• Title/Summary/Keyword: Threat Factor

Search Result 181, Processing Time 0.021 seconds

Use of americium as a burnable absorber for VVER-1200 reactor

  • Shelley, Afroza;Ovi, Mahmud Hasan
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2454-2463
    • /
    • 2021
  • The objective of this research is to the use of americium (AmO2) as a burnable absorber effectively instead of conventional gadolinium (Gd2O3) for VVER-1200 reactor by analyzing its impacts on reactivity, power peaking factor (PPF), safety factor, and quality of the spent fuel. The assembly is burned to 60 GWd/t by using SRAC-2006 code and JENDL-4.0 data library for finding the optimum amount and effective way of using AmO2 as a burnable absorber. From these studies, it is found that AmO2 can decrease the excess reactivity like Gd2O3 without changing the criticality life span and enrichment of 235U. A homogeneous mixture of the 0.20% AmO2+ 4.95% enriched UO2 fuel rod (model MF-4) decreases the PPF than the reference assembly. The use of AmO2+UO2 in the integral burnable absorber (IBA) rod or the outer layer could also decrease the PPF up to 10 GWd/t but increases rapidly after 30 GWd/t, which could be a safety threat. The fuel temperature coefficient and void coefficient of the model MF-4 are the same as the reference assembly. In addition, 22% of initially loaded Am are burning effectively and contributing to the power production.

A Study on the Development of Analysis Model for Maritime Security Management (해상보안관리 분석모델 개발에 관한 연구)

  • Jeong, Woo-Lee
    • Journal of Navigation and Port Research
    • /
    • v.36 no.1
    • /
    • pp.9-14
    • /
    • 2012
  • Maritime security incidents by pirates and by terrorists increase, but maritime incidents investigation models are limited to figure out the maritime security incidents. This paper provides the analysis model for maritime security incidents. To develop this analysis model, this categorizes five threat factors, the ship, the cargo type, port system, human factor, information flow system, makes the risk assessment matrix to quantify the risk related to threat factors and classifies four priority categories of risk assessment matrix. Also, this model makes from the frameworks which include a variety of security initiatives implementing in stakeholder levels like international organizations, individual governments, shipping companies, and the ship. Therefore, this paper develops the Analysis for Maritime Security Management model based on various security initiatives responding to the stakeholder levels of maritime security management and top-bottom/bottom-up decision trees, and shows the validity through verifying the real maritime security incident of M/V Petro Ranger.

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.

A study on detection methodology of threat on cars from the viewpoint of IoT (IoT 관점에서의 차량 위협 탐지 방안)

  • Kwak, Byung Il;Han, Mi Ran;Kang, Ah Reum;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.411-421
    • /
    • 2015
  • These days, a conversion of the fast-advancing ICT (Information and Communications Technologies) and the IoT (Internet of Things) has been in progress. However, these conversion Technology could lead to many of the security threat existing in the ICT environment. The security threats of car in the IoT environment could cause the property damage and casualty. There are the inadequate preparations for the car security and the difficulty of detection for the security threats by itself. In this paper, we proposed the decision-making framework for the anomaly detection and found out what are the threats of car in the IoT environment. The discrimination of the factor, path and type of threats from the attack against the car should take priority over the self-inspection and the swift handling of the attack on control system.

A Study on Hometown Terrorism Possibility and Measures in Multiculturalism (다문화주의에 따른 자생테러리즘의 가능성과 대책에 관한 연구)

  • Kim, Soon-Seok
    • Korean Security Journal
    • /
    • no.23
    • /
    • pp.1-19
    • /
    • 2010
  • As the world becomes more global, entry simplification measure increases many foreigners' entry and international marriage around the low income countries of southeast Asia. Those are adding multicultural phenomena to Korean society, which has a bad influence on public order environment and leads to side effect in society. Since the 9/11 terror attacks, a sudden increase in the threat of terror has been worldwide. Besides, the threat tends toward New Terrorism and contributes to factor to social malaise in Korea. Therefore, this study examines all the possibilities of hometown terrorism by multiculturalism and suggests measures for it. To achieve this, it is required to lead the people's understanding and national participation for multiculturalism. The mature civic awareness should be given priority over any others, which means the understanding and consideration of various countries' cultures and traditions. It is also necessary to inspect the dangers of hometown terrorism. Furthermore, there should be an urgent need for an institutional device to prevent and suppress terror through a close examination of countermeasures system of terror.

