• Title/Summary/Keyword: Security-Critical

Search Result 835, Processing Time 0.024 seconds

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.

Preliminary Post-closure Safety Assessment of Disposal Options for Disused Sealed Radioactive Source (폐밀봉선원 처분방식별 폐쇄후 예비안전성평가)

  • Lee, Seunghee;Kim, Juyoul;Kim, Sukhoon
    • Economic and Environmental Geology
    • /
    • v.49 no.4
    • /
    • pp.301-314
    • /
    • 2016
  • Disused Sealed Radioactive Sources (DSRSs) are stored temporally in the centralized storage facility of Korea Radioactive Waste Agency (KORAD) and planned to be disposed in the low- and intermediate-level radioactive waste (LILW) disposal facility in Gyeongju city. In this study, preliminary post-closure safety assessment was performed for DSRSs in order to draw up an optimum disposal plan. Two types of disposal options were considered, i.e. engineered vault type disposal and rock cavern type disposal which were planned to be constructed and operated respectively in LILW disposal facility in Gyeongju city. Assessment end-point was individual effective dose of critical group and calculated by using GoldSim code. In normal scenario, the maximum dose was estimated to be approximately $1{\times}10^{-7}mSv/yr$ for both disposal options. It meant that both options had sufficient safety margin when compared with regulatory limit (0.1 mSv/yr). Otherwise, in well scenario, the maximum dose exceeded regulatory limit of 1 mSv/yr in engineered vault type disposal and the exposure dose was mainly contributed by $^{226}Ra$, $^{210}Pb$ (daughter nuclide of $^{226}Ra$) and $^{237}Np$ (daughter nuclide of $^{241}Am$). For rock cavern type disposal, even though the peak dose satisfied regulatory limit, the exposure doses by $^{14}C$ and $^{237}Np$ were relatively high above 10% of regulatory limit. Therefore, it is necessary to exclude $^{14}C$, $^{226}Ra$ and $^{241}Am$ for two type of disposal options and additional management such as long-term storage and development of disposal container for those radionuclides should be performed before permanent disposal for conservative safety and security.

A study on Convergence Weapon Systems of Self propelled Mobile Mines and Supercavitating Rocket Torpedoes (자항 기뢰와 초공동 어뢰의 융복합 무기체계 연구)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.31-60
    • /
    • 2023
  • This study proposes a new convergence weapon system that combines the covert placement and detection abilities of a self-propelled mobile mine with the rapid tracking and attack abilities of supercavitating rocket torpedoes. This innovative system has been designed to counter North Korea's new underwater weapon, 'Haeil'. The concept behind this convergence weapon system is to maximize the strengths and minimize the weaknesses of each weapon type. Self-propelled mobile mines, typically placed discreetly on the seabed or in the water, are designed to explode when a vessel or submarine passes near them. They are generally used to defend or control specific areas, like traditional sea mines, and can effectively limit enemy movement and guide them in a desired direction. The advantage that self-propelled mines have over traditional sea mines is their ability to move independently, ensuring the survivability of the platform responsible for placing the sea mines. This allows the mines to be discreetly placed even deeper into enemy lines, significantly reducing the time and cost of mine placement while ensuring the safety of the deployed platforms. However, to cause substantial damage to a target, the mine needs to detonate when the target is very close - typically within a few yards. This makes the timing of the explosion crucial. On the other hand, supercavitating rocket torpedoes are capable of traveling at groundbreaking speeds, many times faster than conventional torpedoes. This rapid movement leaves little room for the target to evade, a significant advantage. However, this comes with notable drawbacks - short range, high noise levels, and guidance issues. The high noise levels and short range is a serious disadvantage that can expose the platform that launched the torpedo. This research proposes the use of a convergence weapon system that leverages the strengths of both weapons while compensating for their weaknesses. This strategy can overcome the limitations of traditional underwater kill-chains, offering swift and precise responses. By adapting the weapon acquisition criteria from the Defense force development Service Order, the effectiveness of the proposed system was independently analyzed and proven in terms of underwater defense sustainability, survivability, and cost-efficiency. Furthermore, the utility of this system was demonstrated through simulated scenarios, revealing its potential to play a critical role in future underwater kill-chain scenarios. However, realizing this system presents significant technical challenges and requires further research.

  • PDF

Security and Safety Assessment of the Small-scale Offshore CO2 Storage Demonstration Project in the Pohang Basin (포항분지 해상 중소규모 CO2 지중저장 실증연구 안전성 평가)

  • Kwon, Yi Kyun;Chang, Chandong;Shinn, Youngjae
    • The Journal of Engineering Geology
    • /
    • v.28 no.2
    • /
    • pp.217-246
    • /
    • 2018
  • During the selection and characterization of target formations in the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin, we have carefully investigated the possibility of induced earthquakes and leakage of $CO_2$ during the injection, and have designed the storage processes to minimize these effects. However, people in Pohang city have a great concern on $CO_2$-injection-intrigued seismicity, since they have greatly suffered from the 5.4 magnitude earthquake on Nov. 15, 2017. The research team of the project performed an extensive self-investigation on the safety issues, especially on the possible $CO_2$ leakage from the target formation and induced earthquakes. The target formation is 10 km apart from the epicenter of the Pohang earthquake and the depth is also quite shallow, only 750 to 800 m from the sea bottom. The project performed a pilot injection in the target formation from Jan. 12 to Mar. 12, 2017, which implies that there are no direct correlation of the Pohang earthquake on Nov. 15, 2017. In addition, the $CO_2$ injection of the storage project does not fracture rock formations, instead, the supercritical $CO_2$ fluid replaces formation water in the pore space gradually. The self-investigation results show that there is almost no chance for the injection to induce significant earthquakes unless injection lasts for a very long time to build a very high pore pressure, which can be easily monitored. The amount of injected $CO_2$ in the project was around 100 metric-tonne that is irrelevant to the Pohang earthquake. The investigation result on long-term safety also shows that the induced earthquakes or the reactivation of existing faults can be prevented successfully when the injection pressure is controlled not to demage cap-rock formation nor exceed Coulomb stresses of existing faults. The project has been performing extensive studies on critical stress for fracturing neighboring formations, reactivation stress of existing faults, well-completion processes to minimize possible leakage, transport/leakage monitoring of injected $CO_2$, and operation procedures for ensuring the storage safety. These extensive studies showed that there will be little chance in $CO_2$ leakage that affects human life. In conclusion, the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin would not cause any induced earthquakes nor signifiant $CO_2$ leakage that people can sense. The research team will give every effort to secure the safety of the storage site.

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.