• Title/Summary/Keyword: System failures

Search Result 1,131, Processing Time 0.027 seconds

Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach (해시 트리 기반의 대규모 데이터 서명 시스템 구현)

  • Park, Seung Kyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.19-31
    • /
    • 2018
  • As the ICT technologies advance, the unprecedently large amount of digital data is created, transferred, stored, and utilized in every industry. With the data scale extension and the applying technologies advancement, the new services emerging from the use of large scale data make our living more convenient and useful. But the cybercrimes such as data forgery and/or change of data generation time are also increasing. For the data security against the cybercrimes, the technology for data integrity and the time verification are necessary. Today, public key based signature technology is the most commonly used. But a lot of costly system resources and the additional infra to manage the certificates and keys for using it make it impractical to use in the large-scale data environment. In this research, a new and far less system resources consuming signature technology for large scale data, based on the Hash Function and Merkle tree, is introduced. An improved method for processing the distributed hash trees is also suggested to mitigate the disruptions by server failures. The prototype system was implemented, and its performance was evaluated. The results show that the technology can be effectively used in a variety of areas like cloud computing, IoT, big data, fin-tech, etc., which produce a large-scale data.

  • PDF

Additional CSP calculation method considering Human Error (휴먼에러를 고려한 추가 CSP 산정 방안)

  • Baek, Sung-Il;Ha, Yun-chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.759-767
    • /
    • 2021
  • Most weapons systems that are Force Integration are expensive equipment that reflects the latest technology, and the operation and maintenance cost is increasing continuously. Factors that efficiently operate and maintain these weapon systems include maintenance plans, economic costs, and repair part requirements. Among them, predicting the repair parts requirements during the life cycle in advance is an important way to increase operation and maintenance cost efficiency and operating availability. The start of requirement analysis for repair parts is a calculation of the CSP (CSP: Concurrent Spare parts, CSP hereafter) that is distributed when the weapon system is deployed. The CSP is an essential component of achieving the operating availability during this period because the weapon system aims to successfully perform a given operation mission without resupply for an initial set period. In the present study, the CSP calculation method was analyzed, reflecting the failure rate and operating time of items, but the analyzed CSP was aimed at preparing for technical failure, but in the initial operating environment, it is limited in coping with unexpected failures caused by human error. The failure is not included in the scope of free maintenance and is a serious factor in making the weapon system inoperable during the initial operation period. To prevent the inoperable status of a weapon system, CSP that considers human error is required in the initial operating environment, and the calculation criteria and measures are proposed.

Risk Analysis for the Rotorcraft Landing System Using Comparative Models Based on Fuzzy (퍼지 기반 다양한 모델을 이용한 회전익 항공기 착륙장치의 위험 우선순위 평가)

  • Na, Seong Hyeon;Lee, Gwang Eun;Koo, Jeong Mo
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.49-57
    • /
    • 2021
  • In the case of military supplies, any potential failure and causes of failures must be considered. This study is aimed at examining the failure modes of a rotorcraft landing system to identify the priority items. Failure mode and effects analysis (FMEA) is applied to the rotorcraft landing system. In general, the FMEA is used to evaluate the reliability in engineering fields. Three elements, specifically, the severity, occurrence, and detectability are used to evaluate the failure modes. The risk priority number (RPN) can be obtained by multiplying the scores or the risk levels pertaining to severity, occurrence, and detectability. In this study, different weights of the three elements are considered for the RPN assessment to implement the FMEA. Furthermore, the FMEA is implemented using a fuzzy rule base, similarity aggregation model (SAM), and grey theory model (GTM) to perform a comparative analysis. The same input data are used for all models to enable a fair comparison. The FMEA is applied to military supplies by considering methodological issues. In general, the fuzzy theory is based on a hypothesis regarding the likelihood of the conversion of the crisp value to the fuzzy input. Fuzzy FMEA is the basic method to obtain the fuzzy RPN. The three elements of the FMEA are used as five linguistic terms. The membership functions as triangular fuzzy sets are the simplest models defined by the three elements. In addition, a fuzzy set is described using a membership function mapping the elements to the intervals 0 and 1. The fuzzy rule base is designed to identify the failure modes according to the expert knowledge. The IF-THEN criterion of the fuzzy rule base is formulated to convert a fuzzy input into a fuzzy output. The total number of rules is 125 in the fuzzy rule base. The SAM expresses the judgment corresponding to the individual experiences of the experts performing FMEA as weights. Implementing the SAM is of significance when operating fuzzy sets regarding the expert opinion and can confirm the concurrence of expert opinion. The GTM can perform defuzzification to obtain a crisp value from a fuzzy membership function and determine the priorities by considering the degree of relation and the form of a matrix and weights for the severity, occurrence, and detectability. The proposed models prioritize the failure modes of the rotorcraft landing system. The conventional FMEA and fuzzy rule base can set the same priorities. SAM and GTM can set different priorities with objectivity through weight setting.

