• Title/Summary/Keyword: security inspection

Search Result 224, Processing Time 0.029 seconds

Implementation of an Expert System for COTS Fault Diagnosis (COTS 고장진단을 위한 전문가 시스템 구현)

  • Kim, A-Ram;Roh, Jin-Song;Rhee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.275-281
    • /
    • 2013
  • This space is for the of your study in English. If simple menu item changes or the addition of check items are necessary on GUI menu of existing test equipments for military facilities that are programmed by using RAD tools such as Visual C++, they should go through complex steps, such as numerous conducting steps, coding, flash design modification, recompiling and distribution. It is cumbersome process and waste much time. Also, on implementing them, it was worried about leaking secrets because a number of military security considerations were included. To solve such as the above problem, we proposed commercial RIA technologies and a COTS fault diagnostic knowledge-based system that implemented by the XML data design technique in this research. The proposed approach solves the problem of existing methods, reduced inspection time, and improved performance, usability, and maintainability.

Guided Missile Assembly Test Set using Encryption AES Rijndael Algorithm (암호화 AES Rijndael 알고리즘 적용 유도탄 점검 장비)

  • Jung, Eui-Jae;Koh, Sang-Hoon;Lee, You-Sang;Kim, Young-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.339-344
    • /
    • 2019
  • In order to prepare for the rise of data security threats caused by the information and communication technology, technology that can guarantee the stability of the data stored in the missile test set is important. For this purpose, encryption should be performed when data is stored so that it cannot be restored even if data is leaked, and integrity should be ensured even after decrypting the data. In this paper, we apply AES algorithm, which is a symmetric key cryptography system, to the missile test set, and Encrypt and decrypt according to the amount of data for each bit of each AES algorithm. We implemented the AES Rijndael algorithm in the existing inspection system to analyze the effect of encryption and apply the proposed encryption algorithm to the existing system. confirmation of suitability. analysis of capacity and Algorithm bits it is confirmed that the proposed algorithm will not affect the system operation and the optimal algorithm is derived. compared with the initial data, we can confirm that the algorithm can guarantee data undulation.

MAGICal Synthesis: Memory-Efficient Approach for Generative Semiconductor Package Image Construction (MAGICal Synthesis: 반도체 패키지 이미지 생성을 위한 메모리 효율적 접근법)

  • Yunbin Chang;Wonyong Choi;Keejun Han
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.30 no.4
    • /
    • pp.69-78
    • /
    • 2023
  • With the rapid growth of artificial intelligence, the demand for semiconductors is enormously increasing everywhere. To ensure the manufacturing quality and quantity simultaneously, the importance of automatic defect detection during the packaging process has been re-visited by adapting various deep learning-based methodologies into automatic packaging defect inspection. Deep learning (DL) models require a large amount of data for training, but due to the nature of the semiconductor industry where security is important, sharing and labeling of relevant data is challenging, making it difficult for model training. In this study, we propose a new framework for securing sufficient data for DL models with fewer computing resources through a divide-and-conquer approach. The proposed method divides high-resolution images into pre-defined sub-regions and assigns conditional labels to each region, then trains individual sub-regions and boundaries with boundary loss inducing the globally coherent and seamless images. Afterwards, full-size image is reconstructed by combining divided sub-regions. The experimental results show that the images obtained through this research have high efficiency, consistency, quality, and generality.

A Study on The Enhancement of Aviation Safety in Airport Planning & Construction from a Legal Perspective (공항개발계획과 사업에서의 항공안전성 제고에 대한 법률적 소고)

  • Kim, Tae-Han
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.67-106
    • /
    • 2012
  • Today air traffic at the airport is complicated including a significant increase in the volume of air transport, so aviation accidents are constantly occurring. Therefore, we should newly recognize importance of the Air Traffic Safety, the core values of the Air Traffic. The location of airport that is the basic infrastructure of the air traffic and the security of safety for facilities and equipments are more important than what you can. From this dimension, I analyze the step-by-step safety factors that are taken into account in the airport development projects from the construction or improvement of the airport within the current laws and institutions and give my opinion on the enhancement of safety in the design and construction of airport. The safety of air traffic, as well as airport, depends on location, development, design, construction, inspection and management of the airport including airport facilities because we have to carry out the national responsibility that prevents the risk of large social overhead capital for many and unspecified persons in modern society through legislation regarding intervention of specialists and locational criteria for aviation safety from the planning stage of airport development. In addition, well-defined installation standards of airports and air navigation facilities, the key points of the airport development phase, can ensure the safety of the airport and airport facilities. Of course, the installation standards of airport and air navigation facilities are based on the global standard due to the nature of air traffic. However, to prevent the chaos for the safety standards in design, construction, inspection of them and to ensure the aviation safety, the safety standards must be further subdivided in the course of domestic legislation. The criteria for installation of the Air Navigation facilities is regulated most specifically. However, to ensure the safety of the operation for Air Navigation Facilities, performance system proved suitable for the Safety of Air Navigation Facilities must change over from arbitrary restrictions to mandatory restrictions and be applied for foreign producers as well as domestic producers. Of course, negligence of pilots and defective aircraft maintenance lead to a large portion of the aviation accidents. However, I think that air traffic accidents can be reduced if the airport or airport facility is perfect enough to ensure the safety. Therefore, legal and institutional supplement to prioritize the aviation safety from the stage of airport development may be necessary.

