• Title/Summary/Keyword: Usage scenarios

Search Result 127, Processing Time 0.031 seconds

Study on the Well Scenario of the LILW Disposal Facility in Korea (중·저준위 방사성폐기물 처분시설의 우물 이용 시나리오를 적용한 안전평가 연구에 대한 고찰)

  • Jeong, Mi-Seon;Cheong, Jae-Yeol;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.1
    • /
    • pp.63-72
    • /
    • 2015
  • The low and intermediate-level radioactive waste generated in Korea is disposed of at Wolsong Disposal Facility. For the safety of a disposal facility, it must be assessed by considering some abnormal scenarios including human intrusion as well as those by natural phenomena. The human intrusion scenario is a scenario that an incognizant man of the disposal facility will be occurred by the drilling. In this paper, the well usage scenario was classified into the human intrusion event as the probability of the well drilling is very low during the man's lifecycle and then was assessed by using conservative assumptions. This scenario was assessed using the dilution factor of contaminants released from a disposal facility and then it was introduced the applied methodology in this study. The assessed scenario using this methodology is satisfied the regulatory limits.

A Study on The Instant Messaging Security Policy in The Organizations (조직 내부에서의 인스턴트 메시징 보안 정책에 대한 연구)

  • Sattarova, Feruza;Kim, Seok-Soo;Choi, Min-Kyu;Cho, Eun-Suk;Kim, Tai-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.280-286
    • /
    • 2009
  • A policy of instant messaging usage is offered in this article. First, a brief introduction of instant messaging system structure is described. The main threats and vulnerabilities of Instant messenger (IM) are described in the second part of the paper. Instant messaging applications offer so many advantages in so many different fields that they're fast becoming the preferred communication tool for a number of different professional scenarios. When properly implemented, instant messaging can be a true asset to the business by making communications easier throughout the organization. If instant messaging is carelessly implemented, though, it can cause problems with privacy and may expose the organization to various forms of malware. The solution offered in this paper is one of the effective ways against threats of IM. However, the system cannot be secured entirely. All we can do is reducing the risks.

  • PDF

Intention-awareness Communication System for Future Mobile Terminal with Flexible Shape Change (가변 형태의 미래형 단말기를 위한 의도인식 통신시스템)

  • Cho, Myeon-Gyun;Yoon, Dal-Hwan;Choi, Hyo-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2720-2728
    • /
    • 2012
  • Recently flexible mobile terminals which can freely change the shape of their device are coming out with the development of the flexible display, high capacity memory and system integration technology. The display and the antenna configuration of the future terminals will be altered according to the QoS (quality of service) and the communication environment of users. In particular, we present the new emergence of a multimedia language for human and system to communicate over subjective concepts, intention of users. The intension of users is expressed by changing the shape of their mobile terminal. In addition, antenna configuration is also related to shape of terminal and QoS of users. Therefore, we set up a specific usage scenarios for future mobile terminals and propose an adaptive MIMO (multiple-input multiple-output) schemes that can maximize channel capacity and fit to QoS of users simultaneously.

R-URC: Smartphone based RF4CE Universal Remote Control Framework (스마트폰 기반 RF4CE URC 프레임워크의 설계 및 구현)

  • Koo, Bon-Hyun;Ahn, Tae-Won;Park, Yong-Suk;Shon, Tae-Shik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.2
    • /
    • pp.48-53
    • /
    • 2010
  • RC(Remote Control) is a technology that can efficiently control and transfer a variety of user commands to CEs. However, the existing RCs have been required various additional features such as communication between CEs, extension of communication range, low power-consumption and bi-directional communication according to the advent of new types of CE devices and its enhanced performance. Even though RC controller has many customers' requests, it is not a simple solution because most legacies work on IR-based RC. In this paper, we propose RF4CE-based Universal Remote Control Framework using Smartphone in order to solve the many constraints of IR legacies. The proposed R-URC system is designed by RF4CE platform which is a kind of de-facto standard for CE remote control communication. From the verification scenarios using various CEs and smart phone, we can see that the proposed R-URC shows the good practical usage in terms of contents sharing and smart CE control.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

Intrusion-Tolerant Jini Service Architecture for Enhancing Survivability of Ubiquitous Services (유비쿼터스 서비스 생존성 제고를 위한 침입감내 Jini 서비스 구조)

  • Kim, Sung-Ki;Park, Kyung-No;Min, Byoung-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.4
    • /
    • pp.41-52
    • /
    • 2008
  • Ubiquitous service environment is poor in reliability of connection and has a high probability that the intrusion and the system failure may occur. Therefore, in the environment, the capability of a system to collectively accomplish its mission in spite of active intrusions and various failure scenarios, that is, the survivability of services are needed. In this paper, we analyze the Jgroup/ARM framework that was developed in order to help the development of fault- tolerant Jini services. More importantly, we propose an intrusion-tolerant Jini service architecture to satisfy the security availability and quality of services on the basis of the analysis. The proposed architecture is able to protect a Jini system not only from faults such as network partitioning or server crash, but also from attacks exploiting flaws. It is designed to provides performance enough to show a low response latency so as to support seamless service usage. Through the experiment on a test-bed, we have confirmed that the architecture is able to provide high security and availability at the level that degraded services quality is ignorable.

