• Title/Summary/Keyword: Software and system safety

Search Result 811, Processing Time 0.026 seconds

The Pseudo-Dynamic Test for the Seismic Retrofit System Utilizing Existing Bridge Bearings (교량의 기존 받침을 활용하는 내진보강시스템의 유사동적 실험)

  • Kwahk, Im-Jong;Cho, Chang-Beck;Kim, Young-Jin;Kwark, Jong-Won
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.11 no.1 s.53
    • /
    • pp.21-27
    • /
    • 2007
  • In this study, an approach that installs seismic isolation bearings was proposed for the seismic retrofit of the existing bridges. The method that replaces all existing bearings with seismic isolators was proposed already. However, in this study, we recommend to utilize the existing bearings for the benefit of safety and cost. According to our proposal, the seismic isolators do not support vertical loads but they Just function as the period shifter and the horizontal damper. To verify this approach experimentally, the real scale bearings and lead rubber bearings far the real highway bridges were designed and fabricated. And the responses of this isolated bridges to the assumed earthquakes were determined by the pseudo dynamic test scheme. The test results were also compared to the responses computed by the well known structural analysis software to check the reliability of the test. From the test results, we found that the retrofitted bridges using the proposed method showed stable performances under earthquakes.

Effort Analysis of Unit Testing Conducted by Non-Developer of Source Code (원개발자 부재에 따른 원시코드 기반의 단위테스트 노력 분석)

  • Yoon, Hoijin
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.251-262
    • /
    • 2012
  • Unit testing is one of the test levels, which tests an individual unit or a group of related units. Recently, in Agile Development or Safety-critical System Development, the unit testing plays an important role for the qualities. According to the definition of unit testing, it is supposed to be done by the developers of units. That is because test models for the unit testing refers to the structure of units, and others but its original developers hardly can understand the structures. However, in practice, unit testing is often asked to be done without the original developers. For example, it is when faults are revealed in customer sites and the development team does not exit any more. In this case, instead of original developers, other developers or test engineers take a product and test it. The unit testing done by a non-developer, who is not the original developer, would cause some difficulties or cause more cost. In this paper, we tests an open source, JTopas, as a non-developer, with building test models, implementing test codes, and executing test cases. To fit this experiment to practical testing situations, we designed it based on the practices of unit testing, which were surveyed through SPIN(Software Process Improvement Network). This paper analyzes which part of unit testing done by non-developers needs more effort compared to the unit testing done by original developers. And it concludes that Agile Development contributes on reducing the extra effort caused by non-developers, since it implements test codes first before developing source code. That means all the units have already included their own tests code when they are released.

Simplification of State Invariant with Mixed Reachability Analysis (혼합 도달성 분석을 이용한 상태 불변식의 단순화)

  • 권기현
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.3_4
    • /
    • pp.212-218
    • /
    • 2003
  • State invariant is a property that holds in every reachable state. It can be used not only in understanding and analyzing complex software systems, but it can also be used for system verifications such as checking safety, liveness, and consistency. For these reasons, there are many vital researches for deriving state invariant from finite state machine models. In previous works every reachable state is to be considered to generate state invariant. Thus it is likely to be too complex for the user to understand. This paper seeks to answer the question `how to simplify state invariant\ulcorner`. Since the complexity of state invariant is strongly dependent upon the size of states to be considered, so the smaller the set of states to be considered is, the shorter the length of state invariant is. For doing so, we let the user focus on some interested scopes rather than a whole state space in a model. Computation Tree Logic(CTL) is used to specify scopes in which he/she is interested. Given a scope in CTL, mixed reachability analysis is used to find out a set of states inside it. Obviously, a set of states calculated in this way is a subset of every reachable state. Therefore, we give a weaker, but comprehensible, state invariant.

