• Title/Summary/Keyword: secure operating system

Search Result 239, Processing Time 0.031 seconds

Study on Power Control and Optimal Management for Dog-Horse Robot (견마로봇의 전력제어 및 최적 운용에 대한 연구)

  • Kang, Tae-Ha;Huh, Jin-Wook;Kim, Jun;Kang, Sin-Cheon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.343-348
    • /
    • 2010
  • Recently, unmanned electric vehicles are increasingly interested among all of the world since they can provide low exhaust gas, high efficiency and high mobility. To exploit their silent maneuver and high mobility, unmanned electric vehicles have been developed since early 1980's for military. However, it is not easy to design and control a power system satisfying operating duration and mobility performance requirements based on various mission profiles for military use under the conditions of limited space and weight. Moreover it is also necessary to prevent over-charge, over-discharge and voltage unbalance between cells of battery to secure high voltage battery which is serially connected with muti-cells. In this paper, we presents power control and optimal management method for the dog-horse robot which adopts a electric power system and suggests a guide-line to manage and control to secure high voltage battery.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

A Study for the Safety Improvement of Track using the Risk Assessment (위험도평가 적용을 통한 궤도시설 안전성 향상에 관한 연구)

  • Lee, Byung-Suk;Yang, Sin-Chu;Park, Yong-Gul
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.1601-1606
    • /
    • 2011
  • The railway system consists of rolling stocks, facilities, electrical system, signaling and operation and so on, organically bound. Recently due to lots of train failures and accidents, especially the derailment related to track irregularity this year, all the people using the train are worried about railway safety and we paved the way for letting them knowing that all components of railway system are so important. As a result, most of developed countries operating railway have used to risk assessment methods about safety management to prevent railroad accidents in advance. The purpose of this paper is to find out how to closely apply to track field for risk assessment methods. Because there is no case to apply to and we're not interested in yet, despite of importance of track, in situations of higher train speed. Therefore, in this study we're going to investigate risk assessment methods and compare enire railway system with track system, eventually we want us try to present to safety management conditions necessary and secure safety improvement in track field.

  • PDF

Running safety evaluation of tilting vehicle when speed-up in curved track of conventional line (기존선 곡선선로에서 한국형 틸팅열차의 속도향상시 주행안전성 평가)

  • Ham, Young-Sam;Lee, Dong-Hyong;Kwon, Seok-Jin;Seo, Jung-Won;Jun, Hyun-Kyu
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.25-29
    • /
    • 2010
  • Safety of railroad is result of reliability which is received from test & evaluation of system. Railroad system is consisted of various sub system such as vehicle, supply of electric power, signal, communication, rail track construction, operation. To secure safety of railroad, evaluation about parts, assembly, sub system, whole system etc.. that compose railroad is essential. In this paper, I wish to describe for results that analyze korean tilting vehicle's derailment coefficient developed by national research achievement. Confirmed that is possible even if speed up, curved line department running speed that estimate korean tilting vehicle's running safety in curved line track of Jungang Line about 20 km/h than present operating speed.

  • PDF

The Study on Development of the MMI based on ERTMS Standards (ERTMS 규격에 적합한 MMI 국산화 개발에 관한 연구)

  • Kim, Kwang-Jun;Lee, Jeong-Sung;Kan, Deok-Won
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.2076-2088
    • /
    • 2010
  • MMI (Man Machine Interface) is the system that monitors the operating condition of the ATP/ATC/ATS systems and receives defined information from ATP/ATC/ATS systems through the interface with On-board systems. Based on the data from the ATP/ATC/ATS system, MMI can display the information and status of the train to secure safe operation. It is possible for the display mode and quantities of MMI to be improved by the customer's demand, and it can be designed as the same structure of existing devices for the driver. The ERTMS is Regular Safety Standards of high-speed railroad. It is fundamental structure of European Rail Control System which train control, safety and operate facilities. In this paper, I study requirements of ERTMS form which design function each section of MMI and application at ATP/ATC/ATS combined Train Constrol System.

