• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.028 seconds

Development of a Web-based Fatigue Life Evaluation System for Primary Components in a Nuclear Power Plant (원자력발전소 1차 계통 주요기기에 대한 웹기반 피로수명평가 시스템 개발)

  • Seo, Hyong-Won;Lee, Sang-Min;Choi, Jae-Boong;Kim, Young-Jin;Choi, Sung-Nam;Jang, Ki-Sang;Hong, Sung-Yull
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.28 no.6
    • /
    • pp.663-669
    • /
    • 2004
  • A nuclear power plant is composed of a number of primary components. Maintaining the integrity of these components is one of the most critical issues in nuclear industry. In order to maintain the integrity of these primary components, a complicated procedure is required including regular in-service inspection, failure assessment, fracture mechanics analysis, etc. Also, experts in different fields have to co-operate to resolve the integrity issues on the basis of inspection results. This integrity evaluation process usually takes long, and thus, is detrimental for the plant productivity. Therefore, an effective safety evaluation system is essential to manage the integrity issues on a nuclear power plant. In this paper, a web-based fatigue life evaluation system for primary components in nuclear power plant is proposed. This system provides engineering knowledge-based information and concurrent and collaborative working environment through internet, and thus, is expected to raise the efficiency of integrity evaluation procedures on primary components of a nuclear power plant.

Development of a Web-based Fatigue Life Evaluation System for Primary Components in a Nuclear Power Plant (원자력발전소 1 차 계통 주요기기에 대한 웹기반 피로수명평가 시스템 개발)

  • Seo, Hyong-Won;Lee, Sang-Min;Choi, Jae-Boong;Kim, Young-Jin;Choi, Sung-Nam;Jang, Ki-Sang;Hong, Sung-Yull
    • Proceedings of the KSME Conference
    • /
    • 2003.04a
    • /
    • pp.279-284
    • /
    • 2003
  • A nuclear power plant is composed of a number of primary components. Maintaining the integrity of these components is one of the most critical issues in nuclear industry. In order to maintain the integrity of these primary components, a complicated procedure is required including regular in-service inspection, failure assessment, fracture mechanics analysis, etc. Also, experts in different fields have to co-operate to resolve the integrity issues on the basis of inspection results. This integrity evaluation process usually takes long, and thus, is detrimental for the plant productivity. Therefore, an effective safety evaluation system is essential to manage the integrity issues on a nuclear power plant. In this paper, a web-based fatigue life evaluation system for primary components in nuclear power plant is proposed. This system provides engineering knowledge-based information and concurrent and collaborative working environment through internet, and thus, is expected to raise the efficiency of integrity evaluation procedures on primary components of a nuclear power plant.

  • PDF

A Study on the Signal Integrity and Distorted Signal Analysis of High Speed Transmission Line (고속 전송선로의 신호왜곡과 신호 보전에 관한 연구)

  • Jang, Yeon-Gil;Rhee, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.213-219
    • /
    • 2012
  • In this paper, we suggested the method of signal integrity for noises and distortion signal generated between high speed information transmission modules by external effects. Suggested method for signal integrity of impedance matching to remove transmission line distortion, We divided the impedance matching between the transmitter and the receiver module with the single line and differential line methods after confirmed the improvement of signal distortions through ADS simulation. the experimental results indicated that it is possible to keep signal integrity without signal distortions by matching the optimal termination impedance which are considering the signal delay of transmission line for using the high-performance modules.

An Efficient Selective Encryption of Fingerprint Images for Embedded Processors

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Chung, Kyo-Il
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.444-452
    • /
    • 2006
  • Biometric-based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting the characteristics of the fingerprint images. Because the fingerprint sensor is computationally limited, a standard encryption algorithm may not be applied to the full fingerprint images in real-time to guarantee the integrity and confidentiality of the fingerprint images transmitted. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a nonce for integrity and to a specific bitplane of each pixel of the fingerprint image for confidentiality. Experimental results show that the integrity and confidentiality of the fingerprint images can be guaranteed without any leakage of the fingerprint ridge information and can be completed in real-time on embedded processors.

