• Title/Summary/Keyword: Critical infrastructures

Search Result 112, Processing Time 0.028 seconds

Effect of higher order terms of Maclaurin expansion in nonlinear analysis of the Bernoulli beam by single finite element

  • Zahrai, Seyed Mehdi;Mortezagholi, Mohamad Hosein;Mirsalehi, Maryam
    • Structural Engineering and Mechanics
    • /
    • v.58 no.6
    • /
    • pp.949-966
    • /
    • 2016
  • The second order analysis taking place due to non-linear behavior of the structures under the mechanical and geometric factors through implementing exact and approximate methods is an indispensible issue in the analysis of such structures. Among the exact methods is the slope-deflection method that due to its simplicity and efficiency of its relationships has always been in consideration. By solving the differential equations of the modified slope-deflection method in which the effect of axial compressive force is considered, the stiffness matrix including trigonometric entries would be obtained. The complexity of computations with trigonometric functions causes replacement with their Maclaurin expansion. In most cases only the first two terms of this expansion are used but to obtain more accurate results, more elements are needed. In this paper, the effect of utilizing higher order terms of Maclaurin expansion on reducing the number of required elements and attaining more rapid convergence with less error is investigated for the Bernoulli beam with various boundary conditions. The results indicate that when using only one element along the beam length, utilizing higher order terms in Maclaurin expansion would reduce the relative error in determining the critical buckling load and kinematic parameters in the second order analysis.

Securing the IoT Frontier: Exploring the Limitation and Future Directions in Cybersecurity

  • Moustafa Abdelrahman Mahmoud Ahmed;Nur Arzilawati Md Yunus
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-9
    • /
    • 2024
  • As the Internet of Things (IoT) continues to permeate every facet of modern life, the imperative to secure this vast and dynamic frontier becomes increasingly paramount. This presents a comprehensive exploration of the challenges and opportunities inherent in safeguarding the interconnected web of IoT devices. The research critically examines the limitations of current cybersecurity measures through an extensive review of diverse topics, including IoT network performance, smart grid security, and the escalating cyber threats against critical infrastructures. A meticulous analysis of research findings underscores the need for enhanced infrastructure and ongoing research to fortify the cybersecurity mechanisms surrounding IoT objects. We underline the imperative of relentless research efforts to parry the advancing threats and leverage the promise of nascent technologies. Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. The paper underscores the importance of ongoing research to address evolving threats and harness the potential of emerging technologies, reaffirming the central role of cybersecurity in shaping a secure interconnected world. In conclusion, the study emphasizes the dynamic and ever-evolving nature of cybersecurity on the IoT frontier. It unveils a complex landscape of challenges, ranging from network performance intricacies to the security concerns of critical infrastructures.

SOC Investment Promotion Strategy for Strengthening Global Competitiveness (국가경쟁력 강화를 위한 SOC 투자 전략)

  • Lee, Sun
    • Journal of the Korean Professional Engineers Association
    • /
    • v.45 no.5
    • /
    • pp.26-35
    • /
    • 2012
  • Korea is now the 12th largest economy in the world, surpassing its annual trade in the amount of $1 trillion, and it has joined the socalled 20-50 Club, becoming one of the seven countries in the world with capita income of more than $20,000 with population of 50 million. However it ranked 24th of the Global competitiveness index evaluated by World Economic Forum based on the basic requirements including infrastructures, efficiency enhances, innovation and sophistication factors, etc. The extensive and efficient SOC infrastructures are critical for ensuring the global competitiveness of each country. Effective modes of SOC facilities including quality roads, railroads, ports, air transport, etc will be able to reduce the annual traffic congestion cost as well as macro economic logistics costs in Korea, thereby the global competitiveness can be strengthened in the global market.

  • PDF

A Study on a Model of University Information Systems for e-Business Era (e-비즈니스 시대의 대학정보시스템 구축 모델에 관한 연구: K 대학교 사례를 중심으로)

  • Kwon Moon Taek
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.133-145
    • /
    • 2004
  • The two main purposes of this paper are to 1) investigate critical components of university information systems for information resources management, 2) develop a comprehensive framework model of university information systems for e-Business Era. Through a literature review and by employing group decision making techniques with managers of K University, critical components for developing university information systems were identified. The critical components of university information systems are 1) academic affaires. 2) general administration. (3) research administration. (4) information services. (5) management support, (6) cyber education. (7) knowledge management, (8) e-library. (9) mobile service. and (10) IT infrastructures. In the second stage. by employing IT experts in K University and other institutes. a comprehensive framework of university information systems for e-Business era was developed. The comprehensive framework shows that major components for university information resources management are (1) information infrastructure. (2) common operating environments. (3) applications/information services. The results of this study expect to help managers. who are in charge of university information systems. plan to develop information systems based on the framework proposed in this paper.