Investigating the Stress on Fault Plane Associated with Fault Slip Using Boundary Element Method (경계요소법을 이용한 단층 슬립에 따른 단층면 응력에 관한 연구)

  • Sung Kwon, Ahn;Hee Up, Lee;Jeongjun, Park;Mintaek, Yoo
    • Tunnel and Underground Space
    • /
    • v.32 no.6
    • /
    • pp.598-610
    • /
    • 2022
  • Avoiding a fault zone would be a best practice for safety in underground construction, which is only sometimes possible because of many restrictions and other field conditions. For instance, there is an ongoing conception of Korea-Japan subsea tunnels that inevitably cross a massive fault system in the Korea Strait. Therefore it was deemed necessary to find an efficient way of predicting the likely behaviour of underground structures under fault slip. This paper presents the findings from simple numerical analysis for investigating the stress induced at a normal fault with a dip of 45 degrees. We used a boundary element software that assumed constant displacement discontinuity, which allowed the displacement to be estimated separately at both the fault's hangingwall and footwall sides. The results suggested that a principal stress rotation of 45 degrees occurred at the edges of the fault during the slip, which was in agreement with the phenomenon for fault plane suggested in the body of literature. A simple numerical procedure presented in this paper could be adopted to investigate other fault-related issues associated with underground structure construction.

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

A Study on Obtaining Feedback Function of Disaster Information Management using Information & Communication Technology (ICT기술을 이용한 방재정보 관리의 환류기능 확보에 관한 연구)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2015
  • Due to the cases of recent global warming and unusual weather etc., large-scale natural disasters such as typhoons, floods, snow damage occur frequently across the continents such as Southeast Asia and North America, South America etc. and risks of earthquakes and tsunami are also increasing gradually in Korea which has been regarded as a safe zone and disaster types are also being diversified such as typhoons, floods, heat waves, heavy snow and damage scale is also enlarged. In addition, due to geographical characteristics or lack of infrastructure, disasters tended to occur intensively around a specific region or city in the past but disasters occur throughout the country in recent years so preparation for disaster prevention has emerged as an urgent challenge issue. Therefore, considering that the plan of obtaining the effective feedback function of disaster Information is very important in the proactive and software aspects for disaster reduction, this paper analyzed this three aspects of contents, procedural and contextual aspects and proposed the plan. First, in the content aspect, building disaster prevention information communication Infrastructure, building urban and regional disaster prevention system, obtaining concurrency and sharing of information and second, in the procedural aspect, active utilization of ICT(Information and Communication Technology) of the prevention stage, disaster prevention information collection and analysis reinforcement of the preparation stage, improvement of decision-making structure and field command system of the response stage, recovery system related information promotion of the recovery stage were proposed as alternatives and finally, in the contextual aspect, if disaster prevention information is effectively managed through maintenance of disaster prevention information related systems, obtaining domainality by disaster prevention work, improvement of the ability to judge the situation, obtaining comprehensive and feedback function etc, it is considered to significantly contribute to reducing natural disasters.

Drone-based smart quarantine performance research (드론 기반 스마트 방재 방안 연구)

  • Yoo, Soonduck
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.437-447
    • /
    • 2020
  • The purpose of this study is to research the countermeasures and expected effects through the use of drones in the field of disaster prevention as a drone-based smart quarantine performance method. The environmental, market, and technological approaches to the review of the current quarantine performance task and its countermeasures are as follows. First, in terms of the environment, the effectiveness of the quarantine performance business using drone-based control is to broaden the utilization of forest, bird flu, livestock, facility areas, mosquito larvae, pests, and to simplify and provide various effective prevention systems such as AI and cholera. Second, in terms of market, the standardization of livestock and livestock quarantine laws and regulations according to the use of disinfection and quarantine missions using domestic standardized drones through the introduction of new technologies in the quarantine method, shared growth of related industries and discovery of new markets, and animal disease prevention It brings about the effect of annual budget savings. Third, the technical aspects are (1) on-site application of disinfection and prevention using multi-drone, a new form of animal disease prevention, (2) innovation in the drone industry software field, and (3) diversification of the industry with an integrated drone control / control system applicable to various markets. (4) Big data drone moving path 3D spatial information analysis precise drone traffic information ensures high flight safety, (5) Multiple drones can simultaneously auto-operate and fly, enabling low-cost, high-efficiency system deployment, (6) High precision that this was considered due to the increase in drone users by sector due to the necessity of airplane technology. This study was prepared based on literature surveys and expert opinions, and the future research field needs to prove its effectiveness based on empirical data on drone-based services. The expected effect of this study is to contribute to the active use of drones for disaster prevention work and to establish policies related to them.