• Title/Summary/Keyword: Component development

Search Result 3,943, Processing Time 0.029 seconds

Development of Intrusion Detection System for GOOSE Protocol Based on the Snort (GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발)

  • Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1181-1190
    • /
    • 2013
  • The GOOSE(Generic Object Oriented Substation Event) is used as a network protocol to communicate between IEDs(Intelligent Electronic Devices) in international standard IEC 61850 of substation automation system. Nevertheless, the GOOSE protocol is facing many similar threats used in TCP/IP protocol due to ethernet-based operation. In this paper, we develop a IDS(Intrusion Detection System) for secure GOOSE Protocol using open software-based IDS Snort. In this IDS, two security functions for keyword search and DoS attack detection are implemented through improvement of decoding and preprocessing component modules. And we also implement the GOOSE IDS and verify its accuracy using GOOSE packet generation and communication experiment.

A Study on the Development of Next Generation Wireless PAN Algorithms with Location Awareness Technique (위치인식기반의 차세대 무선 PAN 알고리즘 개발에 관한 연구)

  • Cho, Juphil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2095-2100
    • /
    • 2012
  • In this paper, we propose the channel sounding scheme which is made for ideal communication between some application as well as the short distance of high speed data transmission in MIMO-OFDM system for Wireless PAN. This method is able to perceive the duration of the impulse response through the delaying of power delay profile, modeled a power delay profile which has an attenuate characteristic, and obtained the coefficient of channel response by ML (maximum likelihood). Through the amplitudes, phases and delays associated with each multipath component which were acquired from this channel sounding scheme, we can describe the wave propagation characteristics of channels between the transmitter and receiver so that the receiver could enhance not only the reliability but also the ability of communication link. Multi agent system models can be used to analyze the path of the system within any time frame. Further, parameter values can be perturbed to examine how the path of the system changes in response to exogenous shocks.

Full Color Top Emission AMOLED Displays on Flexible Metal Foil

  • Hack, Michael;Hewitt, Richard;Urbanik, Ken;Chwang, Anna;Brown, Julie J.;Lu, Jeng Ping;Shih, Chinwen;Ho, Jackson;Street, Bob;Ramos, Teresa;Rutherford, Nicole;Tognoni, Keith;Anderson, Bob;Huffman, Dave
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.305-308
    • /
    • 2006
  • Advanced mobile communication devices require a bright, high information content display in a small, light-weight, low power consumption package. For portable applications flexible (or conformable) and rugged displays will be the future. In this paper we outline our progress towards developing such a low power consumption active-matrix flexible OLED $(FOLED^{TM})$ display. We demonstrate full color 100 ppi QVGA active matrix OLED displays on flexible stainless steel substrates. Our work in this area is focused on integrating three critical enabling technologies. The first technology component is based on UDC's high efficiency long-lived phosphorescent OLED $(PHOLED^{TM})$ device technology, which has now been commercially demonstrated as meeting the low power consumption performance requirements for mobile display applications. Secondly, is the development of flexible active-matrix backplanes, and for this our team are employing PARC's Excimer Laser Annealed (ELA) poly-Si TFTs formed on metal foil substrates as this approach represents an attractive alternative to fabricating poly-Si TFTs on plastic for the realization of first generation flexible active matrix OLED displays. Unlike most plastics, metal foil substrates can withstand a large thermal load and do not require a moisture and oxygen permeation barrier. Thirdly, the key to reliable operation is to ensure that the organic materials are fully encapsulated in a package designed for repetitive flexing, and in this device we employ a multilayer thin film Barix encapsulation technology in collaboration with Vitex systems. Drive electronics and mechanical packaging are provided by L3 Displays.

