• Title/Summary/Keyword: Safety Critical Software

Search Result 193, Processing Time 0.027 seconds

Comparison of Path Exploration and Model Checking Techniques for Checking Automotive API Call Safety (차량전장용 소프트웨어의 API 제약사항 위배여부 탐지를 위한 실행경로 탐색방법과 모델검증 방법의 비교)

  • Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.12
    • /
    • pp.615-622
    • /
    • 2016
  • Automotive control software can be a source of critical safety issues when developers do not comply system constraints. However, a violation is difficult to identify in complicated source code if not supported by an automated verification tool. This paper introduces two possible approaches that check whether an automotive control software complies API call constraints to compare their performance and effectiveness. One method statically analyzes the source code and explores all possible execution paths, and the other utilizes a model checker to monitor constraint violations for a given set of constraint automata. We have implemented both approaches and performed a series of experiments showing that the approach with model-checking finds constraint violations more accurately and scales better.

A Study on Safety Evaluation Methods for Electric Multiple Units (도시철도차량의 안전진단평가 기법에 관한 연구)

  • Chung J.D.;Han S.Y;Park K.J.;Park O.J.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.374-377
    • /
    • 2005
  • Automobile is in charge of most transportation system in modern urban city. However, in fact, cause of problem of road state, environment, and the other reasons, urban transit system is using as Mass Transit nowadays. Nevertheless Urban transit system is considering many kind of safety fact of that system which is increasing continuously nowadays, it occurs various train accident. This paper describes 3D Dimensional Measurement(EDM testing) and tensile testing results of carbody structure for crashed EMU(Electric Multiple Units). Tensile tests were performed on two different types of specimens in order to evaluate the strength changes before and after damages, obtained from plastic deformed area and nondeformed region of the crashed EMU. And Structural analysis of EMU was performed for the criteria of safety assessment. Structural analysis using commercial I-DEAS software provided important information on the stress distribution and load transfer mechanisms as well as the amount of damages during rolling stock crash. The testing results have been used to provide the critical information for the criteria of safety diagnosis.

  • PDF

A Design of Base Technology for Airbag Actuation Checking Application Based on Mechanical Calculations for Old Container Vehicle

  • Huh, Jun-Ho;Lee, Dong-Geun;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.69-76
    • /
    • 2016
  • Currently, research on more convenient and safer cars for drivers and passengers, the intelligent cars, are being actively conducted. The researches involve designing systems that intelligently minimize physical damages caused by car accidents, not just pursuing passive safety measures like airbags or safety belts. However, there are many cases around the world where airbags cannot be activated in times of accidents and it is difficult for consumers to check if their airbags will be activated, especially for the old-style cars. Thus, in this paper, a base technology for an application that can determine whether the airbags will actually be actuated at a critical moment based on the mechanical calculations is being introduced.

Running Performance Analysis of an Articulated Light Rail Vehicle (관절형 경량전철의 주행성능 해석)

  • Hur, Shin;Park, Chan-Kyung;Han, Hyung-Suk;Ha, Sung-Do
    • Proceedings of the KSR Conference
    • /
    • 1999.05a
    • /
    • pp.159-166
    • /
    • 1999
  • In this paper, running performance analyses of an articulated light rail vehicle are carried out using VAMPIRE software package. The stability analysis to determine the critical speed and the safety analysis such as derailment coefficients, lateral forces of wheels and reduction of wheel load are carried for the track conditions of straight, transition and curving range to the operating velocity of 40km/h. Also, ride quality is analyzed. As the results of analysis, the safety of light rail vehicle satisfied with the limit values and the ride quality for tare and full load condition was shown to the "not uncomfortable" level in ISO 2631-1 (1997) criteria.

  • PDF

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Post-pillars design for safe exploitation at Trepça hard rock mine (Kosovo) based on numerical modeling

  • Ibishi, Gzim;Genis, Melih;Yavuz, Mahmut
    • Geomechanics and Engineering
    • /
    • v.28 no.5
    • /
    • pp.463-475
    • /
    • 2022
  • In the mine exploitation stage; one of the critical issues is the stability assessment of post-pillars. The instability of post-pillars leads to serious safety hazards in mining operations. The focus of this study is to assess the stability of post-pillars in the 130# stope in the central ore body at Trepça hard rock mine by employing both conventional (i.e., critical span curve) and numerical methods (i.e., FLAC3D). Moreover, a new numerical based index (i.e., Pillar Yield Ratio-PYR) was proposed. The aim of PYR index is to determine a border line between stable, potentially unstable, and failure state of post-pillars at a specific mine site. The critical value of pillar width to height ratio is 2.5 for deep production stopes (e.g., > 800 m). Results showed that pillar size, mining height and mining depth significantly have affected the post-pillar stability. The reliability of numerical based index (i.e., PYR) is verified based on empirical underground pillar stability graph developed by Lunder, 1994. The proposed pillar yield ratio index and pillar stability graph can be used as a design tool in new mining areas at Trepça hard rock mine and for other situations with similar geotechnical conditions.

Development of Certification Program for Application Service Provider : Service Provider(Service Environment) Certification (ASP 인증제도 개발 : 사업자(서비스 환경) 인증)

  • Seo, Kwang-Kyu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.1
    • /
    • pp.101-108
    • /
    • 2006
  • The issue of using information system to ensure competitive power in the market is rising. The outsourcing methods that entrust activities of information system of companies to other expert agencies are increasing as the enterprises make a lot of efforts to put their resources to their heart of business in the process of adopting information system. Recently, ASP(Application Service Provider) as a new information technology outsourcing method appears due to the development of network technology and spreading of peculating software. ASP defines as a software leasing service which is supplied through networks instead of purchasing application software with high price. For successful implementation of ASP, it is necessary to develop a certification program to ensure safety and reliability of ASP. This paper provides the safe and reliable certification program for ASP. In order to develop it, the critical issues related to service quality and certification of ASP are identified and then evaluation methodology for the ASP certification program is proposed. This paper presents service provider(service environment) certification as the part of the ASP certification program.

HW/SW Co-design of a Visual Driver Drowsiness Detection System

  • Lai, Kok Choong;Wong, M.L. Dennis;Islam, Syed Zahidul
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.1
    • /
    • pp.31-41
    • /
    • 2013
  • There have been various recent methods proposed in detecting driver drowsiness (DD) to avert fatal accidents. This work proposes a hardware/software (HW/SW) co-design approach in implementation of a DD detection system adapted from an AdaBoost-based object detection algorithm with Haar-like features [1] to monitor driver's eye closure rate. In this work, critical functions of the DD detection algorithm is accelerated through custom hardware components in order to speed up processing, while the software component implements the overall control and logical operations to achieve the complete functionality required of the DD detection algorithm. The HW/SW architecture was implemented on an Altera DE2 board with a video daughter board. Performance of the proposed implementation was evaluated and benchmarked against some recent works.

  • PDF

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

A Study on Mission Critical Factors for Software Test Enhancement in Information Technologies Development of Public Sector (Mission Critical 공공 정보화 구축 시험평가 개선 지표 연구)

  • Lee, Byung-hwa;Lim, Sung-ryel
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.97-107
    • /
    • 2015
  • Up until recently, Korea has ranked the first place in UN e-Government Survey for three consecutive years. In keeping with such accomplishment, the size of budget execution has been consistently growing in accordance with Korea's Government 3.0 policy and vision, leading to increase in big-sized informatization projects in the business. Especially in mission critical public sector's infrastructure where it affects many people, growing demand for establishing high-quality information system with new technologies being brought to attention in order to meet the complex needs of citizens. National defense information system, being one of representative domains examples in the concerned area, established high military competency by applying breakthrough technology. Network-oriented national defense knowledge informatization was set as the vision in order to implement core roles in making efficient national defense management; and effort has been made to materialize the vision by making advancement in national defense's information system and its informatization implementation system. This research studies new quality index relevant to test and evaluation (T&E)of informatization business in national defense which is the representative example of mission critical public sector's infrastructure. We studied international standards and guidelines, analyzed actual T&E cases, and applied them to the inspection items that are currently in use, complying with the e-government law (Act No. 12346, Official Announcement Date 2014. 1.28., Enforcement Date 2014. 7.29.) As a result of productivity analysis, based on hypothesis in which suggested model was applied to T&E of the national defense informatization business, we confirmed the possibility of enhancement in the T&E productivity by assessing reliability, expertise, and safety as evaluation factors.