• Title/Summary/Keyword: priority of safety

Search Result 755, Processing Time 0.028 seconds

Study of real-time OS structure that use OSEK/VDX (OSEK/VDX이용한 실시간 OS 구조에 관한 연구)

  • Oh, Chang-Yeon;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.861-865
    • /
    • 2009
  • Technical development in car has utilized electronic controls (ECU, Electronic Control Unit) recently if was achieved machine such as engine performance in priority and electronic side technical development that improve safety, convenience, expense etc. is proceeded vigorously. Also, preference of consumers for car is various model's number according to change at the fast speed and complexity of software required from vanguard service development was increased greatly. Software development expense dominated considerable weight in car manufacture expense by such change and automakers established OSEK/VDX that is standard of automobile embeded system to reuse application software by module to respond this and transplant easily to other control device. Do when search about all item that is necessary in real-time OS structure that examines OSEK/VDX standard that is presented as the alternative to respond environment that change rapidly that refer in dignified mien after it is original, and uses actuality OSEK/VDX.

  • PDF

A Study on Vulnerability Assessment for the Digital Assets in NPP Based on Analytical Methods (분석적 방법을 적용한 원전디지털자산 취약점 평가 연구)

  • Kim, In-kyung;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1539-1552
    • /
    • 2018
  • The necessity of establishing a more secure cyber security system is emerging to protect NPP against cyber attacks as nuclear facilities become increasingly reliant on digital system. Proper security measures should be established through periodic analysis and evaluation of vulnerabilities. However, as Nuclear facilities has safety characteristics as their top priority and it requires a lot of time and cost to construct regarding the activities for vulnerability analysis, it is difficult to apply the existing vulnerability analysis environment and analysis tools. In this study, We propose a analytical vulnerability assessment method to overcome the limitations of existing vulnerability analysis methods through analysis the existing vulnerability analysis methods and the issues to be considered when applying the vulnerability analysis method.

Competitiveness Enhancement for Local Commercial Banks in Vietnam (베트남 일반은행의 경쟁력 제고에 관한 연구)

  • Dinh, Nguyen Yen Chi;Kim, Jung-Ho
    • International Area Studies Review
    • /
    • v.21 no.2
    • /
    • pp.171-196
    • /
    • 2017
  • This study employed the Analytical Hierarchy Process (AHP) methodology with the enhancement of the competitiveness of Vietnamese commercial banks set as the overall goal of the model. Analysis of the survey questionnaire based on pair-wise comparisons and collected from experts in the field of banking led to three significant findings. First, banking safety is the most important evaluation criteria for the competitiveness of local commercial banks in Vietnam, followed by operating efficiency, intangible values and large scale. Second, in order to achieve the overall goal of enhancing competitiveness for local banks, securing healthy financial conditions should be made the priority. Effective management systems, strategic human resource planning and high-quality products and services all show strong connections to achieving the evaluation criteria. Third, the study found that bad debt settlement is essential in obtaining healthy financial conditions. In order to introduce effective management systems as well as high-quality products and services, technological advances are very important. Improving the quality of executives and staff is imperative for strategic human resource planning purposes.

Experimental Study on the Determination of Heat Transfer Coefficient for the KURT (KURT 내 열전달계수 결정에 관한 실험적 연구)

  • Yoon, Chan-Hoon;Kwon, Sang-Ki;Kim, Jin
    • Tunnel and Underground Space
    • /
    • v.19 no.6
    • /
    • pp.507-516
    • /
    • 2009
  • In cases of high-level radioactive waste repositories, heat load is apparent by radioactive waste decay. The safety of a waste repository would be influenced by changing circumstances caused by heat transfer through rock. Thus, a ventilation system is necessary to secure the waste repository. The first priority for building an appropriate ventilation system is completing a computer simulation research with thermal rock properties and a heat transfer coefficient. In this study, the heat transfer coefficient in KURT was calculated using the measurement of inner circumstance factors that include dry bulb and wet bulb temperature, rock surface temperature, and barometric pressure. The heater that is 2 m in length and 5 kw in capacity heats the inside of rock in the research module by $90^{\circ}C$. As a result of determining the heat transfer coefficient in the heating section, the changes of heat transfer coefficient were found to be a maximum of 7.9%. The average heat transfer coefficient is approximately 4.533 w/$m^2{\cdot}K$.

