• Title/Summary/Keyword: Threat Event

Search Result 81, Processing Time 0.025 seconds

Managing the Back-end of the Nuclear Fuel Cycle: Lessons for New and Emerging Nuclear Power Users From the United States, South Korea and Taiwan

  • Newman, Andrew
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.19 no.4
    • /
    • pp.435-446
    • /
    • 2021
  • This article examines the consequences of a significant spent fuel management decision or event in the United States, South Korea and Taiwan. For the United States, it is the financial impact of the Department of Energy's inability to take possession of spent fuel from commercial nuclear power companies beginning in 1998 as directed by Congress. For South Korea, it is the potential financial and socioeconomic impact of the successful construction, licensing and operation of a low and intermediate level waste disposal facility on the siting of a spent fuel/high level waste repository. For Taiwan, it is the operational impact of the Kuosheng 1 reactor running out of space in its spent fuel pool. From these, it draws six broad lessons other countries new to, or preparing for, nuclear energy production might take from these experiences. These include conservative planning, treating the back-end of the fuel cycle holistically and building trust through a step-by-step approach to waste disposal.

Re-examining on Ascending the Throne of King Thibaw and Its Effects

  • Kyi, Aye Mon
    • SUVANNABHUMI
    • /
    • v.5 no.2
    • /
    • pp.1-28
    • /
    • 2013
  • This paper is attempted to clarify the controversial event King Thibaw ascending the throne. Moreover it was presented with the purpose of how important "Trust Building" is in politic. After ascending the throne, King Thibaw faced external threat as well as internal weakness. The Hluttaw ministers and counselors did not support effectively and King Thibaw lost trust his ministers and counselors. Therefore mass killing of royal prince took place after the ascending the throne and it made discredit to King Thibaw. Senior minister like Kinwun Mingyi and Hsinphyumashin secretly contact with Prince Nyaung Yan whom was staying under the protection of British. On the other hand Prince Myingun took refuge under protection of the French and was trying to seize the power with the supporters from lower Myanmar as well as taking the financial help from Hsinphyu Mashin. They were external strength for the British and French. In this way King Thibaw's administration became deteriorated and finally the British anxious about Franco-Myanmar treaty so they exaggerated the Bombay-Burma Teak company's problem. In this way King Thibaw was taken away by the British due to the internal weakness and external strength.

  • PDF

The Impact of Data Assimilation on WRF Simulation using Surface Data and Radar Data: Case Study (지상관측자료와 레이더 자료를 이용한 자료동화가 수치모의에 미치는 영향: 사례 연구)

  • Choi, Won;Lee, Jae Gyoo;Kim, Yu-Jin
    • Atmosphere
    • /
    • v.23 no.2
    • /
    • pp.143-160
    • /
    • 2013
  • The effect of 3DVAR (Three Dimension Variational data Assimilation) was examined by comparing observation and the simulations of CNTL (to which data assimilation was not applied) and ALL (to which data assimilation was applied using ground observation data and radar data) for the case of a heavy snowfall event (case A) of 11-12 February 2011 in the Yeongdong region. In case A, heavy snow intensively came in the Yeongdong coastal region rather than Daegwallyeong, in particular, around the Gangneung and Donghae regions with total precipitation in Bukgangneung at approximately 91 mm according to the AWS observation. It can be seen that compared to CNTL, ALL simulated larger precipitation along the Yeongdong coastline extending from Sokcho to Donghae while simulating smaller precipitation for inland areas including Daegwallyeong. On comparison of the total accumulated precipitations from simulations of CNTL and ALL, and the observed total accumulated precipitation, the positive effect of the assimilation of ground observation data and radar data could be identified in Bukgangneung and Donghae, on the other hand, the negative effect of the assimilation could be identified in the Daegwallyeong and Sokcho regions. In order to examine the average accuracy of precipitation prediction by CNTL and ALL for the entire Gangwon region including the major points mentioned earlier, the three hour accumulated precipitation from simulations of CNTL and ALL were divided into 5, 10, 15, 20, 25 and 30 mm/3hr and threat Scores were calculated by forecasting time. ALL showed relatively higher TSs than CNTL for all threshold values although there were some differences. That is, when considered generally based on the Gangwon region, the accuracy of precipitation prediction from ALL was improved somewhat compared to that from CNTL.

A Study on the Preparation of National Cyber Warfare (국가 사이버전 대비방안 연구)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.141-151
    • /
    • 2006
  • The destructive power of cyber threat arrived to until the phase which it threatens to direct and seriously in national security undergoes an important national institutuin hacking event of 2004 and Internet paralysis accidents of 2003. 1. 25. So Cyber terror and Cyber warfare is not the hypothetical enemy situation. It is more actual security situation and identify as magnification of warfare concept of incapacitation national important ability include military command system of the adversary, communication, energy, finance and transportation system. consequently, with the progress of cyber threat, it is necessary that looking at a number of general plan to make up for the weak points in cyber warfare operation system. Thus, the focus of this study is to examine new ways of developing a comprehensive cyber security management system.

