• Title/Summary/Keyword: Physical Protection

Search Result 725, Processing Time 0.024 seconds

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

Surface Protection Obtained by Anodic Oxidation of New Ti-Ta-Zr Alloy

  • Vasilescu, C.;Drob, S.I.;Calderon Moreno, J.M.;Drob, P.;Popa, M.;Vasilescu, E.
    • Corrosion Science and Technology
    • /
    • v.17 no.2
    • /
    • pp.45-53
    • /
    • 2018
  • A new 80Ti-15Ta-5Zr wt% alloy surface was protected by anodic oxidation in phosphoric acid solution. The protective oxide layer (TiO2, ZrO2 and Ta suboxides and thickness of 15.5 nm) incorporated $PO{_4}^{3-}$ ions from the solution, according to high resolution XPS spectra. The AFM analysis determined a high roughness with SEM detected pores (20 - 50 nm). The electrochemical studies of bare and anodically oxidized Ti-15Ta-5Zr alloy in Carter-Brugirard saliva of different pH values and saliva with 0.05M NaF, pointed to a nobler surface for the protected alloy, with a thicker electrodeposited oxide layer acting as a barrier against aggressive ions. The oxidized alloy significantly decreased corrosion current densities and total quantity of ions released into the oral environment in comparison with the bare one, at higher polarisation resistance and protective capacity of the electrodeposited layer. The impedance data revealed a bi-layered oxidation film formed by: a dense, compact, barrier layer in contact with the metallic substrate, decreasing the potential gradient across the metal/oxide layer/solution interface, reducing the anodic dissolution and a more permissive, porous layer in contact with the electrolyte. The open circuit potential for protected alloy shifted to nobler values, with thickening of the oxidation film signifying long-term protection.

The Aesthetics of Hooded Garments after the Mid-20th Century (20세기 중반 이후 후드 복식에 나타난 복식미)

  • Choi, Sun-Young;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.62 no.3
    • /
    • pp.1-16
    • /
    • 2012
  • The purpose of this dissertation is to examine the various types of hooded garments that have been worn after the $20^{th}$ century, and to analyze the aesthetic values of them. The study examined various types of hooded garments with diverse significances based on literature and case studies on the history of garments, news paper articles and the Internet. Since the $20^{th}$ century, there has been a variety of hooded garments, such as monk dresses, hoodies, anoraks, duffle coats, some protective clothing, and designers' hooded clothes. Through this research, the study found that the aesthetics of hooded garments after the mid-20th century were as follows: physical protection, anonymity, psychological refuge, fashionability and high-functionality.

Inelastic two-degree-of-freedom model for roof frame under airblast loading

  • Park, Jong Yil;Krauthammer, Theodor
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.321-335
    • /
    • 2009
  • When a roof frame is subjected to the airblast loading, the conventional way to analyze the damage of the frame or design the frame is to use single degree of freedom (SDOF) model. Although a roof frame consists of beams and girders, a typical SDOF analysis can be conducted only separately for each component. Thus, the rigid body motion of beams by deflections of supporting girders can not be easily considered. Neglecting the beam-girder interaction in the SDOF analysis may cause serious inaccuracies in the response values in both Pressure-Impulse curve (P-I) and Charge Weight-Standoff Diagrams (CWSD). In this paper, an inelastic two degrees of freedom (TDOF) model is developed, based on force equilibrium equations, to consider beam-girder interaction, and to assess if the modified SDOF analysis can be a reasonable design approach.

The Trends of Next Generation Cyber Security (차세대 사이버 보안 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

Generation of security system defense strategies based on evolutionary game theory

  • Bowen Zou;Yongdong Wang;Chunqiang Liu;Mingguang Dai;Qianwen Du;Xiang Zhu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.9
    • /
    • pp.3463-3471
    • /
    • 2024
  • The physical protection systems of Nuclear Power Plant are utilized to safeguard targets against intrude by attacker. As the methods employed by attackers to intrude Nuclear Power Plant become increasingly complex and diverse, there is an urgent need to identify optimal defense strategies to interrupt adversary intrusions. This paper focuses on studying the defense of security personnel against adversary intrusions and utilizes an evolutionary game approach to select the optimal defense decisions for physical protection systems. Under the assumption of bounded rationality for both the attacker and defender, the paper constructs replication dynamic equations for attack and defense strategies, investigating the process of strategy selection and the stability of evolution. Finally, a minimal model is proposed to validate the feasibility of utilizing the evolutionary game model for defense strategy selection.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Comparison & Analysis of Intrusion Detection System System Protection Profile of NSA and MIC (NSA IDS System PP와 국가기관용 IDS PP 가정사항 비교분석)

  • 김남기;박종오;김지영
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.57-65
    • /
    • 2003
  • A protection profile is the required specification document by consumer groups to specify what security purpose they would like to have in their specialized products. A protection profile assumption is the document that specifies consumer environment in the physical, artificial, network perspective and the contents of intended usage which include usage limitation, the value of latent asset, and additional applications for a TOE (Target of Evaluation). In this paper, we compare the assumptions of the NSA IDS PP and the IDS PP for government.

  • PDF

Routing and Wavelength Assignment in Survivable WDM Networks without Wavelength Conversion

  • Lee, Tae-Han;Park, Sung-Soo;Lee, Kyung-Sik
    • Management Science and Financial Engineering
    • /
    • v.11 no.2
    • /
    • pp.85-103
    • /
    • 2005
  • In this paper, we consider the routing and wavelength assignment problem in survivable WDM transport network without wavelength conversion. We assume the single-link failure and a path protection scheme in optical layer. When a physical network and a set of working paths are given, the problem is to select a link-disjoint protection path for each working path and assign a wavelength for each working and protection path. We give an integer programming formulation of the problem and propose an algorithm to solve it. Though the formulation has exponentially many variables, we solve the linear programming relaxation of it by using column generation technique. We devise a branch-and price algorithm to solve the column generation problem. After solving the linear programming relaxation, we apply a variable fixing procedure combined with the column generation to get an integral solution. We test the proposed algorithm on some randomly generated data and test results show that the algorithm gives very good solutions.

A Study on Fire Protection in Nuclear Power Plants and Application of the Code and Standards for Fire Protection Systems (원자력발전소 화재방호와 소방시설 기술기준 적용에 대한 고찰)

  • Kim, Wee-Kyong;Jeong, Kee-Sin
    • Fire Science and Engineering
    • /
    • v.26 no.6
    • /
    • pp.38-44
    • /
    • 2012
  • The purpose of fire protection for the nuclear power plants (NPPs) is to ensure safe shutdown state of the reactor, to minimize the release of radioactive materials to the environment, to provide physical safety of the on-site personnel, and to limit the property damage. Fire protection and extinguishing equipments are one of the important protection measures based on the defense-in-depth concept, which can promptly detect and control and extinguish those fires that do occur, thereby limiting fire damage. However, a separate evaluation process might be additionally necessary for the construction permit and operating license because the fire protection laws of the NEMA for installation standards of the fire protection systems is not fully characterized for the NPPs. It is also not easy to implement the regulations such as the performance based design concept for fire protection system of the NPPs which are characterized for a relatively low density of employee. This study suggests a guideline for the improvement of the technical standards for fire protection systems of the NPPs by evaluating the fundamental problems drawn by reviewing laws and regulatory guides relevant to fire protection and by evaluating the applicability of the KEPIC FPN in domestic nuclear power plants.