Envionmental Problems of Abandoned Mining Sites and Their Recovery (폐광지역의 오염현황 및 환경관리 전략)

  • Chung, Jae-Chun;Lee, Moo-Choon
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.5 no.1
    • /
    • pp.71-85
    • /
    • 1997
  • There are approximately 500 abandoned mining sites in Korea. Abandoned mines cause various environmental and safety problems such as landscape damage, soil, groundwater and stream pollution by heavy metal, acid mine drainage and soil erosion. According to the survey, there are significant numbers of mines causing environmental problems in Korea. For a environmentally sound management of abandoned mines, the Soil Pollution Control Act should include the regulation concerning soil pollution and recovery standards of the abandoned mines. Also, comprehensive survey about abandoned mines, setting-up of tile recovery priority, finance for clean-up are necessary.

  • PDF

Secure Authentication Protocol based on a Chameleon Hash Function for Ambient Living Assisted-Systems (전천 후 생활보조 시스템을 위한 카멜레온 해시 함수 기반의 안전한 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.73-79
    • /
    • 2020
  • Due to the rapidly ageing population and low birth rates, most countries have faced with the problems of an ageing population. As a result, research into aging and the means to support an aging population has therefore become a priority for many governments around the world. Ambient Assisted Living(AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can provide more safety for the elderly, offering emergency response mechanisms and fall detection solutions. Since the information transmitted in AAL systems is very personal, however, the security and privacy of such data are becoming important issues that must be dealt with. In this paper, we propose a Chameleon hash-based secure authentication protocol for AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

The Risk Factor Analysis of Power Line Tunnel Using the AHP Method in Construction Stage (AHP기반 지중 전력구 굴착 위험요소 평가)

  • Woo, Sang-Kyun;Kim, Kyung-Jin;Kim, Tae-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.17 no.5
    • /
    • pp.122-129
    • /
    • 2013
  • In this study, the risk factors which derive from the ground condition of typical construction sites are put forward. In order to prioritize the risk elements, the analytical method of AHP was used. The result of using a weighting factor for each risk analysis showed that if the constituency index is less than 0.1, then reliable results and priorities for each of the risk elements can be calculated using the AHP method. From now on, if the range of measured value can be established, the risk or safety value of concrete structures for power lines can be applicable.

An Optimal Route Algorithm for Automated Vehicle in Monitoring Road Infrastructure (도로 인프라 모니터링을 위한 자율주행 차량 최적경로 알고리즘)

  • Kyuok Kim;SunA Cho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.265-275
    • /
    • 2023
  • The purpose of this paper is to devise an optimal route allocation algorithm for automated vehicle(AV) in monitoring quality of road infrastructure to support the road safety. The tasks of an AV in this paper include visiting node-links at least once during its operation and checking status of road infrastructure, and coming back to its depot.. In selecting optimal route, its priority goal is visiting the node-links with higher risks while reducing costs caused by operation. To deal with the problem, authors devised reward maximizing algorithm for AVs. To check its validity, the authors developed simple toy network that mimic node-link networks and assigned costs and rewards for each node-link. With the toy network, the reward maximizing algorithm worked well as it visited the node-link with higher risks earlier then chinese postman route algorithm (Eiselt, Gendreau, Laporte, 1995). For further research, the reward maximizing algorithm should be tested its validity in a more complex network that mimic the real-life.

Axial map Implementation Using Linear Generalization of GIS data (GIS 도로 데이터의 일반화를 이용한 Axial map 구현 방법에 관한 연구)

  • Kwon, Soon-Il;Park, Soo-Hong;Joo, Yong-Jin
    • Spatial Information Research
    • /
    • v.18 no.4
    • /
    • pp.99-108
    • /
    • 2010
  • Space Syntax methodology can be quantitatively calculated spatial cognitive analysis by number of turns_ In the existing GIS-based spatial information service provide 'physical distance' due to the shortest distance as a priority. but pedestrians tends to choose the path with concerned a lot of emphasis of safety, more vitality way from the crime at night, traffic accidents, and comfort on a road. Human's 'psychological distance' may reflect the spatial information services and provided path should be. In this study, using GIS Road Data implements the axial map with idea of the linear simplification principles. Traditional axial map of the Space Syntax get the assumption from the actual traffic values by comparing the results of correlation relationship. Through these methods, the actual relationship between traffic and test values have the correlation value($R^2$= 0.5387) 50% level and was able to get the results.