Development of a warning algorithm and monitoring system for preventing condensation in utility tunnels (공동구 내 결로 예방을 위한 경고 알고리즘 및 모니터링 시스템 개발)

  • Sang-Il Choi;Jung-Hun Kim;Suk-Min Kong;Yoseph Byun;Seong-Won Lee
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.26 no.5
    • /
    • pp.551-561
    • /
    • 2024
  • Underground utility tunnels are spaces densely packed with various infrastructure facilities, such as power, telecommunications, and water supply and drainage systems, making internal environment management crucial. An investigation into accident cases and on-site demands in these tunnels revealed that while fires and floods are the most common types of incidents, the demand for real-time condensation prevention and response is frequent according to on-site managers. Condensation occurs due to the difference in humidity and temperature between the inside and outside of the tunnel. Frequent or prolonged condensation can lead to metal pipe corrosion, electrical failures, and reduced equipment lifespan. Therefore, this study developed a control algorithm and monitoring system to prevent condensation in underground utility tunnels. The proposed control algorithm estimates the likelihood of condensation in real-time based on the measured temperature and humidity and suggests appropriate responses for each stage to the managers. Finally, a practical condensation prevention monitoring system was built based on the developed algorithm, verifying the feasibility and applicability of this technology in the field.

Functional Drainage Evaluation of Block Paving through the Usage of Sludge and Wheel Tracking Test (슬러지 투입 및 휠트랙킹 시험을 이용한 블록 포장의 기능적 투수평가)

  • Lee, Sang-Yum;Jung, Hoon-Hee;Mun, Sung-Ho;Park, Dae-Geun;Park, Kyong-Min
    • International Journal of Highway Engineering
    • /
    • v.13 no.3
    • /
    • pp.31-38
    • /
    • 2011
  • As the percentage of permeable ground is reduced due to the increased impermeable roads of major cities, a heat island phenomenon can be dominantly observed, resulting in increased temperature. In addition, rainfall that would have been naturally absorbed and retained by the permeable ground is overflowed due to large volumes of run-off water, resulting in more sewer failures and increased erosion. In terms of permeable pavement system, block paving has been used anywhere as well as provides many years of service. The permeable block paving is an effective alternative to the more traditional asphalt or plain concrete for minor roads; furthermore, it looks a lot better than other pavements. In this study, the functional drainage evaluation of block paving was carried out, considering the usage of experimental sludge and wheel tracking test, in order to simulate the field condition of roads.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

Runtime Fault Detection Method based on Context Insensitive Behavioral Model for Legacy Software Systems (레거시 소프트웨어 시스템을 위한 문맥 독립적 행위 기반 실시간 오작동 탐지 기법)

  • Kim, Suntae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.9-18
    • /
    • 2015
  • In recent years, the number of applications embedded in the various devices such as a smart phone is getting larger. Due to the frequent changes of states in the execution environment, various malfunctions may occur. In order to handle the issue, this paper suggests an approach to detecting method-level failures in the legacy software systems. We can determine if the software executes the abnormal behavior based on the behavior model. However, when we apply the context-sensitive behavior model to the method-level, several problems happen such as false alarms and monitoring overhead. To tackle those issues, we propose CIBFD (Context-Insensitive Behavior Model-based Failure Detection) method. Through the case studies, we compare CIBFD method with the existing method. In addition, we analyze the effectiveness of the method for each application domains.

