• Title/Summary/Keyword: Secure Storage

Search Result 397, Processing Time 0.026 seconds

A Study on the Establishment of the Cooperative Shared Storage for Public Libraries in Seoul Metro Area (공공도서관 공동보존서고 건립 방안 연구 - 서울특별시 공공도서관을 중심으로 -)

  • Yoon, Hee-Yoon;Chang, Durk Hyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.285-303
    • /
    • 2021
  • Efforts to establish a joint preservation facility for library collection are being discussed by some of regional representative libraries recently. In order for the efficient management and preservation of public library materials and to secure the space necessary for applying new services, there is a high demand for a cooperative shared storage for public libraries. The construction of a cooperative shared storage for public libraries is to minimize the cost of expanding the preservation space for each public library and to provide a pleasant service environment by separating the low-use materials stored in the library. Accordingly, discussions on the construction of a cooperative shared storage for public libraries are being initiated by some representative libraries. This study, in this regard, tried to propose a plan to build a cooperative shared storage for public libraries by a Seoul Metropolitan Library. To this end, it surveyed the estimate size of the collections of public libraries in Seoul and, based on this, proposed the size and strategies for the facility.

Estimation of the Economic Value of Pumped Storage Power Generation in Korea (양수발전의 비시장 가치 추정)

  • Won, DooHwan
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.1
    • /
    • pp.263-275
    • /
    • 2022
  • Purpose - This study estimated the non-market value of pumped storage power generation using the contingent valuation method(CVM). Design/methodology/approach - CVM, a non-market value estimation method, was used. The perception of pumped storage power generation and the willingness to pay(WTP) for pumped storage power generation were investigated among 612 randomly selected households. Findings - It was analyzed that the average value per household was 7309.99 won/month, and the sources of these benefits were 1819.37 won due to the improvement of power generation efficiency, 1320.48 won due to the improvement of power system reliability, 2359.24 won due to the stabilization of electricity rates, 2110.89 won due to water resource management It was assumed that a circle occurred. If the average monthly benefit per household is expanded to cover countries across the country, it is estimated that the annual value to our society from pumped storage power generation will be KRW 1.796.6 trillion. Research implications or Originality - It is necessary to consider the operation of pumped-water power generation by reflecting the value of pumped-up power generation that is not evaluated in the market. Since Korea's electricity market is isolated in a state where it is impossible to connect with other countries, it may be vulnerable to a stable electricity operation system. Therefore, there is a need for a facility that can stably secure reserve power and produce power quickly when necessary. If pumped-water power generation is actively used for power operation, a more stable power system can be secured.

Seismic Response Analysis of Rectangular Tank with Base-Isolation System (구형 면진유체저장조의 지진시 거동해석)

  • 전영선;최인길;황신일;김진웅
    • Computational Structural Engineering
    • /
    • v.8 no.1
    • /
    • pp.107-113
    • /
    • 1995
  • Spent fuel storage pool should maintain its structural integrity and the safety of stored spent fuels against design earthquake load. In this study, the seismic response analysis of the pool with LRB isolation system is performed for two different earthquakes. To investigate the seismic response of the base isolated pool, the analysis results are compared with the responses of conventional type. In conclusion, the base-isolation system is effective to reduce the seismic forces transmitted to the superstructure and the responses, and to secure the safety of the storage pool and stored spent fuel.

  • PDF

Design of Slim Actuator with Symmetric Electromagnetic Circuit (대칭형 자기회로를 갖는 슬림형 엑추에이터의 설계)

  • Woo, Jung-Hyun;Park, No-Cheol;Park, Young-Pil;Park, Kyoung-Su;Oh, Young-Se;Kim, Ki-Beom
    • Transactions of the Society of Information Storage Systems
    • /
    • v.6 no.1
    • /
    • pp.6-11
    • /
    • 2010
  • Researches for actuator which is appropriate to slim optical disk drive (ODD) have been progressed for a long time. Various types of actuators are suggested to secure high performances with slim thickness. In this paper, the slim actuator with symmetric electromagnetic (EM) circuit is suggested to apply slim ODD. Various EM circuits are proposed to increase EM force in the focusing and the tracking directions. Flexible mode frequencies and driving sensitivities are increased by using stress distribution and design of experiment (DOE). Consequently, final model is suggested to have high flexible mode frequencies and driving sensitivities.

3D SDRAM Package Technology for a Satellite (인공위성용 3차원 메모리 패키징 기술)

  • Lim, Jae-Sung;Kim, Jin-Ho;Kim, Hyun-Ju;Jung, Jin-Wook;Lee, Hyouk;Park, Mi-Young;Chae, Jang-Soo
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.19 no.1
    • /
    • pp.25-32
    • /
    • 2012
  • Package for artificial satellite is to produce mass production for high package with reliability certification as well as develop SDRAM (synchronous dynamic RAM) module which has such as miniaturization, mass storage, and high reliability in space environment. It requires sophisticated technology with chip stacking or package stacking in order to increase up to 4Gbits or more for mass storage with space technology. To make it better, we should secure suitable processes by doing design, manufacture, and debugging. Pin type PCB substrate was then applied to QFP-Pin type 3D memory package fabrication. These results show that the 3D memory package for artificial satellite scheme is a promising candidate for the realization of our own domestic technologies.

Fault Detection and Diagnosis of the Deaerator Level Control System in Nuclear Power Plants

  • Kim Kyung Youn;Lee Yoon Joon
    • Nuclear Engineering and Technology
    • /
    • v.36 no.1
    • /
    • pp.73-82
    • /
    • 2004
  • The deaerator of a power plant is one of feedwater heaters in the secondary system, and it is located above the feedwater pumps. The feedwater pumps take the water from the deaerator storage tank, and the net positive suction head(NSPH) should always be ensured. To secure the sufficient NPSH, the deaerator tank is equipped with the level control system of which level sensors are critical items. And it is necessary to ascertain the sensor state on-line. For this, a model-based fault detection and diagnosis(FDD) is introduced in this study. The dynamic control model is formulated from the relation of input-output flow rates and liquid-level of the deaerator storage tank. Then an adaptive state estimator is designed for the fault detection and diagnosis of sensors. The performance and effectiveness of the proposed FDD scheme are evaluated by applying the operation data of Yonggwang Units 3 & 4.

New Security Layer for OverLay Networks

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.211-228
    • /
    • 2009
  • After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.

Role Based Smart Contract For Data sharing

  • Joachim, Kweka Bruno;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.235-237
    • /
    • 2018
  • The Internet has allowed many things to move fast, including sharing of data, files and others within a second. Many domains use applications range from IoT, smart cities, healthcare, and organizations to share the data when necessary. However, there are some challenges faced by existing systems that works on centralized nature. Such challenges are data breach, trustiness issue, unauthorized access and data fraud. Therefore in this work, we focus on using a smart contract which is used by blockchain platform and works on decentralized form. Furthermore, in this work our contract provides an access to the file uploaded onto the decentralized storage such as IPFS. By leveraging smart contract-role based which consist of a contract owner who can manage the users when access the certain resources such as a file and as well as use of decentralized storage to avoid single point of failure and censorship over secure communication channel. We checked the gas cost of the smart contract since most of contracts tends to be a high cost.

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.