• Title/Summary/Keyword: Technical Security

Search Result 957, Processing Time 0.023 seconds

Development of New Code Case "Mitigation of PWSCC and CISCC in ASME Code Section III Components by the Advanced Surface Stress Improvement Technology (일차수응력부식균열(PWSCC) 및 염화이온부식균열(CISCC) 저감용 표면개질기술 적용을 위한 코드케이스 개발)

  • Cho, Sungwoo;Pyun, Youngsik;Mohr, Nick;Tatman, Jon;Broussard, John;Collin, Jean;Yi, Wongeun;Oh, Eunjong;Jang, Donghyun;Koo, Gyeong Hoi;Hwang, Seong Sik;Choi, Sun Woong;Hong, Hyun UK
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.15 no.1
    • /
    • pp.28-32
    • /
    • 2019
  • In nuclear power plant operation and spent fuel canisters, it is necessary to provide a sound technical basis for the safety and security of long-term operation and storage respectively. Recently, the peening technology is being discussed and the technology will be adopted to ASME Section III, Division 1, Subsection NX (2019 Edition). The peening is prohibited in current edition, but it will be approved in 2019 Edition and adopted. However, Surface stress improvement techniques such as the peening is used to mitigate SCC susceptible in operating nuclear plants. Although the peening will be approved to ASME CODE, there are no performance criteria listed in the 2019 edition. The Korean International Working Group (KIWG) formed a new Task Group named "Advanced Surface Stress Improved Technology". The task group will develop a CODE CASE to address PWSCC(Primary Water Stress Corrosion Cracking) and CISCC(Chloride Induced Stress Corrosion Cracking) for new ASME Section III components. TG-ASSIT was started to make peening performance criteria for ASME Section III (new fabrication) applications. The objective of TG-ASSIT is to gain consensus among the relevant Code groups that requirements/mitigation have been met.

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.

A Comparative Analysis of the Germany and Korea's Bilateral Cooperation Strategy to Secure Overseas Clean Hydrogen: Focusing on the Geopolitical Perspective (독일과 한국의 해외 청정수소 확보를 위한 양자협력 전략 비교 분석: 지정학적 관점을 중심으로)

  • JUN, EUNJIN;WOO, AMI;PARK, MIRA;JUNG, HYOUNDUK;SHIN, HYUN WOO
    • Journal of Hydrogen and New Energy
    • /
    • v.33 no.5
    • /
    • pp.470-498
    • /
    • 2022
  • Recently, the world has been considering hydrogen energy as the primary energy transition means to achieve carbon neutrality by 2050. In order to achieve the goal of reducing greenhouse gas emissions, Korea is also promoting a clean hydrogen economy. However, it is necessary to introduce various clean hydrogen from overseas so that the projected demand can not meet the domestically produced. For this study, we conducted the policy comparison approach between countries other than the generally considered technical and economic approaches. The finding proposes the direction of bilateral cooperation for a strategy of securing overseas clean hydrogen from a geopolitical perspective. Germany was a target country for the policy comparison since it has a high proportion of manufacturing, like Korea, and is taking the lead in the renewable-based energy transition policy. According to the survey and analysis of the policy establishment status and new projects of the two countries, Germany is promoting bilateral international cooperation in the hydrogen area with about 33 countries based on 7 types of activities. In comparison, Korea is involved in bilateral cooperation with about 12 countries on relatively few activities. Among the types of bilateral cooperation, R&D cooperation with advanced countries for hydrogen technology was a common activity type. Germany preemptively promotes cooperation for demonstration and commercialization, considering geopolitical means and strengthening manpower training and assistance on policy and regulation to preoccupy the market for the future. Therefore, it is necessary to consider establishing a network of an entire life cycle of supply and demand network that links the future market with securing clean hydrogen considering the geopolitical distribution. To this end, Korea also needs to expand bilateral cooperation countries by activity type, and it seems necessary to seek various geopolitical-based bilateral cooperation and support measures for developing countries to diversify the supply sources of hydrogen.

Analysis of Success Factors for Technology Commercialization of Venture Companies in the 4th Industry : Focusing on smart farm companies (4차 산업 벤처기업의 기술사업화 성공 요인 분석 : 스마트팜 기업 중심으로)

  • Kim, Dae Yu;Bae, Jang Won
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.317-323
    • /
    • 2022
  • The purpose of this study was to analyze how innovative facility investment and innovative research manpower capabilities of venture companies related to the 4th industrial smart farm affect the technological performance of patents and design registrations, and the financial performance of sales and operating profit. As a research method, a total of 47 venture companies were selected as a sample and regression analysis was performed. Research Results This study analyzes the technological commercialization factors of venture companies related to the 4th industrial smart farm and proposes to expand the budget for R&D government tasks for financial and technological success. In the future research direction, I believe that more discussion is needed on the contribution of companies to quantitative and qualitative growth.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Designing a Longitudinal Database for Cohort Construction in Medical Education (의학교육의 코호트 구축을 위한 종단 데이터베이스 설계방안 연구)

