• Title/Summary/Keyword: Secure Development

Search Result 1,887, Processing Time 0.022 seconds

Development of a GVT (Gas Valve Train) Control System for LNG Fueled Vessels (LNG 추진 선박 엔진용 GVT 제어 시스템 개발)

  • Kang, Inpil;Kim, Kyu-Cheol
    • Journal of Power System Engineering
    • /
    • v.21 no.4
    • /
    • pp.70-76
    • /
    • 2017
  • This paper presents the development of a Gas Valve Train (GVT) control system which is the core equipment of LNG fueled vessels. Due to the increasing worldwide demand for echo friendly green ship products, domestic companies urgently require to develop a core equipments for the LNG fueled vessels to secure worldwide markets in marine engineering. A LNG fueled engine generally equips the GVT, a fuel supply system that steadily supplies clean high-pressure LNG to the engine. The GVT requires a safety operational control system that can prevent any gas leakage accident, and a system that monitors operation status in real time. Therefore, we introduces a development for GVT control and monitoring system design and the design was systematically performed by means of functional analysis and differentiation of foreign advanced products.

A Study on feasibility for runway development -IIAC 4th runway construction case study- (인천국제공항 제4활주로 건설 타당성 연구)

  • Choi, Dong Yeop;Sin, Jung Ha;Chang, Chan Hyeok;Park, Sung Do
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.27 no.2
    • /
    • pp.37-46
    • /
    • 2019
  • Although This study is to produce various considerations for the proper time and feasibility of new runway with Incheon international airport $4^{th}$ runway development case. In order to validate the feasibility of runway development, it is main considerations to be increased airport capacity for accommodating increase air traffic demand, secure stable airport operation without degrading service level, cope with emergency situation and maintain competitive among competitive airports which are developing new runway. Conclusionally, to develop new runwlay at the proper time for sustainable and stable airport operation without stop is the best way of maintaining competitiveness among foreign competitive airports.

Direction of Healthcare Expenditure on Research and Development (보건의료 연구개발비 현황과 발전방향)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.28 no.4
    • /
    • pp.327-328
    • /
    • 2018
  • The quality of healthcare in Korea is very good, especially in life threatening disease. However, the level of healthcare research in Korea is not good relative to that of engineering. International university rankings also were showed that engineering was generally higher ranking than medicine. The reason of this phenomenon was deeply related to expenditure on research and development (R&D). Although Korea had a lot of gross domestic expenditure on R&D (GERD), 75% of GERD was from business enterprise that was related to engineering. Healthcare expenditure of R&D from business enterprise is small. Healthcare expenditure from government budget allocation on R&D (GBARD) was smaller than engineering. Higher education expenditure on R&D of GERD was also small and the quantity and quality of researcher in higher education was not enough. For Korea's healthcare to become the growth engine for future, GBARD should be invested heavily in the healthcare, a large part of the increased GBARD must be invested in higher education, and the higher education should invest to secure the higher quality researcher stably.

THE RESEARCH AND ANALYSIS OF THE STATE OF ODA IN OVERSEAS CONSTRUCTION INDUSTRY

  • Jin-Wook Choi;Jae-Jun Kim;Ja-Young Yoon;Jeong-Seok Lee;Jin-Kyu Sim
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.318-326
    • /
    • 2007
  • This research aims to investigate into Official Development Assistance (ODA), which may be regarded as assistance or aid to increase competitiveness in the overseas construction field through presenting, in the initial step of construction projects, schemes to secure financial resources to those who place orders. In this research, the present author analyzes ODA of advanced countries and S.Korea and distributes and collects questionnaires to experts in related fields in order to investigate into the current state and problems of overseas construction and ODA.

