• Title/Summary/Keyword: System verification

Search Result 4,690, Processing Time 0.034 seconds

Speaker Verification System Using Support Vector Machine (SVM을 이용한 화자인증 시스템)

  • 최우용;이경희;정용화
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.409-412
    • /
    • 2002
  • There is a growing interest in speaker verification, which verifies someone by his/her voices. This paper explains the traditional text-dependent speaker verification algorithms, DTW and HMM. This paper also introduces SVM and how this can be applied to speaker verification system. Experiments were conducted with Korean database using these algorithms. The results of experiments indicated SVM is superior to other algorithms. The EER of SVM is only 0.5% while that of HMM is 5.4%.

  • PDF

Verification System for Cutting Condition of Ball-End Milling Process (볼엔드 밀링의 절삭조건 검증시스템)

  • Kim, Chan Bong;Yang, Min Yang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.12 no.2
    • /
    • pp.123-134
    • /
    • 1995
  • In this paper, the fast force algorithm has been studied so that it is used to calculate cutting forces and to develope the NC verification system. The NC verification using the fast force algorithm can verify excessive cutting force which is the cause of deflection and breakage of tool, and adjust the feed rate and spindle speed.

  • PDF

A Safety Verification of the Modified BLP Model using PVS (PVS를 이용한 수정된 BLP 모델의 안전성 검증)

  • Koo Ha-Sung;Park Tae-Kue;Song Ho-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1435-1442
    • /
    • 2006
  • The ideal method of safety evaluation is to verify results of execution against all possible operations within operating system, but it is impossible. However, the formal method can theoretically prove the safety on actual logic of operating system. Therefore we explain the contents of the art of the safety verification of security kernel, and make a comparative study of various standardized formal verification tools. And then we assigned PVS(Prototype Verification system) of SRI(Stanford Research Institute) to verify the safety of a modified BLP(Bell & LaPadula) model, the core access control model of multi-lavel based security kernel. Finally, we describe formal specification of the revised BLP model using the PVS, and evaluate the safety of the model by inspecting the specification of the PVS.

Local Model Checking for Verification of Real-Time Systems (실시간 시스템 검증을 위한 지역모형 검사)

  • 박재호;김성길;황선호;김성운
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.1
    • /
    • pp.77-90
    • /
    • 2000
  • Real-Time verification is a procedure that verifies the correctness of specification related to requirement in time as well as in logic. One serious problem encountered in the verification task is that the state space grows exponentially owing to the unboundedness of time, which is termed the state space explosion problem. In this paper, we propose a real-time verification technique checking the correctness of specification by showing that a system model described in timed automata is equivalent to the characteristic of system property specified in timed modal-mu calculus. For this, we propose a local model checking method based on the value of the formula in initial state with constructing product graph concerned to only the nodes needed for verification process. Since this method does not search for every state of system model, the state space is reduced drastically so that the proposed method can be applied effectively to real-time system verification.

  • PDF

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.

On-line Signature Verification Based on the Structural Analysis (구조적 분석에 의한 온라인 서명 검증)

  • 이진호;김성훈김재희
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.1293-1296
    • /
    • 1998
  • This paper presents a new signature verification technique that not only maximally allows variations in signatures of each person, but also discriminates effectively forgeries from true signatures. The signature verification system is designed to detect unstable portions in signatures of same person, and to give large weight on the portion that is difficult to imitate and plays an important role in signature verification. In registration mode, the system extracts subpatterns from training samples and analizes their consistency and singularity by calculating the variance and complexity of this portion. In verification mode, the system verifies a input signature by comparing corresponding subpatterns with the weights of reference subpatterns.

  • PDF

A Study on Background Speaker Model Design for Portable Speaker Verification Systems (휴대용 화자확인시스템을 위한 배경화자모델 설계에 관한 연구)

  • Choi, Hong-Sub
    • Speech Sciences
    • /
    • v.10 no.2
    • /
    • pp.35-43
    • /
    • 2003
  • General speaker verification systems improve their recognition performances by normalizing log likelihood ratio, using a speaker model and its background speaker model that are required to be verified. So these systems rely heavily on the availability of much speaker independent databases for background speaker model design. This constraint, however, may be a burden in practical and portable devices such as palm-top computers or wireless handsets which place a premium on computations and memory. In this paper, new approach for the GMM-based background model design used in portable speaker verification system is presented when the enrollment data is available. This approach is to modify three parameters of GMM speaker model such as mixture weights, means and covariances along with reduced mixture order. According to the experiment on a 20 speaker population from YOHO database, we found that this method had a promise of effective use in a portable speaker verification system.

  • PDF

Real-Time System Parallel Testing Techniques for Weapon System Error Verification (무기체계 오류 검증을 위한 실시간 시스템 병렬시험 기법)

  • Kim, Dong-Jun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.11
    • /
    • pp.130-138
    • /
    • 2016
  • In this paper present the real-time system parallel testing techniques for weapon systems error verification. Previously field testing equipment in the military field was using the sequential testing method to maintain. This method could not check the error verification of interference. For this reason, in this paper propose the real-time system parallel testing techniques using an embedded module instead of the sequential testing techniques which is used in the weapon system error verification. Using the embedded module mounted switching control card conduct the parallel testing and then send the result to the PC. This method is possible to increase the reliability in the weapon system error verification.

Performance Verification Process for Introduction of Open Source Software -centered on introduction of Linux into the NEIS-

  • Kim Doo-Yeon;Kim Jong-Bae;Rhew Sung-Yul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.59-68
    • /
    • 2006
  • Recently, introduction of Open Source Software into informatization of the government and public sector has been actively examined, however, Open Source Software is being rarely adopted due to the lack of verified and reliable data with regard to the criteria, process, performance and stability for introduction of Open Source Software. In this paper, the process, method and plan for performance verification for introduction of Open Source Software into mission critical systems of the government and public sector are suggested in order to solve the aforesaid problem Specially, a test system to judge whether or not to adopt Open Source Software in school affairs system of the NEIS(National Education Information System) of the Korean government was set up, and the method and process of performance verification by stage in addition to feasibility study were applied to the test system for verification. Based on the result of performance evaluation in the test system, the application of Linux to school affairs system of the NEIS is being successfully practiced. It is expected that this study will be a guideline to technical review process and performance verification method as necessary to introduce Open Source Software into the mission critical systems of government and public agencies.

  • PDF

The Verification Test of Launch Control System Algorithms Using Automated Verification System (자동화 검증시스템을 이용한 발사관제시스템 알고리즘 검증시험)

  • An, Jae-Chel;Moon, Kyung-Rok;Oh, Il-Seok
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.25 no.3
    • /
    • pp.127-137
    • /
    • 2021
  • The launch complex(LC) is composed of various facilities. The launch control system that operates remotely those of LC spends much time and labor for developing and verifying its control algorithms. The verification of algorithms is performed by the software developer entering simulated state values based on the test procedure and checking the output result according to the algorithm flow. These verification processes should be performed repeatedly, thus the human errors are easily occurred. In this paper, an efficient automated verification method with a script test procedure is proposed to minimize human errors and shorten the verification duration. We also present the results of the algorithm verification tests for the cases of the compressed gases supply system and the electro pneumatic panel system of LC.