• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.029 seconds

An Effective Multiple Transition Pattern Generation Method for Signal Integrity Test on Interconnections (Signal Integrity 연결선 테스트용 다중천이 패턴 생성방안)

  • Kim, Yong-Joon;Yang, Myung-Hoon;Park, Young-Kyu;Lee, Dae-Yeal;Yoon, Hyun-Jun;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.1
    • /
    • pp.14-19
    • /
    • 2008
  • Semiconductor testing area challenges many testing issues due to the minimization and ultra high performance of current semiconductors. Among these issues, signal integrity test on interconnections must be solved for highly integrated circuits like SoC. In this paper, we propose an effective pattern application method for signal integrity test on interconnects. Proposed method can be applied by using boundary scan architecture and very efficient test can be preceded with pretty short test time.

Development of Internet-based Cooperative System for Integrity Evaluation of Reactor Pressure Vessel (원자로 압력용기의 건전성평가를 위한 인터넷기반 협업시스템의 개발)

  • Kim, Jong-Choon;Choi, Jae-Boong;Kim, Young-Jin;Choi, Young-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.166-171
    • /
    • 2004
  • Since early 1950's fracture mechanics has brought significant impact on structural integrity assessment in a wide range of industries such as power, transportation, civil and petrochemical industries, especially in nuclear power plant industries. For the last two decades, significant efforts have been devoted in developing defect assessment procedures, from which various fitness-for-purpose or fitness-for-service codes have been developed. From another aspect, recent advances in IT (Information Technologies) bring rapid changes in various engineering fields. IT enables people to share information through network and thus provides concurrent working environment without limitations of working places. For this reason, a network system based on internet or intranet bas been appeared in various fields of business. Evaluating the integrity of structures is one of the most critical issues in nuclear industry. In order to evaluate the integrity of structures, a complicated and collaborative procedure is required including regular in-service inspection, fracture mechanics analysis, etc. And thus, experts in different fields have to cooperate to resolve the integrity problem. In this paper, an internet-based cooperative system for integrity evaluation system which adapts IT into a structural integrity evaluation procedure for reactor pressure vessel is introduced. The proposed system uses Virtual Reality (VR) technique, Virtual Network Computing (VNC) and agent programs. This system is able to support 3-dimensional virtual reality environment and to provide experts to cooperate by accessing related data through internet.

  • PDF

Building A PDM/CE Environment and Validating Integrity Using STEP (STEP을 이용한 PDM/CE환경의 구축과 데이타 무결성 확인)

  • 유상봉;서효원;고굉욱
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.173-194
    • /
    • 1996
  • In order to adapt today's short product life cycle and rapid technology changes., integrated systems should be extended to support PDM (Product Data Management) or CE(Concurrent Engineering). A PDM/CE environment has been developed and a prototype is Presented in this paper. Features of the PDM/CE environment are 1) integrated product information model (IPIM) includes both data model and integrity constraints, 2) database systems are organized hierarchically so that working data C8Mot be referenced by other application systems until they are released into the global database, and 3) integrity constraints written in EXPRESS are validated both in the local databases and the global database. By keeping the integrity of the product data, undesirable propagation of illegal data to other application system can be prevented. For efficient validation, the constraints are distributed into the local and the global schemata. Separate triggering mechanisms are devised using the dependency of constraints to three different data operations, i.e., insertion, deletion, and update.

  • PDF

MiSA (Method of Integrated Spectral Analysis) to Evaluate Structural Integrity of Tunnel Concrete Lining (터널 콘크리트 라이닝의 구조적 특성평가를 위한 탄성파 기법, MiSA의 개발)

  • 김기봉;추진호;조성호;조미라
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2001.03a
    • /
    • pp.49-56
    • /
    • 2001
  • The techniques to make assessment of the structural integrity of underground structures include Infrared thermagraphy, GPR using the reflection of the electromagnetic wave, ultrasonic test, seismic methods using the propagation of elastic wave, and etc These methods have pros and cons in the assessment of the structural integrity in the complex environment of the underground structure, so that a single method alone is not enough to evaluate parameters required for the assessment. In this study, a new seismic method was proposed to improve the existing methods and to provide an additional information like stiffness of concrete. The proposed method combines the advantages of the modified impact-echo test and the SASW method. To verify the validity of the proposed method, a large scale model of a tunnel concrete liner was built and the proposed method was applied to the center of the model and also to the corner of the model which has several distinct reflection boundaries.

