• Title/Summary/Keyword: T-검증

Search Result 3,358, Processing Time 0.034 seconds

A Study on the Performance Verification Method of an ALSE(Absorber-Lined Shielded Enclosure) by the CISPR25 (CISPR25의 ALSE(Absorber-Lined Shielded Enclosure) 성능 검증 방법에 관한 연구)

  • Shin, Jaekon;Jung, Kibum;Choi, Jaehoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.8
    • /
    • pp.791-797
    • /
    • 2013
  • This paper proposes a new way to verify the performance of an absorber lined shielded enclosure(ALSE) in accordance with CISPR25, EMC standards dedicated to testing automotive components. CISPR16 requires the use of NSA and VSWR methods to test the performance of a chamber. As for CISPR25, however, there hasn't been standardized ways to verify the performance of ALSE. This paper purports to present an improved method for the verification based on a long-wire antenna method under discussion at CISPR25 JFT. Existing discussions on a long-wire antenna method proposes that an antenna should reach 500 millimeters in length, while this paper adopts the antenna length of 1,700 millimeters. This paper also assesses the effects of matching conditions and studies problems related to methods which have been already proposed and key parameters in order to improve verification methods.

Validation Testing Tool for Light-Weight Stream Ciphers (경량 스트림 암호 구현 적합성 검증 도구)

  • Kang Ju-Sung;Shin Hyun Koo;Yi Okyeon;Hong Dowon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.495-502
    • /
    • 2005
  • Cryptographic algorithm testing is performed to ensure that a specific algorithm implementation is implemented correctly and functions correctly. CMVP(Cryptographic Module Validation Program) of NIST in US is the well-known testing system that validates cryptographic modules to Federal Information Processing Standards (FIPS). There is no FIPS-approved stream cipher, and CMVP doesn't involve its validation testing procedure. In this paper we provide validation systems for three currently used light-weight stream ciphers: Bluetooth encryption algorithm E0, 3GPP encryption algorithm A5/3, and RC4 used for WEP and SSL/TLS Protocols. Moreover we describe our validation tools implemented by JAVA programing.

Design of weighted federated learning framework based on local model validation

  • Kim, Jung-Jun;Kang, Jeon Seong;Chung, Hyun-Joon;Park, Byung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.13-18
    • /
    • 2022
  • In this paper, we proposed VW-FedAVG(Validation based Weighted FedAVG) which updates the global model by weighting according to performance verification from the models of each device participating in the training. The first method is designed to validate each local client model through validation dataset before updating the global model with a server side validation structure. The second is a client-side validation structure, which is designed in such a way that the validation data set is evenly distributed to each client and the global model is after validation. MNIST, CIFAR-10 is used, and the IID, Non-IID distribution for image classification obtained higher accuracy than previous studies.

A Study on the Factors Influencing Behavioral Intention Related to Beef Traceability and TAM (쇠고기이력추적제와 기술수용모델의 행동의도 영향요인)

  • Na, Young-Sun
    • Culinary science and hospitality research
    • /
    • v.18 no.1
    • /
    • pp.77-90
    • /
    • 2012
  • This study investigates the causal relationships among the factors influencing behavioral intention related to beef traceability and TAM to make diet safer. To do this, this study conducted a survey targeting the customers who use the department stores, specialty shops and large supermarkets in Seoul. The result is as follows. First, the higher the information quality in beef traceability(t=3.872) and social impact (t=1.938) were, the higher the usability became significantly. Second, as the social impact of food traceability(t=2.014), information accessibility(t=2.016), perceived risk(t=1.910) became higher, the perceived usefulness was shown significantly higher. Third, as the usability(t=5.826) was perceived higher, the perceived usefulness became higher. Fourth, the higher the perceived usefulness(t=4.264), the higher the behavioral intention among the customers. Also, the lower the usability(t=-0.682), the lower the behavioral intention.

  • PDF

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Systematic Development of Mobile IoT Device Power Management: Feature-based Variability Modeling and Asset Development (모바일 IoT 디바이스 파워 관리의 체계적인 개발 방법: 휘처 기반 가변성 모델링 및 자산 개발)

  • Lee, Hyesun;Lee, Kang Bok;Bang, Hyo-Chan
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.460-469
    • /
    • 2016
  • Internet of Things (IoT) is an environment where various devices are connected to each other via a wired/wireless network and where the devices gather, process, exchange, and share information. Some of the most important types of IoT devices are mobile IoT devices such as smartphones. These devices provide various high-performance services to users but cannot be supplied with power all the time; therefore, power management appropriate to a given IoT environment is necessary. Power management of mobile IoT devices involves complex relationships between various entities such as application processors (APs), HW modules inside/outside AP, Operating System (OS), platforms, and applications; a method is therefore needed to systematically analyze and manage these relationships. In addition, variabilities related to power management such as various policies, operational environments, and algorithms need to be analyzed and applied to power management development. In this paper, engineering principles and a method based on them are presented in order to address these challenges and support systematic development of IoT device power management. Power management of connected helmet systems was used to validate the feasibility of the proposed method.