• Title/Summary/Keyword: Security Measure

Search Result 578, Processing Time 0.02 seconds

Current Status for Generation, Treatment and Recycling of Waste Resources in the Domestic Industry and Improvement Measures of Resource Efficiency (국내(國內) 산업(産業) 폐자원(廢資源)의 발생(發生)·처리(處理)·재자원화(再資源化) 현황(現況) 및 자원효율성(資源效率性) 향상(向上) 방안(方案))

  • Kang, Hong-Yoon;Lee, Il-Seuk;Kim, Kyung-Hwan
    • Resources Recycling
    • /
    • v.22 no.3
    • /
    • pp.3-17
    • /
    • 2013
  • Recently, the importance of efficient resource management has been highlighted due to the uncertainty of its security. Korea has thus made an effort to improve the resource productivity in various fields such as the increase of recycling rate and the establishment of methodical resource management system. It is still necessary to draw the innovative improvement measure of national resource efficiency. This study derives major issues of recycling potential in the domestic industry by analyzing the current status of generation, treatment and recycling of industrial wastes in Korea. Futhermore, main tasks for promoting the improvement of national resource efficiency through the recycling of industrial wastes in Korea have been proposed based on the results of this study with the comparison of Japan's situation.

A Study on Small Business Forecasting Models and Indexes (중소기업 경기예측 모형 및 지수에 관한 연구)

  • Yoon, YeoChang;Lee, Sung Duck;Sung, JaeHyun
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.1
    • /
    • pp.103-114
    • /
    • 2015
  • The role of small and medium enterprises as an economic growth factor has been accentuated; consequently, the need to develop a business forecast model and indexes that accurately examine business situation of small and medium enterprises has increased. Most current business model and indexes concerning small and medium enterprises, released by public and private institutions, are based on Business Survey Index (BSI) and depend on subjective (business model and) indexes; therefore, the business model and indexes lack a capacity to grasp an accurate business situation of these enterprises. The business forecast model and indexes suggested in the study have been newly developed with Principal Component Analysis(PCA) and weight method to accurately measure a business situation based on reference dates addressed by the National Statistical Office(NSO). Empirical studies will be presented to prove that the newly proposed business model and indexes have their basis in statistical theory and their trend that resembles the existing Composite Index.

A Study on IPTV Video Quality by Routing Protocols in Wireless LAN (무선 LAN 환경에서 경로 배정 프로토콜에 따른 IPTV 영상 서비스 품질에 관한 연구)

  • Jung, Jae-hoon;Park, Seung-seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.572-575
    • /
    • 2009
  • With the advent of integration environment of broadcasting and communication, IPTV has been widely used. It provides services such as information, movie contents and broadcasting through TV using super-high speed networks. Developments of Wireless LAN and IP network technology create various and fusional services such as IPTV, VoIP that are based on IP network. The development of Wireless LAN is very important in IPTV network field which requires the best quality of service on the security, QoS and bandwidth. In this Paper, We configure the experimental network in its RIP and OSPF environment to test the Video Quality of IPTV in Wireless LAN. We measure and evaluate broadcasting quality by using PSNR to show the corelation of Routing Protocols in Wireless LAN in which how they affect to the IPTV real-time Video Quality.

  • PDF

Improving development environment for embedded software (내장 소프트웨어를 위한 개발 환경의 개선)

  • AHN, ILSOO
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • RFID systems have been widely used in various fields such as logistics, distribution, food, security, traffic and others. A RFID middleware, one of the key components of the RFID system, perform an important role in many functions such as filtering, grouping, reporting tag data according to given user specifications and so on. However, manual test data generation is very hard because the inputs of the RFID middleware are generated according to the RFID middleware standards and complex encoding rules. To solve this problem, in this paper, we propose a black box test technique based on RFID middleware standards. Firstly, we define ten types of input conversion rules to generate new test data from existing test data based on the standard specifications. And then, using these input conversion rules, we generate various additional test data automatically. To validate the effectiveness of generated test data, we measure coverage of generated test data on actual RFID middleware. The results show that our test data achieve 78% statement coverage and 58% branch coverage in the classes of filtering and grouping, 79% statement coverage and 64% branch coverage in the classes of reporting.

  • PDF

Calculation of preliminary site-specific DCGLs for nuclear power plant decommissioning using hybrid scenarios

  • Seo, Hyung-Woo;Sohn, Wook
    • Nuclear Engineering and Technology
    • /
    • v.51 no.4
    • /
    • pp.1098-1108
    • /
    • 2019
  • Korea's first commercial nuclear power plant at Kori site was permanently shut down in 2017 and is currently in transition stage. Preparatory activities for decommissioning such as historical site assessment, characterization, and dismantling design are being actively carried out for successful D&D (Dismantling and Decontamination) at Kori site. The ultimate goal of decommissioning will be to ensure the safety of workers and residents that may arise during the decommissioning of nuclear facilities and, thereby finally returning the site to its original status in accordance with the release criteria. Upon completion of decommissioning, the resident's safety at a site released will be assessed from the evaluation of dose caused by radionuclides expected to be present or detected at the site. Although the U.S. commercial nuclear power plants with decommissioning experience use different site release criteria, most of them are 0.25 mSv/y. In Korea, both the unrestricted and restricted release criteria have been set to 0.1 mSv/y by the Nuclear Safety and Security Commission. However, since the dose is difficult to measure, measurable concentration guideline levels for residual radionuclides that result in dose equivalent to the site release criteria should be derived. For this derivation, site reuse scenario, selection of potential radionuclides, and systematic methodology should be developed in planning stage of Kori site decommissioning. In this paper, for calculation of a preliminary site-specific Derived Concentration Guideline Levels (DCGLs) for the Nuclear Power Plant site, a novel approach has been developed which can fully reflect practical reuse plans of the Kori site by taking into account multiple site reuse scenarios sequentially, thereby striking a remarkable distinction with conventional approaches which considers only a single site scenario.

