• Title/Summary/Keyword: Verification scenario

Search Result 147, Processing Time 0.028 seconds

On Multiple ETA-based Test Framework to Enhance Safety Maturity of Live Fire Tests for Weapon Systems (무기체계 실사격 시험의 안전성 강화를 위한 다중 사건나무분석 기반의 시험구조에 관한 연구)

  • Ye, Sung Hyuck;Lee, Jae-Chon
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.75-84
    • /
    • 2015
  • Successful development of weapon systems requires a stringent verification and validation (V&V) process due to the nature of the weapons in which continual increase of operational capability makes the system requirements more complicated to meet. Thus, test and evaluation (T&E) of weapon systems is becoming more difficult. In such a situation, live fire tests appear to be effective and useful methods in not only carrying out V&V of the weapon systems under development, but also increasing the maturity of the end users operability of the system. However, during the process for live fire tests, a variety of accidents or mishaps can happen due to explosion, pyro, separation, and so on. As such, appropriate means to mitigate mishap possibilities should be provided and applied during the live fire tests. To study a way of how to accomplish it is the objective of this paper. To do so, top-level sources of hazard are first identified. A framework for T&E is also described. Then, to enhance the test range safety, it is discussed how test scenarios can be generated. The proposed method is based on the use of the anticipatory failure determination (AFD) and multiple event tree analysis (ETA) in analyzing range safety. It is intended to identify unexpected hazard components even in the environment with constraints. It is therefore expected to reduce accident possibilities as an alternative to the traditional root-cause analysis.

Design and Implementation of Mobile CRM Utilizing Big Data Analysis Techniques (빅데이터 분석 기법을 활용한 모바일 CRM 설계 및 구현)

  • Kim, Young-Il;Yang, Seung-Su;Lee, Sang-Soon;Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.289-294
    • /
    • 2014
  • In the recent enterprises and are utilizing the CRM using data mining techniques and new marketing plan. However, data mining techniques are necessary expertise, general public access is difficult, it will be subject to constraints of time and space. in this paper, in order to solve this problem, we have proposed a Mobile CRM applying the data mining method. Thus, to analyze the structure of an existing CRM system, and defines the data flow and format. Also, define the process of the system, was designed sales trend analysis algorithm and customer sales recommendation algorithm using data mining techniques. Evaluation of the proposed system, through the test scenario to ensure proper operation, it was carried out the comparison and verification with the existing system. Results of the test, the value of existing programs and data matches to verify the reliability and use queries the proposed statistical tables to reduce the analysis time of data, it was verified rapidity.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Development of Integrated Orbit and Attitude Software-in-the-loop Simulator for Satellite Formation Flying

  • Park, Han-Earl;Park, Sang-Young;Park, Chandeok;Kim, Sung-Woo
    • Journal of Astronomy and Space Sciences
    • /
    • v.30 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • An integrated orbit and attitude control algorithm for satellite formation flying was developed, and an integrated orbit and attitude software-in-the-loop (SIL) simulator was also developed to test and verify the integrated control algorithm. The integrated algorithm includes state-dependent Riccati equation (SDRE) control algorithm and PD feedback control algorithm as orbit and attitude controller respectively and configures the two algorithms with an integrating effect. The integrated SIL simulator largely comprises an orbit SIL simulator for orbit determination and control, and attitude SIL simulator for attitude determination and control. The two SIL simulators were designed considering the performance and characteristics of related hardware-in-the-loop (HIL) simulators and were combined into the integrated SIL simulator. To verify the developed integrated SIL simulator with the integrated control algorithm, an orbit simulation and integrated orbit and attitude simulation were performed for a formation reconfiguration scenario using the orbit SIL simulator and the integrated SIL simulator, respectively. Then, the two simulation results were compared and analyzed with each other. As a result, the user satellite in both simulations achieved successful formation reconfiguration, and the results of the integrated simulation were closer to those of actual satellite than the orbit simulation. The integrated orbit and attitude control algorithm verified in this study enables us to perform more realistic orbit control for satellite formation flying. In addition, the integrated orbit and attitude SIL simulator is able to provide the environment of easy test and verification not only for the existing diverse orbit or attitude control algorithms but also for integrated orbit and attitude control algorithms.

Development of 3-D Flow Model for Porous Media with Scenario-based Ground Excavation (지반굴착 시나리오 기반의 다공성 매질에 대한 3차원 유동해석모델 구축)

  • Cha, Jang-Hwan;Lee, Jae-Young;Kim, Woo-Seok
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.19-27
    • /
    • 2017
  • In recent years, ground subsidence has been frequently occurred by underground cavities due to the excessive groundwater inflow, caused by poor construction and management, during tunnel excavation and underground structure construction. In this study, a numerical model (SEEFLOW3D) was developed to estimate groundwater fluctuations for saturated-unsaturated poros media, evaluates the impact on ground excavation with open cut and non-open cut scenarios. In addition, the visual MODFLOW was applied to demonstrate the verification of the model compared with both results. Our results indicated that the RMSE and NRMSE was obtained to range over -3.95~5.7% and 0.56~4.62%, respectively. The developed model was expected to estimate groundwater discharges and apply analysis tool for optimum design of waterproof wall in future.

