• Title/Summary/Keyword: Cyber Operation

Search Result 261, Processing Time 0.026 seconds

A Study of the Rejolbae for Speed Detection and Low Speed Operation (속도검출과 극저속 운전을 위한 레졸바에 대한 연구)

  • Kim, Young-Chun;Cho, Moon-Taek;Song, Ho-Bin;Joo, Hae-Jong;Lee, Euy-Soo;Choi, Hae-Gil
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.343-346
    • /
    • 2011
  • 레졸바는 앤코더에 비하여 가격 면에서 유리하지는 않지만 절대위치를 검지해야 하는 경우와 기계적으로 견고해야 하는 장소에서 정교한 제어용으로 사용되고 있다. 레졸바에 의한 위치와 속도검출 방법은 일반적으로 관측기를 응용하고 있으며, 아날로그 신호를 처리해야 하는 부분을 갖고 있다. 본 논문에서는 레졸바의 출력신호를 위치정보인 코사인과 사인파형으로 복조하고 복조된 아날로그 신호를 제어기에 전송하는 방법을 사용하였다. 또한, 제어기의 프로그램에 추정기를 설계하고 극저속에서 그 동작을 관찰하였다.

  • PDF

A Study on MailStation using Web (웹기반에서 전자우편 활성화 방안에 관한 연구)

  • 한광덕
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.86-90
    • /
    • 1998
  • MailStation is designed for beginners who do not have any idea of POP3 server, SMTP server or mail server They don't need to understand those words or the program operation in order to be able to use MailStation. Anyone can send or receive e-mails without any additional setup if he/she has a line that is connected to the Internet. We will make cyber communications possible over difference of languages, locations, and times.

  • PDF

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

A Study on Process Improvement of the Ready-Mixed Concrete Truck's Transportation Using GPS (프로세스 재정립을 통한 레미콘 운송 효율화에 대한 사례연구)

  • Lee, Won-Dong;Lee, Young-Hoon
    • IE interfaces
    • /
    • v.16 no.1
    • /
    • pp.44-53
    • /
    • 2003
  • Ready-Mixed Concrete transportation business has been managed by the manual operation and intuitive decision making. This study is on the process improvement on ordering process, and allocation/transportation of trucks commuting between the batching plant and construction sites. Processes of order collection, job dispatch and allocation, and on-time-delivery are analysed and improved. The logistics control system, with GPS system, was developed and implemented based on the reconstructed processes. Performances are evaluated after improved business process and logistics system was applied, and it is shown that waiting time loss is decreased by 55%, and that efficiency is increased by 15%.

A Study on the Development and Operation of Integrated Assessment System for National Competency Standard Professional Basic

  • Chang, Young-Hyun
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.121-127
    • /
    • 2018
  • This paper develops and builds an Integrated Assessment System for National Competency Standard Professional Basic. The integrated evaluation system for basic job competency in the National Competency Standards is developed to conduct examination by means of computers, smartphones and tablet PCs. The system can be used for the basic job competency test, examination for online cyber universities, job competency examination for enterprises, and the listening, reading, and speaking test in the foreign language proficiency examination and is even better in terms of facility investment and saved operating costs as well as efficient use of spaces in comparison with conventional evaluation schemes. Even greater synergy effects can be achieved by providing support for the integrated evaluation system for basic job competency in connection with the NCS qualification system. The evaluation system has been tested and practiced at a specialized high school and can be applied to the NCS education evaluation of the college and four-year college and to the selection examination of new employees of the company.

Analysis of Questionary Survey Research on the Intensive Major Course in the KNAC (전공심화과정 개설을 위한 설문조사연구)

  • Kang, Y.K.;Hong, K.H.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.10 no.1
    • /
    • pp.137-151
    • /
    • 2008
  • This research was conducted to suggest a policy plan for intensive major course in recurrent education system of KNAC. A survey was answered by students, graduates, field professors and (full-time) professors. The results are summarized as follows; 1. In the item of educational operation system, there were some differences in preference among 4 examinee groups. Students preferred 'semester system', graduates and field professors did 'once per week system', and professors 'cyber+centralized training system'. 2. As entering time, students and graduates preferred 'immediately after graduation'. However, field and full-time professors preferred '1 to 3 years after graduation' that became reality. 3. As board and lodging, all examinee groups wanted 'dormitory in college'. Students and graduates were open to pay educational expenses as a level of national colleges. 4. As a curriculum, the most preferred subject by all groups was 'major field technique', which was followed by 'marketing/sale' and 'farm management' in the order of preference.

Dynamical Nuclear Waste Assessment Using the Information Feedback Oriented Algorithm Applicable to the Internet of Things(IoT) (사물 인터넷 (IoT)에 적용할 수 있는 정보 피드백 지향 알고리즘을 사용한 동적 핵폐기물 평가)

  • Woo, Tae-Ho;Jang, Kyung-Bae
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.1-8
    • /
    • 2020
  • Following the advanced fuel cycle initiative (AFCI) promotions in the United States, the analytic proposition for global fuel cycle initiative (GFCI) has been investigated using dynamical simulations. The political and economic aspects are considered simultaneously due to the particular characteristics of the nuclear materials. The spent nuclear fuels (SNFs) are treated as the reprocessing by the nuclear non-proliferation treaty (NPT) exemption nations and the NPT excluded nations. Otherwise, the pyroprocessing and repository can be done without NPT restriction. In addition, the international trade is considered as the economic aspect where the energy production is a key issue of the GFCI. The dynamical simulations have been done until 2050. The result of the International Trade shows the gradually increasing shape. Additionally, the Nuclear Power Plant Operation shows the increasing by stepwise shape.

Enhancing on Security Monitoring & Control Redundancy Facilities Config uration & Operation in the COVDI-19 Pandemic Environment (코로나19 환경에서 무중단 보안관제센터 구성 및 운영 강화 연구)

  • Kang, Dongyoon;Lee, Jeawoo;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.25-31
    • /
    • 2021
  • The purpose of this study was to keep the Security Control Center, which operates under a shift system, uninterrupted during the COVID-19 virus epidemic. Security facilities responding to cybersecurity threats are essential security facilities that must be operated 24 hours a day, 365 days a day in real time, and are critical to security operations and management. If security facilities such as infectious disease epidemic, system failure, and physical impact are closed or affected, they cannot respond to real-time cyberattacks and can be fatal to security issues. Recently, there have been cases in which security system facilities cannot be operated, such as the closure of facilities due to the COVID-19 virus epidemic and the availability of security systems due to the rainy season, and other cases need to be prepared. In this paper, we propose a plan to configure a security system facility as a multiplexing facility and operate it as an alternative in the event of a closed situation.

Cyber-Physical System for Energy Management (에너지 관리를 위한 가상-물리 시스템)

  • Oh, Se-Range;Bae, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.279-286
    • /
    • 2021
  • Recently, the effort of enterprises are visualized to correspond for 4th industrial revolution and climate change. Reaching the operation of industrial facilities are one of these efforts and is actively progressing under identical condition between real and virtual world through introduction of cyber-physical system (CPS). However, the problem on no unified definition for CPS still exists. Thus, in this paper, we review the previous concept of CPS. We propose new concept of CPS with four sections such as real world section, communication section, virtual world section and management section. We also propose definite concept by classifying the layer of each section. In order to confirm the possibility of application for proposed concept of CPS, we applied simple motor. We compare the result for torque between real motor and virtual motor. Finally we confirm that the applicability of proposed concept of CPS is very high.

A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure (트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구)

  • Kim, Geunhye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.907-918
    • /
    • 2019
  • The purpose of this study is to understand the cybersecurity policies and critical infrastructure protection of the United States through analyzing Donald Trump's administration executive orders, the national cyber strategy, and the legislation. The analysis has three findings. First, the Department of Homeland Security (DHS) became a main agent in the cybersecurity while the role of the White House was reduced. Second, Trump's administration expanded its role and mission in the policy area by extending the meaning of critical infrastructure. Third, in the case of cyber threats, the government can be involved in the operation of critical infrastructures in the private sector. The opinions of the professional bureaucrats and DHS were more reflected in the direction of the cybersecurity policy than those of the White House. In contrast to Barack Obama's administration, the Trump administration's cybersecurity strategies were not much studied. This study provides insights for improving cybersecurity policies and critical infrastructure protection.