  • PDF

Study on threat analysis about national important facility and control process (국가중요시설에 대한 위협분석과 처리절차에 관한 연구 - 인천국제공항을 중심으로 -)

  • Hwang, Ho-Won;Lee, Ki-Hun
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.31-40
    • /
    • 2009
  • South Korea opened Incheon international airport(IIA) in march 29, 2001, with high expectations of becoming the distribution hub of Northeast Asia and aiming at a world best air hub. IIA compares quite well with any other leading airports in the world in it's facilities for the movement of people and vehicles. However, with the sequence of events following the September, 2001. terrorist attack and the war in Iraq, South Korea, an ally of the US, cannot be considered a safe haven from terrorism. At a point in time when national security is given utmost importance, it is necessary to reevaluate the security of airports, because international terrorism can only occur via air and seaports. Nowadays all the countries of the world have entered into competition for their national interests and innovation of their images. with the increasing role of international airports also comes an increased likelihood as a terrorist target, because it can affect so many people and countries. From the condition of current international terrorism, we can realize that our IIA is not completely safe from a terrorist attack. The major part of counterterrorism is event control process. It's very important for quickly saves an accident and rescues a life of person, In addition for the normalization which the airport operation is prompt. In conclusion, we should secure the legal responsibility and establish and establish a system under which we can work actively in order to implement counter terror activities from being taken an airport.

  • PDF

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

Static Filtering Probability Control Method Based on Reliability of Cluster in Sensor Networks (센서 네트워크에서 클러스터 신뢰도 기반 정적 여과 확률 조절 기법)

  • Hur, Suh-Mahn;Seo, Hee-Suk;Lee, Dong-Young;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.161-171
    • /
    • 2010
  • Sensor Networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Ye et al. proposed the Statistical En-route Filtering scheme to overcome this threat. In statistical en-route filtering scheme, all the intermediate nodes perform verification as event reports created by center of stimulus node are forwarded to the base station. This paper applies a probabilistic verification method to the Static Statistical En-route Filtering for energy efficiency. It is expected that the farther from the base station an event source is, the higher energy efficiency is achieved.

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

Reflecting on the History and Future of Republic of Korea Navy (대한민국 해군창설 : 회고와 당부)

  • Hahm, Myung-Soo
    • Strategy21
    • /
    • s.37
    • /
    • pp.5-31
    • /
    • 2015
  • The Republic of Korean Navy (ROKN) started from scratch. However, ROKN demonstrated its Blue Navy capabilities successfully to the entire world by conducting "Operation Early Dawn" at the Aden Bay, Yemen in Jan 2011. On the event of the 70th anniversary of the ROKN, I would like to retrospect past gleaning from voyages and challenges we had in the past. At the very inception of the ROKN, Korean government as well as senior military leaders recognized that it had no time to spare to clean up military those were insinuated deeply by communist agents. It was the top priority of the government. The Mongumpo Operation which was not well known, conducted by ROKN was one of the clean-up drive. The Korean War sometimes called as "a fire from land put-off at the sea". The world famous "Incheon Landing" which reversed war situation from the Nakdong Perimeter also done by Sea Power. ROKN conducted various maritime operations including not only Incheon Landing, but amphibious operation at Hungnam, mine sweeping, sea convoy, Wonsan Withdrawal. On the same day of the Korean War started, 25th June 1950, unless the victory of the ROKNS Baekdusan (PC 701) at the Korean Strait, the waning lamp light of Korea could not be rekindled by the participation of the U.N. The ROKN rescued the 17th regiment of Korean Army from the isolation at the Ongjin Peninsular and transported gold and silver bars stored at the Bank of Korea to the Navy supply deposit in Jinhae safely. ROKN special intelligence unit conducted critical HUMINT which led Incheon Landing success. One of important mission ROKN conducted successfully was not only transporting war fighting materials but also U.S. provided grains to starving Koreans. ROKN participated Vietnam campaign from 1960s and conducted numerous maritime transportation operations supplying materials to Vietnam military forces along the long coastal lines. Experienced Naval Officers and enlisted men who discharged and acquired as merchant marine certificate supported most of the U.S. sea lift operations throughout the Vietnam campaign. ROK-US Combined Forces which had been honed and improved its war fighting capabilities through the Korean War and out of Vietnam jungle playing key deterrent against threat from north Korea. However, those threat level will be completely different when north Korea finish its nuclear weapon ambition. In order to stand firm against north Korean nuclear threat, I would like to expect strong political leadership supporting nuclear submarine for ROKN.

Estimating the Area of Damage Caused by Gas Pipeline Leakage in Subway Construction Zones (지하철역 공사지역 도시가스 배관 누출로 인한 피해면적 산정)

  • Yang, Yong-Ho;Lee, Jae-Wook;Kong, Ha-Sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.419-427
    • /
    • 2024
  • This study assessed the potential impact of gas leakage resulting from accidental damage to buried urban gas pipelines during perforating operation near subway construction sites. The risk of explosions due to ignition sources such as static electricity, arising from gas infiltrating the subway construction site through storm sewers and sewage pipes, was evaluated using the ALOHA program. The results of the threat zone calculation, which input various parameters of urban gas pipelines such as length, diameter, and pressure, indicated that the flammable area within the vapor cloud extended from 1.2 to 1.4 km (red zone), the blast area ranged from 0.8 to 1.0 km (yellow zone), and the jet fire extended from 45 to 61 m (red zone). This study demonstrates that within the flammable area of the vapor cloud, a specific combination of concentration and conditions can increase flammability. The blast area may experience explosions with a pressure of 1.0 psi, sufficient to break glass windows. In the event of a jet fire, high temperatures and intense radiant heat exposure lead to rapid fire propagation in densely populated areas, posing a high risk of casualties. The findings are presented in terms of the sphere of influence and threat zone ranges.