• Title/Summary/Keyword: Verification and validation

Search Result 563, Processing Time 0.022 seconds

Deep Learning Model Validation Method Based on Image Data Feature Coverage (영상 데이터 특징 커버리지 기반 딥러닝 모델 검증 기법)

  • Lim, Chang-Nam;Park, Ye-Seul;Lee, Jung-Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.9
    • /
    • pp.375-384
    • /
    • 2021
  • Deep learning techniques have been proven to have high performance in image processing and are applied in various fields. The most widely used methods for validating a deep learning model include a holdout verification method, a k-fold cross verification method, and a bootstrap method. These legacy methods consider the balance of the ratio between classes in the process of dividing the data set, but do not consider the ratio of various features that exist within the same class. If these features are not considered, verification results may be biased toward some features. Therefore, we propose a deep learning model validation method based on data feature coverage for image classification by improving the legacy methods. The proposed technique proposes a data feature coverage that can be measured numerically how much the training data set for training and validation of the deep learning model and the evaluation data set reflects the features of the entire data set. In this method, the data set can be divided by ensuring coverage to include all features of the entire data set, and the evaluation result of the model can be analyzed in units of feature clusters. As a result, by providing feature cluster information for the evaluation result of the trained model, feature information of data that affects the trained model can be provided.

A New Certificate Path Processing Scheme employed the Trusted CA for improving an efficiency on the Computational Aspect (연산적 측면의 효율성을 향상시키는 신뢰 CA를 이용한 새로운 인증 경로 처리 기법)

  • 최연희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.908-922
    • /
    • 2003
  • The Public Key Infrastructure (PKI) trends to delegate the certificate path processing to the Delegated Path Discovery (DPD) Server and Delegated Path Validation (DPV) server recently. The most critical factor for the selection of the delegated server is to allow the server to be equipped with a high reliability through a low cost, and simple implementation. In this paper, we propose a new certificate path processing scheme employed the trusted CA as the DPD/DPV server by adding the capability of the Validation Authority (VA) to the trusted CA. Since our proposed scheme uses the existing trusted CA as validation server, we can achieve a high trust through a simple implementation for the processing. Besides, we propose an additional scheme for reducing an overhead on the trusted CA. it is obtained by delegating digital signature verification to CAs on the path and by skipping the repeated path processing. As the result, our proposed validation scheme can be performed efficiently with high speed and low computational overhead.

Method Validation for the Simultaneous Analysis of Organophosphorous Pesticides in Blood by GC/MS (GC/MS를 이용한 혈액 중 유기인제류 농약의 동시 분석에 관한 방법의 유효화)

  • Park Mee Jung;Yang Ja Youl;Kim Ki Wook;Park Yoo Shin;Chung Hee Sun;Lee Sang Ki
    • Environmental Analysis Health and Toxicology
    • /
    • v.20 no.4 s.51
    • /
    • pp.297-302
    • /
    • 2005
  • The purpose of this study was to provide the standard method for the analysis of organophosphorous pesticides such as chlorpyrifos, diazinon, malathion and parathion in blood. We performed method validation for these pesticides in blood according to EURACHEM (A focus For Analytical Chemistry in Europe) guide. For the analysis of the pesticides, we used solid-phase extraction ,column (Waters Oasis $HLB^{(R)}$. After the extraction, the supernatants were evaporated to dryness under the nitrogen stream. They were analyzed by gas chromatography/mass spectrometry (GC/MS) after reconstituting with ethanol. Terbufos was used as an internal standard. To validate this method, we performed verification procedures with the following parameters: selectivity, linearity of calibration, accuracy, precision, limit of detection and quantification. Validation data according to Eurachem guide were adequate for our purpose for the analysis of chlorpyrifos, diazinon, malathion and parathion in blood.

Verification and validation of isotope inventory prediction for back-end cycle management using two-step method

  • Jang, Jaerim;Ebiwonjumi, Bamidele;Kim, Wonkyeong;Cherezov, Alexey;Park, Jinsu;Lee, Deokjung
    • Nuclear Engineering and Technology
    • /
    • v.53 no.7
    • /
    • pp.2104-2125
    • /
    • 2021
  • This paper presents the verification and validation (V&V) of a calculation module for isotope inventory prediction to control the back-end cycle of spent nuclear fuel (SNF). The calculation method presented herein was implemented in a two-step code system of a lattice code STREAM and a nodal diffusion code RAST-K. STREAM generates a cross section and provides the number density information using branch/history depletion branch calculations, whereas RAST-K supplies the power history and three history indices (boron concentration, moderator temperature, and fuel temperature). As its primary feature, this method can directly consider three-dimensional core simulation conditions using history indices of the operating conditions. Therefore, this method reduces the computation time by avoiding a recalculation of the fuel depletion. The module for isotope inventory calculates the number densities using the Lagrange interpolation method and power history correction factors, which are applied to correct the effects of the decay and fission products generated at different power levels. To assess the reliability of the developed code system for back-end cycle analysis, validation study was performed with 58 measured samples of pressurized water reactor (PWR) SNF, and code-to-code comparison was conducted with STREAM-SNF, HELIOS-1.6 and SCALE 5.1. The V&V results presented that the developed code system can provide reasonable results with comparable confidence intervals. As a result, this paper successfully demonstrates that the isotope inventory prediction code system can be used for spent nuclear fuel analysis.