  • PDF

A Representation of Engineering Change Objects and Their Integrity Constraints Using an Active Object-Oriented Database Model (능동형 객체지향적 데이터베이스 모텔을 이용한 설계변경 개체 및 제약조건의 표현)

  • 도남철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.1
    • /
    • pp.111-125
    • /
    • 2003
  • This paper proposes a product data model that can express and enforce integrity constraints on product structure during engineering changes (ECs). The model adopts and extends an active object-oriented database model in order to Integrate IC data and their integrity constraints. Tightly integrated with product structure, It will enable designers to maintain and exchange consistent EC data throughout the product life cycle. In order to properly support operations for ECs, the model provides the data, operations, and Event-Condition-Action rules for nested ECs and simultaneous EC applications to multiple options. in addition, the EC objects proposed In the model integrate the data and Integrity constraints into a unified repository. This repository enables designers to access all EC data and integrity constraints through the product structure and relationships between EC objects. This paper also describes a prototype product data management system based on the proposed model In order to demonstrate its effectiveness.

  • PDF

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

Integrated Platform for Korea Post Information System (우정사업 정보시스템 고도화를 위한 통합 플랫폼 모형 개발)

  • Sun Ji Ung;Yee Soung Ryong;Choe Kyungil
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.835-840
    • /
    • 2002
  • The information systems of the Korea Postal Service are developed not for integration based on strategic purposes but for improvement of low-level business processes within each functional unit. Hence. the as-is level of the information systems is very insufficient for information integrity, and also shows substantial gaps. when compared to recent advances in information envconment such as internet, electronic govemment and so on in this study we suggest the design of the integrated platform to achieve integrity of postal service and banking servive. After briefly addressing the issues on information systems of the Korea Postal Service. we provide the framework of the integrated platform and action plan. We believe when this framework is put into use. It can contribute to competitive performance by giving the integrity and consistency in implementing infomation systems of the Korea Postal Service.

  • PDF

Software integrity verification method in POS system (POS시스템 내 소프트웨어 무결성 검증 방안)

  • Cho, Sung-A;Kim, Sung Hoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.987-997
    • /
    • 2012
  • A Point-of-Sales (POS) terminal manages the selling process by a salesperson accessible interface in real time. Using a POS system makes a business and customer management much more efficient. For these reasons, many store install POS terminal and used it. But it has many problem that stealing personal information by hacking and insider corruption. Because POS system stored payment information like that sales information, card valid period, and password. In this paper, I proposed software integrity verification technique in POS system based on White list. This method can prevent accidents that personal information leak by hacking and POS system forge and falsification. This proposed method provides software integrity, so it can prevent inside and outside threats in advance.

Cloud System Security Technology Trend

  • Yoon, Jeong-Won;Jang, Beakcheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.49-56
    • /
    • 2015
  • In this paper, we introduce recent cloud system security technologies categorizing them according to Reliability, Availability, Serviceability, Integrity, and Security (RASIS), terms that evaluate robustness of the computer system. Then we describe examples of security attacks and corresponding security technologies for each of them. We introduce security technologies based on Software Defined Network (SDN) for Reliability, security technologies based on hypervisor and virtualization for Availability, disaster restoration systems for Serviceability, authorization and access control technologies for Integrity, and encryption algorithms for Security. We believe that this paper provide wise view and necessary information for recent cloud system security technologies.

Secure Object Detection Based on Deep Learning

  • Kim, Keonhyeong;Jung, Im Young
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.571-585
    • /
    • 2021
  • Applications for object detection are expanding as it is automated through artificial intelligence-based processing, such as deep learning, on a large volume of images and videos. High dependence on training data and a non-transparent way to find answers are the common characteristics of deep learning. Attacks on training data and training models have emerged, which are closely related to the nature of deep learning. Privacy, integrity, and robustness for the extracted information are important security issues because deep learning enables object recognition in images and videos. This paper summarizes the security issues that need to be addressed for future applications and analyzes the state-of-the-art security studies related to robustness, privacy, and integrity of object detection for images and videos.