• Title/Summary/Keyword: Safe Network

Search Result 601, Processing Time 0.037 seconds

A Matlab and Simulink Based Three-Phase Inverter Fault Diagnosis Method Using Three-Dimensional Features

  • Talha, Muhammad;Asghar, Furqan;Kim, Sung Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.3
    • /
    • pp.173-180
    • /
    • 2016
  • Fault detection and diagnosis is a task to monitor the occurrence of faults and pinpoint the exact location of faults in the system. Fault detection and diagnosis is gaining importance in development of efficient, advanced and safe industrial systems. Three phase inverter is one of the most common and excessively used power electronic system in industries. A fault diagnosis system is essential for safe and efficient usage of these inverters. This paper presents a fault detection technique and fault classification algorithm. A new feature extraction approach is proposed by using three-phase load current in three-dimensional space and neural network is used to diagnose the fault. Neural network is responsible of pinpointing the fault location. Proposed method and experiment results are presented in detail.

Implementation of Drug Delivery Constitution for Inpatient based on the Position Tracking System

  • Kim, Jeong-lae;Yoon, Su-yeon;Gil, Sang-hee;Park, Bo-geun;Jeong, Hyun-woo
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.402-408
    • /
    • 2021
  • We are designed the delivery constitution technique that is to be measure the safe RFID statusof thewireless delivery system level (WDSL) on the delivery system tracking system. The delivery system level condition by the delivery system tracking system is organized with the RFID system. As to inspection a wireless network of the wireless network, we are found of the delivery value with wireless network by the upper take form. The concept of delivery system level is organized the reference of wireless level for delivery signal by the delivery RFID tracking system. Further, symbolizing a safe deliveryof the WDSL of the medium-minimum interval of the RFID tracking system, and the delivery wireless network RFID that was the delivery value of the far delivery of the DSTS-FA-φMED-MIN with 5.80±1.20 units, that was the delivery value of the convenient delivery of the DSTS-CO-φMED-MIN with 4.06±(-0.04) units, that was the delivery value of the flank delivery of the DSTS-φMED-MIN with 0.91±0.07 units, that was the delivery value of the vicinage delivery of the DSTS-VI-φMED-MIN with 0.18±(-0.03) units. The RFID will be to look into at the safe of the RFID tracking systemwith wireless network bythe delivery system level on the WDSL that is supply the wireless tracking system by the delivery system level system. We will be possible make to curb of a tracking system that to put the wireless signal and to use of the delivery data of RFID level by the delivery system.

The Study on the Security Requirement at Aeronautical Telecommunication Network (항공통신망에서의 보안 요구사항에 관한 연구)

  • Kim, Do-Woo;Lee, Seoung-Hyeon;Lee, Deok-Gyu;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.628-631
    • /
    • 2008
  • The information transfer between the ground facilities and the ground facilities and exchange are necessary for an aircraft and ground facilities so that it is safe, it is economic, an aircraft tan operate an aircraft to the high efficiency until it arrives at the destination location from the stand-by for the fly. Presently, by using the AFTN which is closed network, a communication is made. However, by applying the leading edge communication technology, the aeronautical telecommunication network of the next generation is constructed and it is planning to be managed. Due to this, the ground facilities connected to the foreign network has the security vulnerability by an attack. Therefore, the vulnerability analysis for the safe operational environment build-up at the aeronautical telecommunication network and sorority requirement research are needed.

  • PDF

IDENTITY-BASED AAA AUTHENTICATION PROTOCOL

  • Kim Dong-myung;Cho Young-bok;Lee Dong-heui;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.678-682
    • /
    • 2005
  • IETF suggested AAA for safe and reliable user authentication on various network and protocol caused by development in internet and increase in users. Diameter standard authentication system does not provide mutual authentication and non-repudiation. AAA authentication system using public key was suggested to supplement such Diameter authentication but application in mobile service control nodes is difficult due to overhead of communication and arithmetic. ID based AAA authentication system was suggested to overcome such weak point but it still has the weak point against collusion attack or forgery attack. In this thesis, new ID based AAA authentication system is suggested which is safe against collusion attack and forgery attack and reduces arithmetic quantity of mobile nodes with insufficient arithmetic and power performance. In this thesis, cryptological safety and arithmetical efficiency is tested to test the suggested system through comparison and assessment of current systems. Suggested system uses two random numbers to provide stability at authentication of mobile nodes. Also, in terms of power, it provides the advantage of seamless service by reducing authentication executing time by the performance of server through improving efficiency with reduced arithmetic at nodes.

  • PDF

A Study on The UnSafe Packet Drop and Delay of Multimedia Traffics (멀티미디어 트래픽의 비보안 패킷 폐기와 지연에 관한 연구)

  • Lim Chung-Tyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.245-250
    • /
    • 2005
  • A network of Packet based switch Mode will be required to carry the traffics(CVR,VBR, UBR, ABR) generated by a wide range of services. Packet based Network services the Qualify-of-Service (QoS) management of traffic sources and bandwidth. Besides efficiency and throughput services are achieved in the multimedia traffic sent in the network. In this paper, the scheduler transmits the safe packet, drop the unsafe packet and evaluate unsafe Packet as the requirement of the delay avoiding the network congestion for improving the QoS of the multimedia network. In this paper, we Propose the scheduling algorithm which evaluates and drops the packet The suggested model Performance of the switch is estimated and simulated in terms of the delay by computer.

  • PDF

A Study for Algorithm of Safe Transmission in Distributed Network (분산 네트워크에서 안전한 전송을 위한 알고리즘에 관한 연구)

  • Kim, Tae-Kyung;Seo, Hee-Suk;Lee, Dong-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.1
    • /
    • pp.35-40
    • /
    • 2009
  • The reliability of processing the distributed application becomes more and more important issues in distributed network as the usage of distributed network increases. Because the distributed network applications are processed in the available resources of Internet. It is important factors that the user can efficiently access the available resources and processed results can be delivered to the user of job request. Therefore in this paper, we suggested the survivability factor for sending data safely whether it can be efficiently accessed between the user and available resource which processes the distributed application. And evaluated the performance of the suggested factor using the data transmission time. Also we suggested the transmission algorithm for safe transmission using the survivability factor.

Analysis of Elementary School 'Safe Life' Textbook Using Keyword Network Analysis (키워드 네트워크 분석을 활용한 '안전한 생활' 교과서 분석)

  • DEOK-JIN JANG;HA-SUNG KONG
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2023
  • The Safe Life is an essential subject of education introduced in the 2015 revised curriculum for first and second graders of elementary school to cultivate safety awareness. This study aims to explore the relationship between concepts and concepts that are important in the Safe Life textbook using a keyword network analysis. The results indicate that the areas of life safety, traffic safety, and disaster safety are emphasized in terms of topics in the textbook. The teaching and learning methods for the Safe Life education are mainly based on "experience" and "practice," and the most common teaching materials are card games and sticky stickers. Based on the findings, we suggest maintaining the experience-oriented safety education approach and diversifying the teaching and learning materials and methods to incorporate various safety education areas.

A Study on FSA Application to PRS for Safe Operation of Dynamic Positioning Vessel

  • Chae, Chong-Ju;Jun, Yun-Chul
    • Journal of Navigation and Port Research
    • /
    • v.41 no.5
    • /
    • pp.287-296
    • /
    • 2017
  • The Formal Safety Assessment (FSA) is a structured and systematic methodology developed by the IMO, aimed at assessing the risk of vessels and recommending the method to control intolerable risks, thereby enhancing maritime safety, including protection of life, health, the marine environment and property, by using risk analysis and cost-benefit assessment. While the FSA has mostly been applied to merchant vessels, it has rarely been applied to a DP vessel, which is one of the special purpose vessels in the offshore industry. Furthermore, most of the FSA has been conducted so far by using the Fault Tree Analysis tool, even though there are many other risk analysis tools. This study carried out the FSA for safe operation of DP vessels by using the Bayesian network, under which conditional probability was examined. This study determined the frequency and severity of DP LOP incidents reported to the IMCA from 2001 to 2010, and obtained the Risk Index by applying the Bayesian network. Then, the Risk Control Options (RCOs) were identified through an expert brainstorming and DP vessel simulations. This study recommends duplication of PRS, regardless of the DP class and PRS type and DP system specific training. Finally, this study verified that the Bayesian network and DP simulator can also serve as an effective tool for FSA implementation.

Embedded Home Network System Security using VPN (VPN을 이용한 Embedded 홈 네트워크 시스템 보안)

  • Jin, Seon-Il;Jeong, Jin-Gyu;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.