• Title/Summary/Keyword: process fault

Search Result 939, Processing Time 0.028 seconds

A Study on Distance Relay of Transmission UPFC Using Artificial Neural Network (신경회로망을 이용한 UPFC가 연계된 송전선로의 거리계전기에 관한 연구)

  • Lee, Jun-Kyong;Park, Jeong-Ho;Lee, Seung-Hyuk;Kim, Jin-O
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.6
    • /
    • pp.37-44
    • /
    • 2004
  • This paper represents a new approach for the protective relay of power transmission lines using a Artificial Neural Network(ANN). A different fault m transmission lines need to be detected classified and located accurately and cleared as fast as possible. However, The protection range of the distance relay is always designed on the basis of fixed settings, and unfortunately these approach do not have the ability to adapt dynamically to the system operating condition. ANN is suitable for the adaptive relaying and the detection of complex faults. The backpropagation algerian based multi-layer protection is utilized for the teaming process. It allows to make control to various protection functions. As expected, the simulation result demonstrate that this approach is useful and satisfactory.

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.

Coupled Hydrological-mechanical Behavior Induced by CO2 Injection into the Saline Aquifer of CO2CRC Otway Project (호주 오트웨이 프로젝트 염수층 내 CO2 주입에 따른 수리-역학적 연계거동 분석)

  • Park, Jung-Wook;Shinn, Young Jae;Rutqvist, Jonny;Cheon, Dae-Sung;Park, Eui-Seob
    • Tunnel and Underground Space
    • /
    • v.26 no.3
    • /
    • pp.166-180
    • /
    • 2016
  • The present study numerically simulated the CO2 injection into the saline aquifer of CO2CRC Otway pilot project and the resulting hydrological-mechanical coupled process in the storage site by TOUGH-FLAC simulator. A three-dimensional numerical model was generated using the stochastic geological model which was established based on well log and core data. It was estimated that the CO2 injection of 30,000t over a period of 200 days increased the pressure near the injection point by 0.5 MPa at the most. The pressure increased rapidly and tended to approach a certain value at an early stage of the injection. The hydrological and mechanical behavior observed from the CO2 flow, effective stress change and stress-strength ratio revealed that the CO2 injection into the saline aquifer under the given condition would not have significant effects on the mechanical safety of the storage site and the hydrological state around the adjacent fault.

An Establishment of Super Wi-Fi Environment in Ships Based on UHF System of TMS

  • Kim, Jungwoo;Son, Jooyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2103-2123
    • /
    • 2018
  • Ships built today are larger in scale and feature more complex structures. The ever-evolving systems used on board a ship require vast amounts of data processing. In the future, with the advent of smart ships, unmanned ships and other next-generation ships, the volumes of data to be processed will continue to increase. Yet, to date, ship data has been processed using wired networks. Placed at fixed locations, the nodes on wired networks often fail to process data from mobile devices. Despite many attempts made to use Wi-Fi on ships just as on land to create wireless networks, Wi-Fi has hardly been available due to the complex metal structures of ships. Therefore, Wi-Fi on ships has been patchy as the ship-wide total Wi-Fi coverage has not properly implemented. A new ship-wide wireless network environment is part of the technology conducive to the shipbuilding industry. The wireless network environment should not only serve the purpose of communication but also be able to manage and control multiple features in real-time: fault diagnostics, tracking, accident prevention and safety management. To better understand the characteristics of wireless frequencies for ships, this paper tests the widely used TETRA, UHF and Wi-Fi and sheds light on the features, advantages and disadvantages of each technology in ship settings. The proposed deployment of a Super Wi-Fi network leveraging the legacy UHF system of TMS generates a ship-wide wireless network environment. The experimental findings corroborate the feasibility of the proposed ship-wide Super Wi-Fi network environment.

An Improvement of Fault Tolerant for Routing using Secondary Header in CBRP (CBRP에서 보조헤더를 이용한 라우팅 고장 극복 개선)

  • 허태성;이균하
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.7
    • /
    • pp.983-996
    • /
    • 2001
  • Mobile Ad Hoc Network (MANET) is a network architecture which has no backborn network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, previously developed routing algorithms in wired networks cannot be used. And many new algorithms have been undergone. This study proposes the Secondary Header approach to the cluster based routing protocol (CBRP). In case, the main header becomes abnormal status so that the main header can not participate the communications between network entities, the secondary header immediately replaces the primary header without selecting process of the new primary header. The performances of proposed algorithm CBRP-SH(Cluster Based Routing Protocol using Secondary Header) are compared with CBRP and results are presented in order to show the effectiveness of the algorithm.

