• Title/Summary/Keyword: System Code

Search Result 6,258, Processing Time 0.037 seconds

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Development of the Phased Array Ultrasonic Testing Technique for Nuclear Power Plant's Small Bore Piping Socket Weld (원전 소구경 배관 소켓용접부 위상배열 초음파검사 기술 개발)

  • Yoon, Byung-Sik;Kim, Yong-Sik;Lee, Jeong-Seok
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.33 no.4
    • /
    • pp.368-375
    • /
    • 2013
  • Failure of small bore piping welds is a recurring problem at nuclear power plants. And the socket weld cracking in small bore piping has caused unplanned plant shutdowns for repair and high economic impact on the plants. Consequently, early crack detection, including the detection of manufacturing defects, is of the utmost importance. Until now, the surface inspection methods has been applied according to ASME Section XI requirements. But the ultrasonic inspection as a volumetric method is also applying to enforce the inspection requirement. However, the conventional manual ultrasonic inspection techniques are used to detect service induced fatigue cracks. And there was uncertainty on manual ultrasonic inspection because of limited access to the welds and difficulties with contact between the ultrasonic probe and the OD(outer diameter) surface of small bore piping. In this study, phased array ultrasonic inspection technique is applied to increase inspection speed and reliability. To achieve this object, the 3.5 MHz phased array ultrasonic transducer are designed and fabricated. The manually encoded scanner was also developed to enhance contact conditions and maintain constant signal quality. Additionally inspection system is configured and inspection procedure is developed.

Research Trends of the Jellyfish Blooms (해파리 대량발생의 연구동향)

  • Chung, Mi-Hee;Youn, Seok-Hyun;Yoon, Won-Duk
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.17 no.1
    • /
    • pp.25-31
    • /
    • 2012
  • The frequency and abundance of jellyfish, presumably related with climate change, fisheries overexploitation, marine pollution including land reclamation and dyke construction, are increasing worldwide. This feature has attracted interest and concerns from general public and public officials, and government is seeking how the damages could be prevented or reduced down. Korean government, having recent huge blooms of jellyfish, engaged in reducing and/or countermeasuring jellyfish damages. Korean research themes include ecology and physiology of blooming jellyfish species, understanding of the blooming mechanism, and focus on the eradication of blooming jellyfish, without governmental integrative management plan. EU is undertaking scientific projects focused on understanding of the mechanism and control of jellyfish blooms, and establishment of an integrative management. In USA, government has established the code on jellyfish management for conserving and protecting the fish and shellfish resources and one of its department is specially assigned to monitor jellyfish appearance, undertake research, and prepare management plan. Japan also assigned a department and research institute for jellyfish research. Their main interest is to predict jellyfish drifting and mass bloom. Compared to Korea, USA, EU and Japan emphasize integrative management that includes ecological understanding, public education and outreaches, communication and control, if possible, of jellyfish blooms, based on scientific data. We suggest then, 1) establishment of an integrative scientific system consisting of policy and scientific experts to prepare inter-ministrial integrative management plan to effectively combat jellyfish blooms and to maximize the scientific result; 2) concept change from harmful to exploitable marine animal in policy making and research; and 3) active education and information service for people. We expect that these suggestions can be useful for jellyfish management and policy making on another harmful marine organisms.

Development of a Traffic Signal Controller for the Tri-light Traffic Signal (3구신호등 제어용 교통신호제어기 개발)

  • Han, Won-Sub;Gho, Gwang-Yong;Heo, Nak-Won;Lee, Chul-Kee;Ha, Dong-Ik;Lee, Byung-Cheol
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.5
    • /
    • pp.49-58
    • /
    • 2010
  • The traffic signal controllers being used in the domestic currently are being manufactured based on the korean national police standard which was developed for controlling the quad-light traffic signal having the red, yellow, left-turn arrow, and green lights. But according to the national policy for the traffic operation, they have to be changed to be able to switch the tri-light signal having red, yellow and green lights. In this study, a new tri-light traffic signal controller was designed and developed by the way improving the Signal Control Unit of the existing quad-light standard traffic controller. The Load Signal Unit(LSU) was improved to output 6 signals which are the two assemblies of three signal indications having the red, yellow, and green lights. To enough traffic signals output to control each directional movements and the various transport modes which are car, bus, bike, and pedestrian etc., the connector bus system was designed to be able to accommodate maximum 96 signals outputs being constructed by 16 LSUs. Flasher device was developed to be able to support maximum 32 red signals. In the software, the communication protocol between traffic control center and the traffic signal controller was improved and new signal map code values were defined for the developed LSU controlling the quad-light traffic signal. A model of the quad-light traffic signal controller developed and was tested three operations, protocol-operation, remote-command and control-mode. The test result operated all of them successfully.

