• Title/Summary/Keyword: OpenID

Search Result 91, Processing Time 0.033 seconds

A Case Study on the Risk Assessment for Offshore Plant Solid Desiccant Dehydration Package by using HAZOP (HAZOP을 통한 해양플랜트 흡착식 탈수공정 패키지의 위험성평가 및 안전도 향상 방안)

  • Noh, Hyonjeong;Park, SangHyun;Cho, Su-gil;Kang, Kwangu;Kim, Hyungwoo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.4_2
    • /
    • pp.569-581
    • /
    • 2020
  • Since the dehydration packages of offshore plant deal directly with oil & gas, there is a great risk of fire and explosion during operation. Therefore, this study performed risk assessment through HAZard & OPerability (HAZOP) for solid desiccant dehydration package that can remove water component of natural gas in offshore floating liquefied natural gas (LNG) production facilities below 0.1 ppmv. The risk matrix was determined by dividing the likelihood and the severity into five levels separately by asset, life, environment and reputation. The piping & instrumentation diagram (P&ID) of the dehydration package was divided into 9 nodes. Total 22 deviations were assessed in consideration of the adsorption and desorption conversion cycle. A risk assessment based on deviations revealed 14 major hazards. Three representative types of hazards were open/close failure of the control valve, control failure of the heater, and abnormal operation of the regeneration gas cooler. Finally, we proposed the installation of additional safety devices to improve safety against these major hazards, such as safety instrumented functions, alarms, etc.

Design of Multi-Authentication Server for user authentication in SaaS platform (SaaS 플랫폼 사용자 인증을 위한 Multi-Authentication Server 설계)

  • Kim, Young-Man;Lim, Seung-Yong;Kang, Min-Cheol;Lee, Jin-Bem;Ban, Eun-Young;Lim, Jun-Hyun;Han, Jae-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.897-900
    • /
    • 2011
  • 최근 새로운 소프트웨어 배포 방식인 SaaS가 주목을 받고 있다. SaaS는 원활하고 효율적인 서비스 제공을 위하여 소프트웨어 서비스를 제공하는 SaaS 어플리케이션과 과금, 사용자 인증과 같은 공통 서비스들을 제공하는 SaaS 플랫폼으로 역할이 분리되어 있다. 이런 배경을 바탕으로 본논문에서는 효율적인 사용자인증을 위한 SaaS 플랫폼의 사용자인증 서비스인 Multi-Authentication Server를 설계 한다. 본논문에서 설계되는 Multi-Authentication Server는 OpenID, OAuth, CAS, X.509 프로토콜을 통합하여 웹기반의 사용자인증 서비스를 구현한다. 마지막으로 웹기반 사용자 인증의 보안성 한계 극복과, 최근 하드웨어 보안기능을 이용하여 RADIUS 프로토콜과 TPM칩을 통합한 하드웨어 기반 네트워크 인증서비스를 제공한다.

Clustering of Smart Meter Big Data Based on KNIME Analytic Platform (KNIME 분석 플랫폼 기반 스마트 미터 빅 데이터 클러스터링)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.13-20
    • /
    • 2020
  • One of the major issues surrounding big data is the availability of massive time-based or telemetry data. Now, the appearance of low cost capture and storage devices has become possible to get very detailed time data to be used for further analysis. Thus, we can use these time data to get more knowledge about the underlying system or to predict future events with higher accuracy. In particular, it is very important to define custom tailored contract offers for many households and businesses having smart meter records and predict the future electricity usage to protect the electricity companies from power shortage or power surplus. It is required to identify a few groups with common electricity behavior to make it worth the creation of customized contract offers. This study suggests big data transformation as a side effect and clustering technique to understand the electricity usage pattern by using the open data related to smart meter and KNIME which is an open source platform for data analytics, providing a user-friendly graphical workbench for the entire analysis process. While the big data components are not open source, they are also available for a trial if required. After importing, cleaning and transforming the smart meter big data, it is possible to interpret each meter data in terms of electricity usage behavior through a dynamic time warping method.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

Review on asbestos analysis (석면 분석방법에 대한 고찰)

  • Ham, Seung hon;Hwang, Sung Ho;Yoon, Chungsik;Park, Donguk
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.19 no.3
    • /
    • pp.213-232
    • /
    • 2009
  • This document was prepared to review and summarize the analytical methods for airborne and bulk asbestos. Basic principles, shortcomings and advantages for asbestos analytical instruments using phase contrast microscopy(PCM), polarized light microscopy(PLM), X-ray diffractometer (XRD), transmission electron microscopy(TEM), scanning electron microscopy(SEM) were reviewed. Both PCM and PLM are principal instrument for airborne and bulk asbestos analysis, respectively. If needed, analytical electron microscopy is employed to confirm asbestos identification. PCM is used originally for workplace airborne asbestos fiber and its application has been expanded to measure airborne fiber. Shortcoming of PCM is that it cannot differentiate true asbestos from non asbestos fiber form and its low resolution limit ($0.2{\sim}0.25{\mu}m$). The measurement of airborne asbestos fiber can be performed by EPA's Asbestos Hazard Emergency Response Act (AHERA) method, World Health Organization (WHO) method, International Standard Organization (ISO) 10312 method, Japan's Environmental Asbestos Monitoring method, and Standard method of Indoor Air Quality of Korea. The measurement of airborne asbestos fiber in workplace can be performed by National Institute for Occupational Safety and Health (NIOSH) 7400 method, NIOSH 7402 method, Occupational Safety and Health Administration (OSHA) ID-160 method, UK's Health and Safety Executive(HSE) Methods for the determination of hazardous substances (MDHS) 39/4 method and Korea Occupational Safety and Health Agency (KOSHA) CODE-A-1-2004 method of Korea. To analyze the bulk asbestos, stereo microscope (SM) and PLM is required by EPA -600/R-93/116 method. Most bulk asbestos can be identified by SM and PLM but one limitation of PLM is that it can not see very thin fiber (i.e., < $0.25{\mu}m$). Bulk asbestos analytical methods, including EPA-600/M4-82-020, EPA-600/R-93/116, OSHA ID-191, Laboratory approval program of New York were reviewed. Also, analytical methods for asbestos in soil, dust, water were briefly discussed. Analytical electron microscope, a transmission electron microscope equipped with selected area electron diffraction (SAED) and energy dispersive X-ray analyser(EDXA), has been known to be better to identify asbestiform than scanning electron microscope(SEM). Though there is no standard SEM procedures, SEM is known to be more suitable to analyze long, thin fiber and more cost-effective. Field emission scanning electron microscope (FE-SEM) imaging protocol was developed to identify asbestos fiber. Although many asbestos analytical methods are available, there is no method that can be applied to all type of samples. In order to detect asbestos with confidence, all advantages and disadvantages of each instrument and method for given sample should be considered.

Morphologic and positional assessment of temporomandibular joint disk in facial asymmetric patients by magnetic resonance imaging (자기 공명 영상을 이용한 안면비대칭환자의 측두하악관절원반의 형태와 위치에 관한 연구)

  • Zou, Bingshuang;Kim, Tae-Woo;Choi, Soon-Chul
    • The korean journal of orthodontics
    • /
    • v.35 no.5 s.112
    • /
    • pp.398-407
    • /
    • 2005
  • The present study was conducted to examine the morphometrics and function of the disk on both sides among patients with facial asymmetry (FA) and to elucidate plausible correlations between internal derangement (ID) and FA. The sample was composed of 10 males and 27 females with FA. The disk status of all subjects was evaluated by bilateral high resolution magnetic resonance scans in the sagittal (closed and open) and coronal (closed) planes. Five types of disk displacement were identified accordingly. The disk function was diagnosed as normal disk function, disk displacement with reduction, and disk displacement without reduction. The disk shape on sagittal MRI in closed position was classified as bi-concave, biplanar, funnel/hemiconvex, and deformed. The disk position, translation and rotation were also measured. The difference between the shifted side and non-shifted side was analyzed by statistical analysis. Approximately $70\%$ of the patients in the present study showed unilateral or bilateral ID. It was found that anterior disk displacements (ADD), especially rotational ADD, occurred more frequently in the shifted side, while normal disk position was observed mainly in the non-shifted side (p<0.01). The disk of the shifted side showed significantly deformed configuration and inferior-anterior disk position. However, the disk of the non-deviated side showed hyper-mobility during jaw opening movement. These results demonstrate that in FA patients, the disks status of the shifted side is different from that of the non-shifted side, a phenomenon that could be correlated to facial asymmetry.