  • Hanna Jung;Hae Won Kim;I Re Lee;Shinki An
    • Korean Medical Education Review
    • /
    • v.25 no.2
    • /
    • pp.84-101
    • /
    • 2023
  • Longitudinal data can provide important evidence with the potential to stimulate innovation and affect policies in medical education and can serve as a driving force for further developments in medical education through evidence-based decisions. Tracking and observing cohorts of students and graduates using longitudinal data can be a way to link the past, present, and future of medical education. This study reviewed practical methods and technical, administrative, and ethical considerations for the establishment and operation of a longitudinal database and presented examples of longitudinal databases. Cohort study design methods and previous examples of research using longitudinal databases to explore major topics in medical education were also reviewed. The implications of this study are as follows: (1) a systematic design process is required to establish longitudinal data, and each university should engage in ongoing deliberation about this issue; (2) efforts are needed to alleviate "survey fatigue" among respondents and reduce the administrative burden of those conducting data collection and analysis; (3) it is necessary to regularly review issues of personal information protection, data security, and ethics regarding the survey respondents; and (4) a system should be established that integrates and manages a longitudinal database of medical education at the national level. The hope is that establishing longitudinal data and cohorts at individual medical schools will not be a temporary phenomenon, but rather that they will be well utilized at the national level to innovate and implement ongoing changes in medical education.

A study on improvement of policy of artificial intelligence for national defense considering the US third offset strategy (미국의 제3차 상쇄전략을 고려한 국방 인공지능 정책 발전방안)

  • Se Hoon Lee;Seunghoon Lee
    • Industry Promotion Research
    • /
    • v.8 no.1
    • /
    • pp.35-45
    • /
    • 2023
  • This paper addressed the analysis of the trend and direction of the US defense strategy based on their third offset strategy and presented the practical policy implication of ensuring the security of South Korea appropriately in the future national defense environment. The countermeasures for the development ability of advanced weapon systems and secure core technologies for Korea were presented in consideration of the US third offset strategy for the future national defense environment. First, to carry out the innovation of national defense in Korea based on artificial intelligence(AI), the long-term basis strategy for the operation of the unmanned robot and autonomous weapon system should be suggested. Second, the platform for AI has to be developed to obtain the development of algorithms and computing abilities for securing the collection/storage/management of national defense data. Lastly, advanced components and core technologies are identified, which the Korean government can join to develop with the US on a basis of the Korea-US alliance, and the technical cooperation with the US should be stronger.

Directions for Policy to the Fourth Industrial Revolution based on Hyper-Connected Society and Smart Technology (초연결사회와 스마트기술에 따른 4차산업혁명의 정책방향)

  • Eun-Yeol Oh;Jun-Ok Shin
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.45-54
    • /
    • 2023
  • This study aims to examine trends so far and proactively seek future policy directions because the degree of implementation of hyper-connected society and smart technology at home and abroad cannot be overlooked at present in Korea. The method of the study focused on differentiating it from this study through literature research and comparison of major previous studies. As a result of the study, data security and maintenance, enhanced privacy of users and users, and related policy directions for entering a super-aged society were identified in the era of the 4th industrial revolution in Korea according to hyper-connected society and smart technology. Research limitations were difficulties in obtaining data and technical limitations in statistical quantification through trend analysis, although research analysis should be approached through quantitative and quantitative methods. It needs to be supplemented in future studies.

Consumer Acceptance Intention on Block Chain Consensus Mechanismbased Payment System (블록체인 기반 결제시스템에 대한 관광 소비자 수용의도)

  • Jae-Hyun Kwak
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.27-47
    • /
    • 2019
  • The purpose of this study is to propose a conceptual model for the tourism application of the block chain consensus construct and to test the intention of technology acceptance of potential consumers. First, we have tried to investigate the security, reliability, functionality was derived. Secondary, structural validation of the proposed model confirmed the factors influencing the acceptance of block chain technology in terms of consumers. Based on this, we apply the Unified Theory of Acceptance and Use of Technology to evaluate. Individual innovation and block-chain technology have a strong causal relationship with the proposed block chain acceptance intentions based on the Hybrid Block Chain Consensus system, which shows strong innovation and strong cognitive status. In addition, the factors directly affecting the acceptance of block-chain are the benefits expected from the block chain, the technical infrastructure required to use the service, the perceived benefits available. The influence of the surrounding environment on the adoption of technology and ease of use on new technology did not affect the acceptance intention significantly.