• Title/Summary/Keyword: Information Flow Security

Search Result 304, Processing Time 0.031 seconds

Future Directions and Perspectives on Soil Environmental Researches (토양환경분야 연구동향 및 전망)

  • Yang, Jae-E.;Ok, Yong-Sik;Chung, Doug-Young
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.6
    • /
    • pp.1286-1294
    • /
    • 2011
  • This paper reviews the future directions and perspectives on the soil environmental researches in the 21 century. Previously, the principal emphasis of soil environmental researches had put on the enhancement of food and fiber productions. Beside the basic function of soil, however, the societal needs on soil resources in the 21st century have demands for several environmental and social challenges, occurring regionally or globally. Typical global issues with which soil science should deal include food security with increasing agronomic production to meet the exploding world population growth, adaptation and mitigation of climate change, increase of the carbon sequestration, supply of the biomass and bioenergy, securing the water resource and quality, protection of environmental pollution, enhancing the biodiversity and ecosystem health, and developing the sustainable farming/cropping system that improve the use efficiency of water and agricultural resources. These challenges can be solved through the sustainable crop production intensification (SCPI) or plant welfare concept in which soil plays a key role in solving the abovementioned global issues. Through implementation of either concept, soil science can fulfill the goal of the modern agriculture which is the sustainable production of crops while maintaining or enhancing the ecosystem function, quality and health. Therefore, directions of the future soil environmental researches should lie on valuing soil as an ecosystem services, translating research across both temporal and spatial scales, sharing and using data already available for other purposes, incorporating existing and new technologies from other disciplines, collaborating across discipline, and translating soil research into information for stakeholders and end users. Through the outcomes of these approaches, soil can enhance the productivity from the same confined land, increase profitability, conserve natural resource, reduce the negative impact on environment, enhance human nutrition and health, and enhance natural capital and the flow of ecosystem services. Soil is the central dogma, final frontier and new engine for the era of sustainability development in the $21^{st}$ century and thus soil environmental researches should be carried according to this main theme.

A study on the analysis of heat flow in X-ray tube (X-ray tube 내 열유동 해석에 관한 연구)

  • Yun, Dong-Min;Seo, Byung-Suk;Jeon, Yong-Han
    • Design & Manufacturing
    • /
    • v.15 no.1
    • /
    • pp.26-31
    • /
    • 2021
  • As the aging ages, the disease also increases, and the development of AI technology and X-ray equipment used to treat patients' diseases is also progressing a lot. X-ray tube converts only 1% of electron energy into X-ray and 99% into thermal energy. Therefore, when the cooling time of the anode and the X-ray tube are frequently used in large hospitals, the amount of X-ray emission increases due to temperature rise, the image quality deteriorates due to the difference in X-ray dose, and the lifespan of the overheated X-ray tube may be shortened. Therefore, in this study, temperature rise and cooling time of 60kW, 75kW, and 90kW of X-ray tube anode input power were studied. In the X-ray Tube One shot 0.1s, the section where the temperature rises fastest is 0.03s from 0s, and it is judged that the temperature has risen by more than 50%. The section in which the temperature drop changes most rapidly at 20 seconds of cooling time for the X-ray tube is 0.1 seconds to 0.2 seconds, and it is judged that a high temperature drop of about 65% or more has occurred. After 20 seconds of cooling time from 0 seconds to 0.1 seconds of the X-ray tube, the temperature is expected to rise by more than 3.7% from the beginning. In particular, since 90kW can be damaged by thermal shock at high temperatures, it is necessary to increase the surface area of the anode or to require an efficient cooling system.

Conceptual design of a dual drum-controlled space molten salt reactor (D2 -SMSR): Neutron physics and thermal hydraulics

  • Yongnian Song;Nailiang Zhuang;Hangbin Zhao;Chen Ji;Haoyue Deng;Xiaobin Tang
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2315-2324
    • /
    • 2023
  • Space nuclear reactors are becoming popular in deep space exploration owing to their advantages of high-power density and stability. Following the fourth-generation nuclear reactor technology, a conceptual design of the dual drum-controlled space molten salt reactor (D2-SMSR) is proposed. The reactor concept uses molten salt as fuel and heat pipes for cooling. A new reactivity control strategy that combines control drums and safety drums was adopted. Critical physical characteristics such as neutron energy spectrum, neutron flux distribution, power distribution and burnup depth were calculated. Flow and heat transfer characteristics such as natural convection, velocity and temperature distribution of the D2-SMSR under low gravity conditions were analyzed. The reactivity control effect of the dual-drums strategy was evaluated. Results showed that the D2-SMSR with a fast spectrum could operate for 10 years at the full power of 40 kWth. The D2-SMSR has a high heat transfer coefficient between molten salt and heat pipe, which means that the core has a good heat-exchange performance. The new reactivity control strategy can achieve shutdown with one safety drum or three control drums, ensuring high-security standards. The present study can provide a theoretical reference for the design of space nuclear reactors.

