• Title/Summary/Keyword: Safety requirements

Search Result 1,711, Processing Time 0.027 seconds

A Secure and Lightweight Authentication Scheme for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 안전하고 경량화 된 인증기법)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.77-83
    • /
    • 2019
  • With the increase in population, the number of such senior citizens is increasing day by day. These senior citizens have a variety of care needs, but there are not enough health workers to look after them. Ambient Assisted Living (AAL) aims at ensuring the safety and health quality of the older adults and extending the number of years the senior citizens can live independently in an environment of their own preference. AAL provides a system comprising of smart devices, medical sensors, wireless networks, computer and software applications for healthcare monitoring. AAL can be used for various purposes like preventing, curing, and improving wellness and health conditions of older adults. While information security and privacy are critical to providing assurance that users of AAL systems are protected, few studies take into account this feature. In this paper, we propose a secure and lightweight authentication scheme for the AAL systems. The proposed authentication scheme not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. Also, the security analysis results are presented to show the proposed authentication scheme is more secure and efficient rather than existing authentication schemes.

A Study on the Evaluation for Performance of Body Armor Vest using ANOVA (분산분석을 이용한 방탄조끼의 방탄성능 평가에 관한 연구)

  • Park, Jae Woo;Byun, Kisik;Cho, Sung-Yong;Kim, Suk Ki;Yeo, Yongheon;Kwon, Jae Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.372-378
    • /
    • 2021
  • A body armor vest is a form of munition related directly to the safety and life of combatants. Therefore, it must meet the requirements for ballistic resistance. The ROK demands the performance of body armor vest meet the Level IIIA specified by the NIJ STD-0101.06 published by the US National Institute of Justice. This study performed acceptance tests on body armor vests. The factors for evaluating the ballistic resistance evaluated were not only whether it penetrates when shooting but also whether the BFS (Backface Signature) depth does not exceed 44 mm when it does not penetrate. The factors were assessed to determine if they were consistent or not. The BFS depth is affected by various test factors, such as the physical properties of the backing material and the changes in the amount of impact with the bullet velocity. In this study, an analysis of the bulletproof performance was performed by extracting the data with the same conditions using ANOVA to remove the influence of these external factors. The analysis revealed a correlation between the BFS depth, bullet velocity, vest conditions, and protection area. The mass production process was analyzed by estimating the Interval of BFS on each lot. Through this, a new methodology for ballistic resistance evaluation and paradigm for future quality assurance is suggested.

Research and Application of Fault Prediction Method for High-speed EMU Based on PHM Technology (PHM 기술을 이용한 고속 EMU의 고장 예측 방법 연구 및 적용)

  • Wang, Haitao;Min, Byung-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.55-63
    • /
    • 2022
  • In recent years, with the rapid development of large and medium-sized urban rail transit in China, the total operating mileage of high-speed railway and the total number of EMUs(Electric Multiple Units) are rising. The system complexity of high-speed EMU is constantly increasing, which puts forward higher requirements for the safety of equipment and the efficiency of maintenance.At present, the maintenance mode of high-speed EMU in China still adopts the post maintenance method based on planned maintenance and fault maintenance, which leads to insufficient or excessive maintenance, reduces the efficiency of equipment fault handling, and increases the maintenance cost. Based on the intelligent operation and maintenance technology of PHM(prognostics and health management). This thesis builds an integrated PHM platform of "vehicle system-communication system-ground system" by integrating multi-source heterogeneous data of different scenarios of high-speed EMU, and combines the equipment fault mechanism with artificial intelligence algorithms to build a fault prediction model for traction motors of high-speed EMU.Reliable fault prediction and accurate maintenance shall be carried out in advance to ensure safe and efficient operation of high-speed EMU.

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

[Retracted]Case Study of Microseismic Monitoring System Installation based on Underground Mine Communication System ([논문철회]지하광산 갱내통신 기반 미소진동 모니터링 체계 구축 사례)

  • Heo, Seung;Choi, Yongkun
    • Tunnel and Underground Space
    • /
    • v.32 no.2
    • /
    • pp.120-130
    • /
    • 2022
  • In this study, the applicability of the microseismic monitoring system based on the underground mine communication system has been verified by operation test in the domestic underground mine. The microseismic data consists of wavelet data and meta-data for mine safety management, and both data should be transferred, stored, analyzed and managed with proper method according to the purpose and size of each data. In order to select the optimal communication system for the microseismic monitoring system considering the underground environment as well as properties of data, various types of communication system have been tested and compared during operation test after installing the optical cable communication system, 2.4 GHz and 900 MHz wireless communication system through the underground mine tunnel and overground area of the test site. The integrated microseismic monitoring software, which was developed to secure the stability of data management and ease of use, has been updated according to findings from operation test. Through the operation test of the microseismic monitoring system including the communication system and the monitoring software, the technical basis was established corresponding to various requirements of the domestic mine for adoption of the microseismic monitoring system.

