• Title/Summary/Keyword: software functional safety

Search Result 79, Processing Time 0.022 seconds

An original device for train bogie energy harvesting: a real application scenario

  • Amoroso, Francesco;Pecora, Rosario;Ciminello, Monica;Concilio, Antonio
    • Smart Structures and Systems
    • /
    • v.16 no.3
    • /
    • pp.383-399
    • /
    • 2015
  • Today, as railways increase their capacity and speeds, it is more important than ever to be completely aware of the state of vehicles fleet's condition to ensure the highest quality and safety standards, as well as being able to maintain the costs as low as possible. Operation of a modern, dynamic and efficient railway demands a real time, accurate and reliable evaluation of the infrastructure assets, including signal networks and diagnostic systems able to acquire functional parameters. In the conventional system, measurement data are reliably collected using coaxial wires for communication between sensors and the repository. As sensors grow in size, the cost of the monitoring system can grow. Recently, auto-powered wireless sensor has been considered as an alternative tool for economical and accurate realization of structural health monitoring system, being provided by the following essential features: on-board micro-processor, sensing capability, wireless communication, auto-powered battery, and low cost. In this work, an original harvester device is designed to supply wireless sensor system battery using train bogie energy. Piezoelectric materials have in here considered due to their established ability to directly convert applied strain energy into usable electric energy and their relatively simple modelling into an integrated system. The mechanical and electrical properties of the system are studied according to the project specifications. The numerical formulation is implemented with in-house code using commercial software tool and then experimentally validated through a proof of concept setup using an excitation signal by a real application scenario.

A Construction and Operation Analysis of Group Management Network about Control Devices based on CIM Level 3 (CIM 계층 3에서 제어 기기들의 그룹 관리 네트워크 구축과 운영 해석)

  • 김정호
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.87-101
    • /
    • 1999
  • To operate the automatic devices of manufacturing process more effectively and to solve the needs of the resource sharing, network technology is applied to the control devices located in common manufacturing zone and operated by connecting them. In this paper, functional standard of the network layers are set as physical and data link layer of IEEE 802.2, 802.4, and VMD application layer and ISO-CIM reference model. Then, they are divided as minimized architecture, designed as group objects which perform group management and service objects which organizes and operates the group. For the stability in this network, this paper measures the variation of data packet length and node number and analyzes the variated value of the waiting time for the network operation. For the method of the analysis, non-exhausted service method are selected, and the arrival rates of the each data packet to the nodes that are assumed to form a Poission distribution. Then, queue model is set as M/G/1, and the analysis equation for waiting time is found. For the evalution of the performance, the length of the data packet varies from 10 bytes to 100 bytes in the operation of the group management network, the variation of the wating time is less than 10 msec. Since the waiting time in this case is less than 10 msec, response time is fast enough. Furthermore, to evaluate the real time processing of the group management network, it shows if the number of nodes is less than 40, and the average arrival time is less than 40 packet/sec, it can perform stable operation even taking the overhead such as software delay time, indicated packet service, and transmissin safety margin.

  • PDF

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.

Application of Sequence Diagrams to the Reverse Engineering Process of the ESf-ccs

  • Hasan, Md. Mehedi;Elakrat, Mohamed;Mayaka, Joyce;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.1
    • /
    • pp.1-8
    • /
    • 2019
  • Reverse engineering involves examining a system or component so as to comprehend its structure, functionality, and operation. Creation of a system model in reverse engineering can serve several purposes: test generation, change impact analysis, and the creation of a new or modified system. When attempting to reverse engineering a system, often the most readily accessible information is the system description, which does not readily lend itself to use in Model Based System Engineering (MBSE). Therefore, it is necessary to be able to transform this description into a diagram, which clearly depicts the behavior of the system as well as the interaction between components. This study demonstrates how sequence diagrams can be extracted from the systems description. Using MBSE software, the sequence diagrams for the Engineered Safety Features Component Control System (ESF-CCS) of the Nuclear Power Plant are created. Sequence diagrams are chosen because they are a means of representing the systems behavior and the interaction between components. In addition, from these diagrams, the system's functional requirements can be elicited. These diagrams then serve as the baseline of the reverse engineering process and multiple system views are subsequently be created from them, thus speeding up the development process. In addition, the use of MBSE ensures that any additional information obtained from auxiliary sources can then be input into the system model, ensuring data consistency.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

Development of a Real-time OS Based Control System for Laparoscopic Surgery Robot (복강경 수술로봇을 위한 실시간 운영체제 기반 제어 시스템의 개발)

  • Song, Seung-Joon;Park, Jun-Woo;Shin, Jung-Wook;Kim, Yun-Ho;Lee, Duk-Hee;Jo, Yung-Ho;Choi, Jae-Seoon;Sun, Kyung
    • Journal of Biomedical Engineering Research
    • /
    • v.29 no.1
    • /
    • pp.32-39
    • /
    • 2008
  • This paper reports on a realtime OS based master-slave configuration robot control system for laparoscopic surgery robot which enables telesurgery and overcomes shortcomings with conventional laparoscopic surgery. Surgery robot system requires control system that can process large volume information such as medical image data and video signal from endoscope in real-time manner, as well as precisely control the robot with high reliability. To meet the complex requirements, the use of high-level real-time OS (Operating System) in surgery robot controller is a must, which is as common as in many of modem robot controllers that adopt real-time OS as a base system software on which specific functional modules are implemened for more reliable and stable system. The control system consists of joint controllers, host controllers, and user interface units. The robot features a compact slave robot with 5 DOF (Degree-Of-Freedom) expanding the workspace of each tool and increasing the number of tools operating simultaneously. Each master, slave and Gill (Graphical User Interface) host runs a dedicated RTOS (Real-time OS), RTLinux-Pro (FSMLabs Inc., U.S.A.) on which functional modules such as motion control, communication, video signal integration and etc, are implemented, and all the hosts are in a gigabit Ethernet network for inter-host communication. Each master and slave controller set has a dedicated CAN (Controller Area Network) channel for control and monitoring signal communication with the joint controllers. Total 4 pairs of the master/slave manipulators as current are controlled by one host controller. The system showed satisfactory performance in both position control precision and master-slave motion synchronization in both bench test and animal experiment, and is now under further development for better safety and control fidelity for clinically applicable prototype.

