• Title/Summary/Keyword: Logging System

Search Result 279, Processing Time 0.032 seconds

Design and Implementation of True Random Noise Radar System

  • Min, Woo-Ki;Kim, Cheol-Hoo;Lukin, Constantin A.;Kim, Jeong-Phill
    • Journal of electromagnetic engineering and science
    • /
    • v.9 no.3
    • /
    • pp.130-140
    • /
    • 2009
  • The design theory and experimental results of a true random noise radar system are presented in this paper. Target range information can be extracted precisely by correlation processing between the delayed reference and the signal received from a target, and the velocity information by the Doppler processing with successive correlation data. A K-band noise radar system was designed using random FM noise signal, and the characteristics of the fabricated system were examined with laboratory and outdoor experiments. A C-band random FM noise signal was generated by applying a low-frequency white Gaussian noise source to VCO(Voltage Controlled Oscillator), and a K-band Tx noise signal with 100 MHz bandwidth was obtained by using a following frequency multiplier. Two modified wave-guide horn arrays were designed and fabricated, and used for the Tx and Rx antennas. The required amount of Tx/Rx isolation was attained by using a coupling cancellation circuit as well as keeping them apart with predetermined spacing. A double down-conversion scheme was used in the Rx and reference channels, respectively, for easy post processing such as correlation and Doppler processing. The implemented noise radar performance was examined with a moving bicycle and a very high-speed target with a velocity of 150 m/s. The results extracted by the Matlab simulation using the logging data were found to be in a reasonable agreement with the expected results.

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Park, Gee-Yong;Kwon, Kee-Choon;Lee, Dong-Young;Lee, Cheol-Kwon
    • Nuclear Engineering and Technology
    • /
    • v.45 no.5
    • /
    • pp.637-652
    • /
    • 2013
  • Instrumentation and control systems in nuclear power plants have been digitalized for the purpose of maintenance and precise operation. This digitalization, however, brings out issues related to cyber security. In the most recent past, international standard organizations, regulatory institutes, and research institutes have performed a number of studies addressing these systems cyber security.. In order to provide information helpful to the system designers in their application of cyber security for the systems, this paper presents methods and considerations to define attack vectors in a target system, to review and select the requirements in the Regulatory Guide 5.71, and to integrate the results to identify applicable technical security control requirements. In this study, attack vectors are analyzed through the vulnerability analyses and penetration tests with a simplified safety system, and the elements of critical digital assets acting as attack vectors are identified. Among the security control requirements listed in Appendices B and C to Regulatory Guide 5.71, those that should be implemented into the systems are selected and classified in groups of technical security control requirements using the results of the attack vector analysis. For the attack vector elements of critical digital assets, all the technical security control requirements are evaluated to determine whether they are applicable and effective, and considerations in this evaluation are also discussed. The technical security control requirements in three important categories of access control, monitoring and logging, and encryption are derived and grouped according to the elements of attack vectors as results for the sample safety system.

Mobile Payment System Design with Transaction Certificate Mode (거래 인증 모드를 사용한 이동 결제 시스템 설계)

  • Sung, Soon-Hwa;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.931-939
    • /
    • 2014
  • The Web or Mobile channel of previous Web access authentication system for a payment only provides the authentication of remote users, and does not provide the authentication between a user and a bank/financial institution. Therefore, this paper proposes the Transaction Certificate Mode(TCM) for a payment which can preserve the mutual authentication between a user and a bank/financial institution for Web-based payment systems. The proposed system has designed for wireless network instead of Secure Electronic Transaction (SET) designed for wired electronic transaction. In addition, this system with TCM is able to support an account-based transaction for wireless networks instead of a disadvantage of SET such as a card-based transaction for wired networks. Therefore, customers can check their balances without logging on their bank's web site again due to mutual authentication between a customer and his bank/financial institution.

A Storage Scheme for Logging and Indexing B2Bi XML Messages (기업간통합 XML 메시지의 기록과 색인을 위한 저장 방식)

  • Song Ha-Joo;Kim Chang-Su;Kwon Oh-Heum
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.416-426
    • /
    • 2005
  • A B2Bi system needs a message storage subsystem that efficiently logs and searches XML messages which have been sent from orreceived by it. XML database systems and XML enabled relational databases systems are not adequate as a message storage system because of their expensiveness and excessiveness in functionality. Storage schemes that split XML messages into database records are also unacceptable because of either low performance or implementation hardness. In this paper, we propose a storage scheme that can be applied to implement a message storage system based on a relational database system. In this scheme, messages are examined only through the index fields that have been registered for each message types. Therefore, the proposed storage scheme cannot support such a powerful search facility like XQL, but it provides high performance message legging and restricted search facility. There are three alternative database schemas to store the index fields. This paper compares the advantages and disadvantages of the three schemas through experimental tests.

