• Title/Summary/Keyword: Integrity verification

Search Result 255, Processing Time 0.025 seconds

SIS Design for Fuel Gas Supply System of Dual Fuel Engine based on Safety Integrity Level(SIL) (이중연료엔진의 연료가스공급시스템에 대한 안전무결도 기반 안전계장시스템 설계)

  • Kang, Nak-Won;Park, Jae-Hong;Choung, Choung-Ho;Na, Seong
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.49 no.6
    • /
    • pp.447-460
    • /
    • 2012
  • In this study, the shutdown system of the fuel gas supply system is designed based on the Safety Integrity Level of IEC 61508 and IEC 61511. First of all, the individual risk($10^{-4}$/year) and the risk matrix which are the risk acceptance criteria are set up for the qualitative risk assessment such as the HAZOP study. The natural gas leakage at the gas supply pipe is identified as the highest risk among the hazards identified through the HAZOP study and as a safety instrumented function the shutdown function for leakage was defined. SIL 2 and PFD($2.5{\cdot}10^{-3}$) for the shutdown function are determined by the layer of protection analysis(LOPA). The shutdown system(SIS) carrying out the shutdown function(SIF) is verified and designed according to qualitative and quantitative requirements of IEC 61508 and IEC 61511. As a result of SIL verification and SIS conceptual design, the shutdown system is composed of two gas detectors voted 1oo2, one programmable logic solver, and two shutdown valve voted 1oo2.

An Image forgery protection for real-time vehicle black box using PingPong-256MAC (PingPong-256MAC을 이용한 차량용 블랙박스 실시간 영상 위변조 방지 기술)

  • Kim, HyunHo;Kim, Min-Kyu;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.241-244
    • /
    • 2018
  • Domestic vehicle registration is continuously increasing every year, traffic accidents are also increasing by an increase in the number of vehicles. In the event of a traffic accident, the perpetrator and the victim should be judged and handled appropriately. When judging the accident situation, the black box is what evidence can be except for witness who is at the accident scene. The black box becomes an essential role in order to prevent traffic accidents. However, there is no way to prove integrity by evidence corruption, fabrication and etc. For this reason, we propose a method to guarantee the integrity of image through hash value generated by using PingPong 256 encryption algorithm for integrity verification in this paper.

  • PDF

Chaincode-based File Integrity Verification Model (체인코드 기반의 파일 무결성 검증 모델)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.51-60
    • /
    • 2021
  • Recent advances in network and hardware technologies have led to active research and multiple network technologies that fuse blockchain technologies with security. We propose a system model that analyzes technologies using existing blockchain and verifies the integrity of files using private blockchain in a limited environment. The proposed model can be written as a chain code of Hyperleisure Fabric, a private blockchain platform, and verified for integrity of files through Hyperleisure Explorer, a private blockchain integrated management platform. The system performance of the proposed model was analyzed from a developer perspective and from a user perspective. As a result of the analysis, there are compatibility problems according to the version of various modules to run the blockchain platform, and only limited elements such as chain code status and groups can be checked.

A Study on the Blockchain-Based Bill of Lading System to Improve Usability (사용성 개선을 위한 블록체인 기반 선하증권 거래 시스템 연구)

  • Lee, Ju-young;Kim, Hyun-a;Sung, Chae-min;Kim, Joung-min;Kim, Sungwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.7
    • /
    • pp.283-290
    • /
    • 2022
  • Blockchain is a technology that secures integrity and transparency by distributing and storing transaction details within multiple node networks. Recently, research is being conducted to secure integrity by applying blockchain to Bill of Lading (B/L documents) of monetary value. In this paper, we study a blockchain-based bill of lading system to improve usability. The shippers register the issued bill of lading on the blockchain, and banks in each country read it to conduct L/C transactions. The consignees receive the goods after completing certification with a quick response code (QR) containing the bill of lading information. Through this, shippers enjoy merits in that they can shorten the time and cost of sending shipping documents by mail and prove the integrity of the documents. The consignees have the advantage of being able to check the documents at the same time as they are registered and trust the transaction. Finally, on the bank side, the security of shipping documents is ensured and verification can be done quickly.

Testing Transactions based on Verification of Isolation Levels (고립화 수준을 검증하기 위한 트랜잭션의 시험)

  • Hong, Seok-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.75-84
    • /
    • 2008
  • Concurrency and synchronization problems are often caused by database applications concurrently accessing databases managed by DBMS. Most commercial DBMSs support isolation levels to resolve these problems. Verification of isolation levels are most important because consistency and integrity constraints of the database can be violated according to isolation levels of transactions that consists of database applications. We propose a test tool set to verify and reveal faulty settings of isolation levels and implement a prototype of the test tool set. The proposed tool set analyzes the SQL statements of ESQL/C programs, attaches the test codes to verify isolation levels, runs the test transactions and detects errors.