  • PDF

Solvent Extraction of Lithium Ion in Aqueous Solution Using TTA and TOPO (TTA와 TOPO를 이용한 수용액 중의 리튬이온 용매추출)

  • Lee, Jeon-Kyu;Jeong, Sang-Gu;Koo, Su-Jin;Kim, Si-Young;Ju, Chang-Sik
    • Korean Chemical Engineering Research
    • /
    • v.51 no.1
    • /
    • pp.53-57
    • /
    • 2013
  • For the purpose of development of the extraction process of lithium ion from concentrated water eliminated from desalination process, an experimental research on the solvent extraction of lithium ion from aqueous solutions was performed. The effects of operating parameters, such as concentration of extractant, ratio of extracting solution/aqueous solution, pH of aqueous solution, were examined. The effect of sodium chloride, the major component of sea water, was also examined. Lithium ion in aqueous solutions of pH=10.2~10.6 adjusted by ammonia solution was most effectively extracted by extracting solution composed of 0.02 M TTA and 0.04 M TOPO in kerosine. The addition of sodium chloride in lithium aqueous solution significantly interfered the extraction of lithium ion.

The Design and Implementation of AMI System Using Binary CDMA (Binary CDMA 기반의 AMI 시스템 설계 및 구현)

  • Joe, In-Whee;Jeong, Jong-Yuel
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.663-669
    • /
    • 2012
  • To solve the energy problem and finding new growth engines, interest for the smart grid is increasing and related technologies are making great efforts to secure in the world. AMI (Advanced Metering Infrastructure) Among them is the first to be constructed and getting attention as a key component of smart grid. A fusion of various technologies in technology development and demonstration is underway on Jeju Island Smart Grid Demonstration Complex in Korea, and focusing on broadband power line communication technology infrastructure is actively underway in Korea Electric Power Corporation. AMI system using power line communication technology without building a separate communication lines are available for power supply lines, but communication is impossible in occurs because admission to the power company or the ideal infrastructure for communication is not considered. In this paper, we analyze the requirements to build AMI system using Binary CDMA and powerline communications technology, and design the basic communication protocol based on Binary CDMA, implement network management and relay feature. By doing so, ways to apply Ad-hoc Binary CDMA indigenous technology to the AMI system were derived, and could build a system to make use of Wired (PLC) and wireless (Binary CDMA) simultaneously.

Development of TDMA-Based Protocol for Safety Networks in Nuclear Power Plants (원전 안전통신망을 위한 TDMA 기반의 프로토콜 개발)

  • Kim, Dong-Hoon;Park, Sung-Woo;Kim, Jung-Hun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.7
    • /
    • pp.303-312
    • /
    • 2006
  • This paper proposes the architecture and protocol of a data communication network for the safety system in nuclear power plants. First, we establish four design criteria with respect to determinability, reliability, separation and isolation, and verification/validation. Next we construct the architecture of the safety network for the following systems: PPS (Plant Protection System), ESF-CCS (Engineered Safety Features-Component Control System) and CPCS (Core Protection Calculator System). The safety network consists of 12 sub-networks and takes the form of a hierarchical star. Among 163 communication nodes are about 1600 origin-destination (OD) pairs created on their traffic demands. The OD pairs are allowed to exchange data only during the pre-assigned time slots. Finally, the communication protocol is designed in consideration of design factors for the safety network. The design factors include a network topology of star, fiber-optic transmission media, synchronous data transfer mode, point-to-point link configuration, and a periodic transmission schedule etc. The resulting protocol is the modification of IEEE 802.15.4 (LR-WPAN) MAC combined with IEEE 802.3 (Fast Ethernet) PHY. The MAC layer of IEEE 802.15.4 is simplified by eliminating some unnecessary (unctions. Most importantly, the optional TDMA-like scheme called the guaranteed time slot (GTS) is changed to be mandatory to guarantee the periodic data transfer. The proposed protocol is formally specified using the SDL. By performing simulations and validations using Telelogic Tau SDL Suite, we find that the proposed safety protocol fits well with the characteristics and the requirements of the safety system in nuclear power plants.

