• Title/Summary/Keyword: 점검원

Search Result 409, Processing Time 0.028 seconds

월성1호기 중수증기 회수계통 운전원의 운전능력 향상

  • 박종범;양승권
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.11a
    • /
    • pp.121-126
    • /
    • 1996
  • 월성1호기의 경우 운전원이 중수증기 회수계통 현장 검사(Survey)에 약 3시간 정도를 소요하고 있으며, 자료의 분석과 수집을 위해 각 기기 제어반(Panel)에 기록계(Recorder)를 설치하여 기록된 기록지를 통해서 작업해야 만 한다. 이처럼 기존 설비의 경우 운전원은 많은 시간과 작업 부담을 갖고 운전하게 될 뿐만 아니라 다른 계통을 점검하는데 필요한 많은 시간을 얻기가 어려운 형편이다. 그러나 PLC SYSTEM 내의 한 부분인 공정감시제어를 위한 MMI(Man Machine Interface) SOFTWARE를 사용하여 조사할 경우 약 3분이면 중수증기회수 전 계통을 점검할 수 있고, 경향감시(Trend) 기능을 사용하면 기록계 설치 없이도 과거나 현재의 변화 추이 및 문제점 분석은 물론 계통 결함 발생시 발생되는 경보기능으로 운전원의 신속한 인지가 가능하게 된다.

  • PDF

An Audit Method on Information System Audit using Delphi Method - Based on Hyperledger Fabric (델파이기법을 이용한 감리점검항목 도출 방안 - 하이퍼레저 패브릭 기반으로)

  • Lee, Youngjoo;Park, Sooyong
    • Journal of Software Engineering Society
    • /
    • v.29 no.2
    • /
    • pp.7-12
    • /
    • 2020
  • A project to establish an information system with a project cost of more than 500 million won at a local public firm is subject to the Information System Audit (hereinafter referred to as IS Audit), and the IS Auditor shall conduct audit according to the audit criteria. Recently, as blockchain technology has been applied to various fields such as manufacturing, healthcare, distribution, and public sectors beyond the financial industry, the development of systems that apply blockchain technology is increasing. The use of Hyperledger Fabric, a private blockchain, is on the rise to utilize blockchain technology in public firms and private firms. However, the newly emerging blockchain-based system is not sufficient to carry out auditing with existing audit check items, so it has no choice but to make and use audit items individually. Therefore, a need for verified audit items for systems that base on blockchain technology has emerged. In this study, we customized the Delphi process to derive audit items suitable for the system development project using the blockchain technology, and verified the completeness and accuracy of the audit items derived through a survey by the IS Auditor. This research will be of direct help to the IS Auditor, and it is expected that operators and organizers who provide services through the blockchain-based system will also contribute to improving the quality of the system.

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

Scientific Inspection Method of PC Box Bridges Using Remote Control Tarantula Robot (원격제어 로봇을 이용한 PSC Box교량 내부 점검방법)

  • Lee, Byeong-Ju;Shin, Jae-In;Seo, Jin-Won;Lee, Ji-Yeong;Park, Yeong-Ha
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2009.05a
    • /
    • pp.561-562
    • /
    • 2009
  • The needs for inspection automation for more systematic and efficient maintenance were gradually increased by several inspectors and researchers. With the robotic and digital image processing technologies, in this paper, new inspection automation system were introduced and tested in the real PSC box crack inspection procedures The configuration and scheme of robotic inspection and digital image processing algorithms were represented. The designed robotic sensors and image processing system were tested and the feasibility and possibility of the robot based automatic inspection were approved in the real PSC box bridges.

  • PDF

Factor analysis of VoIP Security Checklists using AHP (AHP를 이용한 VoIP 정보보호 점검항목의 중요도 분석)

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1115-1122
    • /
    • 2012
  • VoIP service is steadily growing due to the spread of smartphones, enhanced network, and various VoIP applications. But, VoIP has many security vulnerabilities because it is based on IP network. This paper analyzes the important weight of VoIP security checklists for incident prevention and response using AHP. The results of AHP analysis showed that network security, incident response, and access control were the most important in technical, administrative, physical standpoint. This study proposes factor analysis of VoIP security checklist at first time. By doing this, it will be used helpfully when VoIP service providers establish their own security policies and inspect their VoIP environment according to their security policies.