• Title/Summary/Keyword: Current signature analysis

Search Result 70, Processing Time 0.026 seconds

Design of Efficient Monitoring and Diagnosis System for Motor Condition Monitoring (모터의 상태 감시를 위한 효율적인 모터 감시 및 진단 시스템의 설계 및 구현)

  • Choi, J.H.;Park, H.S.;Lee, D.Z.;Eo, S.Y.;Kang, T.K.;Jeong, H.P.;Choi, J.P.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10a
    • /
    • pp.167-168
    • /
    • 2006
  • 본 논문은 현장에 운전 중인 모터를 효율적으로 고압 모터 감시 및 진단 기법을 검토하고 현장에 보다 적합한 고압모터 감시 및 진단 시스템을 설계 및 개발에 관하여 기술하였다. 고압 모터의 감시 및 진단 방법은 MCSA(Motor Current Signature Analysis) 기법을 기반으로 하여 순시전력, 공극토크, 진동분석 등 다양한 기법이 있으며 이 기법을 적용한 시스템이 출시되고 있다. 그러나 사용자의 요구 및 편이가 반영되지 않아 그대로 적용하기에는 어려움이 있다. 따라서 본 논문에서는 국내의 실정 및 사용자의 편이 맞도록 진단 시스템을 개발 필요성이 요구되어 다양한 검출 요소를 종합적으로 이용한 보다 현장에 적합하고 유용한 모터 감시 시스템을 설계하였다.

  • PDF

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Design of Fault Diagnostic and Fault Tolerant System for Induction Motors with Redundant Controller Area Network

  • Hong, Won-Pyo;Yoon, Chung-Sup;Kim, Dong-Hwa
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.371-374
    • /
    • 2004
  • Induction motors are a critical component of many industrial processes and are frequently integrated in commercially available equipment. Safety, reliability, efficiency, and performance are some of the major concerns of induction motor applications. Preventive maintenance of induction motors has been a topic great interest to industry because of their wide range application of industry. Since the use of mechanical sensors, such as vibration probes, strain gauges, and accelerometers is often impractical, the motor current signature analysis (MACA) techniques have gained murk popularity as diagnostic tool. Fault tolerant control (FTC) strives to make the system stable and retain acceptable performance under the system faults. All present FTC method can be classified into two groups. The first group is based on fault detection and diagnostics (FDD). The second group is independent of FDD and includes methods such as integrity control, reliable stabilization and simultaneous stabilization. This paper presents the fundamental FDD-based FTC methods, which are capable of on-line detection and diagnose of the induction motors. Therefore, our group has developed the embedded distributed fault tolerant and fault diagnosis system for industrial motor. This paper presents its architecture. These mechanisms are based on two 32-bit DSPs and each TMS320F2407 DSP module is checking stator current, voltage, temperatures, vibration and speed of the motor. The DSPs share information from each sensor or DSP through DPRAM with hardware implemented semaphore. And it communicates the motor status through field bus (CAN, RS485). From the designed system, we get primitive sensors data for the case of normal condition and two abnormal conditions of 3 phase induction motor control system is implemented. This paper is the first step to drive multi-motors with serial communication which can satisfy the real time operation using CAN protocol.

  • PDF

Analysis of the Cryptosystem of the Korean Government Public-Key Infrastructure and Ways to Improve It (행정전자서명 암호체계 기술 현황 분석 및 고도화 방향)

  • Younghoon Jung;Dongyoung Roh;Bonwook Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.13-31
    • /
    • 2023
  • Korean Government-PKI (GPKI) is a public-key infrastructure which provides authentication and security functions for information system used by central government, local governments, and public institutions of the Republic of Korea to provide their own administrative and public services. The current cryptosystem of GPKI was established in the early 2000s, and more than ten years have passed since the last improvement in 2010. Over the past decade or so, the information security, including cryptography, has undergone many changes and will continue to face many changes. Therefore, for the sustainable security of GPKI, it is necessary to review the security of the cryptosystem at this point. In this paper, we analyze the current status and the security of technologies and standards used in the system. We identify cryptographic algorithms with degraded security, international standards which are obsoleted or updated, and cryptographic parameters that should be revised for the high security level. And based on this, we make several suggestions on the reorganization of cryptographic algorithms and related technologies for the security enhancement of GPKI.

Offline Based Ransomware Detection and Analysis Method using Dynamic API Calls Flow Graph (다이나믹 API 호출 흐름 그래프를 이용한 오프라인 기반 랜섬웨어 탐지 및 분석 기술 개발)

  • Kang, Ho-Seok;Kim, Sung-Ryul
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.363-370
    • /
    • 2018
  • Ransomware detection has become a hot topic in computer security for protecting digital contents. Unfortunately, current signature-based and static detection models are often easily evadable by compress, and encryption. For overcoming the lack of these detection approach, we have proposed the dynamic ransomware detection system using data mining techniques such as RF, SVM, SL and NB algorithms. We monitor the actual behaviors of software to generate API calls flow graphs. Thereafter, data normalization and feature selection were applied to select informative features. We improved this analysis process. Finally, the data mining algorithms were used for building the detection model for judging whether the software is benign software or ransomware. We conduct our experiment using more suitable real ransomware samples. and it's results show that our proposed system can be more effective to improve the performance for ransomware detection.

