• Title/Summary/Keyword: 업데이트

Search Result 960, Processing Time 0.026 seconds

Status of Development of Pyroprocessing Safeguards at KAERI (한국원자력연구원 파이로 안전조치 기술개발 현황)

  • Park, Se-Hwan;Ahn, Seong-Kyu;Chang, Hong Lae;Han, Bo Young;Kim, Bong Young;Kim, Dongseon;Kim, Ho-Dong;Lee, Chaehun;Oh, Jong-Myeong;Seo, Hee;Shin, Hee-Sung;Won, Byung-Hee;Ku, Jeong-Hoe
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.3
    • /
    • pp.191-197
    • /
    • 2017
  • The Korea Atomic Energy Research Institute (KAERI) has developed a safeguards technology for pyroprocessing based on the Safeguards-By-Design (SBD) concept. KAERI took part in a Member-State Support Program (MSSP) to establish a pyroprocessing safeguards approach. A Reference Engineering-scale Pyroprocessing Facility (REPF) concept was designed on which KAERI developed its safeguards system. Recently the REPF is being upgraded to the REPF+, a scaled-up facility. For assessment of the nuclear-material accountancy (NMA) system, KAERI has developed a simulation program named Pyroprocessing Material Flow and MUF Uncertainty Simulation (PYMUS). The PYMUS is currently being upgraded to include a Near-Real-Time Accountancy (NRTA) statistical analysis function. The Advanced Spent Fuel Conditioning Process Safeguards Neutron Counter (ASNC) has been updated as Non-Destructive Assay (NDA) equipment for input-material accountancy, and a Hybrid Induced-fission-based Pu-Accounting Instrument (HIPAI) has been developed for the NMA of uranium/transuranic (U/TRU) ingots. Currently, performance testing of Compton-suppressed Gamma-ray measurement, Laser-Induced Breakdown Spectroscopy (LIBS), and homogenization sampling are underway. These efforts will provide an essential basis for the realization of an advanced nuclear-fuel cycle in the ROK.

Satisfaction Evaluation for Tablet-based Smart AAC Device (태블릿 기반 스마트 AAC 기기 만족도 평가)

  • Kong, Jin-Yong;An, Na-Yeon
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.251-257
    • /
    • 2018
  • The purpose of this study is to analyze the satisfaction and requirements of users' devices after development of tablet based AAC(Augmentative and Alternatice Communication) application for Android. The purpose of this study is to evaluate the satisfaction and the requirement of tablet - based AAC application, Were assessed using the Korea Assistive Technology Assessment Tool (KAAT). As a result of satisfaction evaluation of tablet-based smart AAC device, all the items including device, service, and everyday life showed positive response satisfying from 5 point scale to more than 4 point scale. However, it was relatively low in the items of effectiveness, manipulation and convenience. Some of the improvements in the application include the enlargement of the symbol sound and the simplicity of symbol editing. The results of the study suggest that continual updates of m Smart AAC applications, the simplicity of symbolic editing, application usage and training should be improved. The satisfaction evaluation results of this study and the feedback of potential users will be the guidelines for improving and complementing the functions of existing smart AAC devices.

Customizing feature analysis for super mario maker (슈퍼마리오 메이커의 커스터마이징 특징 분석)

  • Park, Sang-Tae;Sohn, Jong-Nam;Lee, Chang-Jo
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.339-345
    • /
    • 2016
  • While a game market has been growing consistently world widely, a market of arcade or video game has been detained. In this stagnation, the latest one in 2015, "Super Mario Maker" of Mario series that's been running in good for 30 years, the notable sale and growth of which are extraordinary. As for a study in customizing, a literature of game customizing and studies that are foregone were mostly handling contents about a game character. In the survey that's done in this thesis about knowledge and needs in customizinge game users have, it was shown they want to customize sides of a rule and a character. I analyzed what the main factors are in this game which uses a main concept of customizing and the reason for high profits and popularity. As a result of the analysis, four features, possibility to customize a game rule, share data among users, collaboration in marketing with NFC figure characters, offering updates with sustained and new customizing features were found out. I am certain a game customizing will be helping to meet users and be used for various industries without limit of existing character.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

A Study on the Tide Differences in the Tide Tables of Major Ports in Korea - Focusing on the Comparison of UK and Korean Harmony Constants - (국내 주요항 조석표상 조석 차이에 관한 연구 - 영국과 한국 조화상수 비교를 중심으로 -)

