• Title/Summary/Keyword: IP Security

Search Result 739, Processing Time 0.034 seconds

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

3X Serial GF($2^m$) Multiplier Architecture on Polynomial Basis Finite Field (Polynomial basis 방식의 3배속 직렬 유한체 곱셈기)

  • Moon, Sang-Ook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.2
    • /
    • pp.328-332
    • /
    • 2006
  • Efficient finite field operation in the elliptic curve (EC) public key cryptography algorithm, which attracts much of latest issues in the applications in information security, is very important. Traditional serial finite multipliers root from Mastrovito's serial multiplication architecture. In this paper, we adopt the polynomial basis and propose a new finite field multiplier, inducing numerical expressions which can be applied to exhibit 3 times as much performance as the Mastrovito's. We described the proposed multiplier with HDL to verify and evaluate as a proper hardware IP. HDL-implemented serial GF (Galois field) multiplier showed 3 times as fast speed as the traditional serial multiplier's adding only partial-sum block in the hardware. So far, there have been grossly 3 types of studies on GF($2^m$) multiplier architecture, such as serial multiplication, array multiplication, and hybrid multiplication. In this paper, we propose a novel approach on developing serial multiplier architecture based on Mastrovito's, by modifying the numerical formula of the polynomial-basis serial multiplication. The proposed multiplier architecture was described and implemented in HDL so that the novel architecture was simulated and verified in the level of hardware as well as software.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

Fast Join Mechanism that considers the switching of the tree in Overlay Multicast (오버레이 멀티캐스팅에서 트리의 스위칭을 고려한 빠른 멤버 가입 방안에 관한 연구)

  • Cho, Sung-Yean;Rho, Kyung-Taeg;Park, Myong-Soon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.625-634
    • /
    • 2003
  • More than a decade after its initial proposal, deployment of IP Multicast has been limited due to the problem of traffic control in multicast routing, multicast address allocation in global internet, reliable multicast transport techniques etc. Lately, according to increase of multicast application service such as internet broadcast, real time security information service etc., overlay multicast is developed as a new internet multicast technology. In this paper, we describe an overlay multicast protocol and propose fast join mechanism that considers switching of the tree. To find a potential parent, an existing search algorithm descends the tree from the root by one level at a time, and it causes long joining latency. Also, it is try to select the nearest node as a potential parent. However, it can't select the nearest node by the degree limit of the node. As a result, the generated tree has low efficiency. To reduce long joining latency and improve the efficiency of the tree, we propose searching two levels of the tree at a time. This method forwards joining request message to own children node. So, at ordinary times, there is no overhead to keep the tree. But the joining request came, the increasing number of searching messages will reduce a long joining latency. Also searching more nodes will be helpful to construct more efficient trees. In order to evaluate the performance of our fast join mechanism, we measure the metrics such as the search latency and the number of searched node and the number of switching by the number of members and degree limit. The simulation results show that the performance of our mechanism is superior to that of the existing mechanism.

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.

A Study on the Unmanned convenience Store Operation System from the Viewpoint of Visual Merchandising (비주얼 머천다이징 관점에서의 무인 편의점 운영시스템에 관한 연구)

  • Seo, Jung-Hwa;Yang, Hoe-Chang;Park, Chul-Ju;Youn, Myoung-Kil
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.45-53
    • /
    • 2018
  • Purpose - The purpose of the study was to investigate operation system of current convenience store and competing retail store and to find out development of unattended convenience store. Operators can save labor cost and solve labor seeking when opening shop under suitable environment and commerce area, and assure of employee's safety. Customers are allowed to select commodity comfortably without disclosure of face and to shorten standby time at simple store opening, buying and paying and to produce convenient living environment by financing, delivery and goods control. This study examined effect and problems of operation of existing and unattended convenience store from point of view of visual merchandising to find out model of unattended convenience store and to strengthen competitiveness of convenience store business. Research design, data, and methodology - Research procedure of accomplishment of goal of the study was: The study investigated state of distribution business, and role and definition of VMD. First, VMD played an important role of promotion and competitiveness of unattended convenience stores. Second, the author investigated research and cases of unattended convenience stores 14 months, that is to say, from August 15, 2017 to October 15, 2018. Third, the author investigated on-the-spot three of common convenience stores, three of unattended convenience stores and three of retailers one month, that is to say, June 1, 2018 to July 1, 2018. The subject was convenience stores and retailers selling similar type of products at Seoul and metropolitan area. Results - Layout, selling place, brand identity, goods assortment, authentication system, product information cognition and control, buying and payment system, security system, salesmen, promotion and other services should be improved from point of view of merchandising. Structure, furniture, lighting, voice, façade, VP, PP, IP and POP should be developed. Conclusions - Unattended convenience stores saved operating cost and lessened labor and gave visitors convenience and comfortable shopping and made use of resources effectively. Further studies with quantitative analysis shall find out strategic conditions for promotion of unattended convenience stores.