An Observational Multi-Center Study Protocol for Distribution of Pattern Identification and Clinical Index in Parkinson's Disease (파킨슨병 변증 유형 및 지표 분포에 대한 전향적 다기관 관찰연구 프로토콜)

  • HuiYan Zhao;Ojin Kwon;Bok-Nam Seo;Seong-Uk Park;Horyong Yoo;Jung-Hee Jang
    • The Journal of Internal Korean Medicine
    • /
    • v.45 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • Objectives: This study investigated the pattern identification (PI) and clinical index of Parkinson's disease (PD) for personalized diagnosis and treatment. Methods: This prospective observational multi-center study recruited 100 patients diagnosed with PD from two Korean medicine hospitals. To cluster new subtypes of PD, items on a PI questionnaire (heat and cold, deficiency and excess, visceral PI) were evaluated along with pulse and tongue analysis. Gait analysis was performed and blood and feces molecular signature changes were assessed to explore biomarkers for new subtypes. In addition, unified PD rating scale II and III scores and the European quality of life 5-dimension questionnaire were assessed. Results: The clinical index obtained in this study analyzed the frequency statistics and hierarchical clustering analysis to classify new subtypes based on PI. Moreover, the biomarkers and current status of herbal medicine treatment were analyzed using the new subtypes. The results provide comprehensive data to investigate new subtypes and subtype-based biomarkers for the personalized diagnosis and treatment of PD patients. Ethical approval was obtained from the medical ethics committees of the two Korean medicine hospitals. All amendments to the research protocol were submitted and approved. Conclusions: An objective and standardized diagnostic tool is needed for the personalized treatment of PD by traditional Korean medicine. Therefore, we developed a clinical index as the basis for the PI clinical evaluation of PD. Trial Registration: This trial is registered with the Clinical Research Information Service (CRIS) (KCT0008677)

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

Hydrographic Analysis of Surface Water Using Radium Isotopes Signature in the East and South China Sea in Summer (여름철 동중국해 및 남중국해 표층수의 Ra 동위원소를 이용한 수계분석)

  • Yang, Han-Soeb;Lee, Tong-Sup
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.4 no.4
    • /
    • pp.305-311
    • /
    • 1999
  • This study aims to decipher surface water mass interaction in summer in the South China Sea and East China Sea by radium isotope distribution pattern. Salinity and activity ratio of radium ($^{228}Ra/^{226}Ra$) showed gradual changes, which were adequate to apply simple two end-member mixing between Kuroshio surface water and Changjiang Dilute Water for the East China Sea and the former and Nearshore Diluted Watermass (NDW) for the South China Sea. Two tracer methods, salinity and Ra isotope ratio, were compared for East China Sea. Results showed remarkable consistency for waters near Kuroshio, however, discrepancy were noticeable after Tsushima Warm Current branching. Mixing with subsurface waters may cause the discrepancy. When mixed with subsurface waters, salts and radium isotope ratio are expected to be biased in opposite direction, i. e. prone to underestimate the fraction of less saline water in the case of salts and vice versa for Ra isotope ratio. Taking the mean values of two different results seems more realistic to estimate fraction of end-members.

  • PDF

Elements and Application of "SmartHome" Concept for Older Adults in USA (미국에서 노인을 위한 "스마트홈(SmartHome)" 개념의 요소와 적용)

  • Moon, Changho
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.17 no.4
    • /
    • pp.7-14
    • /
    • 2011
  • This paper is intended to suggest some reference materials for future elderly housing design, especially smart home, in Korea, by reviewing the elements and applications of smart home concept for older adults in USA. Research method includes collecting materials by attending the regular SmartHome$^{(R)}$ part meeting, the navigation of related homepages, and the analysis of collected materials. Current researches in Korea look initial stage and show some general principles without practical concept & technologies of elderly facilities. SeniorSmart$^{(R)}$ Center in USA started on August 2007 with the 3 parts of SmartHOME$^{(R)}$, SmartWHEELS$^{(R)}$ and SmartBRAIN$^{(R)}$. The Center has been doing various multidisciplinary research projects but slowing down the planned processes due to national economic recession. The major researches of SmartHome$^{(R)}$ part can be summarized as follows; CS-PFP( Continuous Scale Physical Function Performance) laboratory is being in operation to help older adults and families make the difficult decision regarding the ability and safety to live independently. Three levels of necessary laboratories from uninhabited space to senior living environment were accommodated for field research. As core technologies of SmartHome$^{(R)}$, predicting & warning system of fall risk on recognizing gait signature patterns to identify any deviation from the normal patterns of the older adults, home monitoring system which will send alerts to a specified relative and/or health care professional when vital signs of the older adults will not be within normal parameters, and Mobility & Research Clinic for evaluating, treating the older adults & multidisciplinary research are under development. SmartHome$^{(R)}$ has made collaborative research agreements for field laboratory with various retirement communities and also is continuing to work for experimental software engineering with the Fraunhofer Institute, Germany.