• Title/Summary/Keyword: reliability and safety

Search Result 3,067, Processing Time 0.029 seconds

Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants (원전 계측제어계통의 안전 네트워크 설계 및 평가를 위한 보안 기준)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.267-271
    • /
    • 2014
  • Nuclear power plant data networks and their associated safety systems are being modernized to include many information technology (IT) networks and applications. Along with the advancement of plant data networks (PDN), instrumentation and control systems are being upgraded with modern digital, microprocessor-based systems. However, nuclear PDN is confronted significant side-effects, which PDN is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in nuclear PDN. Consequently, it should be designed fully ensuring the PDN meet all reliability, performance and security requirements in order to overcome the disadvantages raised from adaption of IT technology. In this paper, we provide technical security criteria should be used in design and evaluation of secure PDN. It is believed PDN, which is designed and operated along with these technical security critera, effectively protect against possible outside cyber threats.

Open Source Software Security Issues and Applying a Secure Coding Scheme (오픈 소스의 소프트웨어 보안 문제 및 시큐어 코딩 적용방안)

  • Kim, Byoungkuk
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.487-491
    • /
    • 2017
  • Open source software allows the users to freely use, copy, distribute and modify source code without any particular limitations, and this offers the advantages of low entry cost, fast and flexible development, compatibility, reliability and safety. The emergence of many useful open source projects has the advantage of achieving high levels of output with lower costs and time commitment for software development. However, this also increases the risks caused by the security vulnerabilities of the used open source software. There is still no separate process to verify security in using open source software. In this paper, we analyze the security weakness in open source and propose a secure coding scheme in adopting open source, which is known to be highly reliable from a security point of view.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

The Reliability of Eye Screening Physical Examination in School and Living Environment Characteristics of Young Children with Amblyopia (유소년 약시환자의 생활환경 특성과 학교신체검사 안검진의 신뢰성)

  • Oh, Won-Geon;Kim, Sung-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.262-270
    • /
    • 2014
  • Considering that few studies had paid attention to the living characteristics and social environment surrounding amblyopes, the present study surveyed the parents of children aged 3 to 12 and diagnosed-with amblyopia to analyse the time when the children were first diagnosed-with amblyopia, the characteristics of their living environment and the socio-environmental factorsand to delve into correlations. For the purpose of this study, 104 parents of patients in 4 hospitals in Seoul, Gyeonggi and Incheon consented to participate in the survey from September 2 to November 23: 2013. As for the time when the children were first diagnosed with amblyopia: the age of 4 accounted for the highest percentage(28.8%). The older the parents were: the later the children were diagnosed with amblyopia (p<.01). The higher the education of parents, the earlier the diagnosis of amblyopia(p<.05). The present findings-will be conducive to decreasing the number of patients who have no choice but to live-with low vision for life by missing some timely visual acuity tests and ophthalmological examination and particularly to developing a social safety net that can realize national medical welfare for the low-income families and the socially disadvantaged class.With the help of information technology.

The Requirements of Internet of Thing Platform for Railway Environments (철도 환경에 적합한 사물인터넷 플랫폼의 요구사항 분석)

  • Kim, Juyeop;Song, Yong-Soo;Kim, Yong-Kyu;Choi, Sang Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.833-842
    • /
    • 2016
  • The governments in many country recently focus their efforts on developing the industry of Internet of Thing (IoT). At the same time, each industrial field considers to apply the IoT concept and develops their own IoT system for upgrading the existing services or launching new services. In the railway field, many organizations such as Korea Rail Network Authority (KR) expect that the IoT concept can bring many good effects and try to adopt IoT to their existing railway services. In this paper, we survey the current technology level of IoT platform, which is a core technology to realize IoT, and figure out the technical requirements and challenges to apply IoT platform to railway environments.

Co-evolutionary Structural Design Framework: Min(Volume Minimization)-Max(Critical Load) MDO Problem of Topology Design under Uncertainty (구조-하중 설계를 고려한 공진화 구조 설계시스템)

  • 양영순;유원선;김봉재
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.16 no.3
    • /
    • pp.281-290
    • /
    • 2003
  • Co Evolutionary Structural Design(CESD) Framework is presented, which can deal with the load design and structural topology design simultaneously. The load design here is the exploration algorithm that finds the critical load patterns of the given structure. In general, the load pattern is a crucial factor in determining the structural topology and being selected from the experts어 intuition and experience. However, if any of the critical load patterns would be excluded during the process of problem formation, the solution structure might show inadequate performance under the load pattern. Otherwise if some reinforcement method such as safety factor method would be utilized, the solution structure could result in inefficient conservativeness. On the other hand, the CESD has the ability of automatically finding the most critical load patterns and can help the structural solution evolve into the robust design. The CESD is made up of a load design discipline and a structural topology design discipline both of which have the fully coupled relation each other. This coupling is resolved iteratively until the resultant solution can resist against all the possible load patterns and both disciplines evolve into the solution structure with the mutual help or competition. To verify the usefulness of this approach, the 10 bar truss and the jacket type offshore structure are presented. SORA(Sequential Optimization & Reliability Assessment) is adopted in CESD as a probabilistic optimization methodology, and its usefulness in decreasing the computational cost is verified also.