  • PDF

A study on performance improvement of position control system in hydraulic cylinder for heavy construction machinery (건설기계용 유압실린더 위치 제어시스템의 성능개선에 관한 연구)

  • 한석재;박성환;이진걸
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1450-1454
    • /
    • 1996
  • Even though digital control type high speed solenoid valve is a little inferior to analog control type servo valve and proportional control valve in performance, it is cheap and has secure performance against pollutant and simple control circuit. But high speed solenoid valve is hardly used for heavy machinery instead of servo valve or proportional control valve that is used in severe condition because the valve itself is small capacity and it shows wide dead zone during on-off control and chattering of hydraulic cylinder by chattering of pressure. It is desirable to use low-priced and strong pollutant resistant high speed solenoid valve for obtaining reliability of operation from severe working condition because it isn't necessary to acquire response characteristic of high frequency when we consider the characteristic of heavy machinery operation. In this study, PWM control algorithm for pilot pressure control of large capacity pilot operating valve will be used for precision position control of heavy machinery hydraulic cylinder. Not only cost reduction of main control valve but also high reliability of heavy machinery in severe condition can be obtained by using this pilot operating spool valve with high speed solenoid valve.

  • PDF

A study on the ventilation control method of road tunnel for small vehicles (소형차 전용 도로터널의 환기기 제어방안에 대한 연구)

  • Ryu, Ji-Oh;Lee, Hu-Young;Chang, Ji-Don
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.21 no.6
    • /
    • pp.749-762
    • /
    • 2019
  • In recent years, in urban areas, underground of roads are being promoted in order to resolve traffic congestion and to secure green spaces, and due to the low ratio of large vehicles, they are planned or constructed as road tunnels for small cars only. In addition, the tunnels being built in the city is a tendency to be enlarged to play the role of main roads. Accordingly, the capacity of the ventilation system is increasing and various ventilation methods are required, and the importance of maintenance after the completion of the tunnel such as the operating cost of the ventilation system is emphasized. Therefore, the need for optimization of the operation stage for reducing the power consumption of the ventilation system and the study of the ventilation system operation control logic is increasing. In this study, the study on the necessity of the optimization of operation stage and control logic of the ventilation system was carried out to realize the energy-saving operation for the small car only passing through tunnels which is applied of ① jet fan and combination ventilation system (② jet fan + air purifying equipment, ③ jet fan + vertical shaft, ④ jet fan + supply air semi-transverse). As a result of this study, there can be various operating combinations in the case of the combined ventilation system, and even though the amount of ventilation air is the same, the operating power varies greatly according to the operating combinations. It was found that operating the axial fan first rather than the jet fan first operation method has an effect on power saving.

Determining(Estimating) Ratios for Enhancing Publicness Through Analysis of Changes in Land Prices Influenced by Upzoning - A Case of Operating Instructions of District Unit Planning in Busan - (종상향 용도지역의 지가 변화 분석을 통한 공공성 확보 비율 산정 - 부산광역시 지구단위계획 운영지침을 대상으로 -)

  • KIM, Heung-Kwan;YEO, Sung-Jun;KANG, Gi-Cheol
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.4
    • /
    • pp.157-168
    • /
    • 2016
  • Change of Zoning Regulations in district unit plans calls for improving development benefits through upzoning rather than harmonious worldwide development. The purpose of this study is to examine the floor area ratio incentive system according to un-zoning in district units plan, and to suggest criteria to secure publicness. In order to derive methods to secure district unit plan publicness in Busan Metropolitan City, the ratio of securing public facilities through upzoning was examined. A comparative analysis of land price rate in the entire city versus the use district suggests that it is possible to secure 10 to 15% of public facilities. In this study, 10% of the project site was applied to secure public facilities, and it produced upgraded publicness.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Transient Characteristics of a Transformer Type SFCL Applying the Superconductor and the Normal-conductor into the Secondary Winding (초전도체 및 상전도체의 변압기 2차측 적용에 따른 변압기형 SFCL 특성 비교)

  • Jung, Byung-Ik;Choi, Hyo-Sang
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.5
    • /
    • pp.873-877
    • /
    • 2016
  • This paper proposed the structure that applied superconductors to the neutral line of a transformer and applied the normal conductors to the third line. The superconductor applied to the neutral line of a transformer limited the peak value of initial fault current, while the normal conductor finally limited the fault current. In order to secure the operating reliability of transformer type Superconducting Fault Current Limiter (SFCL) of previously proposed structure, we analyzed the operating characteristics according to the fault types. We tested a line-to-ground fault and a line-to-line fault. As a result of the experiment, all the faults showed that the superconductor stably limited the peak-value of initial fault current. Also, the normal conductor finally limited the fault current. Based on this research results, We thought that if the structure of inserting superconductor into the neutral line is applied to the real system, it could improve the reliability and stability of the power system.