• Title/Summary/Keyword: 실시간 고장진단

Search Result 123, Processing Time 0.019 seconds

Development of the Ice Machine Condition Monitoring System for Remote Diagnosis (원격진단을 위한 제빙기 상태 모니터링 시스템 개발)

  • Kim, Su-hong;Jeong, Jong-mun;Jung, Jin-uk;Jin, Kyo-hong;Hwang, Min-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.230-233
    • /
    • 2016
  • In this paper, we developed the ice machine conditions monitoring system that confirms conditions of the ice machine. The developed system is composed of Communication Board, Server Program, and Web-based User Application. Communication Board which is connected to the ice machine periodically sends various data, such as current, voltage, the refrigerant pressure and temperature, the external temperature and humidity. Server Program stores the data received from Communication Board into database. The manager or the ice machine operator can see the state of the own machine through User Application based on Web. When a symptom is detected on the ice machine, the manager and the operator can checks the current condition of the ice machine by using the data obtained in real time and also prevents the machine troubles by taking proper actions.

  • PDF

Development of Operational Flight Program for Smart UAV (스마트무인기 비행운용프로그램 개발)

  • Park, Bum-Jin;Kang, Young-Shin;Yoo, Chang-Sun;Cho, Am
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.10
    • /
    • pp.805-812
    • /
    • 2013
  • The operational flight program(OFP) which has the functions of I/O processing with avionics, flight control logic calculation, fault diagnosis and redundancy mode is embedded in the flight control computer of Smart UAV. The OFP was developed in the environment of PowerPC 755 processor and VxWorks 5.5 real-time operating system. The OFP consists of memory access module, device I/O signal processing module and flight control logic module, and each module was designed to hierarchical structure. Memory access and signal processing modules were verified from bench test, and flight control logic module was verified from hardware-in-the-loop simulation(HILS) test, ground integration test, tethered test and flight test. This paper describes development environment, software structure, verification and management method of the OFP.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.