  • PDF

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

A Study on the Improvement of Emergency Safety System as Social Protection System - Focusing on Alone Elderly and Severely Person with Disabilities - (사회적 보호체계로서의 응급안전시스템에 대한 개선방안 연구 -독거노인·중증장애인을 중심으로-)

  • Heo, Soo Kyung;Lim, Soo Jeong;Jeong, Jong Hwa
    • 재활복지
    • /
    • v.20 no.4
    • /
    • pp.31-54
    • /
    • 2016
  • The purpose of this study is to explore the improvement method of the emergency safety system as a social protection scheme for the elderly living alone with severe disabilities. The study was conducted by randomly choosing three regions in the metropolitan area (Jongno-gu, Seoul), the small-medium city (Yongin-si, Gyeonggi-do) and the rural area (Geochang-gun, Gyeongsangnam-do) among 17 cities and counties nationwide. The study method is based on the interview form of the structured questionnaires with city officials, county officials, and center operators. According to the results of the interview analysis, it was recognized that there was a need for an emergency safety system for the elderly living alone with severe disabilities. In spite of this necessity, there were problems about publicity for the discovery of victims of the blind spot in welfare, about inconvenience due to frequent malfunctions of the emergency equipment, about insufficient awareness of the security of the emergency officials and about supply and demand of manpower for 24-hour monitoring service. In order to improve the effective operation of the emergency safety system, it was the most urgent issue to formulate the legislation for responding to the crisis management of the vulnerable. A suggestion of this study is to build a safety system in which one-stop service is provided for the realization of compact welfare through the establishment of a MOU for linkage with community organizations, the full inspection of emergency equipment to solve safety equipment malfunction problems and the manpower supplement for 24-hour monitoring.

A Study on the Procedure for Establishing an Integrated Platform Plan for Safety Management of 5G Digital Twin-Based Facilities: Focusing on Facilities in Metropolitan Cities (5G 디지털 트윈 기반 시설물 안전관리 통합플랫폼 계획 수립 절차에 관한 연구 : 수도권 광역시 시설물을 중심으로)

  • Chang, Hye-Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.257-268
    • /
    • 2021
  • As the variety and scale of facilities increase due to industrialization and urbanization, blind spots for facility safety management have occurred, resulting in numerous casualties.To meet safety and security needs of citizens living in smart cities, we present a procedure for establishing an integrated platform for facility safety management by combining 5G and digital twin technologies. It can be used to perform inspection according to risk factors and aging of facilities. In this paper, the current status of facility management and application directions of new 5G digital twin-based smart city technologies are reviewed and digital twin implementation procedures are presented. Five cities were selected as target areas: Osan, Gwangmyeong, Guri, Uijeongbu, and Anyang. Old and emergency facilities of each local government were selected. A total of 33 digital twin facilities reflecting policy directions of each city were selected. Focusing on facilities determined by each city, the purpose of this study was to define information technology infrastructure elements for the application of the 5G digital twin facility safety management integrated platform, define categories of implementation services, and suggest a concrete integrated platform configuration plan.

A Consideration of Perception on Enforcement of Serious Accident Punishment Act(SAPA) among the Workers in the Nuclear Medicine Department (중대재해처벌법 시행에 따른 핵의학 종사자의 인식 고찰)

  • Lee, Joo-Young
    • Journal of the Korean Society of Radiology
    • /
    • v.16 no.4
    • /
    • pp.477-490
    • /
    • 2022
  • Serious Accident Punishment Act(SAPA) went into effect as of Jan. 27, 2022. The subject of study was the worker of the nuclear medicine department and the investigation was aimed at identifying the present situation of their understanding on the issue in the here and now, which can be utilized as basic research for further study. The survey was conducted on 51 people of the worker in the nuclear medicine department. The general factors were classified by their gender, the scale of the hospitals, the period of career, and the detailed occupational categories. The conclusion was drawn, including 1 missing data in gender and 2 in the type of occupation. The targeted hospitals were tertiary hospital, university hospital, and general hospital which have nuclear medicine department in. The period of subjects' career was categorized by less than 3 years, 3 to 5 years, 5 to 10 years, and more than 10 years. The specific occupation was classified by in-vivo radiological technologist, radiation safety manager and others. The amount of pressure that the job entails was highest in the category of general hospital, the period of 3 to 5 years of job experience, and radiation safety manager each. The system of the code was well constructed in the category of general hospital, the period of less than 3-year career, and radiation safety manager, as they responded. The blood transmissible disease had the largest number of outbreak of accidents related to the serious industrial accident. In addition, the radiopharmaceutical dosing error had the highest number of outbreak of accidents related to the serious civil accident. Therefore, we need to improve SAPA, facility inspection, security of budget, security of professional manpower. It will help the stable use of radiation and ensure patient safety.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF