• Title/Summary/Keyword: Integrity Check

Search Result 154, Processing Time 0.04 seconds

Using Geometry based Anomaly Detection to check the Integrity of IFC classifications in BIM Models (기하정보 기반 이상탐지분석을 이용한 BIM 개별 부재 IFC 분류 무결성 검토에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Journal of KIBIM
    • /
    • v.7 no.1
    • /
    • pp.18-27
    • /
    • 2017
  • Although Industry Foundation Classes (IFC) provide standards for exchanging Building Information Modeling (BIM) data, authoring tools still require manual mapping between BIM entities and IFC classes. This leads to errors and omissions, which results in corrupted data exchanges that are unreliable and thus compromise the validity of IFC. This research explored precedent work by Krijnen and Tamke, who suggested ways to automate the mapping of IFC classes using a machine learning technique, namely anomaly detection. The technique incorporates geometric features of individual components to find outliers among entities in identical IFC classes. This research primarily focused on applying this approach on two architectural BIM models and determining its feasibility as well as limitations. Results indicated that the approach, while effective, misclassified outliers when an IFC class had several dissimilar entities. Another issue was the lack of entities for some specific IFC classes that prohibited the anomaly detection from comparing differences. Future research to improve these issues include the addition of geometric features, using novelty detection and the inclusion of a probabilistic graph model, to improve classification accuracy.

Experience in Visual Testing of the Main Feed Water Piping Weld for Hanul Unit 3 (한울 3호기 주급수 배관 용접부 육안검사 경험)

  • Yoon, Byung Sik;Moon, Gyoon Young;Kim, Yong Sik
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.11 no.1
    • /
    • pp.74-78
    • /
    • 2015
  • Nuclear power plant steam generator that is one of the main component has several thousands of thin tubes. And the steam generator tube is subject to damage because of the severe operation conditions such as the high temperature and pressure. Therefore periodic inspections are conducted to ensure the integrity of steam generator component. Hanul unit 3 also has been inspected in accordance with in-service inspection program and is scheduled to be replaced for exceeding the plugging rate which was recommended by manufacturer. During the steam generator replacement activity, we found several clustered porosity on inner surface of main feed water pipe. Additionally crack-like indications were found at weld interface between base material and weld of main feed water pipe. This paper describes the field experience and visual testing results for inner surface of main feed water pipes. The destructive test result had shown that these indications were porosities which were caused by manufacturing process not by operation service.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

Non-destructive evaluation of concrete quality using PZT transducers

  • Tawie, R.;Lee, H.K.;Park, S.H.
    • Smart Structures and Systems
    • /
    • v.6 no.7
    • /
    • pp.851-866
    • /
    • 2010
  • This paper presents a new concept of using PZT (lead zircornate titanate) transducers as a non-destructive testing (NDT) tool for evaluating quality of concrete. Detection of defects in concrete is very important in order to check the integrity of concrete structures. The electro-mechanical impedance (EMI) response of PZT transducers bonded onto a concrete specimen can be used for evaluating local condition of the specimen. Measurements are carried out by electrically exciting the bonded PZT transducers at high frequency range and taking response measurements of the transducers. In this study, the compression test results showed that concrete specimens without sufficient compaction are likely to fall below the desired strength. In addition, the strength of concrete was greatly reduced as the voids in concrete were increased. It was found that the root mean square deviation (RMSD) values yielded between the EMI signatures for concrete specimens in dry and saturated states showed good agreement with the specimens' compressive strength and permeable voids. A quality metric was introduced for predicting the quality of concrete based on the dry-saturated state of concrete specimens. The simplicity of the method and the current development towards low cost and portable impedance measuring system, offer an advantage over other NDE methods for evaluating concrete quality.

A Research on the Correlations between the Applicability of CPTED guidelines in Korean Elementary Schools and the Crime Rate within its Campuses - Focused On the Schools Included in Seong-Buk and Gwang-Jin - (국내 초등학교의 CPTED 적용여부와 학교 폭력 피해율과의 상관관계에 관한 연구 - 성북구와 광진구에 위치한 학교들을 중심으로 -)

  • Whang, Hee-Joon;Lee, Seung-Woo;Park, Hyun-Goo
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.20 no.6
    • /
    • pp.3-10
    • /
    • 2013
  • The purpose of this research is to understand the basic correlation between CPTED based 'Safe School Guidelines' and the physical properties of Korean elementary schools. Fundamentally, the guidelines are consisted with phrases that contain a detailed explanation of how the spaces within the school campuses should be and which aspects have to be avoided. Furthermore, the guidelines categorized among the several areas in school are grouped by CPTED elements such as 'Natural Surveillance', 'Territorial Integrity' and 'Natural Access'. The mission of the researchers was to check the applicability of these guidelines for each school samples and investigate which of the categories or subcategories have strong correlation with the current school crime rates. With these results, a new outline of CPTED guideline exclusive to Korean elementary schools will be obtained which can be applied on earlier stages for future school projects.

A Study on the Flow Analysis on the Software-Defined Networks through Simulation Environment Establishment (시뮬레이션 환경 구축을 통한 소프트웨어-정의 네트워크에서 흐름 분석에 관한 연구)

  • Lee, Dong-Yoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.88-93
    • /
    • 2020
  • Recently, SDN technology is applied to real communication business, users are getting bigger, and as the amount of data flowing in the network increases, interest in network data flow management is increasing. During this process, it must be ensured that the confidentiality, integrity, availability, and traceability of the data on the network being transmitted. In addition, it is necessary to develop an environment for observing the flow of data in real time on a network required in various fields and visually confirming the control. In this paper, first, Mininet is applied to construct a network topology and various environment attributes. Second, we added OpenDayLight in Mininet environment to develop a simulation environment to visually check and control network traffic flow in network topology.

Camera Identification of DIBR-based Stereoscopic Image using Sensor Pattern Noise (센서패턴잡음을 이용한 DIBR 기반 입체영상의 카메라 판별)

  • Lee, Jun-Hee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.1
    • /
    • pp.66-75
    • /
    • 2016
  • Stereoscopic image generated by depth image-based rendering(DIBR) for surveillance robot and camera is appropriate in a low bandwidth network. The image is very important data for the decision-making of a commander and thus its integrity has to be guaranteed. One of the methods used to detect manipulation is to check if the stereoscopic image is taken from the original camera. Sensor pattern noise(SPN) used widely for camera identification cannot be directly applied to a stereoscopic image due to the stereo warping in DIBR. To solve this problem, we find out a shifted object in the stereoscopic image and relocate the object to its orignal location in the center image. Then the similarity between SPNs extracted from the stereoscopic image and the original camera is measured only for the object area. Thus we can determine the source of the camera that was used.

Hardware Implementation of Optical Fault Injection Attack-resistant Montgomery exponentiation-based RSA (광학 오류 주입 공격에 강인한 몽고메리 지수승 기반 RSA 하드웨어 구현)

  • Lee, Dong-Geon;Choi, Yong-Je;Choi, Doo-Ho;Kim, Minho;Kim, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.76-89
    • /
    • 2013
  • In this paper, we propose a novel optical fault detection scheme for RSA hardware based on Montgomery exponentiation, which can effectively detect optical fault injection during the exponent calculation. To protect the RSA hardware from the optical fault injection attack, we implemented integrity check logic for memory and optical fault detection logic for Montgomery-based multiplier. The proposed scheme is considered to be safe from various type of attack and it can be implemented with no additional operation time and small area overhead which is less than 3%.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

Leak flow prediction during loss of coolant accidents using deep fuzzy neural networks

  • Park, Ji Hun;An, Ye Ji;Yoo, Kwae Hwan;Na, Man Gyun
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2547-2555
    • /
    • 2021
  • The frequency of reactor coolant leakage is expected to increase over the lifetime of a nuclear power plant owing to degradation mechanisms, such as flow-acceleration corrosion and stress corrosion cracking. When loss of coolant accidents (LOCAs) occur, several parameters change rapidly depending on the size and location of the cracks. In this study, leak flow during LOCAs is predicted using a deep fuzzy neural network (DFNN) model. The DFNN model is based on fuzzy neural network (FNN) modules and has a structure where the FNN modules are sequentially connected. Because the DFNN model is based on the FNN modules, the performance factors are the number of FNN modules and the parameters of the FNN module. These parameters are determined by a least-squares method combined with a genetic algorithm; the number of FNN modules is determined automatically by cross checking a fitness function using the verification dataset output to prevent an overfitting problem. To acquire the data of LOCAs, an optimized power reactor-1000 was simulated using a modular accident analysis program code. The predicted results of the DFNN model are found to be superior to those predicted in previous works. The leak flow prediction results obtained in this study will be useful to check the core integrity in nuclear power plant during LOCAs. This information is also expected to reduce the workload of the operators.