Timber Harvesting Impacts on Soil Respiration Rate and Microbial Population of Populus tremuloides Michx. Stands on Two Contrasting Soils (두 가지 서로 다른 토양에 형성된 Populus tremuloides Michx. 임분의 수확이 토양호흡률 및 토양미생물상에 미치는 영향)

  • Park, Hyun
    • Journal of Korean Society of Forest Science
    • /
    • v.83 no.3
    • /
    • pp.372-379
    • /
    • 1994
  • Timber harvesting impacts on soil microbial populations and respiration rates were examined in naturally regenerating trembling aspen(Populus tremuloides Michx.) stands on two contrasting soils, an Omega loamy sand (sandy mixed, frigid Typic Udipsamment) and an Ontonagon clay loam (very fine, mixed Glossic Eutroboralf). Five timber harvesting disturbances were simulated during winter of 1990 and spring of 1991, including commercial whole-tree harvesting(CWH), winter logging trail+CWH, logging slash removal+CWH(LSR), forest floor removal+LSR(FFR), and spring compaction+FFR. Regardless of soil types, total soil respiration rates of each stand decreased slightly or remained the same after harvesting while microbial population increased progressively during the first two years following harvesting. Microbial populations increased more rapidly and constantly at the sandy site than at the clayey site, which may indicate that the soil physical and chemical conditions changed more drastically for microbial activity following timber harvesting at the sandy site than at the clayey site. However, two kinds of treatment applications-three levels of organic matter removal and two levels of compaction-did not result in significant differences in microbial population or total soil respiration rate at each site during the first two post-harvest years. Total soil respiration of the aspen stands, sum of root respiration and microbial respiration, was a poor index for the microbial activity in this study because aspen kept an active root system for the successive root-sprouts even after harvesting, which resulted in a large portion of root respiration in total respiration.

  • PDF

Borehole Elemental Concentration Logs: Theory, Current Trends and Next Level (암석구성성분검층: 원리, 연구동향 및 향후 과제)

  • Shin, Jehyun;Hwang, Seho
    • Geophysics and Geophysical Exploration
    • /
    • v.22 no.3
    • /
    • pp.149-159
    • /
    • 2019
  • Borehole elemental concentration logging, measuring neutron-induced gamma rays by inelastic scattering and neutron capture interactions between neutron and formation, delivers concentrations of the most common elements found in the minerals and fluids of subsurface formation. X-ray diffraction and X-ray fluorescence analysis from core samples are traditionally used to understand formation composition and mineralogy, but it represents only part of formations. Additionally, it is difficult to obtain elemental analysis over the whole intervals because of poor core recovery zones such as fractures or sand layers mainly responsible for groundwater flow. The development of borehole technique for in situ elemental analysis plays a key role in assessing subsurface environment. Although this technology has advanced consistently starting from conventional and unconventional resources evaluation, it has been considered as exclusive techniques of some major service company. As regards domestic research and development, it has still remained an unexplored field because of some barriers such as the deficiency of detailed information on tools and calibration facility for chemistry and mineralogy database. This article reviews the basic theory of spectroscopy measurements, system configuration, calibration facility, and current status. In addition, this article introduces the domestic researches and self-development status on borehole elemental concentration tools.

Fault-Tolerant Parallel Applications in Java Message Passing Systems (자바 메시지 전달 시스템에서의 결함 포용 병렬 애플리케이션)