Remote Communication of sensor data in Ballast Water Treatment System (선박 평형수 처리 시스템에서 센서 데이터의 원격 통신)

  • Kim, Chin-Hoon;Kim, Joo-Man;Kim, Byoung-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.139-147
    • /
    • 2014
  • The ballast water may be discharged into another sea area with marine organisms, it caused problems to disturb the marine ecosystem. So, in order to remove these environmental risk factors, the IMO has mandated the installation of BWTS to the all ships. Our monitoring system diagnose and predict a failure of BWTS by analyzing the sensor information of BWTS collected from which the ships scattered in the ocean of several. This paper presents the design and implementation of communication modules for BWTS remote monitoring considering the satellite communication charge fee. In the our study, we implemented the safety and cost-saving communication modules by LabVIEW program. The collected sensor informations is encrypted and compressed by LabVIEW modules running on RIO. Then they will be transfer to the land server and will be decrypt to enable monitoring in the land server. For the verification, we build the test modules which can verify from collecting the sensor data to consuming them in the monitoring server. We carried out 20 times for the data pattern in all of case. So, we verified the excellent functionality and reliability through the experimental result.

IEEE 802.15.4 Ad-Hoc Wireless Sensor Network Routing Method Applying EtherCAT Communication Method (EtherCAT 통신방식을 응용한 IEEE 802.15.4 Ad-Hoc 무선 센서 네트워크 라우팅 방식)

  • Park, Jeong-Hyeon;Seo, Chang-Jun
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.289-301
    • /
    • 2018
  • IIoT, the IoT technology applied to the industrial field, is being used as a monitoring technology for increasing in production rate and safety of workers. However, monitoring through the construction of IIoT network using Ethernet and RS485 in production lines where dozens to hundreds of machine tools are manufacturing components, have difficulties of infrastructure cost and network flexibility and fluidity. Therefore, in this paper, using IEEE 802.15.4 standard WSN device to construct a Ad-Hoc WSN in the production line. In addition, the transmission period and order of the sensor nodes are set by applying the EtherCAT communication method in which the payload frames are shared by all the sensor nodes. From this, we have overcome the problem of reliability decline and real-time issue due to the packet collision of wireless network and confirmed that it is a wireless network routing method that can be used in the actual industrial field.

A Study on AE Signal Analysis of Composite Materials Using Matrix Piezo Electric Sensor (매트릭스형 피에조센서를 이용한 복합재료 AE신호 분석에 관한 연구)

  • Yu, Yeun-Ho;Choi, Jin-Ho;Kweon, Jin-Hwe
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.27 no.1
    • /
    • pp.1-7
    • /
    • 2007
  • As fiber reinforced composite materials are widely used in aircraft, space structures and robot arms, the study on non-destructive testing methods has become an important research area for improving their reliability and safety. AE (acoustic emission) can evaluate the defects by detecting the emitting strain energy when elastic waves are generated by the initiation and growth of crack, plastic deformation, fiber breakage, matrix cleavage, or delamination. In the paper, AE signals generated under uniaxial tension were measured and analyzed using the $8{\times}8$ matrix piezo electric sensor. The electronic circuit to control the transmitting distance of AE signals was designed and constructed. The optical data storage system was also designed to store the AE signal of 64channels using LED (light emitting diode) elements. From the tests, it was shown that the source location and propagation path of AE signals in composite materials could be detected effectively by the $8{\times}8$ matrix piezo electric sensor.

Pharmacopuncture for Stroke: An Overview of Meta-Analyses (뇌졸중의 약침 치료에 대한 메타분석의 통합적 고찰)

  • Kim, Mikyung;Han, Chang-ho
    • The Journal of Internal Korean Medicine
    • /
    • v.40 no.6
    • /
    • pp.1081-1100
    • /
    • 2019
  • Objectives: This study is an overview of the meta-analysis and systematic review of randomized controlled trials investigating the clinical effectiveness and safety of pharmacopuncture for patients with stroke. Methods: Core electronic databases were searched from their inception to 21 May 2019. A measurement tool to assess systematic reviews (AMSTAR 2) was applied to screen high-quality studies. The results of these studies were summarized, and additional meta-analysis was conducted. The Grading of Recommendations Assessment, Development, and Evaluation (GRADE) was used to evaluate the certainty of evidence. Results: Sixteen studies met eligibility criteria. Four were excluded owing to insufficiency of AMSTAR 2 or low data reliability. The finally selected 12 studies were about pharmacopuncture using either a single herb extract, such as Dengzhan xixin, Sanch, Ginkgo biloba, or Acanthopanax, or a mixture of herbs, such as Compound danshen, Shenxiong, Xingnaojing, or Mailuoning. Most of the patients were from China, with acute ischemic stroke. All the studies using a pharmacopuncture versus a non-pharmacopuncture design reported the significant superiority of pharmacopuncture on every outcome measure. On the other hand, in a few studies, pharmacopuncture was inferior to active control in improving neurological deficit. Few studies reported adverse events. Conclusions: It is difficult to apply the results of this study directly to Korea, because the level of evidence is generally low and the clinical settings and social acceptance of pharmacopuncture therapy differ in Korea and China. Further studies are warranted to confirm the domestic applicability of evidence generated in China and to create evidence that supports the domestic situation.