• Title/Summary/Keyword: falsification

Search Result 87, Processing Time 0.029 seconds

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Students' Responses on the Supporting or Conflicting Evidences on Thier Preconception (학생 선개념을 지지하는 증거와 반증하는 증거에 대한 학생의 반응)

  • Park, Jong-Won;Kim, Ik-Gyun;Lee, Moo;Kim, Myung-Whan
    • Journal of The Korean Association For Science Education
    • /
    • v.18 no.3
    • /
    • pp.283-296
    • /
    • 1998
  • This study was to identify middle school and college of education students' preconceptions about dielectric polarization and explore the students' reponses on the supporting or conflictual evidences on their preconceptions by letting them observe the demonstrations using electroscope, charged material, six conductor rods and six insulator rods. Letting students select the demonstrations to be observed by themselves, students' evidence selection types were classified as two : to select the evidences to testify their uncertain preconceptions, and to obtain the confirmation evidences about their preconceptions. And each evidence selection types, again, could be subclassified as three and two respectively. When students observed the conflictual observations, all accepted the observation itself. For supporting observational evidences, almost of all students showed the error of 'acceptance of antecedent' in the syllogism, that is, they did not required the succeeding supporting observations. Students' reponses on the conflictual observational evidences were classified as two: to reject the hard core of preconceptions, and to modify the students' auxiliary ideas related to the hard core with preserving the hard core. The first type reponses were, again, could be classified as three subtypes but, in all cases, students introduced new concept to explain the conflictual evidences. This responses indicated that Lakatosian rather than Popperian view is more acceptable to understand the students' reponses on the conflictual evidences. The second type reponses also were classified as three subtypes, and it was found that more middle school students than college education students were involved in this second type. That is, students who did not have perfect understanding of auxiliary ideas related with the hard core of preconceptions were more apt to change or modify theses auxiliary ideas rather than reject the hard core, this means that the quality of understanding of auxiliary ideas also take an important role in the change of hard core concept.

  • PDF

Evaluation of Effects on SWAT Simulated Hydrology and Sediment Behaviors of SWAT Watershed Delineation using SWAT ArcView GIS Extension Patch (SWAT ArcView GIS Extension Patch를 이용한 소유역 분할에 따른 수문 및 유사 거동에 미치는 영향 평가)

  • Heo, Sunggu;Kim, Namwon;Park, Younshik;Kim, Jonggun;Kim, Seong-joon;Ahn, Jaehun;Kim, Ki-sung;Lim, Kyoung Jae
    • Journal of Korean Society on Water Environment
    • /
    • v.24 no.2
    • /
    • pp.147-155
    • /
    • 2008
  • Because of increased nonpoint source runoff potential at highland agricultural fields of Kangwon province, effective agricultural management practices are required to reduce the inflow of sediment and other nonpoint source pollutants into the water bodies. The watershed-scale model, Soil and Water Assessment Tool (SWAT), model has been used worldwide for developing effective watershed management. However, the SWAT model simulated sediment values are significantly affected by the number of subwatershed delineated. This result indicates that the SWAT estimated watershed characteristics from the watershed delineation process affects the soil erosion and sediment behaviors. However, most SWAT users do not spend time and efforts to analyze variations in sediment estimation due to watershed delineation with various threshold value although topography falsification affecting soil erosion process can be caused with watershed delineation processes. The SWAT model estimates the field slope length of Hydrologic Response Unit (HRU) based on average slope of subwatershed within the watershed. Thus the SWAT ArcView GIS Patch, developed by using the regression relationship between average watershed slope and field slope length, was utilized in this study to compare the simulated sediment from various watershed delineation scenarios. Four watershed delineation scenarios were made with various threshold values (700 ha, 300 ha, 100 ha, and 75 ha) and the SWAT estimated flow and sediment values were compared with and without applying the SWAT ArcView GIS Patch. With the SWAT ArcView GIS Patch applied, the simulated flow values are almost same irrespective of the number of subwatershed delineated while the simulated flow values changes to some extent without the SWAT ArcView GIS Patch applied. However when the SWAT ArcView GIS Patch applied, the simulated sediment values vary 9.7% to 29.8% with four watershed delineation scenarios, while the simulated sediment values vary 0.5% to 126.6% without SWAT ArcView GIS applied. As shown, the SWAT estimated flow and sediment values are not affected by the number of watershed delineation significant compared with the estimated flow and sediment value without applying the SWAT ArcView GIS Patch.