Digital Logic Extraction from Quantum-dot Cellular Automata Designs (Quantum-dot Cellular Automata 회로로부터 디지털 논리 추출)

  • Oh, Youn-Bo;Lee, Eun-Choul;Kim, Kyo-Sun
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.139-141
    • /
    • 2006
  • Quantum-dot Cellular Automata (QCA) is one of the most promising next generation nano-electronic devices which will inherit the throne of CMOS which is the domineering implementation technology of large scale low power digital systems. In late 1990s, the basic operations of the QCA cell were already demonstrated on a hardware implementation. Also, design tools and simulators were developed. Nevertheless, its design technology is not quite ready for ultra large scale designs. This paper proposes a new approach which enables the QCA designs to inherit the verification methodologies and tools of CMOS designs, as well. First, a set of disciplinary rules strictly restrict the cell arrangement not to deviate from the predefined structures but to guarantee the deterministic digital behaviors. After the gate and interconnect structures of the QCA design are identified, the signal integrity requirements including the input path balancing of majority gates, and the prevention of the noise amplification are checked. And then the digital logic is extracted and stored in the OpenAccess common engineering database which provides a connection to a large pool of CMOS design verification tools. Towards validating the proposed approach, we designed a 2-bit QCA adder. The digital logic is extracted, translated into the Verilog net list, and then simulated using a commercial software.

  • PDF

A Study of PLC Simulation for Transport System in Virtual Environment (가상환경 기반의 컨베이어 시스템 검증을 위한 제어 시뮬레이션 연구)

  • Ko, Min-Suk;Park, Sang-Chul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.17 no.4
    • /
    • pp.274-281
    • /
    • 2012
  • This paper proposed a control simulation method for design and verification of the transport system in an automobile assembly line based on digital manufacturing system. The design of the transport system involves two major activities: mechanical design (device specification) and electrical design (device behavior and system control). Conventionally, the simulation and emulation system of the transport system focuses on the abstract level, which mainly deals with design verification, alternative comparison, and system diagnosis. Although it can provide overall system visibility in monitoring how well it works in the process and view, its simulation models are not sufficiently realistic to be used for a detailed design or for implementation purposes. In this paper, a digital simulation model for a transport system in an automotive assembly line is constructed by adapting a digital manufacturing methodology. We use the concept of the "Virtual Probe", which transport a carrier instead of the belt of the conveyor. In conclusion, the proposed method is valuable in the process of test run in the shop floor. This method would reduce the time and effort for validating the manufacturing system and improve the productivity and integrity of the control program.

GESS-A Code for Verification of Shielding Integrity by Monte Carlo Method (몬테칼로 방법에 의한 차폐체 건전성 검증코드 개발)

  • Lee, Tae-Young;Ha, Chung-Woo;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • v.11 no.1
    • /
    • pp.29-36
    • /
    • 1986
  • GESS-a computer code for simulation of energy spectra for gamma-ray in NaI(T1) scintillator has been developed. The Monte Carlo method was employed to simulate physical behaviours of particle transport in a medium. In the processes of simulation, all the interaction processes such as Rayleigh and Compton scattering, photoelectric effect and pair production were considered. The resulting electron slowing down spectrum was also considered with the CSDA model. For the purpose of verification of the code, a measurement gamma spectrum for incident gamma energy of 1.33 MeV was performed. The measured values appeared to be slightly higher than the theoretically calculated values.

  • PDF

Experimental Verification of Compressor Blade Aeromechanics (압축기 블레이드 Aeromechanics의 시험적 검증)

  • Choi, Yun Hyuk;Park, Hee Yong;Kim, Jee Soo;Shin, Dong Ick;Choi, Jae Ho;Kim, Yeong Ryeon
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2017.05a
    • /
    • pp.240-244
    • /
    • 2017
  • Experimental verification in the rig test stage for component development is a vital link between the aeromechanical design and structural integrity validation process. Based on this premise, Non-Intrusive Stress Measuring System was adopted on the axial compressor test rig to measure the static and dynamic tip deflection of all blades by using tip-timing sensors. Through analyzing vibration characteristics, we evaluated the vibratory stresses seen on the blades fatigue critical location; detected synchronous resonances which are the source of High Cycle Fatigue (HCF) in blades; presented non-synchronous vibration response by aerodynamic excitation and individual blade mis-tuning patterns.

  • PDF

A Study on the Improvement of Reliability of Safety Instrumented Function of Hydrodesulfurization Reactor Heater (수소화 탈황 반응기 히터의 안전계장기능 신뢰도 향상에 관한 연구)

  • Kwak, Heung Sik;Park, Dal Jae
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.4
    • /
    • pp.7-15
    • /
    • 2017
  • International standards such as IEC-61508 and IEC-61511 require Safety Integrity Levels (SILs) for Safety Instrumented Functions (SIFs) in process industries. SIL verification is one of the methods for process safety description. Results of the SIL verification in some cases indicated that several Safety Instrumented Functions (SIFs) do not satisfy the required SIL. This results in some problems in terms of cost and risks to the industries. This study has been performed to improve the reliability of a safety instrumented function (SIF) installed in hydrodesulfurization reactor heater using Partial Stroke Testing (PST). Emergency shutdown system was chosen as an SIF in this study. SIL verification has been performed for cases chosen through the layer of protection analysis method. The probability of failure on demands (PFDs) for SIFs in fault tree analysis was $4.82{\times}10^{-3}$. As a result, the SIFs were unsuitable for the needed RRF, although they were capable of satisfying their target SIL 2. So, different PST intervals from 1 to 4 years were applied to the SIFs. It was found that the PFD of SIFs was $2.13{\times}10^{-3}$ and the RRF was 469 at the PST interval of one year, and this satisfies the RRF requirements in this case. It was also found that shorter interval of PST caused higher reliability of the SIF.