• Title/Summary/Keyword: Execution Behavior

Search Result 184, Processing Time 0.029 seconds

OPERATOR BEHAVIORS OBSERVED IN FOLLOWING EMERGENCY OPERATING PROCEDURE UNDER A SIMULATED EMERGENCY

  • Choi, Sun-Yeong;Park, Jin-Kyun
    • Nuclear Engineering and Technology
    • /
    • v.44 no.4
    • /
    • pp.379-386
    • /
    • 2012
  • A symptom-based procedure with a critical safety function monitoring system has been established to reduce the operator's diagnosis and cognitive burden since the Three-Mile Island (TMI) accident. However, it has been reported that a symptom-based procedure also requires an operator's cognitive efforts to cope with off-normal events. This can be caused by mismatches between a static model, an emergency operating procedure (EOP), and a dynamic process, the nature of an ongoing situation. The purpose of this study is to share the evidence of mismatches that may result in an excessive cognitive burden in conducting EOPs. For this purpose, we analyzed simulated emergency operation records and observed some operator behaviors during the EOP operation: continuous steps, improper description, parameter check at a fixed time, decision by information previously obtained, execution complexity, operation by the operator's knowledge, notes and cautions, and a foldout page. Since observations in this study are comparable to the results of an existing study, it is expected that the operational behaviors observed in this study are generic features of operators who have to cope with a dynamic situation using a static procedure.

A Study on GIS Information System for Shipbuilding Yard Block Logistics Simulation (조선소 야드 블록 물류 시뮬레이션을 위한 GIS 정보 체계 연구)

  • Kim, Sanghun;Lee, Yonggil;Woo, Jonghun;Lim, Hyunkyu
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.2
    • /
    • pp.116-123
    • /
    • 2018
  • These days, geographic information system has released in everyday life and industries. However, the shipyard only uses it to manage the layout of the yard. In this study, we apply the Geographic Information System to shipbuilding block logistics simulation to analyse the behavior of bogies and forklifts carrying blocks and materials in the shipyard. The shipyard manages daily block logistics plans at the execution planning stage. However, since it is a daily plan, it is difficult to respond to an unexpected situation immediately, and application to judge a certain value or higher value is insufficient. Therefore, a simulation model was created using the shape and attribute information inherent in the geographic information system to verify and improve the block logistics of the mid-and long-term yards. Through this simulation model, we will analyse loads on the workplace, stockyard, and road, and contribute to overall logistics improvement from the point of view of resource planning. In addition, the results of the simulation are reflected in the planning, to help support various decisions.

Application Effects of STS Module Concerning Food Waste (음식물 쓰레기에 관한 STS 모듈의 적용 효과)

  • Lee, Nae-Hwan;Cha, Hee-Young;Kim, Sung-Ha
    • Hwankyungkyoyuk
    • /
    • v.18 no.1 s.26
    • /
    • pp.44-54
    • /
    • 2005
  • This study is intended to examine an effectiveness of STS module concerning food waste, 'Even if food waste is the money, would you throw it away', in the areas of affective domains related to science and attitudes towards environmental problems. For this study, one group of 142 seventh graders attending 'L' middle school in Iksan city, Jeonrabukdo received 8 class hours with this module. Their affective domains related to science and attitudes towards environmental problems were measured by pre- and post-test design in a single group. In addition, their views on STS instruction was also analyzed. Results are as follows. Students in the transition period who had been taught with this module showed that they had a statistically significant effectiveness in interests related to science, scientific attitudes and execution towards environmental problems(p<.05). Students taught with this module had a positive views on the STS instructional methods or contents. It was also shown that their recognition or behavior towards environmental problems have been changed positively.

  • PDF

Practical Malware Development And Analysis Method (실전 악성코드 개발 및 분석 방법)

  • Kim, Kyung-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.434-437
    • /
    • 2017
  • After the first malware, the brain virus, was founded in 1986, various types of malwares have been created Including worm, dropper, trojan, backdoor, rootkit and downloader. Especially in recent years, driver-type malware have made then more difficult to analyze. therefore, malware analyst require competitive skills. To analyze malware well, you need to know how it works and have to do it by yourself. So in this paper, we develop the dropper, backdoor, trojan, rootkit and driver similar to malware distributed in the real world. It shows the execution behavior on the virtual environment system We propose a method to analyze malware quickly and effectively with static analysis and dynamic analysis.

