2016 (466)
2015 (468)
2014 (466)
2013 (216)
2012 (66)
2011 (34)
2010 (19)
2009 (19)
2008 (8)
Multivariable Integrated Model Predictive Control of Nuclear Power Plant
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents the method of multivariable integrated model predictive control for the nuclear power plant, including designing controller and building the modeling of turbine and once-through steam generator. The simulation results show that the rotate speed of turbine and outlet pressure of steam generator under the multivariable integrated model predictive control is faster steady and smaller overshoot than under the PID control, when the power load of nuclear power plant is changed. Simulation test indicates that the multivariable integrated model predictive control can obtain better control performance for nuclear power plant.
An Adaptation Control Model to Support Mobile Web Access
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.9-16
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A mobile environment is characterized by low communication bandwidth and poor connectivity. Efficient Web access over a wireless network is challenging because of the varying characteristics of different devices constituting the wireless environment and the adverse interactions among HTTP, TCP and the wireless network. These lead to problems that significantly degrade the user-experienced performance of the web accessed through the wireless network. We have developed techniques to visualize web access in a mobile environment – the proxy-agent mobile document clustering architecture (PMDC). The PMDC architecture allows the mobile users to visualize and navigate through the Web structure without having to download all related links in a Web site. The Proxy-Agent model provides facilities for adaptation in a mobile environment.
Common Threats and Vulnerabilities of Critical Infrastructures
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.17-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Critical Infrastructure (CI) is used by governments as a term to describe infrastructures, systems and assets that are essential for the society and economy. Critical Infrastructures are so vital that an incapacity or destruction of such infrastructure, system or assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. [1] This Infrastructures, systems or assets must be improved; this paper presents the vulnerabilities and threats to Critical Infrastructure, and discusses possible solutions and recommendations regarding this threats and vulnerabilities.
Extended Sequence Model for Mobile Embedded Software Execution
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.23-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile embedded software applications are typically more difficult to design and build, both because of the problem domain and the constraints placed on them by the target environment. Embedded systems usually have li-mited memory and CPU processing power; these constraints are likely due to size, cost, power efficiency, and heat generation limitations. Embedded system design needs to model together application and hardware architecture. For that a huge number of models are available, each one proposing its own abstraction level associated to its own software platform for simulation or synthesis. Mo-bile and multiplatform solutions even increase this complexity. Testing and managing mobile software applications are important way of handling these complex systems, describing it to different actors inside software business and for analyzing and improving system performance. In this paper, we present an approach to generate and extend mobile test se-quences model using UML. Although sequence diagrams are used for model-ing the dynamic aspects of the system, they can also be used for model based testing. Existing work does not encompass certain important features of se-quence diagrams like the various interaction operators of combined fragment.
A Secured Delivery Scheme for Images
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.35-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Computer and Network security of late has become a major issue with the advent of Internet. Presently, many software tools are available to implement data security. In this paper, we have proposed a new technique to hide an image file entirely with in another image file keeping two considerations in mind which are Size and Degree of Security. At the source, the image which is to be hidden (target image) is encoded at the end of another image (cover image). Double layer security of the hidden image can be achieved (over the untrusted network) by; firstly, the starting point of encoding the image data is depended on the size of the images and it is stored within the encoded image at the end of its header information as a cipher text.; secondly, the target image is hidden behind the cover image by following our encrypted image hiding technique.
Verifying Correctness of Pattern-based Composition in Coq
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.43-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Design patterns capture elegant design solutions and facilitate reuse in design level. In the Component Based Software Engineering (CBSE), design patterns were treated as design components, which serve as elemental components and can be composed to construct a large software system. In the process of composition, the key problem is how to ensure the correctness of composition. To address this problem, a criterion for correct composition is needed. The well known “faithfulness” principle is chosen as the correctness criterion and our discussions are based on this principle. In this paper, we at first use First Order Logic to model some elemental entities and relations in Object Oriented Design, which serve as an ontology in the domain. Then using the vocabulary in the ontology, we formally specify design patterns and formalize the “faithful” principle as theorems in Coq. Finally, we prove the theorems and thus show the correctness of composition. As a case study, we described and verified the composition of Composite pattern and Decorator pattern. Once a composition is proven to be correct, one can use the composition repeatedly. This would facilitate reuse of design in a larger scale and reduce errors in design phase, which justifies all the efforts of verifying their correctness.
Strengthen RFID Tags Security Using New Data Structure
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.51-58
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional objects information and can be used for other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems, in particular against tag cloning and information modification. A new data structure of RFID tags is introduced in this paper. Together with the Identity-based cryptography, this new data structure can provide efficient authentication and digital signature for RFID tags.
Development of A Monitoring System for Interior Spaces using Image Data and Environment Data
보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.1 no.1 2008.12 pp.59-70
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Abstract 1 Intredouction 2 Related studies 3 Proposed monitorng system fr interior spaces 3.1 System architeture 3.2 Image acquisition and motion detection 3.3 Collection of enviroment data using sesor nodes 3.4 Automatic control 4 Implementation and experiment results 5 Conclusionn References
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.