  • PDF

Specialized Sensors and System Modeling for Safety-critical Application

  • Jeong, Taikyeong Ted
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.3
    • /
    • pp.950-956
    • /
    • 2014
  • Special purpose sensor design using MEMS (Micro-Electro-Mechanical Systems) technique is commonly used in Nondestructive Testing (NDT) research for the evaluation of existing structures and for the safety control and requirements. Various sensors and network have been developed for general infrastructures as well as safety-critical applications, e.g., aerospace, defense, and nuclear system, etc. In this paper, one of sensor technique using Fiber Bragg Gratings (FBG) and Finite Element Method (FEM) evaluation is discussed. The experimental setup and data collection technique is also demonstrated. The factors influencing test result and the advantages/limitations of this technique are also reviewed using various methods.

Risk Analysis using Failure Data in Railway E&M System

  • Lee, Chang-Hwan;Song, Mi-Ok;Lim, Sung-Soo
    • International Journal of Railway
    • /
    • v.3 no.1
    • /
    • pp.34-37
    • /
    • 2010
  • In recent, the railway system consists of subsystems as rolling stock and infrastructures as signaling, telecommunication, power supply, overhead contact and platform screen door, etc. Furthermore, each subsystem has complicated interface so as not to understand these relationship. Consequently, to operate the railway system continuously with required safety and availability, the failure data should be corrected and analyzed systematically during operation. To achieve this object effectively, this paper presents the method which is evaluating the operational risk quantitatively using failure data, and selecting the critical equipment. Following this analysis, the improvement plan is established and applied to reduce the operational risk on system or equipment. From this study, the critical equipments of system could be determined and prioritized by risk analysis. Also, the effective maintenance to prevent critical failure could be implanted by this suggested methodology.

  • PDF

Security Issues in SCADA Network (SCADA 네트워크 보안 이슈)

  • Kim, Hak-Man;Kang, Dong-Joo
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.46-47
    • /
    • 2007
  • SCADA (Supervisory Control and Data Acquisition) system has been used fur remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks. SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism. Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, we introduce recent security issue of SCADA network and propose the application of encryption method to Korea SCADA network.

  • PDF

Necessity of Construction Using Designed Structure (설계된 구조물을 사용한 건설의 필요성)

  • 김덕현;한봉구
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2002.10a
    • /
    • pp.428-434
    • /
    • 2002
  • Almost all buildings/infrastructures made of composite materials are fabricated without proper design. Unlike airplane or automobile parts, prototype test is impossible. One cannot destroy 10 story buildings or 100 meter-long bridges. In order to realize “composites in construction”, the following subjects must be studied in detail, for his design: Concept optimization, Simple method of analysis, Folded plate theory, Size effects in failure, and Critical frequency Unlike the design procedures with conventional materials, his design should include material design, selection of manufacturing method, and quality control methods, in addition to the fabrication method.

  • PDF

Security Technology for SCADA Communication Data (SCADA 통신 데이터 보호 기술)

  • Kim, Hak-Man
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.217-219
    • /
    • 2008
  • SCADA(Supervisory Control and Data Acquisition) is popular control and monitor areas not only in critical infrastructures such as electric power, gas, oil but also industrial applications. Increasement of cyber attack technique and frequency threats secure operation of SCADA systems. Recently many researches have been studied for protecting SCADA system against cyber attacks. This paper introduces overall security technologies in SCADA systems.

  • PDF

Evaluation of Logistics Infrastructure of Container Terminals in Northern Vietnam

  • Nguyen, Minh Duc;Kim, Sung-June;Jeong, Jung Sik
    • Journal of Navigation and Port Research
    • /
    • v.40 no.5
    • /
    • pp.305-310
    • /
    • 2016
  • The sea-port in Northern Vietnam accounts for around one third of the total country's cargo throughput and for many decades has been playing an important role in the logistics system of the country. 11 container terminals currently operate in Northern Vietnam, concentrating in Haiphong city and Quang Ninh province. Despite the increasing demand, the competition among these container terminals has become increasingly more critical. In recent years, massive investments from both government and operators have been made to improve the capability of the local sea-port's logistics infrastructure. This critically needed comprehensive research evaluates the impact of the current logistics infrastructure condition on the competitiveness of terminals and quantitatively compares the competencies of these terminals. In order to meet such requirements, the paper first summarizes the indicators of the logistics infrastructures of the sea ports before developing and testing hypotheses to reveal the correlation between the given factors and the annual throughput of container terminals in the region. Factor analysis will then be applied to score the logistics infrastructure competency of each container terminal. A significant gap between logistics infrastructures among all container terminals was not observed and the competitiveness between container terminals is mostly driven by traditional activities including cargo handling and storage. According to the results, strategic thinking will be needed to contribute to related organizations for better decisions in investment, management, and operation.