• Title/Summary/Keyword: information control criteria

Search Result 363, Processing Time 0.026 seconds

A Study for Evaluation Method of Safety Critical Software in Avionics Industry (안전필수 항공 산업용 소프트웨어 평가 방법 연구)

  • Lee, Hongseok;Kwon, Goohoon;Ko, Byeonggak
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.91-97
    • /
    • 2015
  • This paper specifies several considerations about assessing safety-critical software in the aerospace domain. In order to evaluate safety critical software in the aerospace industry, it is required to identify an information of evaluation criteria of software under evaluation. The information is specified in the standard, but determination of evaluation criteria cannot be decided by itself and depends on the results of safety assessment of a system and system design. Thus, this paper explains required information of system development standard and safety assessment standard to determine software evaluation criteria. It surveys existing methodologies about evaluating software, and suggests method which is adapted to evaluation of an advanced surface movement guidance and control system (A-SMGCS) software.

Verifying the Suitability or Unsuitability of the Opening Force Criteria Applied to Air Pressurized Access Door to a Smoke Control Zone (급기 가압 제연구역 출입문에 적용되는 개방력 기준의 적합성 여부에 관한 연구)

  • Lee, Jae-Ou;Choi, Chung-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.9
    • /
    • pp.5820-5825
    • /
    • 2014
  • The aim of this study was to verify the suitability or unsuitability of Korean body types by measuring the opening force criteria of an air pressurized access door to a smoke control zone. The opening force criteria were verified by comparing the NFSC 501A, NFPA 92A and BS-EN 12101-6 based on the body standards information from the Korean Agency for Technology and Standards. When measuring the opening forces, the posture of the body should be standing upright and pushing an access door with the right hand, which is a criterion for designing doors. As a result of analyzing the actual measurement results, the pushing force of men and women in their 30's was the maximum value and the forces in those in their 60's was the minimum value. In addition, the deviations in the pushing forces varied considerably. As a result of comparing the NFSC 501A, the men showed lower values than the criteria in every gender and age variable except for the 20's, 30's and 50's variable. A comparison of the criteria of NFPA 92A showed that the mean of the measured values from every gender and age was also lower than the criteria. In addition, when comparing the criteria of BS-EN 12101-6, it was found that the men in every age variable were higher than the criteria. On the other hand, the women in every age variable were lower than the criteria. Therefore, considering the Korean body type against the Western body type, it was decided that the opening force of an access door to a smoke control area to make a downward adjustment should be 110 N in the local criteria. Furthermore, the criteria should consider the characteristics of buildings and users because an optional application of the international standard is not necessarily suitable for local situations.

Distributed Power Control and Removal Algorithms for Multimedia CDMA Wireless Networks

  • Wang, Jui-Teng
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.197-201
    • /
    • 2003
  • We study in this paper both distributed power control and removal algorithms for multimedia CDMA wireless networks. In our study, users can have different data rates as well as different quality of service (QoS) requirements. We derive a necessary and sufficient condition for the fully distributed power control (FDPC) algorithm to find a feasible power set. We also prove that, if the maximal power level is used at the start, then the distributed constrained power control (DCPC) algorithm is equivalent to the FDPC algorithm. For the connection removal algorithm, we prove that the non-reinitialized removal algorithm finds a feasible power set faster and employs smaller power levels than the reinitialized one does. Performances of some connection removal criteria are also studied. Our simulation results reveal that the smallest normalized CIR (SNC) and largest CIR requirement (LCR) criteria result in smaller outage probability than the smallest CIR (SC) criterion in a multimedia environment.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

Development of semiconductor process information system (반도체 공정정보 관리 시스템 개발)

  • 이근영;김성동;최락만
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10a
    • /
    • pp.401-406
    • /
    • 1988
  • Various types and huge volume of information such as process instructions, work-in process and parametric data are created in a wafer fabrication process and should be provided to personnels inside or outside the facility. This article describes design criteria and functional description on the information system for small-scale wafer fabrication process to accomplish paperless fab and to support efficient fab management.