Proxy Based Application Digital Signature Validation System (프락시 기반 애플리케이션 전자서명 검증 시스템)

  • Kwon, Sangwan;Kim, Donguk;Lee, Kyoungwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.743-751
    • /
    • 2017
  • As smart phones are becoming popular, an operating system is being used at wearable devices, home appliances and smart TVs. A user is able to use various applications on devices with operating system, but there is an increased threat of hacker. Thus, the technology for detecting the forgery of applications is becoming more important on operating system. To detect the forgery of the application, a digital signature technology is used on the filed of application digital signature. According to W3C recommendation, the signing process of application digital signature must be performed at least twice, and the applications which are signed by the application digital signature have to be validated for all signature files when the application is installed in the operating system. Hence, the performance of the application digital signature validation system is closely related to the installer performance on the operating system. Existing validation system has performance degradation due to redundancy of integrity verification among application components. This research was conducted to improve the performance of the application digital signature validation system. The proposal of validation system which is applied proxy system shows a performance improvement compared to the existing verification system.

A Study on the Verification of Design Compatibility for a Europe Type Automatic Coupler Head according to TSI Certification Standards (TSI 인증기준에 따른 유럽 표준형 자동복합연결기 헤드의 설계적합성 검증 연구)

  • Min, Kyeong Bin;Park, Jin Kyu;Kang, Ji Sung;Kim, Ki Nam
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.1
    • /
    • pp.29-37
    • /
    • 2016
  • The type approval system of the railway safety law, which was enforced in 2014, has been preferentially applied to the field of railway vehicles. The type approval system addresses railway vehicles and railway constituents. Unlike the previous system, it requires serial verification stages divided, in consecutive order, into verification of design compatibility and conformity and type test. These stages are in accord with international certification systems including TSI certification of the European commission. This study has been carried out to find and meet the design requirements for a coupler head, which is a part of the automatic coupler system; requirements were drawn from TSI and technical specifications that are subordinate to the domestic railway approval system. Through this study, it has been found that there exist 34 design requirements to acquire a complete coupler head. Among those requirements, 32 were verified by document inspection and two were able to be verified by performing FEA and gathering range analysis data.

User Experience Validation Using the Honeycomb Model in the Requirements Development Stage

  • Kim, Neung-Hoe
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.227-231
    • /
    • 2020
  • Recently, the importance of user experience (UX) has been rapidly increasing. Its utilization is emphasized for development of systems, products, and services. User experience is widely used across industries including services, products, processes, society, and culture. Therefore, if it is unsatisfactory, it is likely to have a direct negative impact on the corresponding system, product, or service. The failure to analyze user experience causes significant damage to the project, which may lead to its failure or redevelopment; it is hence necessary to prioritize the verification of UX in the earliest stages of development. The requirements development stage, which is a preceding stage, is an appropriate stage for the verification of user experience because the identification of user needs is completed and prototypes can be implemented. In this paper, we proposed a systematic requirements development stage; it adds user experience verification activities to the requirements development stage, using the Honeycomb model, which is a widely used tool for verifying the overall UX. User experience verification was added to the existing requirements development activities, which consisted of three steps: model definition and requirements placement, discussions between external and internal stakeholders, and review by internal stakeholders. By easily validating the user experience through this systematic requirements development stage, we expect to minimize the damage to the project due to the failure of the user experience analysis and increase the possibility of success.

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

"3+3 PROCESS" FOR SAFETY CRITICAL SOFTWARE FOR I&C SYSTEM IN NUCLEAR POWER PLANTS

  • Jung, Jae-Cheon;Chang, Hoon-Sun;Kim, Hang-Bae
    • Nuclear Engineering and Technology
    • /
    • v.41 no.1
    • /
    • pp.91-98
    • /
    • 2009
  • The "3+3 Process" for safety critical software for nuclear power plants' I&C (Instrumentation and Control system) has been developed in this work. The main idea of the "3+3 Process" is both to simplify the software development and safety analysis in three steps to fulfill the requirements of a software safety plan [1]. The "3-Step" software development process consists of formal modeling and simulation, automated code generation and coverage analysis between the model and the generated source codes. The "3-Step" safety analysis consists of HAZOP (hazard and operability analysis), FTA (fault tree analysis), and DV (design validation). Put together, these steps are called the "3+3 Process". This scheme of development and safety analysis minimizes the V&V work while increasing the safety and reliability of the software product. For assessment of this process, validation has been done through prototyping of the SDS (safety shut-down system) #1 for PHWR (Pressurized Heavy Water Reactor).

A Validation Model for the Statistical Power Balance Method Using a Reverberation Chamber

  • Lee, Young Seung;Choi, Sung Woong;Park, Seung Keun
    • Journal of electromagnetic engineering and science
    • /
    • v.13 no.3
    • /
    • pp.192-194
    • /
    • 2013
  • This paper proposes a validation model using a reverberation chamber for verification of the effectiveness and accuracy of the statistical power balance (PWB) method. The PWB method treats electromagnetic (EM) field distributions in certain environments as a representative value of an "ensemble" average, so a reverberation chamber is utilized as a testing apparatus to experimentally simulate the sets of measurement field "ensemble" inside a complex environment. Measurements are performed with various test conditions for environmental loss using flat absorbers, and front and side doors of the chamber. Comparison between the PWB analysis and the measurement results shows good agreement, indicating the usefulness of this statistical analysis method for stating the electromagnetic field inside the EM zone as a representative value to general structures.