Measurements of Encryption and Decryption Times of AES and LEA Algorithms on an Arduino MCU (아두이노를 이용한 AES와 LEA의 암복호화 속도 측정)

  • Kwon, Yeongjun;Shin, Hyungsik
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.971-977
    • /
    • 2019
  • This paper presents an experimental result showing the encryption and decryption times of the AES and LEA algorithms. AES and LEA algorithms are international and Korean standards for block ciphers, respectively. Through experiments, this paper investigates the applicability of the LEA algorithm for light weight IoT devices. In order to measure the encryption and decryption times, 256-bit and 128-bit secret keys were randomly generated for AES and LEA, respectively. Under our test environment using an Arduino microcontroller, the AES algorithm takes about 45ms for encryption and decryption processes, whereas the LEA algorithm takes about 4ms. Even though processing times of each algorithm may vary much under different implementation and test environments, this experimental result shows that the LEA algorithm can be applied to many light weight IoT devices for security goals.

IP-Based Heterogeneous Network Interface Gateway for IoT Big Data Collection (IoT 빅데이터 수집을 위한 IP기반 이기종 네트워크 인터페이스 연동 게이트웨이)

  • Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.173-178
    • /
    • 2019
  • Recently, the types and amount of data generated, collected, and measured in IoT such as smart home, security, and factory are increasing. The technologies for IoT service include sensor devices to measure desired data, embedded software to control the devices such as signal processing, wireless network protocol to transmit and receive the measured data, and big data and AI-based analysis. In this paper, we focused on developing a gateway for interfacing heterogeneous sensor network protocols that are used in various IoT devices and propose a heterogeneous network interface IoT gateway. We utilized a OpenWrt-based wireless routers and used 6LoWAN stack for IP-based communication via BLE and IEEE 802.15.4 adapters. We developed a software to convert Z-Wave and LoRa packets into IP packet using our Python-based middleware. We expect the IoT gateway to be used as an effective device for collecting IoT big data.

A Study on the Evaluation Method of Defense Technology Valuation Using the Readability Level Assessment of Core National Defense Technology (국방 핵심기술의 성숙도(Readiness Level)평가를 활용한 국방기술가치평가 방안 연구)

  • Lee, Hyung-Seog;Shin, Chung-Jin;Kang, Seok-Joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1710-1719
    • /
    • 2019
  • This study is intended to understand defense technologies that require the convergence of various technologies and the integration of systems, and to propose valuation methods that reflect the characteristics of each field. The measure of technology level, integration (system integration technology) between technologies, preparation of manufacturing, and maturity scale of the weapons system to be valued are measured according to the items of measurement factors to verify system performance, and to present a framework for estimating the quantitative values of core technologies using system maturity. Considering the characteristics of each technology field, the research suggests a proper valuation method. In evaluating the value of defense technologies, A proposal is made to evaluate the value of defense technology by competent technical experts in each field, using SRL, which can be evaluated according to the evaluation criteria reflecting the technical characteristics of each field, and to evaluate the completion of the entire system in quantitative terms.

Hacking attack and vulnerability analysis for unmanned reconnaissance Tankrobot (무인정찰 탱크로봇에 대한 해킹 공격 및 취약점 분석에 관한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1187-1192
    • /
    • 2020
  • The dronebot combat system is a representative model of the future battlefield in the 4th industrial revolution. In dronebot, unmanned reconnaissance tankrobot can minimize human damage and reduce cost with higher combat power than humans. However, since the battlefield environment is very complex such as obstacles and enemy situations, it is also necessary for the pilot to control the tankrobot. Tankrobot are robots with new ICT technology, capable of hacking attacks, and if there is an abnormality in control, it can pose a threat to manipulation and control. A Bluetooth sniffing attack was performed on the communication section of the tankrobot and the controller to introduce a vulnerability to Bluetooth, and a countermeasure using MAC address exposure prevention and communication section encryption was proposed as a security measure. This paper first presented the vulnerability of tankrobot to be operated in future military operations, and will be the basic data that can be used for defense dronebot units.

A Study on the Characteristics of Underwater Explosion for the Development of a Non-Explosive Test System (무폭약 시험 장치 개발을 위한 수중폭발 특성에 대한 연구)

  • Lee, Hansol;Park, Kyudong;Na, Yangsub;Lee, Seunggyu;Pack, Kyunghoon;Chung, Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.6
    • /
    • pp.322-330
    • /
    • 2020
  • This study deals with underwater explosion (UNDEX) characteristics of various non-explosive underwater shock sources for the development of non-explosive underwater shock testing devices. UNDEX can neutralize ships' structure and the equipment onboard causing serious damage to combat and survivability. The shock proof performance of naval ships has been for a long time studied through simulations, but full-scale Live Fire Test and Evaluation (LFT&E) using real explosives have been limited due to the high risk and cost. For this reason, many researches have been tried to develop full scale ship shock tests without using actual explosives. In this study, experiments were conducted to find the characteristics of the underwater shock waves from actual explosive and non-explosive shock sources such as the airbag inflators and Vaporizing Foil Actuator (VFA). In order to derive the empirical equation for the maximum pressure value of the underwater shock wave generated by the non-explosive impact source, repeated experiments were conducted according to the number and distance. In addition, a Shock Response Spectrum (SRS) technique, which is a frequency-based function, was used to compare the response of floating bodies generated by underwater shock waves from each explosion source. In order to compare the magnitude of the underwater shock waves generated by each explosion source, Keel Shock Factor (KSF), which is a measure for estimating the amount of shock experienced by a naval ship from an underwater explosionan, was used.