  • PDF

Evaluation of Seismic Response Considering the Ageing Effect of Rubber and Lead-Rubber Bearings Applied to PSC Box Bridge (PSC-Box 교량에 적용된 탄성고무 받침과 납-고무 받침의 노후화 효과를 고려한 지진응답의 평가)

  • Jeong, Yeon Hui;Song, Jong-Keol;Shin, Soobong
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.23 no.6
    • /
    • pp.311-319
    • /
    • 2019
  • The number of aged bridges is increasing so that bridges over 30 years old account for about 11% of all bridges. Consequently, the development of a seismic performance evaluation method that considers the effects of ageing is essential for a seismic retrofitting process for improvement of the seismic safety of existing old bridges. Assessment of the damage situation of bridges after the recent earthquakes in Korea has been limited to the bearings, anchor, and concrete mortar on piers. The purpose of this study is to evaluate the seismic responses of PSC box girder bridges by considering the ageing effect of rubber bearings (RBs) and lead-rubber bearings (LRBs). The modification factor proposed by AASHTO is used to take into account the ageing effect in the bearings. PSC box girder bridges with RBs and LRBs were 3D modeled and analyzed with the OpenSEES program. In order to evaluate the ageing effect of RBs and LRBs, 40 near fault and 40 far field records were used as the input earthquakes. When considering the effect of ageing, the displacement responses and shear forces of bridge bearings (RBs and LRBs) were found to increase mostly under the analytical conditions. It was shown that the effect of ageing is greater in the case of RBs than in the case of LRBs.

Development of Feedback Data Automated Verification Program for Mission S/W (임무 S/W 시험을 위한 피드백 데이터의 기댓값 검증 자동화 도구 개발)

  • Kwon, GI-Bong;Lee, Ha-Yoeun;Ha, Seok-Wun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.10
    • /
    • pp.871-877
    • /
    • 2021
  • Aircraft defects are important matters directly related to the operation of the aircraft and the life of the pilot. The defects in the mission software that occur during aircraft control seriously affect the pilot's mission performance and safety. Therefore, the organization in charge of aircraft development or software defects are reinforced in the process to identify and eliminate defects in the early stages of development, and a lot of labor and time are spent, but due to the nature of the mission software, strong functional coupling with other avionics and high complexity, so there are restrictions on the identification and removal of software defects through the existing test method. This study analyzes the effect of securing mission software integrity and reducing test cost through data integrity verification by developing a tool that automates the verification of expected value of feedback data among communication data of mission computer interlocking equipment.

A study on the effect of cable improvement renovating an old aircraft (노후 항공기 개조 시 케이블 개량에 따른 효과 연구)

  • Lee, Gwang-suk;Yoon, In-bok;Jang, In-dong
    • Journal of IKEEE
    • /
    • v.26 no.2
    • /
    • pp.257-264
    • /
    • 2022
  • As it takes a lot of time and money to develop an aircraft, an environment for renovating and using existing operating aircraft has been created. As a result, many old aircraft were renovated, and due to the aging of the aircraft, more demanding cable requirements were required for renovation projects, and as the number of equipment inside the aircraft gradually increased, the difficulty of system integration increased. In order to solve the difficulties of system integration through systematization of verification procedures, this paper explains VSWR, I-loss, which are the main indicators of antenna cable modification, and explains DTF, one of the problem detection methods. It also explains the elements required for cable design, the environment to be measured, and procedures, and introduces the overall process and effect of antenna cable improvement through demonstration cases.

The Comparative Study of Software Optimal Release Time for the Distribution Based on Shape parameter (형상모수에 근거한 소프트웨어 최적방출시기에 관한 비교 연구)

  • Shin, Hyun-Cheul;Kim, Hee-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, because of the possibility of introducing new faults when correcting or modifying the software, infinite failure non-homogeneous Poisson process models presented and propose an optimal release policies of the life distribution applied fixed shape parameter distribution which can capture the increasing/decreasing nature of the failure occurrence rate per fault. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, after trend test applied and estimated the parameters using maximum likelihood estimation of inter-failure time data, make out estimating software optimal release time

Real-time EKF-based SOC estimation using an embedded board for Li-ion batteries (임베디드 보드를 사용한 EKF 기반 실시간 배터리 SOC 추정)

  • Lee, Hyuna;Hong, Seonri;Kang, Moses;Sin, Danbi;Beak, Jongbok
    • Journal of IKEEE
    • /
    • v.26 no.1
    • /
    • pp.10-18
    • /
    • 2022
  • Accurate SOC estimation is an important indicator of battery operation strategies, and many studies have been conducted. The simulation method which was mainly used in previous studies, is difficult to conduct real-time SOC estimation like real BMS environment. Therefore, this paper aims to implement a real-time battery SOC estimation embedded system and analyze problems that can arise during the verification process. In environment consisting of two Raspberry Pi boards, SOC estimation with the EKF uses data measured by the Simscape battery model. Considering that the operating characteristics of the battery vary depend on the temperature, the results were analyzed at various ambient temperatures. It was confirmed that accurate SOC estimation was performed even when offset fault and packet loss occurred due to communication or sensing problems. This paper proposes a guide for embedded system strategies that enable real-time SOC estimation with errors within 5%.