• Title/Summary/Keyword: Event Code

Search Result 230, Processing Time 0.025 seconds

A Study on the Implementation Effect of Accident Management Strategies on Safety

  • Moosung Jae;Kim, Dong-Ha;Jin, Young-Ho
    • Nuclear Engineering and Technology
    • /
    • v.28 no.3
    • /
    • pp.247-256
    • /
    • 1996
  • This paper presents a new approach for assessing accident management strategies using containment event trees (CETs) developed during an individual plant examination (IPE) for a reference plant (CE type, 950 MWe PWR). Various accident management strategies to reduce risk have been proposed through IPE. Three strategies for the station blackout sequence are used as an example : 1) reactor cavity flooding only, 2) primary system depressurization only, and 3) doing both. These strategies are assumed to be initiated at about the time of core uncovery. The station blackout (SBO) sequence is selected in this paper since it is identified as one of the most threatening sequences to safety of the reference plant. The effectiveness and adverse effects of each accident management strategy are considered synthetically in the CETs. A best estimate assessment for the developed CETs using data obtained from NUREG-1150, other PRA results, and the MAAP code calculations is performed. The strategies are ranked with respect to minimizing the frequencies of Various containment failure modes. The proposed approach is demonstrated to be very flexible in that it can be applied to any kind of accident management strategy for any sequence.

  • PDF

Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices (안드로이드 모바일 단말에서의 실시간 이벤트 유사도 기반 트로이 목마 형태의 악성 앱 판별 메커니즘)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.31-43
    • /
    • 2014
  • Large number of Android mobile application has been developed and deployed through the Android open market by increasing android-based smart work device users recently. But, it has been discovered security vulnerabilities on malicious applications that are developed and deployed through the open market or 3rd party market. There are issues to leak user's personal and financial information in mobile devices to external server without the user's knowledge in most of malicious application inserted Trojan Horse forms of malicious code. Therefore, in order to minimize the damage caused by malignant constantly increasing malicious application, it is required a proactive detection mechanism development. In this paper, we analyzed the existing techniques' Pros and Cons to detect a malicious application and proposed discrimination and detection result using malicious application discrimination mechanism based on Jaccard similarity after collecting events occur in real-time execution on android-mobile devices.

Response Modification Coefficient Using Natural Period (고유진동주기를 이용한 응답수정계수)

  • 김희중
    • Computational Structural Engineering
    • /
    • v.9 no.4
    • /
    • pp.229-237
    • /
    • 1996
  • In some current procedures, ground motions from different sources have been scaled by their peak ground accelerations and combined to obtain smoothed response spectra for specific regions. As consideration of the inelastic deformation capacity of structure, inelastic deformations are permitted under seismic ground excitation in all codes. In the ATC(Applied Technology Council) and UBC(Uniform Building Code), the inelastic design spectrum is obtained by reducing the elastic design spectrum by a factor that is independent of structural period. In this study, the average of nonlinear response spectra calculated from a sample of 20 records for each event are constructed to obtain the smoothed response spectra. These response spectra are used to examine the effects of structural strength factors such as the yield strength ratio and damping value. Through the regression analysis of nonlinear response of system for a given damping value and yield strength ratio, the required yield strength for seismic design can be estimated for a certain earthquake event. And a response modification coefficient depending on the natural period for current seismic design specifications are proposed.

  • PDF

Engineering Model Design and Implementation of Mass Memory Unit for STSAT-2 (과학기술위성 2호 대용량 메모리 유닛 시험모델 설계 및 구현)

  • Seo, In-Ho;Ryu, Chang-Wan;Nam, Myeong-Ryong;Bang, Hyo-Choong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.11
    • /
    • pp.115-120
    • /
    • 2005
  • This paper describes the design and implementation of engineering model(EM) of Mass Memory Unit(MMU) for Science and Technology Satellite 2(STSAT-2) and the results of integration test. The use of Field-Programmable Gate Array(FPGA) instead of using private electric parts makes a miniaturization and lightweight of MMU possible. 2Gbits Synchronous Dynamic Random Access Memory(SDRAM) module for mass memory is used to store payload and satellite status data. Moreover, file system is applied to manage them easily in the ground station. RS(207,187) code improves the tolerance with respect to Single Event Upset(SEU) induced in SDRAM. The simulator is manufactured to verify receiving performance of payload data.

Neural bases underlying Native or Foreign word production, and Language switching (모국어와 외국어의 단어산출 및 언어 간 전환에 따른 뇌 활성화 과정)

  • Kim, Choong-Myung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.1707-1714
    • /
    • 2015
  • The neural bases underlying within or between-language picture naming was investigated by using event-related fMRI. The present suudy explorered the following two goals: The first is to compare cortical activation areas relevant to naming process in native and foreign language, and to decide whether the activation pattern of the foreign word will be the same as native words or not. The next is to find the cerebral areas involved only in alternating language switching between native and foreign language condition. Differential activation patterns were observed for language switching against one-language. Both naming tasks all activated the left inferior frontal gyrus (LIFG) as expected. However the differences in naming between languages were reflected in the activation amount of the LIFG, namely more activation in naming the native language than the foreign language. Especially, naming of the foreign word from English showed the similar area and size in activation with native language suggesting that the process of borrowed noun resembles that of native common noun. And the language switching between languages newly activated the right middle frontal gyrus as well as the left inferior frontal areas. The right middle frontal gyrus engagement in switching conditions obviously identified that right hemisphere is recruited in code switching possibly with respect to meta-cognition controlling language index at a subconscious level.

