• Title/Summary/Keyword: State_Diagram

Search Result 363, Processing Time 0.028 seconds

Specification-based Intrusion Detection System for the Initial Authentication Phase of WiBro (와이브로의 초기인증에 적합한 명세기반의 침입탐지시스템)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.23-32
    • /
    • 2010
  • WiBro(Wireless Broadband), the service based on IEEE 802.16e(mobile WiMAX) standard, is a wireless broadband Internet technology being developed by the domestic telecommunication industry. In this paper, we analyze security vulnerabilities of WiBro focusing on initial authentication phase and propose a specification-based intrusion detection system that can detect those vulnerabilities. We first derive a specification from the normally operational process of the initial authentication based on PKMv2 EAP-AKA and formalize the derived specification as a state transition diagram. Proposed system executes the intrusion detection based on those specification and state transition diagram. In this paper, to verify the detection capability of proposed system, we construct a test bed network and execute scenario-based test.

Development and Evaluation of Automatic Incident Detection Algorithm using Modified Flow-Occupancy Diagram (수정교통량-점유율 관계도를 이용한 돌발상황 자동검지알고리즘 개발 및 평가)

  • Kim, Sang-Gu;Kim, Young-Chun
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.229-239
    • /
    • 2008
  • Most algorithms for detecting incidents have been developed under the premise that congestion must happen whenever an incident occurs. For that reason, the performance of these algorithms could not be guaranteed in cases where congestion did not happen due to traffic operations with low flows despite the occurrence of an incident. The objective of this paper is to develop an automatic incident detection algorithm using a new diagram that can reliably detect the incident under various conditions of traffic operations including a low volume state. Compared with the McMaster Algorithm, the proposed algorithm in this paper was evaluated with three different cases in which the incidents occur in traffic operations with a low volume state, a relatively high volume state, and a recurrent congestion state. It is shown that the new algorithm has a capability to identify the flow characteristics of incidents for all the three cases and is much better than McMaster algorithm in terms of detection rate and false alarm rate.

The Performance-ability Evaluation of an UML Activity Diagram with the EMFG (EMFG를 이용한 UML 활동 다이어그램의 수행가능성 평가)

  • Yeo Jeong-Mo;Lee Mi-Soon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.117-124
    • /
    • 2006
  • Hardware and software codesign framework called PeaCE(Ptolemy extension as a Codesign Environment) was developed. It allows to express both data flow and control flow which is described as fFSM which extends traditional finite state machine. While the fFSM model provides lots of syntactic constructs for describing control flow, it has a lack of their formality and then difficulties in verifying the specification. In order to define the formal semantics of the fFSM, in this paper, firstly the hierarchical structure in the model is flattened and then the step semantics is defined. As a result, some important bugs such as race condition, ambiguous transition, and circulartransition can be formally detected in the model.

A Cause Analysis of the Construction Incident Using Causal Loop Diagram : Safety Culture Perspective (인과지도를 활용한 건설 안전사고 원인 분석 : 안전문화 관점)

  • Choi, Yun Gil;Cho, Keun Tae
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.2
    • /
    • pp.34-46
    • /
    • 2020
  • Unlike research focused on existing technologies and individual errors to analyze the causes of incidents, this study approached them from an organization and culture. And this study is not a one way study but cyclical study what can track cause down using causal loop diagram methodology. Four diagnostic criteria for the negative state of the safety culture : secretive, blame, failure to learning, and incremental learning, combine literature study and expert opinion to derive 41 variables. Connecting these variable make 4 causal loop diagrams and total causal loop diagram. Case accumulation in secretive, accident report in blame, knowledge accumulation in failure to learning, near miss discovery in incremental learning are the main variables. Safety incident is the objective variable by classifying them into 4 stages in total loop, leading track as the most affect is case accumulation, and Step 4 as you can see accident report and near miss discovery are the result of tracking down the cause. This study can be used as a basis for improving the management priority and the system in incident prevention.

Design of A/V Communication System for Passenger and Attendant in Train (열차 내 승무원과의 원격대화 시스템 설계에 관한 연구)

  • Chang, Duk-Jin;Kang, Song-Hee;Park, Hyun-Hue;Kang, Dae-Ho;Heo, Jae-Seok;Song, Dahl-Ho
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.448-454
    • /
    • 2010
  • Currently a KTX train of 20-car formation is 388m long and carries 931 passengers including one captain and three crews which is quite a few to cover the lengthy service area and many customers. On the other hand, if a passenger wants to talk to an attendant, he has to wait for an attendant passing by his/her seat or walk to an intercom which is placed at every other car. Any of these choices is inconvenient. So, in this paper, we presented a system design for developing an audio/visual communication system for a passenger and an attendant. The system was analyzed and designed according to the Object-Oriented methodology with UML (Unified Modeling Language). Based on a problem statement, a Use-case Diagram, Sequence Diagrams, Class Diagram, State Charts, collaboration Diagram were generated. The design will be used in system implementation to a HEMU-400X test train and to be tested.

