• Title/Summary/Keyword: System verification

Search Result 4,673, Processing Time 0.037 seconds

Development of Test-Equipment for AUVs' Navigation Performance Pre-verification (자율무인잠수정의 항법성능 사전 검증을 위한 시험치구 개발)

  • Hansol Lee;Gwonsoo Lee;Ho Sung Kim;Kihwan Choi;Jinwoo Choo;Hyungjoo Kang
    • The Journal of Korea Robotics Society
    • /
    • v.18 no.4
    • /
    • pp.472-480
    • /
    • 2023
  • This paper describes the development of a test-equipment for the pre-verification of navigation performance in cluster-based AUVs (Autonomous Underwater Vehicle). In the development of an AUV, conducting hardware and software development sequentially is not efficient due to the limited research and development period. Therefore, in order to reduce the overall development time and achieve successful development results, it is essential to pre-validate the navigation system and navigation algorithms. Accordingly, this paper explains the test-equipment for pre-verification of navigation performance, and ultimately confirms the stability of the navigation system and the performance of the navigation algorithms through the analysis of five types of navigation sensor data stored during real-sea experiments. The results demonstrate that through the development and verification of the test-equipment, it is possible to shorten the overall development period and improvement of product quality in the process of developing multiple AUVs.

Development Methodology of Safety-Critical System Using Formal Method (정형기법을 이용한 Safety-Critical System 개발 방법론)

  • 성창훈;이나영;오승록;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.486-488
    • /
    • 2000
  • 본 연구는 정형기법을 사용하여 Safety-Critical System의 개발 방법론을 제시한다. Safety-Critical System의 전체적인 개발 과정을 제시하고 Safety-Critical System 중의 하나인 원자력 발전소 시스템 중 Reactor Protection System(RPS)을 정형 명세(Formal Specification)하고 정형 검증(Formal Verification)하는 과정과 그에 따른 각 과정의 Compliance를 확인하는 예를 든다. 여기서 정형 명세에는 Software Cost Reduction(SCR)이하는 도구가 사용되었고, 정형 검증에는 SPIN이, Compliance를 확인하는 데에는 Prototype Verification System(PVS)를 사용하였다.

  • PDF

On Speaker Adaptations with Sparse Training Data for Improved Speaker Verification

  • Ahn, Sung-Joo;Kang, Sun-Mee;Ko, Han-Seok
    • Speech Sciences
    • /
    • v.7 no.1
    • /
    • pp.31-37
    • /
    • 2000
  • This paper concerns effective speaker adaptation methods to solve the over-training problem in speaker verification, which frequently occurs when modeling a speaker with sparse training data. While various speaker adaptations have already been applied to speech recognition, these methods have not yet been formally considered in speaker verification. This paper proposes speaker adaptation methods using a combination of MAP and MLLR adaptations, which are successfully used in speech recognition, and applies to speaker verification. Experimental results show that the speaker verification system using a weighted MAP and MLLR adaptation outperforms that of the conventional speaker models without adaptation by a factor of up to 5 times. From these results, we show that the speaker adaptation method achieves significantly better performance even when only small training data is available for speaker verification.

  • PDF

A Study on Establishing the Requirements Verification Matrix (RVM) for the Space Launch Vehicle (우주발사체 요구조건 검증 매트릭스(RVM) 수립 연구)

  • Jang, Junyouk;Cho, Dong Hyun;Yoo, Il Sang
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.14 no.2
    • /
    • pp.16-23
    • /
    • 2018
  • The intended system's function and performance can be assured through implementing the development process, the verification compliance against corresponding requirements, in accordance with the fundamental principle from the Systems Engineering. For the effective verification implementation, related core metadata should be selected and managed throughout the development life cycle. And these have to be included in the configuration document such as specification so that taking them as development baselines each phases if necessary. In this paper, associated case study results are introduced to establish the Requirements Verification Matrix (RVM) for the verification management on the space launch vehicle development program.

An Effective ESICD Verification Strategy: A case study of Military Satellite Communications System II

  • Lee, Kee-Sung;Choi, Jun-Ho;Shin, Jeong-Jin;Yoon, Hye-Jin;Kim, Seung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.105-114
    • /
    • 2021
  • ESICD(Electrical Signal Interface Control Document) refers to a document that describes protocols and data for communication between components consist of a system. Each component developer gathers at a specific place to conduct an integrated test for ESICD verification. In this case, it often happens that the integration test is delayed due to a simple mistake of software developers. There are two reasons for this situation: First, software developers do not perform sufficient verification because it is difficult to configure the system environment in a Lab, and second, they do not immediately find the cause of errors occurred during integration tests. Therefore, in this paper, we propose a strategy to effectively perform ESICD verification, which takes a lot of time between the production and implementation stage of the weapon system development stage and the system integration test stage.