Design and Implementation of A Weakness Analyzer for Mobile Applications (모바일 애플리케이션을 위한 취약점 분석기의 설계 및 구현)

  • Mun, Il-Yong;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1335-1347
    • /
    • 2011
  • The dissemination and use of mobile applications have been rapidly expanding these days. And in such a situation, the security of mobile applications has emerged as a new issue. Although the safety of general software such as desktop and enterprise software is systematically achieved from the development phase to the verification phase through secure coding, there have been not sufficient studies on the safety of mobile applications yet. This paper deals with deriving weakness enumeration specialized in mobile applications and implementing a tool that can automatically analyze the derived weakness. Deriving the weakness enumeration can be achieved based on CWE(Common Weakness Enumeration) and CERT(Computer Emergency Response Team) relating to the event-driven method that is generally used in developing mobile applications. The analysis tool uses the dynamic tests to check whether there are specified vulnerabilities in the source code of mobile applications. Moreover, the derived vulnerability could be used as a guidebook for programmers to develop mobile applications.

Framework for Supporting Business Services based on the EPC Network (EPC Network 기반의 비즈니스 서비스 지원을 위한 프레임워크)

  • Nam, Tae-Woo;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.193-202
    • /
    • 2010
  • Recently, there have been several researches on automatic object identification and distributed computing technology to realize a ubiquitous computing environment. Radio Frequency IDentification (RFID) technology has been applied to many business areas to simplify complex processes and gain important benefits. To derive real benefits from RFID, the system must rapidly implement functions to process a large quantity of event data generated by the RFID operations and should be configured dynamically for changing businesses. Consequently, developers are forced to implement systems to derive meaningful high-level events from simple RFID events and bind them to various business processes. Although applications could directly consume and act on RFID events, extracting the business rules from the business logic leads to better decoupling of the system, which consequentially increases maintainability. In this paper, we describe an RFID business aware framework for business processes in the Electronic Product Code (EPC) Network. This framework is proposed for developing business applications using business services. The term "business services" refers to generated events that can be used in business applications without additional data collection and processing. The framework provides business rules related to data collection, processing, and management, and supports the rapid development and easy maintenance of business applications based on business services.

Definition of New SIBs for Service Description and Implementation of SCE in Intelligent Network (지능망에서 서비스 기술을 위한 새로운 SIB들의 정의와 SCE의 구현)

  • 김연중;이지영;마영식;안순신
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.209-220
    • /
    • 2004
  • The Goals of Intelligent Network(IN) provide the methods that create, test and apply the various hinds of services to satisfy the user's need. In this environments, we can create new IN service by description of GSL(Global Service Logic) using that SCE(Service Creation Environment). In the ITU-T CS-2, the various SIBs(Service Independent Building-blocks) are defined to develop the services. There are limitations to develop the various services using the SIBs defined in recommendation. So, in this paper, we define the new SIBs and implement the SCE. The new SIBs are defined in this paper are Connect SIB and BCSM Event SIB. The Connect Call SIB provides the connectivity between SLPI(Service Logic processing Program Instance) and call after connecting the calling party to called party. The BCSMEvent SIB provides the functions that request SSF to report the call processing event and receive it. In this paper, we design and implement the SCE that supports the SIBs defined by recommendation and this paper, provides GUI environment to specify GSI, and generates the code used by SCP.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

RADIOLOGICAL DOSE ASSESSMENT ACCORDING TO METHODOLOGIES FOR THE EVALUATION OF ACCIDENTAL SOURCE TERMS

  • Jeong, Hae Sun;Jeong, Hyo Joon;Kim, Eun Han;Han, Moon Hee;Hwang, Won Tae
    • Journal of Radiation Protection and Research
    • /
    • v.39 no.4
    • /
    • pp.176-181
    • /
    • 2014
  • The object of this paper is to evaluate the fission product inventories and radiological doses in a non-LOCA event, based on the U.S. NRC's regulatory methodologies recommended by the TID-14844 and the RG 1.195. For choosing a non-LOCA event, one fuel assembly was assumed to be melted by a channel blockage accident. The Hanul nuclear power reactor unit 6 and the CE $16{\times}16$ fuel assembly were selected as the computational models. The burnup cross section library for depletion calculations was produced using the TRITON module in the SCALE6.1 computer code system. Based on the recently licensed values for fuel enrichment and burnup, the source term calculation was performed using the ORIGEN-ARP module. The fission product inventories released into the environment were obtained with the assumptions of the TID-14844 and the RG 1.195. With two kinds of source terms, the radiological doses of public in normal environment reflecting realistic circumstances were evaluated by applying the average condition of meteorology, inhalation rate, and shielding factor. The statistical analysis was first carried out using consecutive three year-meteorological data measured at the Hanul site. The annual-averaged atmospheric dispersion factors were evaluated at the shortest representative distance of 1,000 m, where the residents are actually able to live from the reactor core, according to the methodology recommended by the RG 1.111. The Korean characteristic-inhalation rate and shielding factor of a building were considered for a series of dose calculations.