Development of Damage Mechanism Information System for Equipments in Refinery Industry (정유산업 설비의 손상기구 정보 시스템 개발)

  • Choi J.W.;Seo J.M.;Choi S.C.;Yoon K.B.
    • Journal of the Korean Institute of Gas
    • /
    • v.10 no.1 s.30
    • /
    • pp.32-37
    • /
    • 2006
  • Major components of refinery plants are exposed to various damage mechanisms depending on the operation condition, material selection and kinds of internal fluid. Inspection techniques and damage monitoring methods should be selected considering the damage mechanisms of the components. Hence, it is quite necessary to have an information system with a standardized database on the various damage mechanisms. In this study a damage information system with contents on the damage mechanisms included in API 571 code was developed. Concept of the screening table employed in USA and Japan was also adopted to identify the probable damage mechanisms from the information on operating temperature, internal fluid, metal used for the component and stress condition. This system can be used before the risk based inspection planning to identify key damage mechanisms involved.

  • PDF

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Analysis of Flows around the Rotor-Blades as Rotating Body System of Wind Turbine (풍력 발전기의 Rotor-Blades 회전체 시스템 공력 해석)

  • Kim, Don-Jean;Kwag, Seung-Hyun;Lee, Kyong-Ho
    • Journal of Ocean Engineering and Technology
    • /
    • v.23 no.5
    • /
    • pp.25-31
    • /
    • 2009
  • The most important component of wind turbine is rotor blades. The developing method of wind turbine was focused on design of rotor blade. By the way, the design of a rotating body is more decisive process in order to adjust the performance of wind turbine. For instance, the design allows the designer to specify the wind characteristics derived by topographical map. The iterative solver is then used to adjust one of the selected inputs so that the desired rotating performance which is directly related to power generating capacity and efficiency is achieved. Furthermore, in order to save the money for manufacturing the rotor blades and to decrease the maintenance fee of wind power generation plant, while decelerating the cut-in speed of rotor. Therefore, the design and manufacturing of rotating body is understood as a substantial technology of wind power generation plant development. The aiming of this study is building-up the profitable approach to designing of rotating body as a system for the wind power generation plant. The process was conducted in two steps. Firstly, general designing and it’s serial testing of rotating body for voltage measurement. Secondly, the serial test results above were examined with the CFD code. Then, the analysis is made on the basis of amount of electricity generated by rotor-blades and of cut-in speed of generator.

Strategy for Insecticide Resistance Management Approach to IPM

  • Motoyama, Naoki;Dauterman, W.C.
    • Korean journal of applied entomology
    • /
    • v.31 no.3
    • /
    • pp.314-327
    • /
    • 1992
  • Insecticide resistance is a serious is a serious threat to IPM, resulting in various adverse effects not to mention the loss of yield in agriculture. One approach to counter the problem is the disruption of resistance mechanisms. This can be achieved by (1) compounds which show a negative correlation with resistance at the site of action, (2) specific metabolic inhibitors which serve as synergists, or (3) a certain combination of two insecticides producing a joint action. This approach, however, requires certain precautions for the side effects may cause an increase in toxicity to mammals. Owing to the recent advances in theoretical studies on resistance management employing computer simulation and mathematical models, a few principles to reduce the risk of development of resistance have been clarified. They are helpful in designing operational strategies with regard to, for instance, insecticide doses to be applied, mode of application, and choice and nature of the insecticide(s) to be used. For restoration of insecticide susceptibility of a resistant population, reintroduction of susceptible individuals to the resistant population is feasible when certain conditions are met. Natural enemies which developed resistance to insecticides can be an important component of IPM as has been shown in the pest management in apple orchards. After all, the implementation of a successful resistance management program depends upon cooperation between different sigments of the agricutural community. Although resistance is a preadaptive phenomenon, in some cases spontaneous loss of resistance does occur without contamination by susceptible individuals. The instability of resistance in these insects implies the possible existence of a switch machanism controlling the expression of resistance gene(s). Elucidation of such a mechanism may eventually provide us with a new technical approach with which we can combat the problem of insecticide resistance.

  • PDF