• Title/Summary/Keyword: Information Assurance

Search Result 650, Processing Time 0.025 seconds

Repair and Replacement Methodology for Electrical Equipment Used in Nuclear Power Plants (원자력발전소 전기기기의 보수, 교체 방법론)

  • Park, Chulhee;Park, Wan-gyu;Lee, Manbok;Kim, Choon-sam
    • Proceedings of the KIPE Conference
    • /
    • 2018.07a
    • /
    • pp.177-179
    • /
    • 2018
  • After Fukushima nuclear accident at 2011, nuclear industrial has been focused on operation and maintenance phase, not design and construction phase. Continued good operating performance of nuclear power plants has been the best critical issue to nuclear utilities. Replacement for complete components as well as parts of components is being procured because nuclear utilities must maintain safety and reliability of operating nuclear power plants. However, many suppliers and manufacturers are giving up a nuclear quality assurance program under reduction in new construction of nuclear power plants. It is able to be increased difficulty in procuring spare parts to support operations and maintenance of nuclear power plants. Over 20% of nuclear power plant equipment in some countries is obsolete. Owing to obsolescence of nuclear safety-related items and/or withdrawing a nuclear quality assurance program of suppliers and manufactures, some replacement item and part might be procured to the item not covered by appendix B to USNRC 10 CFR Part 50. Under various methods of the nuclear repair and replacement methodology, utilities are supposed to establish a typical program for a repair and replacement of an electrical equipment and its parts in conjunction with a nuclear quality assurance. Concerning this typical program, this study suggests the repair and replacement methodology of electrical equipments used in nuclear power plants by procurement of a power supply, based on nuclear regulations, codes, standards, guidelines, specific and general technical information, etc..

  • PDF

Evaluation of Physical Correction in Nuclear Medicine Imaging : Normalization Correction (물리적 보정된 핵의학 영상 평가 : 정규화 보정)

  • Park, Chan Rok;Yoon, Seok Hwan;Lee, Hong Jae;Kim, Jin Eui
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.21 no.1
    • /
    • pp.29-33
    • /
    • 2017
  • Purpose In this study, we evaluated image by applying normalization factor during 30 days to the PET images. Materials and Methods Normalization factor was acquired during 30 days. We compared with 30 normalization factors. We selected 3 clinical case (PNS study). We applied for normalization factor to PET raw data and evaluated SUV and count (kBq/ml) by drawing ROI to liver and lesion. Results There is no significant difference normalization factor. SUV and count are not different for PET image according to normalization factor. Conclusion We can get a lot of information doing the quality assurance such as performance of sinogram and detector. That's why we need to do quality assurance daily.

  • PDF

Factors Affecting Customer Satisfaction of Franchise Hairshop Customers (프렌차이즈 헤어샵 고객의 만족도 향상을 위해 고려해야 할 요인들)

  • Lee, Seung-yon
    • Industry Promotion Research
    • /
    • v.6 no.1
    • /
    • pp.9-13
    • /
    • 2021
  • In order to suggest the factors to be managed for customer satisfaction management in the franchise hair salon industry, a survey was conducted on the customers' experiences toward consumers who have experience using domestic franchise hair shop service in Korea. An online survey was conducted for 1,000 consumers who had used the top five franchise hair salon services within 6 months of the survey. According to the result of research on service quality(SERVQUAL)'s 5 factors- tangibleness, responsiveness, assurance, reliability, and empathy, assurance has the greatest impact on satisfaction, followed by responsiveness, empathy, reliability, and tangibleness. The service quality satisfaction of the five companies surveyed was 3.77 out of 5, indicating that there is much room for future satisfaction. This study aims to provide information on which factors should be invested more with limited resources to improve customer satisfaction.

A multitype sensor placement method for the modal estimation of structure

  • Pei, Xue-Yang;Yi, Ting-Hua;Li, Hong-Nan
    • Smart Structures and Systems
    • /
    • v.21 no.4
    • /
    • pp.407-420
    • /
    • 2018
  • In structural health monitoring, it is meaningful to comprehensively utilize accelerometers and strain gauges to obtain the modal information of a structure. In this paper, a modal estimation theory is proposed, in which the displacement modes of the locations without accelerometers can be estimated by the strain modes of selected strain gauge measurements. A two-stage sensor placement method, in which strain gauges are placed together with triaxial accelerometers to obtain more structural displacement mode information, is proposed. In stage one, the initial accelerometer locations are determined through the combined use of the modal assurance criterion and the redundancy information. Due to various practical factors, however, accelerometers cannot be placed at some of the initial accelerometer locations; the displacement mode information of these locations are still in need and the locations without accelerometers are defined as estimated locations. In stage two, the displacement modes of the estimated locations are estimated based on the strain modes of the strain gauge locations, and the quality of the estimation is seen as a criterion to guide the selection of the strain gauge locations. Instead of simply placing a strain gauge at the midpoint of each beam element, the influence of different candidate strain gauge positions on the estimation of displacement modes is also studied. Finally, the modal assurance criterion is utilized to evaluate the performance of the obtained multitype sensor placement. A bridge benchmark structure is used for a numerical investigation to demonstrate the effectiveness of the proposed multitype sensor placement method.

