• Title/Summary/Keyword: Security Control

Search Result 3,102, Processing Time 0.029 seconds

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

A Study on Integrated Management System of Researcher Identifiers based on the ISNI (International Standard Name Identifier) (국제표준이름식별자(ISNI)를 중심으로 한 연구자 식별자의 통합관리체계 연구)

  • Byeon, Hoi-Kyun;Oh, Bok-hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.3
    • /
    • pp.139-155
    • /
    • 2018
  • This study proposed an integrated management system model of researcher identifiers using the ISNI(International Standard Name Identifier) that can prevent duplicate issuance of identifiers and can be used to reorganize the authors' information. We looked at the metadata structure and management system of the ISNI that can be applied in various fields among identifiers. And we have designed the integrated ID system and system model that can manage the identifiers issued by each institute based on the ISNI. This model consists of data structure layer, platform layer, application layer, management and security layer (4 layers) and we have presented some of the key features and issues to consider when managing the integrations.

Life of the Institutionalized Elderly (시설노인의 삶)

  • Lee, Ga-Eon
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.1
    • /
    • pp.32-38
    • /
    • 2001
  • This study focused on the understanding the life of the elderly in the institution by phenomenological method. The participants were seven. who were 4 men and 3 women living in the elderly institution in Taegu. The data were collected through the indepth interviews and participant observation from June 20. 1999 to January 10. 2000 and analyzed by phenomenological analytic method by Giorgi. The structure of the meaning were as follows: Unhappy life: irresponsibility. self-centered thought. hardness. Irresistible life: misfortune. unhealthiness. Reading their son's intention. Bitter life: unfair treatment from their sons and daughters, betrayed feeling for their being thrown away. Outside oriented life: a fear of others' attention, wrong information about institutionalized life, maladjustment. Self-consolation life: comfortableness, convenience, economic merit of low cost. Dissatisfied life: discomfort from communal living. unkindness of the institution staffs, depreciated tendency to the elder people, irrational social security system. economic distress, physical pain, restrained feeling. Tenacity to their sons and daughters longingness for their sons and daughters, regretableness, waiting, Regretable life: remorse for their past life. agony, guilty, loneliness, grief, self-abandonment, self-depreciation, other residents' death in common. Inharmonious life with other residents complaint, conflict, ignorance, selfishness. Yearning life for opposite sex: sexual interest. Preparing for their life: control over their body and mind, consideration for others. A life with hope: blessing death, forever healthfulness, affiliation to their family. From the results of this study an education and consultation should be done as soon as possible to remove the negative recognition of the institutional life to the facility residents. the family and the future consumers of elderly institution. To minimize the maladjustment to facility life of residents, a new program and interventions for the new comer's are needed. The thesis with above results will widen the understandings of institutional residents and an important guidance for a better nursing care in elderly institutions of korea.

  • PDF

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

A Study on US Free and Open Indo-Pacific Strategy and Distributed Lethality (인도-태평양(FOIP) 전략과 전력분산의 치명성에 관한 연구)

  • Kim, Tae-sung
    • Strategy21
    • /
    • s.44
    • /
    • pp.28-53
    • /
    • 2018
  • The U.S. has recently developed Free and Open Indo-Pacific strategy and Distributed Lethality strategy based on a common perception that they are responding to China's threats. In the future, it is anticipated the following. Strengthen cooperation of the U.S.-India-Vietnam navy, Maximizing the combined combat power between the U.S. and regional navies, Improving its ability to restore damage control, Economic cooperation between the Pacific and Indian countries. The meanings given to the Korean navy are as follows. First, South Korea should pursue cooperation with the Indian Navy, which will grow into a regional balance on China's growth. The growth of the Indian navy is expected to increase cooperation with other Pacific countries. The government should seek ways to promote cooperation with india navy in various fields. Secondly, it is a joint drill between the U.S. Navy and the Korean Navy. Recently, the Korea-U.S. joint drill has not been conducted and many changes are expected to be made regarding the implementation of the joint drill in the future. Therefore, it is necessary to respond to possible changes in the naval relationship between Korea navy and the U.S. navy Also, due to distributed lethality strategy, preparations for operations and training with U.S.navy will be necessary. Lastly, it should contribute to cooperation among regional countries in preparation for maritime territorial disputes. The growth of the Chinese navy and the territorial disputes in the East and South China sea has raised the possibility of accidental military clashes at sea. Therefore, the government should make efforts to create multilateral security cooperation systems that can continue to promote the prevention of armed conflict.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

A Implementation on Interface Module and Communication Protocol for Control Monitoring of the AtoN AIS (AtoN AIS 제어감시용 인터페이스 모듈과 통신프로토콜 구현)

  • Cha, Yeong-Mun;Jeong, Yeong-Cheol;Choi, Jo-Cheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.683-688
    • /
    • 2011
  • Current is change to concept that management traffic of ship os magnified gradually to near shore waters from harbor. Therefore, introducing the technology of AIS in the ground station, lighthouse, bouy, sea facilities etc.. that is support equipment for safety sailing of ship and safety security of harbor and ship administration. The operation and maintenance of AIS for aids to navigation are required to efficient method. With this actuality, sea advanced nation of EU, USA, Japan that has been apply for developing AtoN AIS equipment that is connected equipment of technology standard in IALA. Because of it is expected to depend equipment in income, that is required to domestic technology of the AtoN AIS. This paper is targeted to development that is suitable automation AtoN AIS equipment in environmental peculiarity for constructor AtoN operating administration center. It has been realization send protocol for information interchange.

WebCam : A Web-based Remote Recordable Surveillance System using Index Search Algorithm (웹캠 : 새로운 인데스검색 알고리듬을 이용한 웹기반 원격 녹화 보안 시스템)

  • Lee, Myeong-Ok;Lee, Eun-Mi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.9-16
    • /
    • 2002
  • As existing analog video surveillance systems could save and retrieve data only in a limited space within short distance, it had many constraints in developing into various application systems. However, on the back of development of the Internet and computer technologies, digital video surveillance systems can be controlled from a remote location by web browser without space limits. Moreover, data compression and management technologies with Index Search algorithm make it possible to efficiently handling, storing, and retrieving a large amount of data and further motion detection algorithm enhances a recording speed and efficiency for a practical application, that is, a practical remote recordable video surveillance system using our efficient algorithms as mentioned, called WebCam. The WebCam server system can intelligently record and save video images digitized through efficient database management, monitor and control cameras in a remote place through user authentication, and search logs.

A study on ACF Comparsion to Various Spreading Sequence for T-DMB Emergency Broadcasting (T-DMB 재난방송을 위한 다양한 확산 수열 자기상관특성 비교 연구)

  • Lee, Seung-Ho;Lee, Yong-Tae;Kim, Geon;Yang, Chung-Mo;Kim, Wan-Sik;Cho, Ju-Phil;Park, Yong-Woon;Cha, Jae-Sang
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2011
  • In this paper, there was compared to the performance of the Auto Correlation Feature of each code using Spreading code for improving the data transmission technology in T-DMB disaster broadcasting. Generally, wireless mobile communication environment such as DMB occur the Inter Code Interference and the Multi-Path Interference in the process of the identification of the transmitter from the receiver. To solve this problem, spreading code technology was able to improve the security property. Also, it will be able to use in many fields of signal processing, because to control a period of the code can be variable. Therefore, in this paper, we studied to compare the performance of excellent orthogonal Golay code, Kasami code and ZCD(Zero Correlation Duration) code.