  • PDF

A Protection Profile for Access Control Based Database Security System (접근제어형 데이터베이스 보안 시스템의 보호프로파일)

  • Jeon, Woong-Ryul;Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.109-113
    • /
    • 2007
  • With increasing the mont of processed information over the network, the importance of database system increases rapidly. There are two types of security system for database, access control and data encryption. However, it is hard to evaluate security of database systems using the Common Criteria(CC) as there is no protection profile(PP) for these systems. In this paper, we propose a protection profile for secure database systems which can be used in formal evaluation using the Common Criteria. The proposed protection profile can be used by both developer and consumer to evaluate security of database systems.

A Certain Class of Root Clustering of Control Systems with Structured Uncertainty (구조적불확실성을 갖는 제어시스템의 Root Clustering 해석)

  • 조태신;김영철
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.10
    • /
    • pp.1259-1268
    • /
    • 1995
  • This note presents the robust root clustering problem of interval systems whose characteristic equation might be given as either a family of interval polynomials or a family of polytopes. Corresponding to damping ratio and robustness margin approximately, we consider a certain class of D-region such as parabola, left-hyperbola, and ellipse in complex plane. Then a simpler D-stability criteria using rational function mapping is presented and prove. Without .lambda. or .omega. sweeping calculation, the absolute criteria for robust D-stability can be determined.

  • PDF

Delay-dependent Stabilization for Systems with Multiple Unknown Time-varying Delays

  • Wu, Min;He, Yong;She, Jin-Hua
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.6
    • /
    • pp.682-688
    • /
    • 2006
  • This paper deals with the delay-dependent and rate-independent stabilization of systems with multiple unknown time-varying delays and time-varying structured uncertainties. All the linear matrix inequalities based conditions are derived by employing free-weighting matrices to express the relationships between the terms in the Leibniz-Newton formula. The criteria do not require any tuning parameters. Numerical examples demonstrate the validity of the method.

A STUDY ON CHARACTERISTICS OF DEFUZZYFICATION METHODS IN FUZZY CONTROL

  • 송원경;이종필;변증남
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1997.11a
    • /
    • pp.98-103
    • /
    • 1997
  • Defuzzification plays a great role in fuzzy control system. Defuzzification is a process which maps from a space defined over an output universe of discourse into a space of nonfuzzy(crisp) number. But, it's impossible to convert a fuzzy set into a numeric value without losing some information during defuzzification. Also it's very hard to find a number that best represents a fuzzy set. Many methods have been used for defuzzification but most of then were problem dependent. There has been no rule which guides how to select a method that is suitable to solve given problem. Here, we have investigated most widely used methods and we have analyzed their characteristics and evaluated them. D. Driankov and Mizumoto have suggested 5 criteria which the‘ideal’defuzzification method should satisfy. But, they didn't considered about control action. Output fuzzy set if not only a fuzzy set but also a sequence of control action. We suggested 4 new criteria which describe sequence of cont ol action from some experiments. In addition, we have compared each method in simple adaptive fuzzy control. COG(Center of Gravity), or COS(Center of Sums) methods were successful in fuzzy control. However, at transition region, MOM(Mean of Maxima) was best among others in adaptive fuzzy control.

  • PDF

A Study on Improvement of Personal Information Protection Control Log Quality: A Case of the Health and Welfare Division (개인정보통합관제 로그품질 분석 및 개선에 관한 연구: 보건복지 분야 사례를 중심으로)

  • Lee, Yari;Hong, Kyong Pyo;Kim, Jung Sook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.1
    • /
    • pp.42-51
    • /
    • 2015
  • In this paper, we analyze the quality status of Health and Welfare division's standardized log and asses the characteristics of the institutions' logs analysis to establish the criteria to minimize hazards and control the quality of log's institutional details to limit extraction. As a result, extraction condition's proposed development direction to adequately assess and control health and welfare abuses privacy control target log. This improvement over the status and quality of information shared with relation to institutional work of the log quality characteristics is made possible. In addition, quality control and inspection standards were prepared in accordance with the institutional log characteristics. Future research will include performing continuous analysis and improvement activities on the quality of logs with integrated control of sharing personal information and distributing information about logs' quality to proactively target organ. Therefore, we expect that correcting proactive personal information misuse and leakage is possible to achieve.