  • PDF

A consistent FEM-Vlasov model for hyperbolic cooling towers on layered soil under unsymmetrical wind load

  • Karakas, Ali I.;Ozgan, Korhan;Daloglu, Ayse T.
    • Wind and Structures
    • /
    • v.22 no.6
    • /
    • pp.617-633
    • /
    • 2016
  • In this paper, the analysis of hyperbolic cooling tower on elastic subsoil exposed to unsymmetrical wind loading is presented. Modified Vlasov foundation model is used to determine the soil parameters as a function of vertical deformation profile within subsoil. The iterative parameter updating procedure involves the use of Open Application Programming Interface (OAPI) feature of SAP2000 to provide two way data flow during execution. A computing tool coded in MATLAB employing OAPI is used to perform the analysis of hyperbolic cooling tower with supporting columns over a hollow annular raft founded on elastic subsoil. The analysis of such complex soil-structure system is investigated under self-weight and unsymmetrical wind load. The response of the cooling tower on elastic subsoil is compared with that of a tower that its supporting raft foundation is treated as fixed at the base. The results show that the effect of subsoil on the behavior of cooling tower is considerable at the top and bottom of the wall as well as supporting columns and raft foundation. The application of a full-size cooling tower has demonstrated that the procedure is simple, fast and can easily be implemented in practice.

Qualitative Content Approach: Impact of Organizational Climate on Employee Capability

  • KANG, Eungoo
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.9 no.4
    • /
    • pp.57-67
    • /
    • 2021
  • Purpose - The corporate culture's energy is recognized to go through the company and facilitate a new balance to realize success, which means that the culture in an environment of various organizations affects the performance of its employees. The purpose of the current research is to investigate the impact of organizational culture on employee performance. Research design, data, and methodology - The current research conducted a qualitative content analysis. The primary research approach applied by qualitative content analysis is an inductive methodology, and this approach is a type of reasoning that seeks the application of logic, which later helps develop a theory that will guide the future research. Result - Research findings of the present study indicated that five solutions to the problems encountered through the execution of culture are attached to how effective the organizational culture are when workers execute. Thus, culture is realized to boost structure, because the structure of an organization elevates the behavior of the organization. Conclusion - Workers will be aware of both the negative and positive implications of executing culture in the organization. Therefore, organization managers must learn that various employees are vital people in their vicinity, and creating a culture that would make a good rapport with them is vital.

Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity (프로세스 가상 메모리 데이터 유사성을 이용한 프로세스 할로윙 공격 탐지)

  • Lim, Su Min;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.431-438
    • /
    • 2019
  • Fileless malware uses memory injection attacks to hide traces of payloads to perform malicious works. During the memory injection attack, an attack named "process hollowing" is a method of creating paused benign process like system processes. And then injecting a malicious payload into the benign process allows malicious behavior by pretending to be a normal process. In this paper, we propose a method to detect the memory injection regardless of whether or not the malicious action is actually performed when a process hollowing attack occurs. The replication process having same execution condition as the process of suspending the memory injection is executed, the data set belonging to each process virtual memory area is compared using the fuzzy hash, and the similarity is calculated.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

A Probabilistic Analysis for Periodicity of Real-time Tasks

  • Delgado, Raimarius;Choi, Byoung Wook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.134-142
    • /
    • 2021
  • This paper proposes a probabilistic method in analyzing timing measurements to determine the periodicity of real-time tasks. The proposed method fills a gap in existing techniques, which either concentrate on the estimation of worst-case execution times, or do not consider the stochastic behavior of the real-time scheduler. Our method is based on the Z-test statistical analysis which calculates the probability of the measured period to fall within a user-defined standard deviation limit. The distribution of the measured period should satisfy two conditions: its center (statistical mean) should be equal to the scheduled period of the real-time task, and that it should be symmetrical with most of the samples focused on the center. To ensure that these requirements are met, a data adjustment process, which omits any outliers in the expense of accuracy, is presented. Then, the Z-score of the distribution according to the user-defined deviation limit provides a probability which determines the periodicity of the real-time task. Experiments are conducted to analyze the timing measurements of real-time tasks based on real-time Linux extensions of Xenomai and RT-Preempt. The results indicate that the proposed method is able to provide easier interpretation of the periodicity of real-time tasks which are valuable especially in comparing the performance of various real-time systems.

Color Correction with Optimized Hardware Implementation of CIE1931 Color Coordinate System Transformation (CIE1931 색좌표계 변환의 최적화된 하드웨어 구현을 통한 색상 보정)

  • Kim, Dae-Woon;Kang, Bong-Soon
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.10-14
    • /
    • 2021
  • This paper presents a hardware that improves the complexity of the CIE1931 color coordinate algorithm operation. The conventional algorithm has disadvantage of growing hardware due to 4-Split Multiply operations used to calculate large bits in the computation process. But the proposed algorithm pre-calculates the defined R2X, X2R Matrix operations of the conventional algorithm and makes them a matrix. By applying the matrix to the images and improving the color, it is possible to reduce the amount of computation and hardware size. By comparing the results of Xilinx synthesis of hardware designed with Verilog, we can check the performance for real-time processing in 4K environments with reduced hardware resources. Furthermore, this paper validates the hardware mount behavior by presenting the execution results of the FPGA board.