Development of ISO 26262 based Requirements Analysis and Verification Method for Efficient Development of Vehicle Software

  • Kyoung Lak Choi;Min Joong Kim;Young Min Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.219-230
    • /
    • 2023
  • With the development of autonomous driving technology, as the use of software in vehicles increases, the complexity of the system increases and the difficulty of development increases. Developments that meet ISO 26262 must be carried out to reduce the malfunctions that may occur in vehicles where the system is becoming more complex. ISO 26262 for the functional safety of the vehicle industry proposes to consider functional safety from the design stage to all stages of development. Specifically at the software level, the requirements to be complied with during development and the requirements to be complied with during verification are defined. However, it is not clearly expressed about specific design methods or development methods, and it is necessary to supplement development guidelines. The importance of analysis and verification of requirements is increasing due to the development of technology and the increase of system complexity. The vehicle industry must carry out developments that meet functional safety requirements while carrying out various development activities. We propose a process that reflects the perspective of system engineering to meet the smooth application and developmentrequirements of ISO 26262. In addition, the safety analysis/verification FMEA processforthe safety of the proposed ISO 26262 function was conducted based on the FCAS (Forward Collision Avoidance Assist System) function applied to autonomous vehicles and the results were confirmed. In addition, the safety analysis/verification FMEA process for the safety of the proposed ISO 26262 function was conducted based on the FCAS (Forward Collision Avoidance Assist System) function applied to the advanced driver assistance system and the results were confirmed.

Upgrade of gamma electron vertex imaging system for high-performance range verification in pencil beam scanning proton therapy

  • Kim, Sung Hun;Jeong, Jong Hwi;Ku, Youngmo;Jung, Jaerin;Cho, Sungkoo;Jo, Kwanghyun;Kim, Chan Hyeong
    • Nuclear Engineering and Technology
    • /
    • v.54 no.3
    • /
    • pp.1016-1023
    • /
    • 2022
  • In proton therapy, a highly conformal proton dose can be delivered to the tumor by means of the steep distal dose penumbra at the end of the beam range. The proton beam range, however, is highly sensitive to range uncertainty, which makes accurately locating the proton range in the patient difficult. In-vivo range verification is a method to manage range uncertainty, one of the promising techniques being prompt gamma imaging (PGI). In earlier studies, we proposed gamma electron vertex imaging (GEVI), and constructed a proof-of-principle system. The system successfully demonstrated the GEVI imaging principle for therapeutic proton pencil beams without scanning, but showed some limitations under clinical conditions, particularly for pencil beam scanning proton therapy. In the present study, we upgraded the GEVI system in several aspects and tested the performance improvements such as for range-shift verification in the context of line scanning proton treatment. Specifically, the system showed better performance in obtaining accurate prompt gamma (PG) distributions in the clinical environment. Furthermore, high shift-detection sensitivity and accuracy were shown under various range-shift conditions using line scanning proton beams.

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

A Study on Out-of-Vocabulary Rejection Algorithms using Variable Confidence Thresholds (가변 신뢰도 문턱치를 사용한 미등록어 거절 알고리즘에 대한 연구)

  • Bhang, Ki-Duck;Kang, Chul-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1471-1479
    • /
    • 2008
  • In this paper, we propose a technique to improve Out-Of-Vocabulary(OOV) rejection algorithms in variable vocabulary recognition system which is much used in ASR(Automatic Speech Recognition). The rejection system can be classified into two categories by their implementation method, keyword spotting method and utterance verification method. The utterance verification method uses the likelihood ratio of each phoneme Viterbi score relative to anti-phoneme score for deciding OOV. In this paper, we add speaker verification system before utterance verification and calculate an speaker verification probability. The obtained speaker verification probability is applied for determining the proposed variable-confidence threshold. Using the proposed method, we achieve the significant performance improvement; CA(Correctly Accepted for keyword) 94.23%, CR(Correctly Rejected for out-of-vocabulary) 95.11% in office environment, and CA 91.14%, CR 92.74% in noisy environment.

  • PDF

A Design of One-time Password Verification System with Enhanced Security Using Certificate (인증서를 이용한 보안성이 강화된 일회용 패스워드 검증 시스템의 설계)

  • Kim, Hyun-Chul;Lee, Chang-Soo;Lee, Kyung-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.435-441
    • /
    • 2009
  • The one-time password system solves the problem concerning password reuse caused by the repeated utilization of an identical password. The password reuse problem occurs due to the cyclic repetition at the time of password creation, and authentication failure can occur due to time deviation or non-synchronization of the number of authentication. In this study, the password is created asynchronously and exchanged with the user, who then signs using a digital signature in exchange for the password and a valid verification is requested along with the certificate to ensure non-repudiation. Besides this, a verification system for one-time password is proposed and designed to improve security by utilizing the validity verification that is divided into certificate verification and password verification. Comparative analysis shows that the mechanism proposed in this study is better than the existing methods in terms of replay attack, non-repudiation and synchronization failure.