• Title/Summary/Keyword: Protection challenges

Search Result 163, Processing Time 0.029 seconds

Challenges of implementing the policy and strategy for management of radioactive waste and nuclear spent fuel in Indonesia

  • Wisnubroto, D.S.;Zamroni, H.;Sumarbagiono, R.;Nurliati, G.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.549-561
    • /
    • 2021
  • Indonesia has policies and strategies for the management of radioactive waste and spent nuclear fuel that arises from the use of nuclear research and development facilities, including three research reactors, and the use of radioisotopes in medicine and industries. The Indonesian government has provided extensive facilities such as an independent regulatory organization (BAPETEN) and a centralized radioactive waste management organization (CRWT-BATAN). Further, the presence of regulations and several international conventions guarantee the protection of the public from all risks due to handling radioactive waste and spent nuclear fuel. However, the sustainability of radioactive waste management in the future faces various challenges, such as disposal issues related to not only to site selection but also financing of radioactive waste management. Likewise, the problem of transportation persists; as an archipelago country, Indonesia still struggles to manage the infrastructure required for the transport of radioactive materials. The waste from the production of the radioisotopes, especially from the production of 99Mo, requires special attention because BATAN has never handled it. Indonesia should also resolve the management of NORM from various activities. In Indonesia, the definition of radioactive waste does not include NORM. Therefore, the management of this waste needs revision and improvement on the regulations, infrastructure, and technology.

Intellectual Property Disputes in the Era of the Metaverse: Complexities of Cross-Border Justice and Arbitration Consideration

  • Kye Hwan Ryu;Choong Mok Kwak
    • Journal of Arbitration Studies
    • /
    • v.33 no.3
    • /
    • pp.147-175
    • /
    • 2023
  • The emergence of the metaverse, a complex three-dimensional virtual environment, has led to significant changes in the intellectual property (IP) landscape. This paper examines the challenges and legal intricacies of IP within the virtual realm, focusing on the unprecedented nature of these disputes and on the inadequacies of traditional jurisdiction methods. Drawing from international frameworks, including the International Law Association's Guidelines and WIPO's guides, the study critically explores arbitration as an alternate approach to metaverse IP disputes, analyzing its complexities and applicability. The paper further delves into challenges arising from diverse protection laws that pertain to the global nature of the metaverse, including the nuances of various digital assets like NFTs. By assessing jurisdictional difficulties, the paper addresses the adoption of decentralized justice platforms, and examines the role of Alternative Dispute Resolution (ADR) methods, this paper presents a comprehensive view of the evolving virtual legal field. It suggests that while innovative methods are emerging, traditional arbitration will likely remain the preferred choice for complex disputes, offering a balance of speed, cost-effectiveness, and legal robustness within the virtual world.

Transforming Apple Pomace into Valuable Resources: Upcycling for Carbon Reduction and Circular Resource Utilization

  • Hyo Jun Won;Mi Jin Kim;Pureum Im;Mina Kim;Kyung-A Hwang;Ae-Jin Choi
    • Journal of Environmental Science International
    • /
    • v.33 no.9
    • /
    • pp.687-695
    • /
    • 2024
  • The global apple processing industry generates millions of tons of apple pomace (AP) annually, leading to significant environmental challenges owing to improper disposal methods, such as landfilling, which releases methane and other contaminants. This mini-review provides a concise overview of the strategies for the upcycling and circular resource utilization of AP. Upcycling strategies for AP can contribute to environmental protection through carbon reduction and resource circulation using existing resources in new methods instead of new materials. Additionally, this review presents the potential of AP as a raw material for food, pharmaceuticals, and cosmetics while examining the technical, economic, and environmental challenges and necessary improvements for its optimal use. Overall, the upcycling of AP offers a valuable opportunity to improve waste management and promote efficient resource utilization.