  • PDF

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers (개인정보보호 활동 결정요인 연구: 개인정보처리자를 중심으로)

  • Jang, Chul-Ho;Cha, Yun-Ho
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.64-76
    • /
    • 2021
  • The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.

An APT Attack Scoring Method Using MITRE ATT&CK (MITRE ATT&CK을 이용한 APT 공격 스코어링 방법 연구)

  • Cho, Sungyoung;Park, Yongwoo;Lee, Kunho;Choi, Changhee;Shin, Chanho;Lee, Kyeongsik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.673-689
    • /
    • 2022
  • We propose an APT attack scoring method as a part of the process for detecting and responding to APT attacks. First, unlike previous work that considered inconsistent and subjective factors determined by cyber security experts in the process of scoring cyber attacks, we identify quantifiable factors from components of MITRE ATT&CK techniques and propose a method of quantifying each identified factor. Then, we propose a method of calculating the score of the unit attack technique from the quantified factors, and the score of the entire APT attack composed of one or more multiple attack techniques. We present the possibility of quantification to determine the threat level and urgency of cyber attacks by applying the proposed scoring method to the APT attack reports, which contains the hundreds of APT attack cases occurred worldwide. Using our work, it will be possible to determine whether actual cyber attacks have occurred in the process of detecting APT attacks, and respond to more urgent and important cyber attacks by estimating the priority of APT attacks.

Comparison and Analysis of Action Plans of GIAHS in the Four Countries of Orchards for GIAHS Listing and Conservation of Dokmoe Persimmon System (독뫼 감 농업의 GIAHS 등재 및 보전을 위한 4개국 과수 지역 GIAHS의 동적 계획 비교 및 분석)

  • Ahn, Seong Gyu;Jeon, Yushin;Kim, Young Jin;Seo, Hae Young;Kim, Jong Haeg;Lee, Wan-Seok
    • Journal of Korean Society of Rural Planning
    • /
    • v.30 no.2
    • /
    • pp.35-50
    • /
    • 2024
  • Dokmoe persimmon system in Changwon, designated as a Korea National Important Agricultural Heritage System is a unique agricultural heritage system, is a farming system carried out in the sloping semi-mountainous terrain of the low hills downstream of the Nagdong River. In this study, we analyzed the proposal submitted for registration by the orchard region GIAHS and analyzed the regional characteristics, agricultural characteristics, and threats to heritage conservation of Dokmoe persimmon system. Dokmoe persimmon system is located in a large city, so the threat of development was analyzed as a threat factor differentiated from other regions, and the development of the processing industry was analyzed as a common initiative for GIAHS in the orchard area. Based on this, we established a action plan for heritage conservation. The action plan consists of 4 main criteria, 6 plans, and 14 initiatives. Research on Dokmoe persimmon farming is now at the starting point, and this study will be able to contribute to registration of Dokmo persimmon system in GIAHS.

Prediction of Agricultural Wind and Gust Using Local Ensemble Prediction System (국지앙상블시스템을 활용한 농경지 바람 및 강풍 예측)

  • Jung Hyuk Kang;Geon-Hu Kim;Kyu Rang Kim
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.26 no.2
    • /
    • pp.115-125
    • /
    • 2024
  • Wind is a meteorological factor that has a significant impact on agriculture. Gust cause damage such as fruit drop and damage to facilities. In this study, low-altitude wind speed prediction was performed by applying physical models to Local Ensemble Prediction System (LENS). Logarithmic Law (LOG) and Power Law (POW) were used as the physical models, and Korea Ministry of Environment indicators and Moderate Resolution Imaging Spectroradiometer (MODIS) data were applied as indicator variables. We collected and verified wind and gust data at 3m altitude in 2022 operated by the Rural Development Administration, and presented the results in scatter plot, correlation coefficient, Root Mean Square Error (RMSE), Normalized Root Mean Square Error (NRMSE), and Threat Score (TS). The LOG-applied model showed better results in wind speed, and the POW-applied model showed better results in gust.