  • 안진호;김기범;김정훈;황종선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.768-770
    • /
    • 1998
  • 동기적 검사점(synchronous checkpoiting)기법, 인과적 메시지 로깅(causal message logging)과 향상된 회복 비동기성(improved asynchronism during recovery)을 제공하는 복귀회복(rollback recovery) 기법을 적용하여 자바 메시지 전달 시스템(java massage passing system)에서 수행하는 병렬 에플리케이션들에게 저 비용의 결함 포용성에 따라, 통신망으로 연결된 이질형 (fault-tolerance)(heterogeneous) 컴퓨터들을 이용하는 대규모 분산 시스템들은 아주 효율적인 병렬 컴퓨팅 환경을 제공해준다. 그러나, 이러한 분산 시스템들의 규모가 커짐에 따라 고장률 (failure rate)도 그 만큼 중요하게 된다. 따라서, 고장률이 높은 대규모 분산 시스템들에게 좀더 효율적인 결함 포용성을 제공하는 기법들이 필요하다. 또한, 대규모분산 시스템들은 이질형 컴퓨터들로 구성되어 있기 때문에, 결함 포용성을 제공하는 소프트웨어 패키지들은 플랫폼 독립적(platform independent)이어야 한다. 이러한 문제점은 높은 이식성(portability)을 가지고 있는 자바 언어로 구현함으로써 해결될 수 있다. 따라서, 본 논문은 자바 메시지 전달 시스템에서 수행되는 병렬 애플리케이션들에게 동기적 검사점 기법, 인과적 메시지 로깅과 향상된 비동기성을 제공하는 복귀회복 기법을 높은 이식성을 가진 자바언어로 구현하여 저 비용으로 결함 포용성을 제공하고자 한다.

  • PDF

Performance Analysis of an On-line Game Abuse Pattern Monitoring Method (온라인 게임 악용 패턴 모니터링 방법의 성능 분석)

  • Roh, Chang-Hyun;Son, Han-Seong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.71-77
    • /
    • 2011
  • CEP(Complex Event Processing) is a technique to find complex event pattern in a massive information system. Based on CEP technique, an abuse pattern monitoring method has been developed to provide an real-time detection. In the method, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server. This article provides the performance analysis results of the abuse pattern monitoring method using real game DB. We results that the method proposed in previous study is effective to monitor abusing users.

A REVIEW OF THE ROCK MECHANICAL AND ENGINEERING GEOLOGICAL RESEARCH AT GJOVIK OLYMPIC CAVERN (GJOEVIK올림픽 경기장(암반역학 및 지질공학 분야))

  • Barton, N.;By, T.L.;Chryssanthakis, P.;Tunbridge, L.;Kristiansen, J.;Loset, F.;Bhasin, R.K.;Westerdahl, H.;Vik, G.;Myrvang, A.;Hansen, S.E.;Lv, Ming;Stjern, G.;Ruistven, H.;Kjorholt, H.;Lee, M.S.
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 1993.10b
    • /
    • pp.235-247
    • /
    • 1993
  • The 62 m span Olympic lee Hockey cavern in Gjovik, Norway, is located in jointed gneiss of average RaD = 70% and has a rock cover of only 25 to 50m, thus posing challenging design p problems. The investigations prior to construction included two types of stress measurements, cross-hole seismic tomography, special coe logging, Q-system classification and numerical modelling with UDEC-BB. Predicted maximum deformations were 4 to 8 mm; surprisingly small due to the high horizontal stresses recorded. Extensometer (MPBX) installations from the surface prior to construction, precision surface levelling and MPBX installed from inside the cavern give a combined measure of maximum deformations in the range 7 to 8 mm with the 62 m span fully e excavated, and three adjacent caverns for the Postal Services also completed.

  • PDF

Integration of AutoCAD and Microsoft Excel for Forest Survey Application

  • Mamat, Mohd Rizuwan;Hamzah, Khali Aziz;Rashid, Muhammad Farid;Faidi, Mohd Azahari;Norizan, Azharizan Mohd
    • Journal of Forest and Environmental Science
    • /
    • v.29 no.4
    • /
    • pp.307-313
    • /
    • 2013
  • Forest Survey consists of road survey, topographic survey, tree mapping survey, stream survey and also ridge survey. Information from forest survey is important and become essential in preparing base map to be used for forest harvesting planning and control. With the current technologies technique of data processing and mapping from traditionally hand drawn method had shifted to a computer system particularly the use of Computer Aided Design (CAD). This gives great advantages to the forest managers and logging operators. However data processing and mapping duration could be further reduced by integrating CAD with other established software such as Microsoft Excel. This time study to show that there is significance difference in term of duration for data processing and efficiency using AutoCAD in combination with Microsoft Excel program as compare to the use of AutoCAD program alone. From the study, it shows that the integration of AutoCAD and Microsoft Excel is able to reduce 70% of duration for data processing and mapping as compared to the use of AutoCAD program alone.