• Title/Summary/Keyword: reliability requirements

Search Result 810, Processing Time 0.025 seconds

The Building for Safety Regulation DB of Urban Transit System Infrastructure used by Computer Design Tool (전산지원도구를 이용한 도시철도시설 안전기준 DB구축 연구)

  • Lee, Woo-Dong;Shin, Jeong-Ryul;Ahn, Tai-Ki
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.786-790
    • /
    • 2006
  • Urban rail transit offers target performance and function because various lower part system such as rolling-stock, signal, power and trackis consisted as complex. In order to function properly an urban rail transit which is complicated system to work as safety and reliability, System must secure safety with structure, design, manufacture, install and verification and it is important to establish a safety standard follows it procedures, establish what step all it is important to operate. Safety standard of urban transit infrastructure is minimum standard necessary to secure safety of signal, power and track. Urban rail transit standard business leads to make many requirements. Recently, many types of equipment have applied to manage requirements and standards for system efficiently in part of universal, airline and car accordingly applied equipments use to manage a pursuit(Trace) between standard of system. Especially importance of management is emphasized more become more. Importance of standard management which usesa computing support tool recently in transit filed is embossed and is predicted to be more such forward. Therefore we propose the effective method of management with infrastructure system by constructed data-base system.

  • PDF

150 kJ Compact Capacitive Pulsed Power System for an Electrothermal Chemical Gun

  • Lee, Byung-Ha;Kim, Jin-Sung;Kim, Seong-Ho;Lee, Young-Hyun;Yang, Kyung-Seung
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.6
    • /
    • pp.971-976
    • /
    • 2012
  • A 150 kJ compact capacitive pulsed power system (CCPPS) capable of delivering electrical energy into an electrothermal chemical (ETC) gun on a vehicle has been studied. The CCPPS provides pulsed electrical energy into a capillary plasma injector which generates plasma of tens of thousands $^{\circ}K$ in temperature and has a nonlinear resistance depending on the current. The design requirements of the CCPPS are as follows: the maximum power of 250 MW, the pulse width of about 0.6 ms, the volume of no more than 0.5 cubic meter, the efficiency of energy transfer over 80 % and the repetition rate of 4~5 times per minute. The constructed CCPPS is composed of four 37.5 kJ capacitor bank modules in parallel to make a trapezoid pulse shape and to satisfy the design requirements. Each module is designed to achieve high reliability, safety, efficiency and energy density to endure severe operating conditions. The results of the performance test on the CCPPS using a 120 mm ETC gun are described.

Analysis and Implementation of High Speed Data Processing Technology using Multi-Message Chain and Double Buffering Method with MIL-STD-1553B (MIL-STD-1553B 통신의 다중 메시지 체인과 더블 버퍼링 방식을 적용한 고속 데이터 처리기술 분석 및 구현)

  • Kim, Ki-Pyo;Ahn, Kee-Hyun;Kwon, Yong-Sung;Yun, Seok-Jae;Lee, Sang-Hoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.422-429
    • /
    • 2013
  • MIL-STD-1553B communication is globally used in the area of aerospace and defense which require safety and reliability in spite of its low communication speed. As recently increased requirements for high precision and robust guidance ability of missiles, missile sensor equipment needs more data to satisfy those requirements. Therefore, missile systems to adopt MIL-STD-1553B requires higher data transfer and processing capability than those of the current systems. In this paper, we describe the result of analysis and implementation of the existing methods that applied multi-message chain and double buffers to improve the current missile system.

A Study of Security Threats and Security Requirements of Software Defined Networking Technology (소프트웨어 정의 네트워킹 기술의 보안 위협 및 보안 요구사항에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.561-562
    • /
    • 2017
  • Software defined networking technology allows centralized and powerful network control by separating packet processing and network control. However, powerfulness of software-defined networking technology threats the network itself. Most security researches of software-defined networking focus on discovering and defending network vulnerabilities. But, there is not much security for this technology itself. In this paper, the security vulnerabilities that can occur in this networking technology are analyzed and the security requirements of it are proposed. The biggest threats are the threats to the controller, the reliability problem between the controller and the switch must be solved, and a technique to detect attacks that malfunction by manipulating configuration information are needed.