  • PDF

Environmental Conservation and Sustainable Pusan Development Strategy (환경보전과 지속가능한 부산의 도시개발방안)

  • Hwang, Young-Woo;Song, Kyo-Ook;Yhang, Wii-Joo
    • Journal of Environmental Science International
    • /
    • v.6 no.3
    • /
    • pp.195-203
    • /
    • 1997
  • Pusan has experienced some different paths of urbanization and industrialization compared to other cities. and has faced the problem of over-saturation In enoronmental capacity. Pusan needs to fond out sustainable development strategies based on Agenda 21 by UNCED In 1992 to secure urban renewal. Therefore. Pusan's sustainable development strategies focus on the 1)research on envlronmental capacity and reasonable population accommodation 2)supp1y of basic enoronmental facilities for the human settlement 3)protection and efficient management of environmental pollution 4)saving and control of energy and other resources S)independent and stable euecution of plan based on biological relation 6)harmony between nature and urban spatial organization. In addition. these policies can be suggested along with the conclusions; First, ostablishment of green plan-muddle and long term environmental goals Included In the urban planning to reduce enoronmental deterioration and pollution. Second, computation of sustalnability Indeu the Index Is necessary to sustainable urban development, which is related with green GNP of the national level. Third, capacity estimation of nature and social environment-estimation of enoronmental capacity to the civilized area is required become an ecopolis, and is required to focus on the western area of Pusan which has high decree of potentiality.

  • PDF

The research on Diffie-Hellman-based IoT Sensor Node key management (Diffie-Hellman 기반 사물인터넷 센서노드 키 관리 연구)

  • Hong, Sunghyuck;Yu, Jina
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.9-14
    • /
    • 2017
  • Recently, the Internet of Things are developing in accordance with the technology of implementation in low-cost, small-size, low power consumption and smart sensor that can communicate using the internet. Especially, key management researches for secure information transmission based on the Internet of Things (IoT) are actively performing. But, Internet of Things(IoT) are uses sensor. Therefore low-power consumption and small-memory are restrictive condition. As a result, managing the key is difficult as a general security measure. However, The problem of secure key management is an essential challenge For the continuous development of the Internet of things. In this paper, we propose a key distribution and management technique in secure Internet of things. In the key generation and management stage, it satisfies the conditions and without physically constrained for IoT based communication.

A Study of Pre-inspection for Information Security in Information System (정보시스템의 정보보호를 위한 사전점검에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.513-518
    • /
    • 2014
  • According to the development of IT technology, various new technologies are being produced. As the complexity of the information system like using the network and convergence devices is increasing, threat and vulnerability against various security problems are increasing even though new IT services provide the convenience of users' accessibility to services. In order to secure the safety of information system, the weakness is being removed through the information protection vulnerability analysis starting from information and communication service construction stage and the system is being prepared for pre-inspection activities about whether the information protection measures were established and applied. In this paper, introduction and current status of each country about advanced check-up systems in the information system are to be identified. Progress direction about the advanced pre-inspection system which is driven by Korea Internet Security Agency and its activation plan to secure the safety are to be suggested.

The Role and Issue analysis of the ADR's Committee in the Revision of Personal Information Protection Act (데이터 3법 개정에 따른 분쟁조정위원회 역할과 이슈분석)

  • Yoon, Duck Joong;Jee, Yoon Seok;Kim, Youngae;Shin, Yongtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.279-286
    • /
    • 2020
  • On February 4, 2020, the Personal Information Protection Act ("Privacy Act") was amended to facilitate the convergence and utilization of data, a key resource of the Fourth Industrial Revolution, and to support the development of the data industry. As the scope of the law applies to telecommunications operators, financial operators, and personal information processing providers, the scope of related dispute settlement is expected to increase. Therefore, this paper first introduces the role and function of the Personal Information Dispute Committee and the institutional standards for personal information dispute mediation, and researches the roles and issues that the Personal Information Dispute Mediation Committee should play in accordance with the revision of the Data 3 Law. In this study, For efficient operation of personal information dispute mediation, expert deliberation by field, new adjustment criteria for new industrial technologies, way to secure business continuity between the Personal Information Dispute Committee and the Personal Information Committee, Secure the link between the mediation decision and courts, and Suggested the strengthening of the operational standards for collective dispute mediation.

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.