• Title/Summary/Keyword: set-up verification

Search Result 134, Processing Time 0.029 seconds

Performance Verification Process for Introduction of Open Source Software -centered on introduction of Linux into the NEIS-

  • Kim Doo-Yeon;Kim Jong-Bae;Rhew Sung-Yul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.59-68
    • /
    • 2006
  • Recently, introduction of Open Source Software into informatization of the government and public sector has been actively examined, however, Open Source Software is being rarely adopted due to the lack of verified and reliable data with regard to the criteria, process, performance and stability for introduction of Open Source Software. In this paper, the process, method and plan for performance verification for introduction of Open Source Software into mission critical systems of the government and public sector are suggested in order to solve the aforesaid problem Specially, a test system to judge whether or not to adopt Open Source Software in school affairs system of the NEIS(National Education Information System) of the Korean government was set up, and the method and process of performance verification by stage in addition to feasibility study were applied to the test system for verification. Based on the result of performance evaluation in the test system, the application of Linux to school affairs system of the NEIS is being successfully practiced. It is expected that this study will be a guideline to technical review process and performance verification method as necessary to introduce Open Source Software into the mission critical systems of government and public agencies.

  • PDF

Evaluation of VMAT Dose Accuracy According to Couch Rotation in Stereotactic Radiation Surgery of Metastatic Brain Cancer (전 이성 뇌 암의 정위 방사선수술에서 Couch 회전에 따른 VMAT의 선량 정확성 평가)

  • Na, Gwui Geum;Park, Byoung Suk;Cha, Woo Jung;Park, Yong Chul
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.33
    • /
    • pp.117-125
    • /
    • 2021
  • Purpose: To purpose of this study is to find the correlation of the Set-up error according to the couch rotation and suggest additional margin setting for the GTV. Target and Method: Each scenario treatment plan was created by making the frequency of non-coplanar beams different among all beams. The set-up error value was measured by using the Exact System and the dose accuracy was evaluated by creating a re-treatment plan. Results: When the couch was rotated by 30°, 45°, 60°, and 90°, the mean of the X-axis values was measured to be 0.29 mm, 0.26 mm, 0.51 mm, and 0.08 mm, respectively. The mean of the Y-axis values was measured to be 0.75 mm, 0.5mm, 0.35 mm, and 0.29 mm, respectively. The mean of the Z-axis values was measured to be 0.5 mm, 0.28 mm, 0.22 mm, and 0.1 mm, respectively. There were dose reductions of 0.1%, 3.1%, 1.9% in D99 for 1-NC VMAT, 2-NC VMAT, and 3-NC VMAT, respectively. Conclusion: When treating with 50% or more of non-coplanar beams among total beams, image verification is required. And it is considered to make the treatment plan by adding a 1.5 mm margin to the GTV.

A Template Based Process Modeling Methodology for Control Simulation (제어 시뮬레이션을 위한 템플릿기반 공정 모델링 방법론)

  • Shin, Hye-Seon;Ko, Min-Suk;Hong, Sang-Hyun;Park, Sang-Chul;Wang, Gi-Nam
    • Korean Journal of Computational Design and Engineering
    • /
    • v.16 no.5
    • /
    • pp.351-360
    • /
    • 2011
  • Product systems are quickly and frequently changed because Product Life Cycle is continuously reduced and adopting new product is steadily fast. Thus, various studies are progressed using simulation which is one of digital manufacturing. The research that is concerning simulation of control verification for shorten the commissioning which has a lot of trial and error is in progress. Also, simulation of control verification has strength that it can catch the errors in advance. However, a control program in simulation needs virtual factory for representation of control information. For this reason, excessive time and energy is put into controlling the virtual factory. So, in this paper, we construct library which is using exist data, in order to overcome limitation of these problems. Furthermore, we suggest methodology which can model and verify the process more speedy using library. Especially, we give body to the BB/BR Line process which has many altering equipment and need high technology effectively using physical and logical modeling. We can set up a control simulation environment very rapidly, as well as cut process time down using our suggestion.

