• Title/Summary/Keyword: control flow integrity

Search Result 62, Processing Time 0.026 seconds

Using structural intensity approach to characterize vibro-acoustic behavior of the cylindrical shell structure

  • Wang, Yuran;Huang, Rong;Liu, Zishun
    • Coupled systems mechanics
    • /
    • v.7 no.3
    • /
    • pp.297-319
    • /
    • 2018
  • In this paper, the vibro-acoustic behaviors of vibrational cylindrical shells are investigated by using structural intensity approach. The reducing interior noise method for vibrating cylindrical shells is proposed by altering and redistributing the structural intensity through changing the damping property of the structure. The concept of proposed novel method is based on the properties of structural intensity distribution on cylindrical shells under different load and damping conditions, which can reflects power flow in the structures. In the study, the modal formulas of structural intensity are developed for the steady state vibration of cylindrical shell structures. The detailed formulas of structural intensity are derived by substituting modal quantities, in which the effect of main parameters such as weight coefficients and distribution functions on structure intensity are analyzed and discussed. Numerical simulations are first carried out based on the structural intensity analytical solutions of modal formulas. Through simulating the coupling vibration and acoustical radiation problems of cylindrical shell, the relationship between vibro-acoustic and structural intensity distribution is derived. We find that for cylindrical shell, by properly arranging damping conditions, the structural intensity can be efficiently changed and further the noise property can be improved. The proposed methodology has important implications and potential applications in the vibration and noise control of fuselage structure.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

A Study on Characteristics of pH Control with Amines in the Secondary Side of Nuclear Power Plants (원전 2차 계통에서 아민의 pH 제어 특성 연구)

  • Rhee, In-H.;Ahn, Hyun-Kyoung;Park, Byung-Gi;Jun, Gwon-Hyuk;Ho, Song-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.3112-3118
    • /
    • 2010
  • The pH control agent in PWRs, to insure the integrity of steam generator, was changed from ammonia to ethanolamine(ETA) which decreased pH at condensate system and low pressure feedwater heater drain system, so that several amines were investigated for the selection of the optimum amine. There was no single alternative amine to meet the optimum condition. The more volatile ammonia provides the higher pH in condensate, while the less volatile ETA increases the pH in wet steam area. Thus, the combined amine of ammonia and ETA is able to equally raise the pH in both region so that the flow accelerated corrosion be reduced in the every system of the secondary side and the integrity of steam generator be also improved in pressurized water reactors (PWRs).

Remote-controlled micro locking mechanism for plate-type nuclear fuel used in upflow research reactors

  • Jin Haeng Lee;Yeong-Garp Cho;Hyokwang Lee;Chang-Gyu Park;Jong-Myeong Oh;Yeon-Sik Yoo;Min-Gu Won;Hyung Huh
    • Nuclear Engineering and Technology
    • /
    • v.55 no.12
    • /
    • pp.4477-4490
    • /
    • 2023
  • Fuel locking mechanisms (FLMs) are essential in upward-flow research reactors to prevent accidental fuel separation from the core during reactor operation. This study presents a novel design concept for a remotely controlled plate-type nuclear fuel locking mechanism. By employing electromagnetic field analysis, we optimized the design of the electromagnet for fuel unlocking, allowing the FLM to adapt to various research reactor core designs, minimizing installation space, and reducing maintenance efforts. Computational flow analysis quantified the drag acting on the fuel assembly caused by coolant upflow. Subsequently, we performed finite element analysis and evaluated the structural integrity of the FLM based on the ASME boiler and pressure vessel (B&PV) code, considering design loads such as dead weight and flow drag. Our findings confirm that the new FLM design provides sufficient margins to withstand the specified loads. We fabricated a prototype comprising the driving part, a simplified moving part, and a dummy fuel assembly. Through basic operational tests on the assembled components, we verified that the manufactured products meet the performance requirements. This remote-controlled micro locking mechanism holds promise in enhancing the safety and efficiency of plate-type nuclear fuel operation in upflow research reactors.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Effective Comparison of Indirect Branch Addresses for Checking Control-flow Integrity (제어 흐름 무결성 검증을 위한 간접 분기 주소의 효과적인 비교)

