF

Structural and Semantic Verification for Consistency and Completeness of Knowledge (지식의 일관성과 완결성을 위한 구조적 및 의미론적 검증)

  • Suh, Euy-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.8
    • /
    • pp.2075-2082
    • /
    • 1998
  • Rule-based knowledge representHtion is, the most popular technique for ,storage and manipulation of domain knowledge in expert system. By the way, the amount of knowledge increases more and more in this representatiun technique, it, relationship becomes complex, and even its contents can be modified. This is the reason why rule-based knowledge representation technique requires a verification ,system which can maintain consistency and completeness of knowledge base. This paper is to propose a verification system for consistency and completeness of knowledge base to promote the efficiency and reliability of expert system. After verifying the potential errors both in structure and in semantics whenever a new rule is added, this system renders knowledge base consistent and complete by correcting them automatically or by making expert correct them if it fails.

  • PDF

System-level Hardware Function Verification System (시스템수준의 하드웨어 기능 검증 시스템)

  • You, Myoung-Keun;Oh, Young-Jin;Song, Gi-Yong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.2
    • /
    • pp.177-182
    • /
    • 2010
  • The flow of a universal system-level design methodology consists of system specification, system-level hardware/software partitioning, co-design, co-verification using virtual or physical prototype, and system integration. In the developing process of a hardware component in system, the design phase has been regarded as a phase consuming lots of time and cost. However, the verification phase in which functionality of the designed component is verified has recently been considered as a much important phase. In this paper, the implementation of a verification environment which is based on SystemC infrastructure and verifies the functionality of a hardware component is described. The proposed verification system uses SystemC user-defined channel as communication interface between variables of SystemC module and registers of Verilog module. The functional verification of an UART is performed on the proposed verification system. SystemC provides class library for hardware modeling and has an advantage of being able to design a system consisting hardware and software in higher abstraction level than register transfer level. Source codes of SystemC modules are reusable with a minor adaptation on verifying functionality of another hardware component.

A Memory-Efficient Fingerprint Verification Algorithm Using a Multi-Resolution Accumulator Array

  • Pan, Sung-Bum;Gil, Youn-Hee;Moon, Dae-Sung;Chung, Yong-Wha;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.25 no.3
    • /
    • pp.179-186
    • /
    • 2003
  • Using biometrics to verify a person's identity has several advantages over the present practices of personal identification numbers (PINs) and passwords. At the same time, improvements in VLSI technology have recently led to the introduction of smart cards with 32-bit RISC processors. To gain maximum security in verification systems using biometrics, verification as well as storage of the biometric pattern must be done in the smart card. However, because of the limited resources (processing power and memory space) of the smart card, integrating biometrics into it is still an open challenge. In this paper, we propose a fingerprint verification algorithm using a multi-resolution accumulator array that can be executed in restricted environments such as the smart card. We first evaluate both the number of instructions executed and the memory requirement for each step of a typical fingerprint verification algorithm. We then develop a memory-efficient algorithm for the most memory-consuming step (alignment) using a multi-resolution accumulator array. Our experimental results show that the proposed algorithm can reduce the required memory space by a factor of 40 and can be executed in real time in resource-constrained environments without significantly degrading accuracy.

  • PDF