Optimized Route Optimization mode of MIPv6 between Domains Based on AAA (관리상의 도메인간 이동시 AAA 기반의 핸드오버 성능향상 방안)

  • Ryu, Seong-Geun;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.39-45
    • /
    • 2009
  • When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for an authentication, authorization and accounting. AAA and Mobile IPv6 are protocols which are operated independently. Then schemes which merge these protocols have been emerged. These schemes can enable a mobile node to establish a security association between the mobile node and a home agent and to perform a binding update for the home agent using AAA authentication request. But these schemes introduce many signal messages and long handover latency during the handover, since Route Optimization mode for Mobile Ipv6 is performed using Return Routability procedure. To solve this problem, we propose a scheme for Route Optimization mode that the home agent performs the binding update for a correspondent node via the AAA infrastructure between the home agent and the correspondent node instead of Return Routability procedure. For performance evaluation, we analyze signal message transmission costs and handover latencies during handover. We show performance improvement of the proposed scheme which reduces handover latency as 61% compared with the existing scheme.

Epigenetic Regulation of Fungal Development and Pathogenesis in the Rice Blast Fungus

  • Jeon, Junhyun
    • 한국균학회소식:학술대회논문집
    • /
    • 2014.10a
    • /
    • pp.11-11
    • /
    • 2014
  • Fungal pathogens have huge impact on health and economic wellbeing of human by causing life-threatening mycoses in immune-compromised patients or by destroying crop plants. A key determinant of fungal pathogenesis is their ability to undergo developmental change in response to host or environmental factors. Genetic pathways that regulate such morphological transitions and adaptation are therefore extensively studied during the last few decades. Given that epigenetic as well as genetic components play pivotal roles in development of plants and mammals, contribution of microbial epigenetic counterparts to this morphogenetic process is intriguing yet nearly unappreciated question to date. To bridge this gap in our knowledge, we set out to investigate histone modifications among epigenetic mechanisms that possibly regulate fungal adaptation and processes involved in pathogenesis of a model plant pathogenic fungus, Magnaporthe oryzae. M. oryzae is a causal agent of rice blast disease, which destroys 10 to 30% of the rice crop annually. Since the rice is the staple food for more than half of human population, the disease is a major threat to global food security. In addition to the socioeconomic impact of the disease it causes, the fungus is genetically tractable and can undergo well-defined morphological transitions including asexual spore production and appressorium (a specialized infection structure) formation in vitro, making it a model to study fungal development and pathogenicity. For functional and comparative analysis of histone modifications, a web-based database (dbHiMo) was constructed to archive and analyze histone modifying enzymes from eukaryotic species whose genome sequences are available. Histone modifying enzymes were identified applying a search pipeline built upon profile hidden Markov model (HMM) to proteomes. The database incorporates 22,169 histone-modifying enzymes identified from 342 species including 214 fungal, 33 plants, and 77 metazoan species. The dbHiMo provides users with web-based personalized data browsing and analysis tools, supporting comparative and evolutionary genomics. Based on the database entries, functional analysis of genes encoding histone acetyltransferases and histone demethylases is under way. Here I provide examples of such analyses that show how histone acetylation and methylation is implicated in regulating important aspects of fungal pathogenesis. Current analysis of histone modifying enzymes will be followed by ChIP-Seq and RNA-seq experiments to pinpoint the genes that are controlled by particular histone modifications. We anticipate that our work will provide not only the significant advances in our understanding of epigenetic mechanisms operating in microbial eukaryotes but also basis to expand our perspective on regulation of development in fungal pathogens.

  • PDF

Internetworking strategy between MANET and WLAN for Extending Hot-Spot of WLAN based on HMIPv6 (HMIPv6를 기반으로 한 무선 랜과 이동 애드 혹 네트워크 간의 인터네트워킹 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.38-48
    • /
    • 2006
  • For extending of hot-spot of WLAN, (2) proposes internetworking scheme between wireless LAN (WLAN) and mobile ad-hoc network (MANET), which employ the same layer-2 protocol with different mode. Compared to internetworking schemes between UMTS (Universal Mobile Telecommunications Systems) and WLAN (3-4), the scheme from (2) has relatively low overhead and latencies because WLAN and MANET are physically and logically similar to each other. However, the mode switching algorithm proposed in r2] for internetworking between WLAN and MANET only considers signal strength and determines handoff, and mobile nodes following a zigzag course in pollution area may perform handoff at short intervals. Furthermore, (2) employs mobile IPv6 (MIPv6) at base, which brings still high delay on handoff and overhead due to signal message exchange. In this paper, we present optimized internetworking scheme between WLAN and MANET, modified from (2). To settle ping-pong handoff from (2), we propose adaptive mode switching algorithm. HMIPv6 is employed for IP connectivity and mobility service in WLAN, which solves some shortcomings, such as high handoff overhead and vulnerable security. For routing in MANET, OLSR is employed, which is a proactive Protocol and has optimally reduced signal broadcasting overhead. OLSR operates with current P protocol compatibly with no change or modification. The proposed internetworking scheme based on adaptive mode switching algorithm shows better performance than scheme from (2).