Estimating Exploitable Groundwater Amount in Musimcheon Watershed by Using an Integrated Surface Water-Groundwater Model (지표수지하수 통합모형을 이용한 무심천 유역의 지하수 개발가능량 산정)

  • Chung, Il-Moon;Lee, Jeong-Woo;Kim, Nam-Won
    • Economic and Environmental Geology
    • /
    • v.44 no.5
    • /
    • pp.433-442
    • /
    • 2011
  • In Korea, groundwater management has been conducted based on the estimation of annual average of groundwater recharge. Since groundwater recharge and surface water-groundwater interactions show spatiotemporal variation, continuous monitoring and dynamic analysis must be carried out to evaluate the sustainability of groundwater resources. In this study, SWAT-MODFLOW, an integrated surface water-groundwater model was used to analyze surface-groundwater interactions for various groundwater pumping scenarios in Musimcheon watershed. When current usage is applied, the baseflow reduction is about 16%, and annual averaged storage reduction is about 27 mm for whole watershed. As a holistic approach to groundwater sustainability considers the hydrological, ecological, socioeconomic, technological aspects of groundwater utilization, the exploitable groundwater should be determined by physical analysis as well as social compromise in a community.

A System Dynamics Model to Analyze the Effects of Investments for Improvement of Environmental Conditions in Nak-Dong River Basin (낙동강 유역 환경개선 투자 효과 분석을 위한 시스템다이내믹스 모델)

  • Park, Suwan;Kim, Kimin
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.30 no.5
    • /
    • pp.561-569
    • /
    • 2016
  • In this paper a concept of the paradigm shift in the operations of Water and Wastewater systems regarding the production and usage of water was introduced. Based on this concept the interrelationships between the water quality in the upper basin of NakDong River relative to Busan and the degree of satisfaction of the customers on the water supply service in Busan were modeled using the System Dynamics modeling methodology. SamRangJin basin area was determined as the upper basin of Busan after analyzing the relationships between the water quality of MoolGeum water intake point and water quality data of various mid- and upper water intake points along NakDong River. The amount of contaminants generated in SamRangJin basin was modeled using the Gross Regional Domestic Product in the area and the treated amount was calculated using the efficiency of wastewater treatment and the degree of improvement of environmental condition per investment. The water quality at MoolGeum water intake point was modeled to take the effects of the remaining amount of contaminants after treatment and the non-point source contaminants in SamRangJin basin. Using the developed System Dynamics model the effects of the investment for the improvement of environmental condition in SamRangJin basin were compared to the case of alternate water source development for Busan in terms of the degree of satisfaction of the customers on the water supply service in Busan.

Mobile Ad Hoc Routing Protocol Supporting Unidirectional Links (단방향 링크를 지원하는 이동 Ad Hoc 라우팅 프로토콜)

  • Lee, Kwang-Bae;Kim, Hyun-Ug;Jung, Kun-Won
    • Journal of IKEEE
    • /
    • v.5 no.1 s.8
    • /
    • pp.59-66
    • /
    • 2001
  • In this paper, we propose a dynamic source routing protocol supporting asymmetric paths for mobile Ad Hoc networks that contain unidirectional links. At present, the existing dynamic source routing protocol supports only symmetric paths that consist of bidirectional links for routing. However, in fact, there can exist unidirectional links due to asymmetric property of mobile terminals or current wireless environment. Thus, we implement a mobile Ad Hoc routing protocol supporting unidirectional links, which is fit for more general wireless environment. Especially, the proposed protocol uses an improved multipath maintenance method in order to perform rapid route reconfiguration when route error due to mobility is detected. For performance evaluation, we consider the following factors: average route discovery time and average data reception rate. In order to obtain the factors of the performance evaluation, we did simulation for 900 seconds in the step of 100 seconds with the following scenarios: usage of route cache in intermediate nodes on route path, and different mobility/connection patterns.

  • PDF

A Study on Scenario-Centered Design Process for Multimedia Contents Planning & Design - through a Case Study of Contents design of Internet Shopping Mall "Shop 'n' Chat" (멀티미디어 컨텐츠 디자인 프로세스에서의 시나리오 활용에 관한 연구 - 인터넷 쇼핑몰 “Shop 'n' Chat“의 컨텐츠 디자인 사례연구를 중심으로)

  • 김현정
    • Archives of design research
    • /
    • v.15 no.3
    • /
    • pp.137-148
    • /
    • 2002
  • As human-centered design has become new paradigm in the field of design, it is also needed to apply scenario-centered design methodology in planning and design new multi-media contents. In this paper, scenario-centered design process for multimedia contnets planning & design was identified through a case study of contents design of internet shopping mall "Shop 'n' Chat". The study was preceded with three kinds of scenarios during design process, which are present situation scenario to find needed contents, behavior prototype scenario to make contents concrete, and future usage scenario to design visual interface. These three stages of scenario are exampled by of finally shopping scenario between 20's girls, internet shopping scenario with using messenger, and finally navigation/interaction scenario in future internet shopping mall.

  • PDF