• Title/Summary/Keyword: 신뢰도 기반 설계

Search Result 1,303, Processing Time 0.036 seconds

Design of High-Reliability eFuse OTP Memory for PMICs (PMIC용 고신뢰성 eFuse OTP 메모리 설계)

  • Yang, Huiling;Choi, In-Wha;Jang, Ji-Hye;Jin, Liyan;Ha, Pan-Bong;Kim, Young-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1455-1462
    • /
    • 2012
  • In this paper, a BCD process based high-reliability 24-bit dual-port eFuse OTP Memory for PMICs is designed. We propose a comparison circuit at program-verify-read mode to test that the program datum is correct by using a dynamic pseudo NMOS logic circuit. The comparison result of the program datum with its read datum is outputted to PFb (pass fail bar) pin. Thus, the normal operation of the designed OTP memory can be verified easily by checking the PFb pin. Also we propose a sensing margin test circuit with a variable pull-up load out of consideration for resistance variations of programmed eFuse at program-verify-read mode. We design a 24-bit eFuse OTP memory which uses Magnachip's $0.35{\mu}m$ BCD process, and the layout size is $289.9{\mu}m{\times}163.65{\mu}m$ ($=0.0475mm^2$).

A Study on the Decision Strategy of Investment Priority Focused on Economics in Distribution Network (경제성에 기반한 배전계통 설비투자 우선순위 결정에 관한 연구)

  • Park, Chang-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.9
    • /
    • pp.31-39
    • /
    • 2009
  • This paper shows prioritization process for equipment investment plans considering reliability indices and economical efficiency. To decide prioritization of distribution investment projects, we made a distribution system model using system configuration, it's component and load information and designed several investment alternatives to improve reliability of present system. Lastly, we proposed a evaluation model of economical efficiency assessment on distribution investment alternative projects. To analyze influence by reliability and economical efficiency, we produced economical effects with applying time-varying failure rate of KEPCO's main equipments of distribution system and interruption cost of electric power affected by investment. Finally, in order to insure the validity of this proposed methodology, we compared investment prioritization by economical evaluation with that of real investment alternatives of KEPCO's branch office. In conclusion, this paper shows what and how to interpret the reliability effects of distribution system investments into financial indicators beneficial for power utilities's managers to make decision on the perspective of corporate value.

A Design of Sybil Attack detection technique using ID-based certificate on Sensor network (센서 네트워크에서 ID기반 인증서를 이용한 Sybil 공격 탐지 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.467-470
    • /
    • 2012
  • This paper proposes a technique of sybil attack detection using an ID-based certificate on sensor network. First, it can solve the broadcast storm problem happening when keys are distributed to sensor nodes. Second, it prevents the replay attack by periodically generating and changing the keys of sensor nodes with Key-chain technique. Third, it authenticates sensor node's ID using hash function. So, it maximizes sensor node's memory usage, reduces communication overhead. Finally it detects Sybil attack through ID-based certificate. Therefore, the proposed technique of Sybil attack detection using ID-based certificate consider simultaneously energy efficiency and stability on sensor network environment, and can trust the provided information through sensor network.

  • PDF

Fuzzy-based Segment-Boost Method for Effective Face Recognition (퍼지기반 Segment-Boost 방법을 통한 효과적인 얼굴인식)

  • Chang, Won-Suk;Noh, Chang-Hyeon;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.1
    • /
    • pp.17-25
    • /
    • 2009
  • This paper suggests fuzzy-based Segment-Boost method and an effective method for face recognition using the fuzzy-based Segment-Boost. Fuzzy-based Segment-Boost eliminates the limitations of Segment-Boost, and it guarantees improved learning performance and the stability of the performance. By using the fuzzy theory, fuzzy-based Segment-Boost optimizes the selection number of sub-vectors, and leads the optimized learning performance. The fuzzy controller designed in this paper measures learning performance of the fuzzy-based Segment-Boost, and it controls the selection number of sub-vectors by inferring the optimized selection number. The simulation results show that the fuzzy controller inferred the selection number which is very approximate to the true optimized value. As a result, fuzzy-based Segment-Boost showed higher face recognition rate than compared boosting methods and it preserves the velocity of feature selection as fast as that of Segment-Boost. From the experimental results, it was proved that fuzzy-based Segment-Boost has improved and stable performances of learning, feature selection and face recognition.