The Method of Verification for Legal Admissibility of Digital Evidence using the Digital Forensics Ontology (디지털 포렌식 온톨로지를 이용한 디지털 증거의 증거능력에 대한 검증 방법)

  • Cho, Hyuk-Gyu;Park, Heum;Kwon, Hyuk-Chul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.265-272
    • /
    • 2009
  • Although the various crime involved numerous digital evidence, the digital evidence is hard to be acknowledged as a evidence to proof the crime fact in court. We propose the method of verification for the legal admissibility of digital evidence using digital forensics ontology. In order to verify the legal admissibility of digital evidence, we will extend the digital ontology by standard digital forensics process from Digital Forensics Technical Manual defined by KNPA and set up the relation properties and the rule of property constraint to process class in the digital forensics ontology. It is possible for proposed ontology to utilize to plan the criminal investigation and to educate the digital forensics.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

A Study of Usability Analysis on 'Low-Budget' Mobile Game Development (저비용 모바일 게임 개발사례 분석을 통한 사용성 연구)

  • Ahn, Duck-ki;Kim, Suk-rae
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.355-363
    • /
    • 2019
  • This study is an analytical case study focusing on 'low-budget' mobile game development centered on both short-term development and small-scale collaboration. This study set up the assumption of four months as development period limited by three developers along with step by step productional documentation. In the previous study, we set up the responsibilities of the development personnels to analyze the effective process of the practical production. Furthermore, the study analyzed the usability verification of both advantages and disadvantages for conducting the quantitative survey with developer's feedbacks. The study is to provide the essential guideline for 'low-budget' development group with effective pipeline.

Reliability Verification of Evidence Analysis Tools for Digital Forensics (디지털 포렌식을 위한 증거 분석 도구의 신뢰성 검증)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.165-176
    • /
    • 2011
  • In this paper, we examine the reliability verification procedure of evidence analysis tools for computer forensics and test the famous tools for their functional requirements using the verification items proposed by standard document, TIAK.KO-12.0112. Also, we carry out performance evaluation based on test results and suggest the way of performance improvement for evidence analysis tools. To achieve this, we first investigate functions that test subjects can perform, and then we set up a specific test plan and create evidence image files which contain the contents of a verification items. We finally verify and analyze the test results. In this process, we can discover some weaknesses of most of analysis tools, such as the restoration for deleted & fragmented files, the identification of the file format which is widely used in the country and the processing of the strings composed of Korean alphabet.

Factors to Influence Customer Satisfaction and Future Behavior Intention for LOHAS Exhibition (로하스박람회의 고객만족과 미래행동의도에 미치는 영향요인)

  • Ra, Jeung-Im;Kim, Hyoung-Gil;Yang, Sung-Soo
    • Journal of Distribution Science
    • /
    • v.14 no.9
    • /
    • pp.133-147
    • /
    • 2016
  • Purpose - The Purpose of this study is to observe the value of LOHAS as an exhibition that is perceived to be a specialized local exhibition with good fame and differentiated advantage as well as the spectators' will to visit the exhibition coming from the future behavior intention of visitors. Research design, data, and methodology - In order to achieve the purpose of this study, This study organized questionnaire after setting a hypothesis based on the theoretical background from the parameters. verification of the hypothesis by statistically analyzing the answers for questionnaire follows. Finally, the implication of this study is drawn through comprehensive discussion while This study indicated from the limits of the study and future direction for research. This study set up a model to research the influence on the structuring factors in LOHAS exhibition in forming perceived value, customer satisfaction and future behavior intention. Frequency analysis was used for getting demographic characteristics, verification of plausibility, reliability of measured parameters and factors analysis. This study have performed verification of difference at selection property level based on multiple regression analysis and demographic nature. Results - To summarize the study result, through the verification of hypothesis about meaningful influence among structuring factors in LOHAS exhibition, perceived value and customer satisfaction shows some noticeable points to focus on. That is, it is established things that partial adoption and meaning relationship of partial influence. The perceived value affected both customer satisfaction and future behavior intention meaningfully. Conclusions - This study could note that in the structuring factors of LOHAS exhibition, perceived value for visitors and customer satisfaction play their roles positively on the future behavior intention. In conclusion, this study implies that strategic measures are necessary to fulfill the structuring factors of LOHAS exhibition as they would make positive impact on acknowledged value, customer satisfaction and future behavior intention to contribute to the growth and development of LOHAS exhibition. Also it suggests that the method to join each other with activities is necessary to strengthen the properties of the exhibition and position well to be a solid local exhibition.