A robust execution scheme for Ethereum blockchain application services

  • Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.73-80
    • /
    • 2020
  • In this paper, we propose a robust execution scheme for Ethereum blockchain application services which provide continuous services and support recovery even in the case of failures of those services. As of now, blockchain services are rapidly expanding to all industries and being combined with various infrastructure services of public institutions. But if these services fail in disastrous situations such as earthquakes, floods and terrors or various hacking attacks, the aftermath is very serious and its side effects are difficult to assess. To resolve this issue, we develop the service registry as a smart contract of the Ethereum blockchain, which provides useful information on the services to users even in disasters. With the help of the service registry, we also present a method of replicating services on the basis of the ETCD distributed storage system. The proposed scheme is confirmed by the test service developed by the proposed techniques.

An experimental study on fracture coalescence characteristics of brittle sandstone specimens combined various flaws

  • Yang, Sheng-Qi
    • Geomechanics and Engineering
    • /
    • v.8 no.4
    • /
    • pp.541-557
    • /
    • 2015
  • This research aims to analyze the fracture coalescence characteristics of brittle sandstone specimen ($80{\times}160{\times}30mm$ in size) containing various flaws (a single fissure, double squares and combined flaws). Using a rock mechanics servo-controlled testing system, the strength and deformation behaviours of sandstone specimen containing various flaws are experimentally investigated. The results show that the crack initiation stress, uniaxial compressive strength and peak axial strain of specimen containing a single fissure are all higher than those containing double squares, while which are higher than those containing combined flaws. For sandstone specimen containing combined flaws, the uniaxial compressive strength of sandstone increase as fissure angle (${\alpha}$) increases from $30^{\circ}$ to $90^{\circ}$, which indicates that the specimens with steeper fissure angles can support higher axial capacity for ${\alpha}$ greater than $30^{\circ}$. In the entire deformation process of flawed sandstone specimen, crack evolution process is discussed detailed using photographic monitoring technique. For the specimen containing a single fissure, tensile wing cracks are first initiated at the upper and under tips of fissure, and anti-tensile cracks and far-field cracks are also observed in the deformation process; moreover anti-tensile cracks usually accompanies with tensile wing cracks. For the specimen containing double squares, tensile cracks are usually initiated from the top and bottom edge of two squares along the direction of axial stress, and in the process of final unstable failure, more vertical splitting failures are observed in the ligament region. When a single fissure and double squares are formed together into combined flaws, the crack coalescence between the fissure tips and double squares plays a significant role for ultimate failure of the specimen containing combined flaws.

Design of High Speed Tensile Test Machine for Flow Stress under Intermediate Strain Rate Condition (중변형률 속도 유동응력 확보를 위한 고속 인장 실험기 설계)

  • Choung, Joonmo;Yoon, Sung-Won;Park, Sung-Ju;Kim, Younghun
    • Journal of Ocean Engineering and Technology
    • /
    • v.29 no.1
    • /
    • pp.34-44
    • /
    • 2015
  • A hydraulic tensile test machine (HSTM) is one of the devices used to obtain the flow stress of a material during high-speed elongation. This paper first describes some features of a newly built HSTM. The improvement histories of the upper and lower jigs, which are the most vital parts of the HSTM, are also presented. We have frequently witnessed test failures with 1st generation jigs and specimens due to slip between the jig and specimen. 2nd generation jigs provide more stable test results, but the use of a longer upper jig induces excessive vibration and consequently makes it difficult to attach an environment chamber. 3rd generation jigs have some advances in terms of the symmetric fastening between the upper jig and specimen, as well as an exemption from direct contact between the lower jig and specimen. The performance of an environment chamber is verified by high and low temperature tests. A high-speed displacement measurement system is introduced based on a high-speed camera and motion-tracking software with aid of a surface grid device for the specimen.