Designing and Implementing a PKI-based Safety Protocol for Electronic Medical Record Systems (공개키 기반의 안전한 전자의무기록에 관한 프로토콜 설계 및 구현)

  • Jin, Gang-Yoon;Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.243-250
    • /
    • 2012
  • This study proposes new protocol protecting patients' personal record more safely as well as solving medical dispute smoothly by storing the record not into a computer server in hospitals but into the National Health Insurance Corporation computer server. The new protocol for electronic medical record is designed using RSA public key algorithm and DSA digital signature. In addition, electronic medical record systems are built up with more safety and reliability through certificate authority. The proposed medical information systems can strengthen trust between doctors and patients. If medical malpractice occurs, the systems can also provide evidence. Furthermore, the systems can be helpful to reduce medical accidents. The systems could be also utilized efficiently in various applied areas.

Life Test Design and Evaluation of Inertial Measurement Unit for Guided Weapons (유도무기용 관성측정기 수명 시험 설계 및 평가)

  • Jo, Kyoung Hwan;Moon, Sang Chan;Yun, Suk Chang;Kwon, Seung Bok;Kim, Do Hyung;Yang, Il Young
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.5
    • /
    • pp.94-101
    • /
    • 2022
  • In this paper, we have obtained the acceleration coefficient of the IMU (Inertial Measurement Unit) to prove reliability by analyzing the characteristic of the MEMS IMU installed in guided weapon systems for overseas export and the operating environment of the guided weapon system. Additionally, based on designed life testing, we performed life tests on three the IMUs and demonstrated a target lifetime of 12 years.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

Design and Implementation of Gateway System for Digital Substation based on IEC61850 (IEC61850 기반 디지털변전소 게이트웨이 시스템의 설계 및 구현)

  • Hyu, Mu-Yong;Lee, Jung-Hyun;Choi, Jon-Phil;Song, Wan-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.233_234
    • /
    • 2009
  • 2005년 유틸리티 산업분야 국제표준 규약으로서 IEC61850이 발표된 이후, 변전소 자동화 시스템 설계 및 구현을 위한 새로운 패러다임으로 인식되고 있다. 현재, 유럽시장을 중심으로 IEC61850 규약과 호환되는 많은 제품들이 출시되고 있고 다양한 구현사례를 통해 그 적용가능성 및 타당성이 검증되고 있다. 그러나, 변전소 자동화의 기본 통신규약으로서 IEC61850이 도입될 경우, 이미 기존에 설치되어 운용중인 수많은 전력설비 감시/제어 시스템 및 상위 제어센터와의 통신 호환성 문제가 발생되며, 향후, IEC61850 기반의 디지털변전소 확대 적용에 장애 요인으로 대두되고 있다. 본 논문에서는 이러한 문제점을 해결하기 위해 IEC61850 기반의 변전소자동화 용 게이트웨이 시스템을 설계하고 구현하였다. 제안된 시스템은 기존에 운용되고 있는 전력설비 감시/제어 시스템과의 호환성 제공은 물론, 변전소 내의 IEC61850 IED들과 상위제어센터 내의 송변전 SCADA 시스템간 통신 및 상호운영성을 제공한다. 또한, 시스템의 가용성 및 신뢰성을 보장하기 위한 이중화 메커니즘을 지원한다.

  • PDF

Design and Implementation of MQTT Based Real-time HVAC Control Systems (MQTT 기반 실시간 공조제어 시스템 설계 및 구현)

  • Jung, Hun;Park, Chong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1163-1172
    • /
    • 2015
  • In this paper, an MQTT based protocol is designed and implemented for control, management and monitoring of HVAC in a cloud platform in real time. The MQTT protocol is a two-way messaging protocol, and has the generality, flexibility, light weighted, quickness with reliability and security. In the implemented system, performance and reliability of the communication protocol is considered for data acquisition and control between the CCU and the cloud server. Control and monitoring for the cloud server is performed in real time in conjunction with CCU and the MQTT server.

A Scalability based Energy Model for Sustainability of Blockchain Networks (블록체인 네트워크의 지속 가능성을 위한 확장성 기반 에너지 모델)

  • Seung Hyun Jeon;Bokrae Jung
    • Journal of Industrial Convergence
    • /
    • v.21 no.8
    • /
    • pp.51-58
    • /
    • 2023
  • Blockchains have recently struggled to design for the ideal distributed trust networks by solving scalability trilemma. However, local conflicts between some countries lead to imbalance on energy distribution. Besides, blockchain networks (e.g., Bitcoin) currently consume enormous energy for transaction and mining. The existing data volume based trust model evaluated an increasing blockchain size better than Lubin's trust model in scalability trilemma. In this paper, we propose a scalability based energy model to evaluate sustainability for blockchain networks, considering energy consumption for transaction, time duration, and the blockchain size of growing blockchain networks. Through the rigorous numerical analysis, we compare the proposed scalability based energy model with the existing model for the satisfaction and optimal blockchain size. Thus, the scalability based energy model will provide an assessment tool to choose the proper blockchain networks to solve scalability trilemma problem and prove sustainability.