• Title/Summary/Keyword: Real-time Integrity

Search Result 184, Processing Time 0.024 seconds

Development of UAV Flight Control Software using Model-Based Development(MBD) Technology (모델기반 개발기술을 적용한 무인항공기 비행제어 소프트웨어 개발)

  • Moon, Jung-Ho;Shin, Sung-Sik;Choi, Seung-Kie;Cho, Shin-Je;Rho, Eun-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.12
    • /
    • pp.1217-1222
    • /
    • 2010
  • This paper describes the Model-Based Development(MBD) process behind the flight control software of a close-range unmanned aerial vehicle(KUS-9). An integrated development environment was created using a commercial tool(MATLAB $Simulink^{(R)}$), which was utilized to design models for linear/nonlinear simulation, flight control law, operational logic and HILS(Hardware In the Loop Simulation) system. Software requirements were validated through flight simulations and peer reviews during the design process, whereas the models were verified through the application of a DO-178B verification tool. The integrity of automatically generated C code was verified by using a separate S/W testing tool. The finished software product was embedded on two different types of hardware and real-time operating system(uC/OS-II, VxWorks) to perform HILS and flight tests. The key findings of this study are that MBD Technology enables the development of a reusable and an extensible software product and auto-code generation technology allows the production of a highly reliable flight control software under a compressed time schedule.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

Fiber Optic Sensors for Smart Monitoring (스마트 모니터링용 광섬유센서)

  • Kim, Ki-Soo
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.10 no.6 s.52
    • /
    • pp.137-145
    • /
    • 2006
  • Recently, the interests in structural monitoring of civil infrastructures are increased. Especially, as the civil infrastructures such as bridges, tunnels and buildings become large-scale, it is necessary to monitor and maintain the safety state of the structures, which requires smart systems that can supply long-term monitoring during the service time of the structures. In this paper, we investigated the possibilities of fiber optic sensor application to the various structures. We investigate the possibility of using fiber optic Bragg grating sensors to joint structure. The sensors show good response to the structural behavior of the joint while electric gauges lack of sensitivity, durability and long term stability for continuous monitoring. We also apply fiber optic structural monitoring to the composite repaired concrete beam structure. Peel-out effects is detected with optical fiber Bragg grating sensors and the strain difference between main structure and repaired carbon sheets is observed when they separate each other. The real field test was performed to verify the behaviors of fiber Bragg grating sensors attached to the containment structure in Uljin nuclear power plant in Korea as a part of structural integrity test which demonstrates that the structural response of the non-prototype primary containment structures. The optical fiber Bragg grating sensor smart system which is the probable means for long term assessments can be applicable to monitoring of structural members in various civil infrastructures.

Implementation of Secure System for Blockchain-based Smart Meter Aggregation (블록체인 기반 스마트 미터 집계 보안 시스템 구축)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.1-11
    • /
    • 2020
  • As an important basic building block of the smart grid environment, smart meter provides real-time electricity consumption information to the utility. However, ensuring information security and privacy in the smart meter data aggregation process is a non-trivial task. Even though the secure data aggregation for the smart meter has been a lot of attention from both academic and industry researchers in recent years, most of these studies are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter system. Recently, blockchains or distributed ledgers are an emerging technology that has drawn considerable interest from energy supply firms, startups, technology developers, financial institutions, national governments and the academic community. In particular, blockchains are identified as having the potential to bring significant benefits and innovation for the electricity consumption network. This study suggests a distributed, privacy-preserving, and simple secure smart meter data aggregation system, backed up by Blockchain technology. Smart meter data are aggregated and verified by a hierarchical Merkle tree, in which the consensus protocol is supported by the practical Byzantine fault tolerance algorithm.

Study of Quantitative Assessment Standard for Type 1 and Type 2 Gas Cylinders Using Acoustic Emission Testing (음향방출법을 이용한 Type 1 및 Type 2 가스실린더의 정량적 평가기준에 대한 연구)

  • Kim, Dong-Hyun;Lee, Sang-Bum;Kim, Kyung-Hoon;Yoon, Dong-Jin;Bae, Dong-Myung
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.2
    • /
    • pp.176-183
    • /
    • 2014
  • Acoustic emission testing (AET) of cylinders is advantageous in that it can be directly conducted on cylinders installed in a car, without needing to dissemble them on a real-time basis. Therefore, users prefer AET over other nondestructive testing methods. Owing to these advantages of AET, it has been approved by the Department of Transportation of the U.S. as a safety evaluation method for pressure containers or as an alternative to the hydroproof testing method. This paper presents a study of the quantitative evaluation criteria for a container having ultrasonic testing defects and also for Type 1 and Type 2 gas cylinders, which are defective seamless pressure containers provided by NK, a manufacturer of pressure containers. For the Type 1 cylinder, the process from crack growth to leak was observed in a repetitive fatigue test using a 113 L container according to ASTM E 1419-02. Further, for the Type 2 cylinder, integrity was evaluated using a 119 L sound container and a container damaged by hydraulic pressure, by the slow-fill method according to ASTM E 2191-02. Based on the AET results of the Type 1 and Type 2 cylinders, quantitative evaluation criteria were established for a defective and non-defective container.