Evaluation Method for Protection Coordination of PV Systems Interconnected with Primary Feeders (태양광전원이 연계된 고압배전선로의 보호협조 평가 방안에 관한 연구)

  • Kim, Byungki;Kim, Sohee;Ryu, Kyungsang;Rho, Daeseok
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.29-37
    • /
    • 2011
  • Dispersed generation (DG) such as wind power (WP) and Photovoltaic systems (PV) that has been promoted at the national level recently is mainly being introduced into distribution systems adjacent to consumers because it is generation on a small scale when compared to current generation. Due to its characteristics, DG can be operated by interconnection with distribution systems to present security of more stable power and efficient use of power facilities and resources. Problems on protection coordination of distribution systems by reverse flow of DG can roughly be divided into three possibilities: excess in rated breaking capacity (12.5KA) of protective devices by a fault in DG current supply, failure to operate protective devices by an apparent effect that can occur by reduction in impedance parallel circuit fault current due to interconnection of DG, and malfunction of protective devices by interconnection transformer connection type. The purpose of this study is to analyze problems in protection coordination that can occur when DG is operated by interconnection with distribution systems by conducting modeling and simulations by using theoretical symmetrical components and MATLAB/SIMULINK to present methods to improve such problems.

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

The Landscape Characteristics of Village Located in the Meander cut-off Area;The Case of Samji Village (곡류단절지에 입지한 마을의 경관특성;삼지마을을 사례로)

  • 임의제;최기수
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.28 no.2
    • /
    • pp.109-109
    • /
    • 2000
  • This study seeks what kind of factors influence to locate dwellings and to establish scenic spots in nature by a case study focused on a meandering stream. The study specially concentrates on the interrelationship between both residences and beautiful sceneries and a meander cut-off-area that reveals a special topographical characteristics, located at Samji village in Youngyang-eup, Youngyang-gun, Koungsangbuk-do. The meander cut-off area, developed at the middle or upper reaches of a river, often makes up specific landscapes such as precipitous cliffs, sheer cliffs and caves. And the area where is specially created by sudden change of flow due to erosion perceived by the cut surface to be the most beautiful scenic spot. These beautiful landscapes were used to be called as Dae, Dam or Gul and managed by Confucian scholars who enjoy refined taste and devote themselves to the study in nature. Moreover, the Ku-Hado-literary means the area of ex-flow-made the scholars' lving with a well prepared basis for agriculture where supplied a cornucopia of organic matters and water. The merit of agriculture made it possible that the scholars became economically independent, and the fact might be the essential point why the meander cut-off area took noticed. Actually, Cho-family has been in Smaji Village for generations, producing a large number of scholars and keeping the actual power of the region. The physical shape of the meander cut-off area, cozily surrounded by mountains, is considered as a good place for the dwelling due to the influence of traditional sight of view for location and P'ungsuchiri which is known as Feng Shui in China and geomancy in the western world. It is a fruit in it own way that we could find the ancestors' discernment and wisdom from this study, who have lived their lives adapting themselves to the given natural environment and also utilizing the nature wisely. But this is a current-argued study on the meander cut-off area. Follow-up studies have to be continued about the landscapes of the meander streams and the meander cut-off areas scattered all over the country except Samji Village and draw the characteristics from the comparative analysis.

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

Operation of a 3-Year Training Program for Elementary and Secondary Administrators to Foster Creative Convergence Talent (창의융합 인재 양성을 위한 3년간의 초·중등 관리자 연수 프로그램 운영)

  • Jung, Yujin;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.177-186
    • /
    • 2021
  • The 2015 revised curriculum is structured around the core competencies of the 21st century, this is in line with the world's flow of education, such as OECD Education 2030. A future practical leading model was studied to provide a variety of creative teaching and learning experiences to elementary and Secondary students using intelligent information technology to cultivate core competencies such as ICT and computing thinking. In order for this practical model to stably settle the school field, the training was planned and operated to strengthen the creative convergence education capacity required by the teachers at the unit school through various types of the training. In particular, a nationwide administrators training program was operated for three years, reflecting the new curriculum, teaching and learning methods, and evaluation that can lead to future convergence talent training. In this paper, the perception of creative convergence education was investigated and analyzed considering the influence that administrators may have on the school field. Based on this, through the three-year operation results of the training, it was intended to establish a new training method for stable access to future creative convergence education under the post-corona era's social issues.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.