  • Kim, Tae-Hwan;Seong, In-Hyeong;Han, Kyung-Sook;Pyo, Chang-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.86-88
    • /
    • 2012
  • 코드 포인터 공격을 이용한 제어 흐름은 실행 중에 간접 분기의 무결성을 검사하는 것으로 보호할 수 있다. 간접 분기는 반복되는 목적지 주소로의 분기인 경우가 많지만, 목적지 주소는 실행 시간에만 알 수 있기 때문에 여러 가지 예외적인 상황을 적절히 대처할 방법이 필요하다. 본 논문에서는 동적 이진 계측화를 활용하여 실행 중 발생하는 간접 분기를 분석하고, 수집한 주소들을 빠르게 비교하는데 효과적인 주소 비교 기법들을 제시한다. 또한 각 기법을 비교하여 프로그램에 따라 주소 비교의 효율성을 극대화하는 방안을 모색하였다. 이러한 기법을 통해 간접 분기가 야기하는 여러 문제점에서부터 보안 분야에 이르기 까지 활용 범위를 넓힐 수 있을 것으로 기대한다.

A new ALE formulation for sloshing analysis

  • Aquelet, N.;Souli, M.;Gabrys, J.;Olovson, L.
    • Structural Engineering and Mechanics
    • /
    • v.16 no.4
    • /
    • pp.423-440
    • /
    • 2003
  • Arbitrary Lagrangian Eulerian finite element methods gain interest for the capability to control mesh geometry independently from material geometry, the ALE methods are used to create a new undistorted mesh for the fluid domain. In this paper we use the ALE technique to solve fuel slosh problem. Fuel slosh is an important design consideration not only for the fuel tank, but also for the structure supporting the fuel tank. "Fuel slosh" can be generated by many ways: abrupt changes in acceleration (braking), as well as abrupt changes in direction (highway exit-ramp). Repetitive motion can also be involved if a "sloshing resonance" is generated. These sloshing events can in turn affect the overall performance of the parent structure. A finite element analysis method has been developed to analyze this complex event. A new ALE formulation for the fluid mesh has been developed to keep the fluid mesh integrity during the motion of the tank. This paper explains the analysis capabilities on a technical level. Following the explanation, the analysis capabilities are validated against theoretical using potential flow for calculating fuel slosh frequency.

A Study on Control-Flow Integrity Using Intel Processor Trace (인텔 프로세서 트레이스를 이용한 제어 흐름 무결성에 대한 연구)

  • Baek, Se-Hyun;Seo, Ji-Won;Yang, Myong-Hoon;Shin, Jang-Seop;Paek, Yun-Heung
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.289-291
    • /
    • 2017
  • 제어 흐름을 원래 의도와 다르게 만드는 공격을 제어 흐름 무결성을 보장하는 방법을 통해 보안성을 높여 왔다. 완벽한 보안성과 낮은 성능 저하를 만족시키기 위해 인텔 프로세서 트레이스 하드웨어를 이용한 제어 흐름 무결성을 보장하는 연구들에 대해 소개한다.

Workflow Design on Product Data Management System Using Object-Oriented Modeling Technique (객체지향 방법론을 이용한 제품정보관리(PDM) 시스템에서의 워크플로우 설계)

  • 최종윤;최경희;안병하
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.145-157
    • /
    • 1999
  • The challenge is to maximize the time-to-market benefits of concurrent engineering while maintaining control of data and distributing it automatically to the people who need it when they need it. The way PDM systems cope with this challenge is that master data is held only once in a secure vault where its integrity can be assured and all changes to it monitored, controlled and recorded. The structure of PDM is various from vendor, but they have common module. That is PDM and it is most important. The goal is to design the workflow in PDM using object-oriented modeling method. The past methods have concentrated on the flow between workflow engine and agent, but this paper will focus on task. We will model task as individual object. This paper uses OMT(Object Modeling Technique) by James Rumbaugh for base modeling tool and uses DCOM(Distributed Component Object Model) for base ORB(Object Request Broker). Research object is to design the static object model, to design state change by dynamic model and to design data transition by functional model.

  • PDF