• Title/Summary/Keyword: 안전-필수 소프트웨어

Search Result 113, Processing Time 0.027 seconds

Current Status and Prospect of Techniques for Identification of Sabotage Targets (에너지 시스템의 사보타지 표적 인식 기법의 현황 및 전망)

  • Kim, Seong-Ho;Choi, Y.;Jung, W.S.;Kim, K.Y.;Yang, J.E.
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2007.11a
    • /
    • pp.288-293
    • /
    • 2007
  • 미국 911 테러 발생 이후로, 국가 기반시설(예: 송/배전 전력망, 석유/가스 파이프라인, 원자력 발전소, 정보통신 시설, 교통 시설, 금융 시설, 매스미디어 시설 등)에 대한 테러리스트의 사보타지 리스크를 관리하는 도전문제에 정부 차원이나, 기업 차원에서 국내외적으로 뜨거운 이목이 집중되고 있다. 그 가운데 에너지 시스템, 특히 원자력 발전소의 물리적 보안은 국가 안보 차원에서 매우 중대한 이슈가 되고 있다. 이는 사보타지로 인한 이러한 시스템의 파손이 국민, 작업자, 또는 외부 환경에 방사성물질 누출과 같은 중대한 결말을 초래할 수 있기 때문이다. 원전과 같은 복잡 시스템에서 설계 기준 위협이 초래할 수 있는 이러한 결말은 그 시스템의 특정 핵심 표적(예: 부품, 구역, 자산, 행위, 인원)의 방호를 통해 효과적으로 방어될 수 있다. 다시 말하면, 표적 인식에서는 어떻게 방어할 것인가에 앞서서 무엇을 방어할 것인가를 다루려는 것이다. 이 연구의 주요 목적은 여태까지 개발된 다양한 표적 인식 기법의 개발 추세를 소개하고 향후 전망을 제시하는 데에 있다. 이를 통해 표적 인식 기법의 수월성, 신뢰성, 및 경제성을 제고할 수 있으리라 본다. 표적 인식 기술의 활용성 측면에서 볼 때, 표적 인식은 하드웨어 적이거나 소프트웨어적인 방호 시스템의 설계에 필수적이므로, 신뢰성 높은 표적 인식은 다음과 같은 긍정적인 파급 효과를 줄일 수 있다: 1) 사보타지 리스크 감소에 직간접적으로 기여할 수 있다; 2) 제한적인 보안 재원을 효율적으로 할당할 수 있다; 3) 보안 대응군대의 훈련 시나리오를 개발할 수 있다; 4) 발전소 규제요건인 안전조치 계획을 비용이나 보안 측면에서 향상시켜 국민 안심(public easiness)을 도모할 수 있다. 향후에는 보다 더 광의적인 복잡 시스템 사이에서 상호 연계적인 사보타지에 대한 표적 인식의 기법들이 점검될 필요성이 있다고 본다.

  • PDF

Design and Implementation of an Around-View Monitoring system of Smart User Interface based on Windows O/S (Windows 운영체제 기반 어라운드 뷰 모니터링 시스템의 스마트 사용자 인터페이스 설계 및 구현)

  • Cheon, Seung-hwan;Jang, Si-woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.427-430
    • /
    • 2012
  • 최근 차량용 블랙박스, 자동 운전 시스템, 어라운드 뷰 시스템 등과 같은 운전자의 편의와 안전을 위한 장치 및 시스템들이 개발되고 있다. 현재 운전자를 위한 보조 시스템으로 구글(google)의 자동 운전 시스템(Auto Car Driving System)과 현대 모비스(hyundai mobis)의 AVM 시스템(Around View Monitoring System) 등의 다양한 차량용 편의장치 시스템들이 등장했다. 위와 같은 다양한 ECU들을 관리하기 위한 서버 및 저장 장치 역할을 할 수 있는 고사양의 Car PC의 장착이 필수적이다. 기존의 AVM 시스템은 차량 주변을 실시간으로 제공하기 위해 임베디드 또는 별도의 차량용 네트워크를 통해 임베디드 시스템 또는 SoC(System On Chip)형태의 하드웨어 기반으로 개발되고 있다. 하지만 고사양의 Car PC 기반에서는 별도의 비용없이 소프트웨어로 구현이 가능하다. 본 논문에서는 차량의 전 후 좌 우에 장착된 4대의 카메라로부터 입력된 차량 주변 상황을 한눈에 보여주는 AVM 시스템(Around-View Monitoring System)을 위한 카메라 보정 및 정합 처리 모듈 및 AVM 시스템을 Windows를 O/S로 하는 PC 내부에서 기존의 AVM 시스템을 이용하여 화면에 전 후 좌 우 버튼을 각각 만들어 버튼을 터치했을 때, 각 버튼에 해당되는 영상이 AVM 시스템과 함께 출력되도록 하거나 디스플레이에 Full 버전으로 출력되도록 S-UI(Smart User Interface)를 설계 및 구현한다. 제안하는 AVM 시스템과 기존의 AVM 시스템의 성능과 기능을 비교 분석함으로써 제안하는 영상 처리 모듈을 이용하여 추가 비용이 발생하지 않는 AVM 시스템의 구현 가능성을 검증한다.