Test-Bed Implementation for Real-Time Frequency Interference Analysis between Unlicensed Devices (비면허기기 간 실시간 주파수간섭 분석 테스트베드 구현)

  • Park, Jin-Soo;Yoon, Hyun-Goo;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.6
    • /
    • pp.589-592
    • /
    • 2015
  • In this paper, we suggested a real-time test-bed for analyzing frequency interference between 2.4 GHz unlicensed devices, such as WiFi, Zigbee, etc. Owing to versatile programming capability of Universal Software Radio Peripheral(USRP) and $Labview^{TM}$, frequency interference environments can be easily modeled. Therefore, performance degradation effects due to various parameters of interferer and victim receiver can be analyzed intuitively. For verification, we showed a frequency interference scenario, which consists of IEEE 802.15.4 as a victim and IEEE 802.11b as a interferer. Measured Bit Error Rate(BER) results showed good agreement with theory and simulation results.

Development of an Accident Consequence Assessment Code for Evaluating Site Suitability of Light- and Heavy-water Reactors Based on the Korean Technical Standards

  • Hwang, Won Tae;Jeong, Hae Sun;Jeong, Hyo Joon;Kil, A Reum;Kim, Eun Han;Han, Moon Hee
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.4
    • /
    • pp.368-372
    • /
    • 2016
  • Background: Methodologies for a series of radiological consequence assessments show a distinctive difference according to the design principles of the original nuclear suppliers and their technical standards to be imposed. This is due to the uncertainties of the accidental source term, radionuclide behavior in the environment, and subsequent radiological dose. Both types of PWR and PHWR are operated in Korea. However, technical standards for evaluating atmospheric dispersion have been enacted based on the U.S. NRC's positions regardless of the reactor types. For this reason, it might cause a controversy between the licensor and licensee of a nuclear power plant. Materials and Methods: It was modelled under the framework of the NRC Regulatory Guide 1.145 for light-water reactors, reflecting the features of heavy-water reactors as specified in the Canadian National Standard and the modelling features in MACCS2, such as atmospheric diffusion coefficient, ground deposition, surface roughness, radioactive plume depletion, and exposure from ground deposition. Results and Discussion: An integrated accident consequence assessment code, ACCESS (Accident Consequence Assessment Code for Evaluating Site Suitability), was developed by taking into account the unique regulatory positions for reactor types under the framework of the current Korean technical standards. Field tracer experiments and hand calculations have been carried out for validation and verification of the models. Conclusion: The modelling approaches of ACCESS and its features are introduced, and its applicative results for a hypothetical accidental scenario are comprehensively discussed. In an applicative study, the predicted results by the light-water reactor assessment model were higher than those by other models in terms of total doses.

Investigation of Dual-Spin Turn and Attitude Acquisition of Satellite (위성의 Dual-Spin Turn 방법 분석 및 자세획득)

  • Seo, Hyeon-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.2
    • /
    • pp.36-47
    • /
    • 2006
  • The process of dual spin turn maneuver is introduced for attitude acquisition or recovery from flat spin state of a satellite. The physical principle of momentum transfer during dual spin turn is explained clearly. The case studies of special dual spin turn, in addition to the conventional dual spin turn, that are known as an acceptable cases, are performed to investigate the principle of dual spin turn and to provide a physical insight as well as the solution of dual spin turn. This study is done based on case-study simulation, which includes two-state control scheme composed of open-loop maneuver and energy dissipation device. Furthermore, we investigate the stability for the verification of all control cases after implementing two-stage control. We also provide the simulation scenario of flat spin recovery using dual spin turn method as an example.

Comparison of simulation and Actual Test for ACC Function on Real-Road (실도로에서의 ACC 기능에 대한 시뮬레이션과 실차시험 비교 평가)

  • Kim, Bong-Ju;Lee, Seon-Bong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.457-467
    • /
    • 2020
  • Increasing environmental concerns have prompted countries around the world to tighten regulations on greenhouse gases and fuel efficiency. Research is being done using advanced driver assistance systems to improve fuel economy and for the convenience of drivers. Research on systems such as adaptive cruise control (ACC), LKAS, and AEB is active. The purpose of ACC is to control the longitudinal speed and distance of the vehicle and minimize the driver's load, which is considered useful for accident prevention. From this point of view, research has used a mathematical method of safety evaluation as a function of distances and scenarios while considering domestic road environments. A vehicle is tested with a simulation in a proposed scenario. The purpose of the analysis is to verify the functional safety of ACC by comparing the theoretical calculations using theoretical equations, the relative distances in the simulation, and an actual vehicle test. These methods are expected to enable many companies to use scenarios, formulas, and simulations as safety verification methods in the development of ACC.