• Title/Summary/Keyword: digital I & C

Search Result 405, Processing Time 0.034 seconds

DIGITAL TOPOLOGICAL PROPERTY OF THE DIGITAL 8-PSEUDOTORI

  • LEE, SIK;KIM, SAM-TAE;HAN, SANG-EON
    • Honam Mathematical Journal
    • /
    • v.26 no.4
    • /
    • pp.411-421
    • /
    • 2004
  • A digital $(k_0,\;k_1)$-homotopy is induced from digital $(k_0,\;k_1)$-continuity with the n kinds of $k_i$-adjacency relations in ${\mathbb{Z}}^n$, $i{\in}\{0,\;1\}$. The k-fundamental group, ${\pi}^k_1(X,\;x_0)$, is derived from the pointed digital k-homotopy, $k{\in}\{3^n-1(n{\geq}2),\;3^n-{\sum}^{r-2}_{k=0}C^n_k2^{n-k}-1(2{\leq}r{\leq}n-1(n{\geq}3)),\;2n(n{\geq}1)\}$. In this paper two kinds of digital 8-pseudotori stemmed from the minimal simple closed 4-curve and the minimal simple closed 8-curve with 8-contractibility or without 8-contractibility, e.g., $DT_8$ and $DT^{\prime}_8$, are introduced and their digital topological properties are studied by the calculation of the k-fundamental groups, $k{\in}\{8,\;32,\;64,\;80\}$.

  • PDF

Quantitative measures of thoroughness of FBD simulations for PLC-based digital I&C system

  • Lee, Dong-Ah;Kim, Eui-Sub;Yoo, Junbeom
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.131-141
    • /
    • 2021
  • Simulation is a widely used functional verification method for FBD programs of PLC-based digital I&C system in nuclear power plants. It is difficult, however, to estimate the thoroughness (i.e., effectiveness or quality) of a simulation in the absence of any clear measure for the estimation. This paper proposes two sets of structural coverage adequacy criteria for the FBD simulation, toggle coverage and modified condition/decision coverage, which can estimate the thoroughness of simulation scenarios for FBD programs, as recommended by international standards for functional safety. We developed two supporting tools to generate numerous simulation scenarios and to measure automatically the coverages of the scenarios. The results of our experiment on five FBD programs demonstrated that the measures and tools can help software engineers estimate the thoroughness and improve the simulation scenarios quantitatively.

A Study on Method to Establish Cyber Security Technical System in NPP Digital I&C (원전 디지털 계측제어시스템 사이버보안 기술 체계 수립 방법 연구)

  • Chung, Manhyun;Ahn, Woo-Geun;Min, Byung-Gil;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.561-570
    • /
    • 2014
  • Nuclear Power Plant Instrumentation and Control System(NPP I&C) which is used to operate safely is changing from analog technology to digital technology. Ever since NPP Centrifuge of Iran Bushehr was shut down by Stuxnet attack in 2010, the possibility of cyber attacks against the NPP has been increasing. However, the domestic and international regulatory guidelines that was published to strengthen the cyber security of the NPP I&C describes security requirements and method s to establish policies and procedures. These guidelines are not appropriate for the development of real applicable cyber security technology. Therefore, specialized cyber security technologies for the NPP I&C need to be developed to enhance the security of nuclear power plants. This paper proposes a cyber security technology development system which is exclusively for the development of nuclear technology. Furthermore, this method has been applied to the ESF-CCS developed by The KINCS R&D project.

An Architecture Model on Artificial Intelligence for Ground Tactical Echelons (지상 전술 제대 인공지능 아키텍처 모델)

  • Kim, Jun Sung;Park, Sang Chul
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.513-521
    • /
    • 2022
  • This study deals with an AI architecture model for collecting battlefield data using the tactical C4I system. Based on this model, the artificial staff can be utilized in tactical echelon. In the current structure of the Army's tactical C4I system, Servers are operated by brigade level and above and divided into an active and a standby server. In this C4I system structure, the AI server must also be installed in each unit and must be switched when the C4I server is switched. The tactical C4I system operates a server(DB) for each unit, so data matching is partially delayed or some data is not matched in the inter-working process between servers. To solve these issues, this study presents an operation concept so that all of alternate server can be integrated based on virtualization technology, which is used as an source data for AI Meta DB. In doing so, this study can provide criteria for the AI architectural model of the ground tactical echelon.

A Study on Development of Digital Protective Relay Simulator using Digital Signal Processor (DSP를 이용한 디지털 보호 계전기의 시뮬레이터에 관한 연구)

  • Lee, J.J.;Jung, H.S.;Park, C.W.;Shin, M.C.;An, T.P.;Ko, I.S.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07a
    • /
    • pp.237-239
    • /
    • 2001
  • This paper describes the digital relay simulator system using digital signal processor. The simulator system has two parts, one is software and the other is hardware part. The simulation software has variety calculation engines ; EMTP simulation data file conversion, user define simulation data generation, sequence data generation, data analysis engines. etc, these are designed upon GUI. And simulator software provides easy control interface for users, the simulator software performs on every MS Windows OS. The simulator hardware design uses 32bit floating point DSP(TMS320C32) architecture to achieve flexibility and high speed operation.

  • PDF

A Comparative Study on the Performance of Intrusion Detection using Decision Tree and Artificial Neural Network Models (의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구)

  • Jo, Seongrae;Sung, Haengnam;Ahn, Byunghyuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.33-45
    • /
    • 2015
  • Currently, Internet is used an essential tool in the business area. Despite this importance, there is a risk of network attacks attempting collection of fraudulence, private information, and cyber terrorism. Firewalls and IDS(Intrusion Detection System) are tools against those attacks. IDS is used to determine whether a network data is a network attack. IDS analyzes the network data using various techniques including expert system, data mining, and state transition analysis. This paper tries to compare the performance of two data mining models in detecting network attacks. They are decision tree (C4.5), and neural network (FANN model). I trained and tested these models with data and measured the effectiveness in terms of detection accuracy, detection rate, and false alarm rate. This paper tries to find out which model is effective in intrusion detection. In the analysis, I used KDD Cup 99 data which is a benchmark data in intrusion detection research. I used an open source Weka software for C4.5 model, and C++ code available for FANN model.