  • PDF

Analysis of Performance Influencing Factor in Chemical Process Industry : A Practical Application (석유화학 산업에서의 수행영향인자 및 근본원인 분석 결과)

  • Yu, Kwang-Soo;Kim, Eun-Jung;Kim, Yong-Soo
    • Journal of the Korean Institute of Gas
    • /
    • v.11 no.2 s.35
    • /
    • pp.60-64
    • /
    • 2007
  • Chemical Process industry in Korea has over 30 year's of history and is likely to face potential incidents. The traditional risk analysis and control system in Chemical Process industry focuses on mechanical defects, overlooking the human performance control. Although development of automation technology and controlling technology was necessary, human decision factor is essential to preventing accidents in the Chemical Process. Almost all serious accidents take place when inappropriate humanperformance and mechanical defects of safety equipments simultaneously occurs. The AHRA(Advanced Human Reliability Analyzer) software has been developed to collect failure data and analyze human error probability (Reliability) in Chemical Process Industry in Korea. This paper describes the HRA analysis result of PIF(Performance Influencing Factor) evaluation, HEP(Human Error Probability) and root cause of accidents by applying a Chemical Process Industry related accident data. This analysis result should present a scheme that, by controlling human error factor other than putting safety management funds into the machinery in plants, can reduce cost and maximize the safety in Chemical Process Industry.

  • PDF

Design and Implementation of Vehicle Control Network Using WiFi Network System (WiFi 네트워크 시스템을 활용한 차량 관제용 네트워크의 설계 및 구현)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.632-637
    • /
    • 2019
  • Recent researches on autonomous driving of vehicles are becoming very active, and it is a trend to assist safe driving and improve driver's convenience. Autonomous vehicles are required to combine artificial intelligence, image recognition capability, and Internet communication between objects. Because mobile telecommunication networks have limitations in their processing, they can be easily implemented and scale using an easily expandable Wi-Fi network. We propose a wireless design method to construct such a vehicle control network. We propose the arrangement of AP and the software configuration method to minimize loss of data transmission / reception of mobile terminal. Through the design of the proposed network system, the communication performance of the moving vehicle can be dramatically increased. We also verify the packet structure of GPS, video, voice, and data communication that can be used for the vehicle through experiments on the movement of various terminal devices. This wireless design technology can be extended to various general purpose wireless networks such as 2.4GHz, 5GHz and 10GHz Wi-Fi. It is also possible to link wireless intelligent road network with autonomous driving.

H-DsM: Distributed Simulation Middleware with HILS for Hybrid System Verification (H-DsM: 하이브리드 시스템 검증을 위한 HILS 지원 분산 시뮬레이션 미들웨어)

  • Lee, Seung-Gi;Yun, Seong-jin;Kim, Han-jin;Kim, Won-Tae
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1073-1078
    • /
    • 2018
  • As interest in the 4th Industrial Revolution increases, the CPS, in which things existing in the reality and things existing in the virtual interact with each other, is attracting attention as an important technology. Complex systems such as electric vehicles, autonomous driving, smart factories, and smart grid system are considered as core technology fields of the 4th Industrial Revolution, and many types of research have been conducted to develop it. The reliability of the system is directly related to the safety of people in case of the autonomous driving, and verification of the actual vehicle's hardware and software of ADAS is essential. In this paper, we proposed distributed simulation middleware supporting HILS for reliable verification of the complex hybrid systems.

Performance Analysis and Comparison of Stream Ciphers for Secure Sensor Networks (안전한 센서 네트워크를 위한 스트림 암호의 성능 비교 분석)

  • Yun, Min;Na, Hyoung-Jun;Lee, Mun-Kyu;Park, Kun-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.3-16
    • /
    • 2008
  • A Wireless Sensor Network (WSN for short) is a wireless network consisting of distributed small devices which are called sensor nodes or motes. Recently, there has been an extensive research on WSN and also on its security. For secure storage and secure transmission of the sensed information, sensor nodes should be equipped with cryptographic algorithms. Moreover, these algorithms should be efficiently implemented since sensor nodes are highly resource-constrained devices. There are already some existing algorithms applicable to sensor nodes, including public key ciphers such as TinyECC and standard block ciphers such as AES. Stream ciphers, however, are still to be analyzed, since they were only recently standardized in the eSTREAM project. In this paper, we implement over the MicaZ platform nine software-based stream ciphers out of the ten in the second and final phases of the eSTREAM project, and we evaluate their performance. Especially, we apply several optimization techniques to six ciphers including SOSEMANUK, Salsa20 and Rabbit, which have survived after the final phase of the eSTREAM project. We also present the implementation results of hardware-oriented stream ciphers and AES-CFB fur reference. According to our experiment, the encryption speeds of these software-based stream ciphers are in the range of 31-406Kbps, thus most of these ciphers are fairly acceptable fur sensor nodes. In particular, the survivors, SOSEMANUK, Salsa20 and Rabbit, show the throughputs of 406Kbps, 176Kbps and 121Kbps using 70KB, 14KB and 22KB of ROM and 2811B, 799B and 755B of RAM, respectively. From the viewpoint of encryption speed, the performances of these ciphers are much better than that of the software-based AES, which shows the speed of 106Kbps.

Implementation of Rule Management System for Validating Spatial Object Integrity (공간 객체 무결성 검증을 위한 규칙 관리 시스템의 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1393-1403
    • /
    • 1999
  • 공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.

Redesign Application Architecture for Advanced Volcanic Disaster Response System (화산재해대응시스템 고도화를 위한 응용아키텍처 재설계)

  • Youn, Junhee;Kim, Tae-Hoon;Kim, Dusik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.90-95
    • /
    • 2018
  • The Korean Peninsula is no longer safe from volcanic disasters. Therefore, the Korean government has been developing a spatial information-based system implementation technology since 2014. VDRS (Volcanic Disaster Response System), which is the result of the technology, was implemented in 2016 as Phase I. Since then, phase II implementation technology has been developed for an advanced system reflecting the user's requirements. To advance the system, redesign architecture is essential. This paper examined the redesign application architecture for an advanced VDRS. First, existing application architecture, which was implemented in phase I, was analyzed. Second, the user's requirements for advanced VDRS were analyzed. The analyzed user's requirements were categorized as a transforming service oriented to a business-oriented architecture, improving accuracy, and expanding the spatial range and target disaster. Third, application architecture was redesigned based on gap analysis between the existing architecture and user's requirements. The results of the proposed redesign architecture are presented as the application system structure and description of the application function based on owner's point of view in the enterprise architecture. The results of this paper can be used to derive the application module design and provide a detailed description of the application module based on the designer's point of view. Further research focused on structuring the HW/SW architecture will be required for system implementation.

Internal Dose Assessment of Worker by Radioactive Aerosol Generated During Mechanical Cutting of Radioactive Concrete (원전 방사성 콘크리트 기계적 절단의 방사성 에어로졸에 대한 작업자 내부피폭선량 평가)

  • Park, Jihye;Yang, Wonseok;Chae, Nakkyu;Lee, Minho;Choi, Sungyeol
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.18 no.2
    • /
    • pp.157-167
    • /
    • 2020
  • Removing radioactive concrete is crucial in the decommissioning of nuclear power plants. However, this process generates radioactive aerosols, exposing workers to radiation. Although large amounts of radioactive concrete are generated during decommissioning, studies on the internal exposure of workers to radioactive aerosols generated from the cutting of radioactive concrete are very limited. In this study, therefore, we calculate the internal radiation doses of workers exposed to radioactive aerosols during activities such as drilling and cutting of radioactive concrete, using previous research data. The electrical-mobility-equivalent diameter measured in a previous study was converted to aerodynamic diameter using the Newton-Raphson method. Furthermore, the specific activity of each nuclide in radioactive concrete 10 years after nuclear power plants are shut down was calculated using the ORIGEN code. Eventually, we calculated the committed effective dose for each nuclide using the IMBA software. The maximum effective dose of 152Eu constituted 83.09% of the total dose; moreover, the five highest-ranked elements (152Eu, 154Eu, 60Co, 239Pu, 55Fe) constituted 99.63%. Therefore, we postulate that these major elements could be measured first for rapid radiation exposure management of workers involved in decommissioning of nuclear power plants, even if all radioactive elements in concrete are not considered.

Implementation and Design of motorcar consumption management iOS based software with OBD-II and WiFi network (OBD-II WiFi를 이용한 iOS 기반의 자동차 소모품관리 소프트웨어 설계 및 구현)

  • Jeong, Da-Woon;Nam, Jae-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.475-478
    • /
    • 2011
  • driver for safety always check the status of their vehicle, and it is essential to understand. But if you want to know the status of the driver of the vehicle in specialist referral time and money because it costs the operator shall be paid. Today's rapidly changing IT technology with the development of the various features of your phone to check the status of the vehicle was able to do. However, the car's existing phone system, car diagnostic expertise must be learned because it will reveal the status of the vehicle do not have the expertise to not highlight the need for diagnostic. To reflect these points in smartphone users to easily use their own vehicles at a time to determine the status of a system that is required. In this paper, OBD-II protocol conversion WiFi OBD-II connector, retrieving information from the driver of the vehicle replacement cycle of consumables required vehicle inspection, vehicle problems in real-time diagnostic information to the user ease of use shows the IOS implementation in the automotive supply was implemented based on the smartphone.

  • PDF