  • Jeon, Jae-Ho;Moon, Serng-Bae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.7
    • /
    • pp.827-833
    • /
    • 2019
  • There are several factors to consider for a ship to enter or depart a port safely. It is particularly important to identify the tides in the port to reduce the risk of stranding the ship. Most previous studies have focused on finding and analyzing harmonic constants. However, the research on the analysis and accuracy of harmonic constants in other hydrographic agencies is lacking. In this study, six Korean ports (Incheon, Gunsan, Yeosu, Busan, Ulsan, and Sokcho) were compared to the British and Korean tide tables based on actual information. To find the cause of tidal difference, the tide height, tide time, and form factor were calculated using harmonic constants. The information was then compared with British and Korean data. As a result of the difference in analysis of actual information and tide tables, there was a difference between the actual tide height and time at each port. The cause was found to be the difference in the harmonic constant, tide, and form factor between the UK and Korea. Therefore, this study, the Korean standard port should be added to the British tide table, and harmonic constants, which are the criteria for creating tides, must be constantly updated with the latest information. Additionally, the tide tables produced in each country are more accurate than the tide tables produced in UK.

Customized Diet Information System (맞춤형 다이어트 정보 시스템)

  • Kang, Tae-Sung;Eom, Min-Doo;Nam, Ki-Sun;Park, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.430-436
    • /
    • 2010
  • Since a 'Well-being' theme had become an issue in 90's, everyone now care about their health more than ever. Besides, IT has been developed so tremendously that we have various ways to collect up-to-dated information through the internet. There are so many web sites that contain information about health and diet. However, the menus of these web sites are not simplified and the content is too large, so the information we see in those web sites may not be accurate. Also, some information is out-of-dated. In this paper, we propose a web site called 'Calory&Diet' that provides customized information on diet. The characteristics of the web site are as following: First, the menu is so simple that users can easily find information they want. Second, it only provides necessary customized information. Lastly, it uses an open application that helps users always get the latest information without DB updates. With its user friendly menu and feedback information, the proposed web site can be a good advisor for people who want to be healthy. 100 offers the user survey results than existing systems, simple system to 2%, 3% from a custom-related topics, the latest related topics were 3% higher on 5 point scale.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

Design and Performance Analysis of Hybrid Receiver based on System Level Simulation in Backhaul System (백홀 시스템에서 시스템 레벨 시뮬레이션 기반 하이브리드 수신기 설계 및 성능 분석)

  • Moon, Sangmi;Chu, Myeonghun;Kim, Hanjong;Kim, Daejin;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.3-11
    • /
    • 2015
  • An advanced receiver which can manage inter-cell interference is required to cope with the explosively increasing mobile data traffic. 3rd Generation Partnership Project (3GPP) has discussed network assisted interference cancellation and suppression (NAICS) to improve signal-to-noise-plus-interference ratio (SINR) and receiver performance by suppression or cancellation of interference signal from inter-cells. In this paper, we propose the advanced receiver based on soft decision to reduce the interference from neighbor cell in LTE-Advanced downlink system. The proposed receiver can suppress and cancel the interference by calculating the unbiased estimation value of interference signal using minimum mean square error (MMSE) or interference rejection combing (IRC) receiver. The interference signal is updated using soft information expressed by log-likelihood ratio (LLR). We perform the system level simulation based on 20MHz bandwidth of 3GPP LTE-Advanced downlink system. Simulation results show that the proposed receiver can improve SINR, throughput, and spectral efficiency of conventional system.

Route Optimization Scheme using Routing Protocol in Nested Mobile Networks (중첩된 이동 네트워크환경에서 동적 라우팅 프로토콜을 이용한 경로 최적화 기법)

  • Kim, Eui-Kook;Lee, Jong-Hyup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1966-1975
    • /
    • 2008
  • NEMO Basic Support Protocol standardized in IETF provides the seamless communication environment to all nodes within the mobile network regardless of the network movement while the network is moving. According to the standard, when the mobile network moves outside of its home network the network can make use of the binding update message or dynamic routing protocol in order to register the mobility information into the Home Agent(HA). But because these two methods don't consider the route optimization, all packets destined to Mobile Network Nodes(MNNs) attached into the Mobile Router(MR) have to go through HAs of MRs so that they bring on the transmission delay and the waste of the bandwidth. This situation is to be worse and causes the packet fragmentation problem if MRs within the mobile network are nested. Even though there have been some researches about the route optimization to recover the problems, they have problems in the packet transmission performance side. In this paper, we propose a new scheme to improve the network performance by using a dynamic routing protocol and minimizing the number of HAs on the end-to-end path. Various performance evaluations show that the proposed mechanism gives better performance in view of the packet transmission compared to the existing schemes.