A Conversion Protocol for 2W Telephone Signal over Ethernet in a Private PSTN (사설 PSTN에서 2W 전화 신호의 이더넷 변환 프로토콜)

  • Shin, JinBeom;Cho, KilSeok;Lee, DongGwan;Kim, TaeHyon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.6
    • /
    • pp.645-654
    • /
    • 2021
  • In this paper, we proposed a protocol to convert 2W telephone analog signals to Ethernet data in a private PSTN 2W tactical voice system. There are several kinds of operational problems in the tactical telephone network where 2W telephone copper lines are installed hundreds of meters away from the PBX in a headquarter site. The reason is that it is difficult to install and maintain the 2W telephone copper cable in severe operational fields and to meet safety and stability operational requirements of the telephone line under lighting and electromagnetic environments. In order to solve these challenging demands, we proposed an efficient method that the 2W analog interface signals between a private PBX system and a 2W telephone is converted to Ethernet messages using the optical Ethernet data communication network already deployed in the tactical weapon system. Thus, it is not necessary to install an additional optic cable for the ethernet telephone line and to maintain the private PSTN 2W telephone network. Also it provides safe and secure telecommunication operation under lightning and electromagnetic environments. This paper presents the conversion protocol from 2W telephone signals over Ethernet interface between PBX systems and 2W telephones, the mutual exchange protocol of ethernet messages between two converters, and the rule to process analog signal interface. Finally, we demonstrate that the proposed technique can provide a feasible solution in the tactical weapon system by analyzing its performance and experimental results such as the bandwidth of 2W telephone ethernet network and the transmission latency of voice signal, and the stability of optic ethernet voice network along with the ethernet data network.

Time Reduction Effect Analysis of SMART Frame for Long Span and Heavy Loaded Logistics Buildings (SMART 프레임의 공기단축 효과 분석 - 대형 물류창고 사례 -)

  • Kim, Doyeong;Ji, Woomin;Lim, Jeeyoung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.5
    • /
    • pp.519-530
    • /
    • 2022
  • As online commerce increases, the construction of large logistics buildings worldwide is exploding. Most of these buildings have the characteristics of long span and heavy loaded and use precast concrete components, a pin joint structure, for rapid construction. However, due to construction safety and structural stability requirements, the pin joint structure has many limitations in terms of the erection of the PC member, which increases the time and cost. A structural frame connected with steel joints between precast concrete components, called a SMART frame, has been developed, which addresses these constraints and risks. However, the effect of the appllication of a SMART frame on the time aspect has not been analysed. The study is a time reduction effect analysis of a SMART frame for long span and heavy loaded logistics buildings. For this study, the authors select a case site erected using existing PC components, and compare the time reduction with the SMART frame erection simulations. Through this analysis, it was found that a time reduciton about 4 months, approximately 48% of the conventional PC installation period could be achieved. If the SMART frame is applied when carrying out future large-scale logistics building projects, it can be expected to have the effect of significantly shortening the construction period compared to the conventional method.

Analysis of Grover Attack Cost and Post-Quantum Security Strength Evaluation for Lightweight Cipher SPARKLE SCHWAEMM (경량암호 SPARKLE SCHWAEMM에 대한 Grover 공격 비용 분석 및 양자 후 보안 강도 평가)