Legal and Practical Solutions for the Expanding the Roles of Medical Support Staff Nurses (진료지원인력의 확대된 업무 수행을 위한 합법적이고 합리적인 해결 방안)

  • Choi, Su Jung;Kim, Min Young
    • Journal of Korean Academy of Nursing
    • /
    • v.54 no.3
    • /
    • pp.300-310
    • /
    • 2024
  • Purpose: Medical support staff nurses have traditionally performed various supportive tasks for physicians, often extending beyond standard nursing roles. Despite these long-standing practices, there is a notable lack of official recognition and legal protection for these expanded responsibilities, leading to increasing legal concerns. Therefore, there is a need for proposing a rational solution to address these issues. Methods: The number of medical support staff nurses is rising, particularly as they fill gaps left by the 2024 resident physician strike. The study focuses on identifying potential challenges arising from this shift and developing strategic improvements to address these challenges effectively. Results: This study proposed legally expanding the scope of nursing duties and creating a robust system for training and certifying nurses to handle these responsibilities effectively, by integrating these roles within the advanced practice nurse (APN) framework. Conclusion: Integrating these roles within the framework of APN can offer a sustainable and legally sound solution to the ongoing healthcare crisis, ensuring patient safety and safeguarding healthcare workers' legal rights.

Meanings and Tasks of the Three Revised Bills which Ease Regulations on the Use of Personal Information (데이터 3법 개정의 의미와 추후 과제)

  • Kim, Seo-An
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.59-68
    • /
    • 2020
  • In January 2020, the National Assembly passed the revisions of three bills which ease regulations on the use of personal information. The revised laws include the launch of an independent supervisory body, the arrangement of redundant regulations, and regulations for the development of the data economy. This paper analyzes the content and meaning of each law of the Three Revised Bills that Ease Regulations on the Use of Personal Information. And the future challenges outline three aspects: the establishment of a system to ensure the right to informational self-determination of privacy concerns, the establishment of a certification system and the presentation of reasonable guidelines, and the expectation of professional performance by the Personal Information Protection Commission.

Face Detection Using Multi-level Features for Privacy Protection in Large-scale Surveillance Video (대규모 비디오 감시 환경에서 프라이버시 보호를 위한 다중 레벨 특징 기반 얼굴검출 방법에 관한 연구)

  • Lee, Seung Ho;Moon, Jung Ik;Kim, Hyung-Il;Ro, Yong Man
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.11
    • /
    • pp.1268-1280
    • /
    • 2015
  • In video surveillance system, the exposure of a person's face is a serious threat to personal privacy. To protect the personal privacy in large amount of videos, an automatic face detection method is required to locate and mask the person's face. However, in real-world surveillance videos, the effectiveness of existing face detection methods could deteriorate due to large variations in facial appearance (e.g., facial pose, illumination etc.) or degraded face (e.g., occluded face, low-resolution face etc.). This paper proposes a new face detection method based on multi-level facial features. In a video frame, different kinds of spatial features are independently extracted, and analyzed, which could complement each other in the aforementioned challenges. Temporal domain analysis is also exploited to consolidate the proposed method. Experimental results show that, compared to competing methods, the proposed method is able to achieve very high recall rates while maintaining acceptable precision rates.

The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.

  • Lee, Kyung-bok;Lim, Jong-in
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.857-880
    • /
    • 2016
  • Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. Moreover, we examine the significance of the event considering international norms, while applying the Tallinn Manual. Based on our analyses, we discuss implications for the cybersecurity of CI in South Korea, after which we propose a framework for strengthening cybersecurity in order to protect CI. Then, we discuss the direction of national policies.

Evaluation of Bacillus velezensis for Biological Control of Rhizoctonia solani in Bean by Alginate/Gelatin Encapsulation Supplemented with Nanoparticles

  • Moradi-Pour, Mojde;Saberi-Riseh, Roohallah;Esmaeilzadeh-Salestani, Keyvan;Mohammadinejad, Reza;Loit, Evelin
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.10
    • /
    • pp.1373-1382
    • /
    • 2021
  • Plant growth promoting rhizobacteria (PGPR) are a group of bacteria that can increase plant growth; but due to unfavorable environmental conditions, PGPR are biologically unstable and their survival rates in soil are limited. Therefore, the suitable application of PGPR as a plant growth stimulation is one of the significant challenges in agriculture. This study presents an intelligent formulation based on Bacillus velezensis VRU1 encapsulation enriched with nanoparticles that was able to control Rhizoctonia solani on the bean. The spherical structure of the capsule was observed based on the Scanning Electron Microscope image. Results indicated that with increasing gelatin concentration, the swelling ratio and moisture content were increased; and since the highest encapsulation efficiency and bacterial release were observed at a gelatin concentration of 1.5%, this concentration was considered in mixture with alginate for encapsulation. The application of this formulation which is based on encapsulation and nanotechnology appears to be a promising technique to deliver PGPR in soil and is more effective for plants.

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.