Location Error of the Dens in a Two-Dimensional Set-up Verification During Head and Neck Radiotherapy (뇌.두경부 방사선치료 시 전자조사문영상장치를 이용한 세트업 오차 확인에서 제2경추 치상돌기 위치의 임상적 의의)

  • Kim, Dong-Hyun;Kim, Won-Taek;Ki, Yong-Gan;Nam, Ji-Ho;Lee, Mi-Ran;Jeon, Ho-Sang;Park, Dal;Kim, Dong-Won
    • Radiation Oncology Journal
    • /
    • v.29 no.2
    • /
    • pp.107-114
    • /
    • 2011
  • Purpose: To assess the degree and clinical impact of location error of the dens on the X-axis during radiotherapy to brain and head and neck tumors. Materials and Methods: Twenty-one patients with brain tumors or head and neck tumors who received three-dimensional conformal radiation therapy or intensity-modulated radiation therapy from January 2009 to June 2010 were included in this study. In comparison two-dimensional verification portal images with initial simulation images, location error of the nasal septum and the dens on the X-axis was measured. The effect of set-up errors of the dens was simulated in the planning system and analyzed with physical dose parameters. Results: A total of 402 portal images were reviewed. The mean location error at the nasal septum was 0.16 mm and at the dens was 0.33 mm (absolute value). Location errors of more than 3 mm were recorded in 43 cases (10.7%) at the nasal septum, compared to 133 cases (33.1%) at the dens. There was no case with a location error more than 5 mm at the nasal septum, compared to 11 cases (2.7%) at the dens. In a dosimetric simulation, a location error more than 5 mm at the dens could induce a reduction in the clinical target volume 1 coverage (V95: 100%${\rightarrow}$87.2%) and overdosing to a critical normal organ (Spinal cord V45: <0.1%${\rightarrow}$12.6%). Conclusion: In both brain and head and neck radiotherapy, a relatively larger set-up error was detected at the dens than the nasal septum when using an electronic portal imaging device. Consideration of the location error of the dens is necessary at the time of the precise radiation beam delivery in two-dimensional verification systems.

Experimental Verification of DC/DC Converter Power Loss Model in Severe Temperature Condition (가혹온도조건에서 DC/DC 변환기 전력손실모델의 실험적 검증)

  • Noh, Myounggyu;Kim, Sunyoung;Park, Young-Woo;Jung, Doo-Hwan
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.32 no.5
    • /
    • pp.455-461
    • /
    • 2015
  • This paper deals with an experimental verification of a temperature-dependent power loss model of a DC/DC converter in severe temperature conditions. The power loss of a DC/DC converter is obtained by summing the losses by the components constituting the converter including switching elements, diodes, inductors, and capacitors. MIL-STD-810F stipulates that any electronic devices must be operable in the temperature ranging from $-50^{\circ}C$ to $70^{\circ}C$. We summarized the temperature-dependent loss models for the converter components. A SEPIC-type converter is designed and built as a target. Using a constant-temperature chamber, a test rig is set up to measure the power loss of the converter. The experimental results confirm the validity of the loss model within 4.5% error. The model can be useful to predict the efficiency of the converter at the operating temperature, and to provide guidelines in order to improve the efficiency.