Exocyclic GpC DNA methyltransferase from Celeribacter marinus IMCC12053 (Celeribacter marinus IMCC12053의 외향고리 GpC DNA 메틸트랜스퍼라아제)

  • Kim, Junghee;Oh, Hyun-Myung
    • Korean Journal of Microbiology
    • /
    • v.55 no.2
    • /
    • pp.103-111
    • /
    • 2019
  • DNA methylation is involved in diverse processes in bacteria, including maintenance of genome integrity and regulation of gene expression. CcrM, the DNA methyltransferase conserved in Alphaproteobacterial species, carries out $N^6$-adenine or $N^4$-cytosine methyltransferase activities using S-adenosyl methionine as a co-substrate. Celeribacter marinus IMCC12053 from the Alphaproteobacterial group was isolated from a marine environment. Single molecule real-time sequencing method (SMRT) was used to detect the methylation patterns of C. marinus IMCC12053. Gibbs motif sampler program was used to observe the conversion of adenosine of 5'-GANTC-3' to $N^6$-methyladenosine and conversion of $N^4$-cytosine of 5'-GpC-3' to $N^4$-methylcytosine. Exocyclic DNA methyltransferase from the genome of strain IMCC12053 was chosen using phylogenetic analysis and $N^4$-cytosine methyltransferase was cloned. IPTG inducer was used to confirm the methylation activity of DNA methylase, and cloned into a pQE30 vector using dam-/dcm- E. coli as the expression host. The genomic DNA and the plasmid carrying methylase-encoding sequences were extracted and cleaved with restriction enzymes that were sensitive to methylation, to confirm the methylation activity. These methylases protected the restriction enzyme site once IPTG-induced methylases methylated the chromosome and plasmid, harboring the DNA methylase. In this study, cloned exocyclic DNA methylases were investigated for potential use as a novel type of GpC methylase for molecular biology and epigenetics.

A study on the Evaluation of Real-Time Map Update Technology for Automated Driving (자율주행 지원을 위한 정밀도로지도 갱신기술 평가를 위한 기준 도출 연구)

  • PARK, Yu-Kyung;KANG, Won-Pyung;CHOI, Ji-Eun;KIM, Byung-Ju
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.3
    • /
    • pp.146-154
    • /
    • 2019
  • Recently, a system has been developed and applied to establish and utilize HD maps through R&D. The biggest problem, however, is the lack of a proper HD map update system, which requires the development and adoption of such a system as soon as possible. In addition, in the case of updating HD maps for automated driving, integrity and accuracy of maps are required for safe driving, so an test of these technologies and data quality is required. In April 2018, the Ministry of Land, Infrastructure and Transport implemented a project to 'Develop Technology to Demonstrate and Share the Instant Road Change Detection and Update Technology for automated driving. This paper analyzed the technology for updating map based on the investigation and analysis of relevant technology trends for the development of integrated demonstration and sharing technology of road change rapid detection and updating map technology, and put forward the criteria for road change rapid detection, integrated quality verification of update technology. It is expected that the results of this study will contribute to quality assurance of HD maps that support safety driving for automated vehicles.

A Fog-based IoT Service Interoperability System using Blockchain in Cloud Environment (클라우드 환경에서 블록체인을 이용한 포그 기반 IoT 서비스 상호운용 시스템)

  • Kim, Mi Sun;Park, Yong Suk;Seo, Jae Hyun
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.39-53
    • /
    • 2022
  • Cloud of Things (CoT) can provide IoT applications with unlimited storage functions and processing power supported by cloud services. However, in a centralized cloud of things, it can create a single point of failure that can lead to bottleneck problems, outages of the CoT network. In this paper, to solve the problem of centralized cloud of things and interoperate between different service domains, we propose an IoT service interoperability system using distributed fog computing and blockchain technology. Distributed fog is used to provide real-time data processing and services in fog systems located at a geographically close distance to IoT devices, and to enable service interoperability between each fog using smart contracts and distributed ledgers of the blockchain. The proposed system provides services within a region close to the distributed fog entrusted with the service from the cloud, and it is possible to access the services of other fogs without going through the cloud even between fogs. In addition, by sharing a service right token issuance information between the cloud and fog nodes using a blockchain network, the integrity of the token can be guaranteed and reliable service interoperability between fog nodes can be performed.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

A Study on the Application of RTLS Technology for the Automation of Spray-Applied Fire Resistive Covering Work (뿜칠내화피복 작업 자동화시스템을 위한 RTLS 기술 적용에 관한 연구)

  • Kim, Kyoon-Tai
    • Journal of the Korea Institute of Building Construction
    • /
    • v.9 no.5
    • /
    • pp.79-86
    • /
    • 2009
  • In a steel structure, spray-applied fire resistive materials are crucial in preventing structural strength from being weakened in the event of a fire. The quality control of such materials, however, is difficult for manual workers, who can frequently be in short supply. These skilled workers are also very likely to be exposed to environmental hazards. Problems with construction work such as this, which are specifically the difficulty of achieving quality control and the dangerous nature of the work itself, can be solved to some degree by the introduction of automated equipment. It is, however, very difficult to automate the work process, from operation to the selection of a location for the equipment, as the environment of a construction site has not yet been structured to accommodate automation. This is a fundamental study on the possibility of the automation of spray-applied fire resistive coating work. In this study, the linkability of the cutting-edge RTLS to an automation system is reviewed, and a scenario for the automation of spray-applied fire resistive coating work and system composition is presented. The system suggested in this study is still in a conceptual stage, and as such, there are many restrictions still to be resolved. Despite this fact, automation is expected to have good effectiveness in terms of preventing fire from spreading by maintaining a certain level of strength at a high temperature when a fire occurs, as it maintains the thickness of the fire-resistive coating at a specified level, and secures the integrity of the coating with the steel structure, thereby enhancing the fire-resistive performance. It also expected that if future research is conducted in this area in relation to a cutting-edge monitoring TRS, such as the ubiquitous sensor network (USN) and/or building information model (BIM), it will contribute to raising the level of construction automation in Korea, reducing costs through the systematic and efficient management of construction resources, shortening construction periods, and implementing more precise construction