Suggestion, Design, and Evaluation of a New Modified Double Tee Slabs (새로운 개량 더블티 슬래브의 제안, 설계 및 평가)

  • Yu, Sung-Yong
    • Journal of the Korea Concrete Institute
    • /
    • v.20 no.6
    • /
    • pp.809-820
    • /
    • 2008
  • A new modified full scale double tee slabs with the length of nib plate - 1,500 mm were suggested, designed, and experimentally evaluated up to the loading of flexural failure. This slabs were composed of the tee section which was same to original PCI double tee and the plate section which was modified in a new shape, and the prestressing force was applied at the bottom of tee section only. This specimens were made from the domestic precast factory. The safety and serviceability of the modified nib plate with the dapped ends were evaluated up to the ultimate flexural strength of tee section. As the experimental loading increased, the flexural crackings developed first in the bottom of the slab and they changed to the increased flexural shear and inclined shear crackings in the nib and dapped portion of the double tees. The suggested modified double tee slabs failed in ductile above the design loading with many evenly distributed flexural crackings. The thickness of nib plate - 250 mm does not show any cracking under the service loading and show several minor flexural cracking up to the ultimate state of tee portion. The proposed specimens were satisfied with the strength and ductility requirements in the design code provisions in the tests. Additional experimental tests are required to reduce the depth and tensile reinforcement of nib plate concrete for the practical use of this system effectively.

A Review of the Medical Nutrition Therapy (MNT) of the U.S. Medicare System (미국 임상영양치료(MNT)의 법제화 과정 및 수가 체계)

  • 박은철;김현아;이해영;이영은;양일선
    • Korean Journal of Community Nutrition
    • /
    • v.7 no.6
    • /
    • pp.852-862
    • /
    • 2002
  • The purposes of this study were 1) to review the Medical Nutrition Therapy (MNT) Act of the United States, 2) to introduce the efforts of the American Dietetic Association (ADA) to expand the Medicare coverage for MNT and 3) to provide information about the reimbursement under Medicare Part B for the cost of MNT. The MNT Act defined MNT services as “the nutritional diagnostic, therapeutic, and counseling services provided by a Registered Dietitian or nutritional professional for the purpose of managing diabetes or renal diseases”. Also, the MNT Act defined “conditions for coverage of MNT”, “limitations on coverage of MNT”, and “qualifications of MNT service provider”. To expand the coverage of Medicare to include MNT, the ADA realized the need for development of a protocol for MNT, as well as studies to evaluate the effectiveness and cost-effectiveness of the MNT protocol developed. Therefore, the ADA supported the studies to develop a strong database of scientific investigations of nutritional services. Furthermore, the ADA needed credible data that could be used by Policy makers, so the ADA contracted with the Lewin Group to if out the study to gather the additional data needed to strengthen the ADA's position. In the report of the Lewin Group, which was entitled, “The Cost of Covering Medical Nutrition Therapy under Medicare : 1998 through 2004”, it was concluded, that if coverage for MNT in the Part B portion of Medicare had begun in 1998, by 2004, approximately $ 2.3 billion would have been saved through reduced hospital spending under Part A of Medicare ($ 1.2 billion) and reduced physician visits under Part B ($ 1.1 billion) Effective January 1 2002, the US Congress extended Medicare coverage to include MNT to beneficiaries with diabetes or renal diseases. The Centers for Medicare and Medicaid Services (CMS) established the duration and frequency for the MNT based on published reports or generally accepted protocols (for example, protocols suggested by the ADA). The number of hours covered by Medicare is 3 hours for the initial MNT and 2 hours for a follow-up MM. In 2002, a Medicare coverage policy was made to define the Physician's Current Procedural Terminology (CPT) codes 97802, 97803, and 97804 for MNT.

