• Title/Summary/Keyword: Test Validation

Search Result 1,765, Processing Time 0.03 seconds

Endurance test procedure and validation of Multipurpose tactical vehicle (다목적 전술차량의 주행내구도 시험 절차 및 검증)

  • Jeong, Eui-Bong;Kang, Dong-Suk;Choi, Ji-Ho;Kim, Han-Shang;Choi, Man-Sick
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.10a
    • /
    • pp.256-261
    • /
    • 2014
  • Endurance test procedures of multipurpose tactical vehicle is constructed by comparing the Korea defence standard and TOP-2-2-506. The plan was to make the best reflect the operational environment and the actual production purposes. Endurance test of multipurpose tactical vehicle more stringent than the existing other military vehicles validation procedures. But the test plan, it is possible to reduce the cost and schedule of long verification that occurs because of the Endurance test. Through a comparison of the dynamic characteristic analysis, change of test center was to ensure the reliability and validity.

  • PDF

Validation Tool of Elliptic Curves Cryptography Algorithm for the Mobile Internet (무선 환경에 적합한 타원곡선 암호 알고리즘의 검증도구)

  • Seo, Chang-Ho;Hong, Do-Won;Yun, Bo-Hyun;Kim, Seo-Kwoo;Lee, Ok-Yeon;Chung, Kyo-IL
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.569-576
    • /
    • 2004
  • Conventional researches of standard tool validating public key cryptographic algorithm have been studied for the internet environment, not for the mobile internet. It is important to develop the validation tool for establishment of interoperability and convenience of users in mobile internet. Therefore, this paper presents the validation tool of Elliptic Curie Cryptography algorithm that can test if following X9.62 technology standard specification. The validation tool can be applied all information securities using ECDSA, ECKCDSA, ECDH, etc. Moreover, we can en-hace the precision of validation through several experiments and perform the validation tool in the online environment.

Study on the validation methods of calibration considering correlations (상관관계를 반영한 신용등급 계량화 검정기법 연구)

  • Kim, Enn-Na;Ha, Jeong-Cheol
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.3
    • /
    • pp.407-417
    • /
    • 2010
  • In Basel II compliance, internal rating systems are allowed for banks to enhance the self control and the validation of the system are getting more important. The validation methods are composed of qualitative test and quantitative test, three basic standards of which are discriminatory power, stability and calibration. The aim of this article is to review the quantitative tests for calibration and find a new method for it. These methods for discrimination between forecasted PD and observed PD include binomial test, chi square test, Brier score, traffic lights approach, normal test and extended traffic lights approach. We introduce a modified extended traffic lights approach considering asset correlations.

Validation Testing of Safety-critical Software (Safety-critical 소프트웨어의 검증시험)

  • Kim, Hang-Bae;Han, Jai-Bok
    • Nuclear Engineering and Technology
    • /
    • v.27 no.3
    • /
    • pp.385-392
    • /
    • 1995
  • A software engineering process has been developed for the design of safety critical software for Wolsong 2/3/4 project to satisfy the requirement of the regulatory body. Among the process, this paper described the detail process of validation testing peformed to ensure that the software with its hardware, developed by the design group, satisfies the requirements of the functional specification prepared by the independent functional group. To perform the test, test facility and test software ore developed and actual safety system computer was connected. Three kinds of test cases, i.e., functional test performance test and self-check test were programmed and run to verify each functional specifications. Test failures ore fedback to the design group to revise the software and test result were analyzed and documented in the report to submit to the regulatory body. The test methodology and procedure were very efficient and satisfactory to perform the systematic and automatic test. The test results were also acceptable and successful to verify the software acts as specified in the program functional specification. This methodology can be applied to the validation of other safety-critical software.

  • PDF

Modelling of IMU Error with Setteing Misalignment in Laboratory Test (실험실 시험 장착오차를 고려한 관성측정장치 오차 모델링)

  • Seong, Sang-Man;Lee, Dal-Ho;Lee, Jang-Gyu
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.4
    • /
    • pp.428-433
    • /
    • 1999
  • The errors of IMU(Inertial Measurement Unit) can be divided into deterministic and random errors. Since the required accuracy of the IMU is very high, the errors must be compensated by using an accurate error mode. In this paper, we present a method to get a more accurate error model in a laboratory test. This was done by considering the setting misalignment in the laboratory test in the IMU error model. We considered here the IMU which consits of DTG(dynamically tuned gyroscope) and pendulum type accelerometer. First, it was shown that the estimation result from the model which does not contain the setting misalignment gives considerable estimation error at the validation test. Second, a new model considering the setting misalignment was derived. Finally, by validation test using the estimation results from new model the validity of it was proved.

  • PDF

Verification Methods of ATE for TICN System (전술정보통신체계 ATE 유효성 검증 방안)

  • Bak, HyeonJeong;Kim, JinSung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.4
    • /
    • pp.17-27
    • /
    • 2020
  • In this paper, we proposed verification methods to prove the effectiveness of automatic test equipment (ATE) for weapon systems. Since the test results from the unproven ATE is not reliable and its use is limited as objective data, it is essential to verify the test equipment in order to guarantee the quality level of the unit under test (UUT). Through the suggested methods, it is applied to the ATE of the tactical information communications network (TICN) system to confirm the verification results and to describe the validation results.