Proposal of a Fail-Safe Requirement Analysis Procedure to Identify Critical Common Causes an Aircraft System (항공기 시스템의 치명적인 공통 요인을 식별하기 위한 고장-안전 요구분석 절차 제안)

  • Lim, San-Ha;Lee, Seon-ah;Jun, Yong-Kee
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.4
    • /
    • pp.259-267
    • /
    • 2022
  • The existing method of deriving the fail-safe design requirements for the domestic developed rotary-wing aircraft system may miss the factors that cause critical system function failures, when being applied to the latest integrated avionics system. It is because the existing method analyzes the severity effect of the failures caused by a single item. To solve the issue, we present a systematic analysis procedure for deriving fail-safe design requirements of system architecture by utilizing functional hazard assessment and development assurance level analysis of SAE ARP4754A, international standard for complex system development. To demonstrate that our proposed procedure can be a solution for the aforementioned issue, we set up experimental environments that include common factors that can cause critical function failures of a system, and we conducted a cross-validation with the existing method. As a result, we showed that the proposed procedure can identify the potential critical common factors that the existing method have missed, and that the proposed procedure can derive fail-safe design requirements to control the common factors.

Construction of real-time remote ship monitoring system using Ka-band payload of COMS (천리안 위성통신을 이용한 실시간 원격 선박 모니터링 체계 구축)

  • Jeong, Jaehoon;Kim, Tae-Ho;Yang, Chan-Su
    • Korean Journal of Remote Sensing
    • /
    • v.32 no.3
    • /
    • pp.323-330
    • /
    • 2016
  • Communication, Ocean and Meteorological Satellite (COMS) was launched in 2010 with three payloads that include Ka-band communication payload developed by Ministry of Science, ICT and Future Planning (MSIP) and Electronics and Telecommunications Research Institute (ETRI). This study introduces a real-time remote vessel monitoring system built in the Socheongcho Ocean Research Station using the Ka-band communication satellite. The system is composed of three steps; real-time data collection, transmission, and processing/visualization. We describe hardware (H/W) and software systems (S/W) installed to perform each step and the whole procedure that made the raw data become vessel information for a real-time ocean surveillance. In addition, we address functional requirements of H/W and S/W and the important considerations for successful operation of the system. The system is now successfully providing, in near real-time, ship information over a VHF range using AIS data collected in the station. The system is expected to support a rapid and effective surveillance over a huge oceanic area. We hope that the concept of the system can be fully used for real-time maritime surveillance using communication satellite in future.

Testing The Healing Environment Conditions for Nurses with two Independent Variables: Visibility Enhancement along with Shortening the Walking Distance of the Nurses to Patient - Focused on LogWare stop sequence and space syntax for U-Shape, L- Shape and I-Shape NS-

  • Shaikh, Javaria Manzoor;Park, Jae Seung
    • KIEAE Journal
    • /
    • v.15 no.2
    • /
    • pp.19-26
    • /
    • 2015
  • Purpose: Maximizing human comfort in design of medical environments depends immensely on specialized architects particularly critical care design; the study proposes Evidence-Based Design as an apparent analog to Evidence-Based Medicine. Healthcare facility designs are substantially based on the findings of study in an effort to design environments that augment care by improving patient safety and being therapeutic. On SPSS (Statistical Package for Social Science) t-test is applied to simulate two independent variables of PDR (Pre Design-Research) and POE (Post- Occupancy Evaluation). PDR is conducted on relatively new hospital Hallym University Dongtan Sacred Heart Hospital to analyse visibility from researchers' point of view, here the ICU is arranged in I-Shape. POE is applied on Dongguk University Ilsan Hospital to simulate walking on LogWare where two NS are designed based on L- Shape and Seoul St. Mary's Hospital, The Catholic University of Korea where five NS are functional for ICU Intensive Care Unit, Surgical Intensive Care Unit (SICU), Medical Intensive Care Unit (MICU), Critical Care Unit (CCU), Korean Oriental Medical Care Unit which are mostly arranged in U-Shape, and walking pattern is recognized to be in a zigzag path. Method: T-Test is applied on two dependent communication variables: walkability and visibility, with confidence interval of 95%. This study systematically analyses the Nurse Station (NS) typo-morphology, and simulates nurse horizontal circulation, by computing round route visits to patient's bed, then estimating minimum round route on LogWare stop sequence software. The visual connectivity is measured on depth map graphs. Hence the aim is to reduce staff stress and fatigue for better patients care by minimizing staff horizontal travel time and to facilitate nurse walk path and support space distribution by increasing effectiveness in delivering care. Result: Applying visibility graph and isovist field on space syntax on I- Shape, L- Shape and U- Shape ICU (SICU, MICU and CCU) configuration, I-shape facilitated 20% more patients in linear view as they stir to rise from their beds from nurse station compared to U-shape. In conclusion, it was proved that U-Shape supply minimum walking and maximum visibility; and L shape provides just visibility as the nurse is at pivot. I shape provides panoramic view from the Nurse Station but very rigorous walking.