  • PDF

A Multi-hash Chain Scheme for Ensure Data Integirty Nodes in Wireless Sensor Network (무선 센서 네트워크에서 데이터 무결성을 보장하기 위한 다중 해쉬 체인 기법)

  • Park, Gil-Cheol;Jeong, Yoon-Su;Kim, Yong-Tae;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2358-2364
    • /
    • 2010
  • Recently, In the wireless sensor network, a study which guarantees integrity of not only data gathered from sensor node but also energy consumption of it is now going on. However, the existing study cannot guarantee data integrity and overhead of cluster head which merges data from sensor node. This paper proposes multi-path hash chain technique which guarantees integrity of merged data and reduces overhead of cluster head when cluster head merges with data transmitted from sensor node. The proposed technique forms multi-hash chain dividing main-path and assistance-path to guarantee data integrity of cluster head, when merges data. The assistance-path, which is used when main-path is not, supports integrity of sensor node while minimizing overhead of cluster head when sensor node is authenticate.

ECU Data Integrity Verification System Using Blockchain (블록체인을 활용한 ECU 데이터 무결성 검증 시스템)

  • Sang-Pil, Byeon;Ho-Yoon, Kim;Seung-Soo, Shin
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.57-63
    • /
    • 2022
  • If ECU data, which is responsible for collecting and processing data such as sensors and signals of automobiles, is manipulated by an attack, it can cause damage to the driver. In this paper, we propose a system that verifies the integrity of automotive ECU data using blockchain. Since the car and the server encrypt data using the session key to transmit and receive data, reliability is ensured in the communication process. The server verifies the integrity of the transmitted data using a hash function, and if there is no problem in the data, it is stored in the blockchain and off-chain distributed storage. The ECU data hash value is stored in the blockchain and cannot be tampered with, and the original ECU data is stored in a distributed storage. Using the verification system, users can verify attacks and tampering with ECU data, and malicious users can access ECU data and perform integrity verification when data is tampered with. It can be used according to the user's needs in situations such as insurance, car repair, trading and sales. For future research, it is necessary to establish an efficient system for real-time data integrity verification.

Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools (사설 클라우드 환경에서 수집된 VM 데이터의 무결성 입증과 관련 포렌식 도구의 신뢰성 검증)

  • Kim, Deunghwa;Jang, Sanghee;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.223-230
    • /
    • 2013
  • Recently, a large number of corporations are adopting cloud solution in order to reduce IT-related costs. By the way, Digital Trace should have admissibility to be accepted as digital evidence in court, and integrity is one of the factors for admissibility. In this context, this research implemented integrity verification test to VM Data which was collected by well-known private cloud solutions such as Citrix, VMware, and MS Hyper-V. This paper suggests the effective way to verify integrity of VM data collected in private cloud computing environment based on the experiment and introduces the error that EnCase fails to mount VHD (Virtual Hard Disk) files properly.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

Effective Management for Retry Buffer on PCI-Express Interface (PCI-Express의 재전송 버퍼 관리 기법)

  • 장형식;현유진;성광수
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.69-72
    • /
    • 2003
  • The PCI Express spec introduces retry buffer in Data Link Layer For data integrity. But this buffer have some restrictions as buffer's usage. So we proposed effective management for retry buffer on PCI-Express interface. Proposed buffer management give increase performance and data integrity simultaneously.

  • PDF

The Effect of Trustworthiness on Purchase Intention in Open Markets: Focusing on Trust and Distrust (오픈마켓에서 신뢰가치성이 구매의도에 미치는 영향: 신뢰와 불신을 중심으로)

  • Choi, Seul Bi;Ahn, Hyunchul;Kwahk, Kee-Young
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.171-188
    • /
    • 2017
  • Purpose This study investigates the effects of trust and distrust on intention to purchase in open market, based on the idea that trust and distrust can co-exist. Specifically, this study approached the effects of trust and distrust of the open market on the intention to purchase from a two-dimensional perspective, and examined trustworthiness as the antecedents of trust and distrust. Design/Methodology/Approach In this study, we conducted a questionnaire survey on consumers who have actually purchased a product from open markets in Korea for two months. As a result, 141 users are chosen for the sample. We apply PLS (Partial Least Squares) structural equation modeling (SEM) to verify our theoretical model using the software application SmartPLS 3.0. Findings First, trust in open market positively affects intention to purchase, whereas distrust in open market negatively affects intention to purchase. Second, the three antecedents of trust (i.e. three factors constituting trustworthiness such as ability, benevolence and integrity) affect trust in open market. Third, integrity negatively affects distrust in open market. Since integrity plays an important role in building both trust and distrust in open market, the operators of open market should pay attention to managing their integrity.