Triple Junction GAGET2-ID2 Solar Cell Degradation by Solar Proton Events (태양 양성자 이벤트에 의한 삼중 접합 GAGET2-ID2 태양전지 열화)

  • Koo, Ja-Chun;Park, Jung-Eon;Moon, Gun-Woo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.12
    • /
    • pp.1019-1025
    • /
    • 2021
  • In nearly all space environments, the solar cell degradation is dominated by protons[1]. Even through a GEO orbit lines in the electron radiation belts, the protons emitted from any solar event will still dominate the degradation[1]. Since COMS launch on June 26 2010, the proton events with the fluence of more than approximately 30 times the average level of perennial observations were observed between January 23 - 29 2012 and March 07 - 14 2012[16]. This paper studies the solar cell degradation by solar proton events in January and March 2012 for the open circuit voltage(Voc) of a witness cell and the short circuit current(Isc) of a section connected to a shunt switch. To evaluate the performance of solar cell, the flight data of voltage and current are corrected to the temperature, the Earth-Sun distance and the Sun angle and then compare with the solar cell characteristics at BOL. The Voc voltage dropped about 23.6mV compare after the March 2012 proton events to before the January 2012 proton events. The Voc voltage dropped less than 1% at BOL, which is 2575mV. The Isc current decreased negligible, as expected, in the March 2012 proton events.

Results of the 2019 European Parliament Elections: The Rise of Far-right Populism and Liberal Centrism (2019년 유럽의회선거의 함의: 극우 포퓰리즘과 중도자유주의의 부상)

  • OH, Chang Rhyong
    • Korean Journal of Legislative Studies
    • /
    • v.25 no.2
    • /
    • pp.5-33
    • /
    • 2019
  • This study aims to explore the implications of the 2019 European Parliament elections. Existing studies show that European elections serve as secondary elections dominated by domestic issues. However, the 2019 European elections have highlighted pan-European issues such as the Brexit negotiations and the rise of far-right populism, with voter turnout also rising sharply to 50.62%, which is the highest record since the 2000s. There was also a significant change in the number of parliamentary seats held by each political group. First, the European People's Party(EPP) and the Progressive Alliance of Socialists and Democrats(S&D), which had hitherto led the European Parliament, failed to achieve a majority. Second, the number of seats won by Renew Europe, a new liberal-centrist group, was considerably high. Third, the far-right groups organized a full-fledged political force by rallying around the Identity and Democracy(ID) group. The rise of liberal-centrism can be explained as a reaction to the popularity of anti-European populism. Renew Europe's emphasis on open-market competition has created a different issue, especially since the center-left and center-right groups have stressed on the need for state intervention in employment, welfare, security and immigration control. Along with far-right populism, liberal centrism has also reshuffled Europe's political cleavage, and the conflict between 'liberalism' and 'protectionism' has become more evident in the European Parliament.

The research of 5.2 protocol performance and structure (V5.2 프로토콜의 성능 및 구조분석)

  • 이성우;이병란;이종영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.226-230
    • /
    • 2003
  • In this thesis I analyzed that V5.2 protocol function is effective to fulfill all of the services that are provided at the existing local exchange. I analyzed this in five methods that refer to ETSI inside patronage. I experimented turnaround time by Start-up method and verified V5.2 protocol function when Start-up. Also I confirmed stability of system by the reconstruction-ability experiment related E1 switch over. I verified V5.2 protocol function through PSTN call process that uses a special service test and local call simulator. As a result of experiment, I confirmed the best method when simultaneous Start-up. V5.2 protocol function was excellent and It becomes switch over at 1/1000 seconds when E1 is out of service. V5.2 protocol function was effective to fulfill all of the special services that are provided at local exchange and its long call process ability was superior to KT standard with 4 fails in 20000 calls. Through the experiment, it was proved that V5.2 interface will become a significant element of communication network when after LE side expanse of v5 interface ID with TDX-100 exchanger and the AN occurrences OOS by message transmission limit and call disconnect when E1 switch over are improved.

  • PDF

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.