Document Management for Jordan Research and Training Reactor Project by ANSIM (원자력 통합안전경영시스템을 이용한 요르단연구로사업의 문서관리)

  • Park, Kook-Nam;Choi, Min-Ho;Kwon, Yongse
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.2
    • /
    • pp.113-118
    • /
    • 2016
  • Project management is a tool for smooth operation during a full cycle from the design to normal operation including the schedule, document, and budget management, and document management is an important work for big projects such as the JRTR (Jordan Research and Training Reactor). To manage the various large documents for a research reactor, a project management system was resolved, a project procedure manual was prepared, and a document control system was established. The ANSIM (Advanced Nuclear Safety Information Management) system consists of a document management folder, document container folder, project management folder, organization management folder, and EPC (Engineering, Procurement and Construction) document folder. First, the system composition is a computerized version of the Inter-office Correspondence (IOC), the Document Distribution for Agreement (DDA), Design Documents, and Project Manager Memorandum (PM Memo) works prepared for the research reactor design. Second, it reviews, distributes, and approves design documents in the system and approves those documents to register and supply them to the research reactor user. Third, it integrates the information of the document system-using organization and its members, as well as users' rights regarding the ANSIM document system. Throughout these functions, the ANSIM system has been contributing to the vitalization of united research. Not only did the ANSIM system realize a design document input, data load, and search system and manage KAERI's long-period experience and knowledge information properties using a management strategy, but in doing so, it also contributed to research activation and will actively help in the construction of other nuclear facilities and exports abroad.

Implementation of a Video Distribution Server to Enhance QoS of Network Cameras for the Video Surveillance System (영상 감시용 네트워크카메라의 서비스 품질 향상을 위한 영상분배서버 구현)

  • Jeong, Tae-Young;Yim, Kang-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.9
    • /
    • pp.67-74
    • /
    • 2008
  • This paper proposes, designs and implements an architecture of a server involved with the network camera based video surveillance systems to solve common problems including lack of inter-network operability at the video information sharing, drawback of bandwidth and processing-overhead caused by increase of the number of users, and difficulty of continuous monitoring over changes of network configurations. The proposed saver was designed to manage and service numerous network cameras and users as well as solving the existing problems by providing video distribution facility. Through the empirical study after applying the implemented server to a real video surveillance system we proved that the server can provide reasonable service quality while it processes several hundreds of simultaneous user connections under persisting more than one hundred connections to network cameras. We expect the developed video distribution server to enhance service quality of the large scale video surveillance systems for citizen-wide services such as traffic reporting informatics or natural calamities supporting.

Study of Hardware AES Module Backdoor Detection through Formal Method (정형 기법을 이용한 하드웨어 AES 모듈 백도어 탐색 연구)

  • Park, Jae-Hyeon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.739-751
    • /
    • 2019
  • Security in embedded devices has become a significant issue. Threats on the sup-ply chain, like using counterfeit components or inserting backdoors intentionally are one of the most significant issues in embedded devices security. To mitigate these threats, high-level security evaluation and certification more than EAL (Evaluation Assurance Level) 5 on CC (Common Criteria) are necessary on hardware components, especially on the cryptographic module such as AES. High-level security evaluation and certification require detecting covert channel such as backdoors on the cryptographic module. However, previous studies have a limitation that they cannot detect some kinds of backdoors which leak the in-formation recovering a secret key on the cryptographic module. In this paper, we present an expanded definition of backdoor on hardware AES module and show how to detect the backdoor which is never detected in Verilog HDL using model checker NuSMV.

A Development of The IT Audit-Based Application Framework for University IT Governance (대학정보화 거버넌스를 위한 감리기반 응용프레임워크 개발)

  • Choi, Jae Jun;Kim, Chi su
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.5
    • /
    • pp.179-186
    • /
    • 2019
  • Information system audit, which provides effective diagnosis and inspection of IT governance, is applied to all aspects from planning to development and operation. However, there is a difficulty in carrying out the audit because the system for the specialized university IT project is not developed. Therefore, it is necessary to set the internal system as the audit-based application framework in order to apply it to university IT governance. In this paper, we propose a audit-based application framework of university information system developed for university. The framework has a difference from the existing audit system. By using this framework, it is possible to present a standard for the university IT project and easily approach and use it in the field. And it can be used for direct audit through this framework in the level of the auditor as well as the HQ admin. The framework categorizes the audit into three major dimensions and suggests a method that can be applied to the university information system audit through the UAFP(University Audit Framework Process) and quality assurance.

Exploring the Information-Sharing Intention on Social Networking Sites

  • Shu-Mei Tseng
    • Asia pacific journal of information systems
    • /
    • v.33 no.2
    • /
    • pp.367-388
    • /
    • 2023
  • This study aimed to examine the factors of information-sharing intention on social networking sites (SNSs) by integrating the perspectives of the institution-based trust, social presence, and theory of reasoned action (TRA). An empirical survey was conducted and 364 valid respondents were collected from Facebook (FB) users in Taiwan. These data were analyzed against the research model using the partial least squares (PLS) structural equation modeling. The findings revealed that situational normality and structural assurance have a positive influenced user trust in SNSs which in turn increased their information-sharing attitudes. Furthermore, the subjective norms, user information-sharing attitudes and social presence of the SNSs were shown to have a positive influenced on user information sharing intention. Finally, this study provided several important theoretical and practical implications to understand factors affecting information-sharing intention on SNSs.

A Study on the Information Security Technical Architecture focusing on the Primary Defense Information Infrastructure (국방주요정보통신기반시설 중심의 정보보호기술구조 연구)

  • Choi, Ji-Na;Nam, Kil-Hyun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.1 s.24
    • /
    • pp.80-88
    • /
    • 2006
  • The purpose of this thesis is to research and propose a practical Information Security Technical Architecture on Primary Defense Information Infrastructure with regard to requirement of information security. The scope of this research is limited to national defense information master plan & security rule, and U.S. DoD's IATF is used to plan a detailed structure. The result of this research can be used as a guide book for providing security for Army IT infrastructure now and in the future as well as to devise a plan for research and development in information protection technology.