  • PDF

Power and Efficiency Optimization through Exergy Analysis of Power Plant (발전 플랜트의 엑서지 해석으로부터 발전량 및 발전효율 최적화)

  • Kim, Deok-Jin;Lee, Jae-Byoung;Kang, Su-Hwan
    • Plant Journal
    • /
    • v.9 no.3
    • /
    • pp.43-47
    • /
    • 2013
  • Even if an expert who has majored energy engineering, it is a difficult concept to understand power output optimization and power efficiency optimization. In this study a diagram applying thermodynamic state value as specific exergy and exergy ratio was developed. Although general peoples who did not major energy engineering can be easily understand the concept of power output optimization and power efficiency through the developed diagram. A represented property that can identify the performance of power plant is the main steam temperature and pressure. At the developed diagram the maximum power output line and maximum power efficiency line are shown according to the temperature and pressure of main steam. Therefore we can identify how much a power plant approach to maximum power output and maximum power efficiency.

  • PDF

The Reliability Estimation of Buried Pipeline Using the FAD and FORM (파손평가선도(FAD)와 FORM을 이용한 매설배관의 건전성 평가)

  • Lee, Ouk-Sub;Kim, Dong-Hyeok
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.4 s.72
    • /
    • pp.20-28
    • /
    • 2005
  • In this paper, the methodology for the reliability estimation of buried pipeline with longitudinal gouges and dent is presented and the limit state of buried pipeline is formulated by failure assessment diagram(FAD). The reliability of buried pipeline with defects has been estimated by using a theory of failure probability. The failure probability is calculated by using the FORM(first order reliability method) and Monte Carlo simulation. The results out of two procedures have been compared each other. It is found that the FORM and Monte Carlo simulation give similar results for varying boundary conditions and various random variables. Furthermore, it is also recognized that the failure probability increases with increasing of dent depth, gouge depth, gouge length, operating pressure, pipe outside radius and decreasing the wall thickness. And it is found that the analysis by using the failure assessment diagram gives highly conservative results than those by using the theory of failure probability.

Analysis of Proportional Control for Grid Connected Inverter With LCL Filter

  • Windarko, Novie Ayub;Lee, Jin-Mok;Choi, Jae-Ho
    • Proceedings of the KIPE Conference
    • /
    • 2008.06a
    • /
    • pp.247-249
    • /
    • 2008
  • There are many types of grid-connected inverter controllers; Synchronous Reference Frame (SRF)-based controller is the most popular methods. SRF-based controller is capable for reducing both of zero-steady state error and phase delay. However, SRF-based controller has a complex algorithm to apply in real application such as digital processor. Resonant controller is also reduced zero-steady state error, but its transfer function has a high order. In this paper, a simple proportional control is applied for grid connected inverter with LCL filter. LCL filter is a third order system. Applying a simple proportional controller is not increased the order of closed loop transfer function. By this technique, the single phase model is easily obtained. To reduce steady state error, proportional gain is set as high as possible, but it may produce instability. To compromise between a minimum steady state error and stability, the single phase model is evaluate through Root Locus and Bode diagram. PSIM simulation is used to verify the analysis.

  • PDF

The new ICP state for the embedded network agent (내장형 Network Agent를 위한 새로운 TCP state의 제안)

  • 정진규;안광혁;진선일;홍석교;유영동
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.379-382
    • /
    • 2002
  • This paper describes an experiment on the embedded network agent. The embedded network agent is the device that will enable other devices to communicate over the Internet. Many devices have no way to communicate with other devices over the Internet The embedded network agent extends the stand-alone devices that have no TCP/IP protocol suite to the Internet, the global networks, without any hardware and software. To support the better efficiency, this parer proffers new TCP state diagram of the embedded network agent. This TCP state on the embedded network agent considers the status of the common devices behind the embedded network agent. Because of this consideration, the embedded network agent tenders an improved result to user.

  • PDF

A Modified H-R Diagram Activity to Introduce the Nature of Science

  • Lee, Eun-Ah
    • Journal of the Korean earth science society
    • /
    • v.26 no.4
    • /
    • pp.329-335
    • /
    • 2005
  • The purpose of this study is to suggest the modification of activities to introduce the nature of science in earth science classrooms. A small modification can turn ordinary textbook activities into the nature of science activities. Since earth science could provide a good basis for the tentative, creative, and socially and culturally embedded nature of science, as well as appropriate understanding about scientific methods, careful modification of earth science activities could be effective for students to understand the nature of science. Considering which aspects of the nature of science are appropriate, along with the possible change in the activity, teachers will be able to modify textbook activities effectively. An example modification of H-R diagram activity was also suggested.