  • PDF

Development of an evaluation method for nuclear fuel debris-filtering performance

  • Park, Joon-Kyoo;Lee, Seong-Ki;Kim, Jae-Hoon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.738-744
    • /
    • 2018
  • Fuel failure due to debris is a major cause of failure in pressurized water reactors. Fuel vendors have developed various filtering devices to reduce debris-induced failure and have evaluated filtering performance with their own test facilities and methods. Because of the different test facilities and methods, it is difficult to compare filtering performances objectively. This study presents an improved filtering test and an efficiency calculation method to fairly compare fuel-filtering efficiency regardless of the vendor's filtering features. To enhance the reliability of our evaluation, we established requirements for the test method and had a facility constructed according to the requirements. This article describes the debris specimens, the amount of debris, and the replicates for the proposed test method. A calculation method of comprehensive debris-filtering efficiency using a weighted mean is proposed. The test method was verified by repeated tests, and the tests were carried out using the PLUS7 and 17ACE7 test fuels to calculate the comprehensive debris-filtering efficiencies. The evaluation results revealed that the filtering performance of PLUS7 is better than that of 17ACE7. The proposed method can be used on any kind of debris-filtering devices and is appropriate for use as a standard.

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.

Debugging of Parallel Programs using Distributed Cooperating Components

  • Mrayyan, Reema Mohammad;Al Rababah, Ahmad AbdulQadir
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.570-578
    • /
    • 2021
  • Recently, in the field of engineering and scientific and technical calculations, problems of mathematical modeling, real-time problems, there has been a tendency towards rejection of sequential solutions for single-processor computers. Almost all modern application packages created in the above areas are focused on a parallel or distributed computing environment. This is primarily due to the ever-increasing requirements for the reliability of the results obtained and the accuracy of calculations, and hence the multiply increasing volumes of processed data [2,17,41]. In addition, new methods and algorithms for solving problems appear, the implementation of which on single-processor systems would be simply impossible due to increased requirements for the performance of the computing system. The ubiquity of various types of parallel systems also plays a positive role in this process. Simultaneously with the growing demand for parallel programs and the proliferation of multiprocessor, multicore and cluster technologies, the development of parallel programs is becoming more and more urgent, since program users want to make the most of the capabilities of their modern computing equipment[14,39]. The high complexity of the development of parallel programs, which often does not allow the efficient use of the capabilities of high-performance computers, is a generally accepted fact[23,31].

On the Supplementary Study on DSM-Based Interface Requirements through Analysis of the Operation Scenario of the Urban Subway Logistics System

  • Hwang, Sunwoo;Kim, Joouk;Park, Jaemin;Lee, Sangmin;Kim, Youngmin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.152-161
    • /
    • 2022
  • Recently, it is recognized as a high-cost and inefficient logistics system that increases traffic congestion and environmental problems due to an increase in traffic volume due to the activation of the online market. In order to solve inefficient problems such as unavoidable traffic congestion and environmental problems caused by the increase in traffic volume, it is necessary to develop a freight transport system technology using the existing urban railway infrastructure and freight-only urban railway. The urban subway logistics system is a logistics system that requires a combination of various technologies to solve the nationwide demand for urban logistics and road traffic problems. This paper recognized the existing traffic congestion and environmental pollution of road traffic as problems, and supplemented the contact point requirements presented above by identifying the sub-systems constituting the target system and supplementary points for each part-level contact point. In this study, as a complex system operated for one purpose by grafting various technologies, a plan is required to secure the reliability and safety of operation from various viewpoints. The results of this study can contribute to the initial configuration and basic data to solve the interface bottleneck of the urban subway logistics system to be promoted in the future.

Reliability Test Recommendations of Transmission Level HTS Power Cable (송전급 초전도케이블 신뢰성평가를 위한 시험방법)

  • Park, J.;Yang, B.;Kang, J.;Cho, J.;Lee, S.;Shim, K.;Kim, S.
    • Progress in Superconductivity and Cryogenics
    • /
    • v.12 no.3
    • /
    • pp.29-33
    • /
    • 2010
  • For last 10 years, there are big progress and many efforts in the development of HTS power equipments by some country including South Korea. Especially HTS cable system is the strongest candidate among them from the viewpoint of applying to real grid, because of the feature of it, compact and large capacity. In South Korea, transmission level 154kV, the world top voltage class, HTS cable system was installed and has been tested in KEPCO Gochang Underground Cable Test Field since the early of 2010 in order to meet test requirements made by KEPCO, the only grid company in South Korea. The type test of it will be completed by October 2010 and subsequently long-term load cycle test will be performed during 6 months. Also in the near future, KEPCO has a plan to demonstrate transmission level HTS cable system in real grid, in order to meet practical requirements and confirm the feasibility of it. This paper says the test plan of transmission level 154kV HTS cable system and the way how to test it.

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

  • Mi-Kyung Oh;Sangjae Lee;Yousung Kang;Dooho Choi
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.346-357
    • /
    • 2023
  • Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.