Performance and structural analysis of a radial inflow turbine for the organic Rankine cycle (유기랭킨사이클용 반경류 터빈의 성능 및 구조 해석)

  • Kim, Do-Yeop;Kim, You-Taek
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.6
    • /
    • pp.484-492
    • /
    • 2016
  • The turbine is an important component and has a significant impact on the thermodynamic efficiency of the organic Rankine cycle. A precise preliminary design is essential to developing efficient turbines. In addition, performance analysis and structural analysis are needed to evaluate the performance and structural safety. However, there are only a few exclusive studies on the development process of the radial inflow turbines for the organic Rankine cycle (ORC). In this study, a preliminary design of the ORC radial inflow turbine was performed. Subsequently, the performance and structural analysis were also carried out. The RTDM, which was developed as an in-house code, was used in the preliminary design process. The results of the performance analysis were found to be in good agreement with target performances. Structural analysis of the designed turbine was also carried out in order to determine whether the material selection for this study is suitable for the flow conditions of the designed turbine, and it was found that the selected aluminum alloy is suitable for the designed turbine. However, the reliability of the preliminary design algorithms and numerical methods should be strictly verified by an actual experimental test.

A Study on the Research Model for the Standardization of Software-Similarity-Appraisal Techniques (소프트웨어 복제도 감정기법의 표준화 모델에 관한 연구)

  • Bahng, Hyo-Keun;Cha, Tae-Own;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.823-832
    • /
    • 2006
  • The Purpose of Similarity(Reproduction) Degree Appraisal is to determine the equality or similarity between two programs and it is a system that presents the technical grounds of judgment which is necessary to support the resolution of software intellectual property rights through expert eyes. The most important things in proceeding software appraisal are not to make too much of expert's own subjective judgment and to acquire the accurate-appraisal results. However, up to now standard research and development for its systematic techniques are not properly made out and as different expert as each one could approach in a thousand different ways, even the techniques for software appraisal types have not exactly been presented yet. Moreover, in the analyzing results of all the appraisal cases finished before, through a practical way, we blow that there are some damages on objectivity and accuracy in some parts of the appraisal results owing to the problems of existing appraisal procedures and techniques or lack of expert's professional knowledge. In this paper we present the model for the standardization of software-similarity-appraisal techniques and objective-evaluation methods for decreasing a tolerance that could make different results according to each expert in the same-evaluation points. Especially, it analyzes and evaluates the techniques from various points of view concerning the standard appraisal process, setting a range of appraisal, setting appraisal domains and items in detail, based on unit processes, setting the weight of each object to be appraised, and the degree of logical and physical similarity, based on effective solutions to practical problems of existing appraisal techniques and their objective and quantitative standardization. Consequently, we believe that the model for the standardization of software-similarity-appraisal techniques will minimizes the possibility of mistakes due to an expert's subjective judgment as well as it will offer a tool for improving objectivity and reliability of the appraisal results.

A Reconfigurable, General-purpose DSM-CC Architecture and User Preference-based Cache Management Strategy (재구성이 가능한 범용 DSM-CC 아키텍처와 사용자 선호도 기반의 캐시 관리 전략)

  • Jang, Jin-Ho;Ko, Sang-Won;Kim, Jung-Sun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.89-98
    • /
    • 2010
  • In current digital broadcasting systems, GEM(Globally Executable MHP)-based middlewares such as MHP(Multimedia Home Platform), OCAP(OpenCable Application Platform), ACAP(Advanced Common Application Platform) are the norm. Despite much of the common characteristics shared, such as MPEG-2 and DSM-CC(Digital Storage Media-Command and Control) protocols, the information and data structures they need are slightly different, which results in incompatibility issues. In this paper, in line with an effort to develop an integrated DTV middleware, we propose a general-purpose, reconfigurable DSM-CC architecture for supporting various standard GEM-based middlewares without code modifications. First, we identify DSM-CC components that are common and thus can be shared by all GEM-based middlewares. Next, the system is provided with middleware-specific information and data structures in the form of XML. Since the XML information can be parsed dynamically at run time, it can be interchanged either statically or dynamically for a specific target middleware. As for the performance issues, the response time and usage frequency of DSM-CC module highly contribute to the performance of STB(Set-Top-Box). In this paper, we also propose an efficient application cache management strategy and evaluate its performance. The performance result has shown that the cache strategy reflecting user preferences greatly helps to reduce response time for executing application.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.