On the Safety and Performance Demonstration Tests of Prototype Gen-IV Sodium-Cooled Fast Reactor and Validation and Verification of Computational Codes

  • Kim, Jong-Bum;Jeong, Ji-Young;Lee, Tae-Ho;Kim, Sungkyun;Euh, Dong-Jin;Joo, Hyung-Kook
    • Nuclear Engineering and Technology
    • /
    • v.48 no.5
    • /
    • pp.1083-1095
    • /
    • 2016
  • The design of Prototype Gen-IV Sodium-Cooled Fast Reactor (PGSFR) has been developed and the validation and verification (V&V) activities to demonstrate the system performance and safety are in progress. In this paper, the current status of test activities is described briefly and significant results are discussed. The large-scale sodium thermal-hydraulic test program, Sodium Test Loop for Safety Simulation and Assessment-1 (STELLA-1), produced satisfactory results, which were used for the computer codes V&V, and the performance test results of the model pump in sodiumshowed good agreement with those in water. The second phase of the STELLA program with the integral effect tests facility, STELLA-2, is in the detailed design stage of the design process. The sodium thermal-hydraulic experiment loop for finned-tube sodium-to-air heat exchanger performance test, the intermediate heat exchanger test facility, and the test facility for the reactor flow distribution are underway. Flow characteristics test in subchannels of a wire-wrapped rod bundle has been carried out for safety analysis in the core and the dynamic characteristic test of upper internal structure has been performed for the seismic analysis model for the PGSFR. The performance tests for control rod assemblies (CRAs) have been conducted for control rod drive mechanism driving parts and drop tests of the CRA under scram condition were performed. Finally, three types of inspection sensors under development for the safe operation of the PGSFR were explained with significant results.

A Stochastic Model of Muscle Fatigue as a Monitor of Individual Muscle Capabilities

  • Lee, Myun-W.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 1980
  • This paper presents the validation of a stochastic model of muscle fatigue during static muscle contractions. Forty four laboratory experiments, covering eleven test conditions for two trained subjects, were run in order to estimate fatigue and recovery rates, based on EMG observations. The validation of the model was made by comparing the model predictions to the experimental fatigue time. The validation study supports that the stochastic model of muscle fatigue accurately represents the underlying fatigue process. The study also provides support that the fatigue model can be used as a monitor of individual muscle capabilities.

  • PDF

Experimental studies of validation and stability of Sweet Bee Venom using HPLC (Sweet BV의 조제물 농도분석 및 안정성 확인을 위한 시험적 연구)

  • Kang, Kye-Sung;Kwon, Ki-Rok
    • Journal of Pharmacopuncture
    • /
    • v.12 no.4
    • /
    • pp.33-50
    • /
    • 2009
  • Objectives : This study was conducted to confirm validation and stability of concentration analysis method of pure melittin (Sweet Bee Venom-Sweet BV) extracted from the bee venom by utilizing protein isolation method of gel filtration. Methods : All experiments were conducted at Biotoxtech, a non-clinical studies authorized institution, under the regulations of Good Laboratory Practice (GLP). Standard solutions of melittin (SIGMA, USA) and test substances were dispensed and were analyzed with HPLC for Sweet BV to secure the validation of analysis. Results : 1. Measurement of system suitability of Sweet BV satisfied criterion of below 3%. 2. Confirming Linearity of Sweet BV in 10-200${\mu}g/m\ell$ solution yielded correlation coefficient (r) of 0.995 and accuracy of 85-115% which satisfy criterion. 3. Measurement of Specificity of Sweet BV didn't yield any substance affecting the peak of test substances, but detected at 21.22min verified as the test substance. 4. Confirming Intra-day of Sweet BV, accuracy and precision of 0.1, 100${\mu}g/m\ell$ were 105.70, 95.81 and 0.66, 0.73, respectively, satisfying both criteria of accuracy (85-115%) and precision (within 10%). 5. To measure Stability in autosampler, all samples used in Intra-day reproducibility sat in the autosampler for five hours and were re-analyzed. Both variability and precision satisfied the criteria. 6. Homogeneity of Sweet BV (0.1, 100${\mu}g/m\ell$) at upper, middle, and lower layers all satisfied the accuracy and precision criteria. 7. Stability of Sweet BV (0.1, 100${\mu}g/m\ell$) at room temperature for four hours and refrigerated for 7 days all satisfied the criterion. 8. For the measurement of Quality control, QC samples measured on the first and eighth day all satisfied accuracy and precision criteria. Conclusion : Above experiment data satisfies validation and stability of concentration analysis method of Sweet BV.

On the SEED Validation System (SEED 구현 적합성 검증 시스템에 관한 연구)

  • Kim, Yeok;Jung, Chang-Ho;Jang, Yoon-Seok; Lee, Sang-Jin;Lee, Sung-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.69-85
    • /
    • 2003
  • In this paper, we discuss a validation test for cryptographic algorithms. The cryptographic algorithms decide on the security and the confidence of a security system protecting sensitive information. So. the implementation of cryptographic algorithms is very critical of the system. The validation lest specifies the procedures involved in validating implementations of the cryptographic standards and provides conformance testing for components or procedures of the algorithm. We propose a SEED Validation System(SVS) to verify that the implementation correctly performs the SEED algorithm. The SVS is composed of two types of validation tests, the Known Answer test and the Monte Carlo test. The System generates the testing data for the Known Answer tests and the random data for the Monte Carlo tests. This system can be used to validate and certify the cryptographic product.