  • Yang, Yu Jin;Jang, Kyung Bae;Kim, Hyun Ji;Song, Gyung Ju;Lim, Se Jin;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.453-460
    • /
    • 2022
  • As high-performance quantum computers are expected to be developed, studies are being actively conducted to build a post-quantum security system that is safe from potential quantum computer attacks. When the Grover's algorithm, a representative quantum algorithm, is used to search for a secret key in a symmetric key cryptography, there may be a safety problem in that the security strength of the cipher is reduced to the square root. NIST presents the post-quantum security strength estimated based on the cost of the Grover's algorithm required for an attack of the cryptographic algorithm as a post-quantum security requirement for symmetric key cryptography. The estimated cost of Grover's algorithm for the attack of symmetric key cryptography is determined by the quantum circuit complexity of the corresponding encryption algorithm. In this paper, the quantum circuit of the SCHWAEMM algorithm, AEAD family of SPARKLE, which was a finalist in NIST's lightweight cryptography competition, is efficiently implemented, and the quantum cost to apply the Grover's algorithm is analyzed. At this time, the cost according to the CDKM ripple-carry adder and the unbounded Fan-Out adder is compared together. Finally, we evaluate the post-quantum security strength of the lightweight cryptography SPARKLE SCHWAEMM algorithm based on the analyzed cost and NIST's post-quantum security requirements. A quantum programming tool, ProjectQ, is used to implement the quantum circuit and analyze its cost.

Improvement of ISMS Certification Components for Virtual Asset Services: Focusing on CCSS Certification Comparison (안전한 가상자산 서비스를 위한 ISMS 인증항목 개선에 관한 연구: CCSS 인증제도 비교를 중심으로)

  • Kim, Eun Ji;Koo, Ja Hwan;Kim, Ung Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.249-258
    • /
    • 2022
  • Since the advent of Bitcoin, various virtual assets have been actively traded through virtual asset services of virtual asset exchanges. Recently, security accidents have frequently occurred in virtual asset exchanges, so the government is obligated to obtain information security management system (ISMS) certification to strengthen information protection of virtual asset exchanges, and 56 additional specialized items have been established. In this paper, we compared the domain importance of ISMS and CryptoCurrency Security Standard (CCSS) which is a set of requirements for all information systems that make use of cryptocurrencies, and analyzed the results after mapping them to gain insight into the characteristics of each certification system. Improvements for 4 items of High Level were derived by classifying the priorities for improvement items into 3 stages: High, Medium, and Low. These results can provide priority for virtual asset and information system security, support method and systematic decision-making on improvement of certified items, and contribute to vitalization of virtual asset transactions by enhancing the reliability and safety of virtual asset services.

CHEMICAL AND MICROBIOLOGICAL ANALYSIS OF GOAT MILK, CHEESE AND WHEY BY NIRS

  • Perez Marin, M.D.;Garrido Varo, A.;Serradilla, J.M.;Nunez, N.;Ares, J.L.;Sanchez, J.
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.1513-1513
    • /
    • 2001
  • Present Food Legislation compels dairy industry to carry out analyses in order to guarantee the food safety and quality of products. Furthermore, in many cases industry pays milk according to bacteriological or/and nutritional quality. In order to do these analyses, several expensive instruments are needed (Milkoscan, Fossomatic, Bactoscan). NIRS technology Provides a unique instrument to deal with all analytical requirements. It offers as main advantages its speed and, specially, its versatility, since not only allows determine all the parameters required in milk analysis, but also allows analyse other dairy products, like cheese or whey. The objective of this study is to develop NIRS calibration equations to predict several quality parameters in goat milk, cheese and whey. Three sets of 123 milk samples, 190 cheese samples and 109 whey samples, have been analysed in a FOSS NIR Systems 6500 I spectrophotometer equipped with a spinning module. Milk and whey were analysed by folded transmission, using circular cells with gold surface and pathlength of 0.1 m, while intact cheese was analysed by reflectance using standard circular cells. NIRS calibrations were obtained for the prediction of chemical composition in goat milk, for fat (r$^2$=0.92; SECV=0.20%), total solids (r$^2$=0.95: SECV=0.22%), protein (r$^2$=0.94; SECV=0.07%), casein (r$^2$=0.93; SECV=0.07%) and lactose (r$^2$=0.89; SECV=0.05%). Moreover, equations have been performed to determine somatic cells (r$^2$=0.81; SECV=276.89%) and total bacteria (r$^2$=0.58; SECV=499.32%) counts in goat milk. In the case of cheese, calibrations were obtained for the prediction of fat (r$^2$=0.92; SECV=0.57), total solids (r$^2$=0.80; SECV=0.92%) and protein (r$^2$=0.70; SECV=0.63%). In whey, fat (r$^2$=0.66; SECV=0.08%), total solids (r$^2$=0.67; SECV=0.19%) and protein (r$^2$=0.76; SECV=0.07%) NIRS equations were obtained. These results proved the viability of NIRS technology to predict chemical and microbiological parameters and somatic cells count in goat milk, as well as chemical composition of goat cheese and whey.

  • PDF