The study of Defense Artificial Intelligence and Block-chain Convergence (국방분야 인공지능과 블록체인 융합방안 연구)

  • Kim, Seyong;Kwon, Hyukjin;Choi, Minwoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.81-90
    • /
    • 2020
  • The purpose of this study is to study how to apply block-chain technology to prevent data forgery and alteration in the defense sector of AI(Artificial intelligence). AI is a technology for predicting big data by clustering or classifying it by applying various machine learning methodologies, and military powers including the U.S. have reached the completion stage of technology. If data-based AI's data forgery and modulation occurs, the processing process of the data, even if it is perfect, could be the biggest enemy risk factor, and the falsification and modification of the data can be too easy in the form of hacking. Unexpected attacks could occur if data used by weaponized AI is hacked and manipulated by North Korea. Therefore, a technology that prevents data from being falsified and altered is essential for the use of AI. It is expected that data forgery prevention will solve the problem by applying block-chain, a technology that does not damage data, unless more than half of the connected computers agree, even if a single computer is hacked by a distributed storage of encrypted data as a function of seawater.

A Matter of Professionalism: Academic Misconduct of Veterinary Students (수의전문직업성 측면에서 본 수의과대학 학생의 학습윤리)

  • Chun, Myung-Sun;Ryu, Pan-Dong;Yoon, Junghee
    • Journal of Veterinary Clinics
    • /
    • v.32 no.2
    • /
    • pp.174-179
    • /
    • 2015
  • Academic integrity guarantees the professional integrity and validity of the education and qualifications offered by the veterinary schools. In this study, we analyzed the responses of 528 veterinary students of two veterinary schools in Seoul regarding their awareness about, knowledge of, and frequency of engaging in academic misconduct. A total of 88.4 percent of the participants agreed that cheating and plagiarism by undergraduates would influence their future academic misconduct. The most common form of academic misconduct was plagiarism (71.7% in the A school, 69.5% in the B school), with falsification (40.2% in the A school, 31.7% in the B school) also reported at a high rate. Students indicated the lack of a culture of academic integrity as the main reason for academic misconduct. According to the regression analysis students' awareness and knowledge of academic integrity and their perception of peers' academic misconduct predicted a significant amount of variance of the frequency of academic misconduct. The findings of this study support that academic integrity should be learned in a flexible format from an early stage of professional development in veterinary curriculum. In parallel with the efforts of faculty, a community approach may be likely to improve the academic environment in terms of integrity.

Development and Evaluation of SWAT Topographic Feature Extraction Error(STOPFEE) Fix Module from Low Resolution DEM (저해상도 DEM 사용으로 인한 SWAT 지형 인자 추출 오류 개선 모듈 개발 및 평가)

  • Kim, Jong-gun;Park, Youn-shik;Kim, Nam-won;Chung, Il-moon;Jang, Won-seok;Park, Jun-ho;Moon, Jong-pil;Lim, Kyoung Jae
    • Journal of Korean Society on Water Environment
    • /
    • v.24 no.4
    • /
    • pp.488-498
    • /
    • 2008
  • Soil and Water Assessment Tool (SWAT) model have been widely used in simulating hydrology and water quality analysis at watershed scale. The SWAT model extracts topographic feature using the Digital Elevation Model (DEM) for hydrology and pollutant generation and transportation within watershed. Use of various DEM cell size in the SWAT leads to different results in extracting topographic feature for each subwatershed. So, it is recommended that model users use very detailed spatial resolution DEM for accurate hydrology analysis and water quality simulation. However, use of high resolution DEM is sometimes difficult to obtain and not efficient because of computer processing capacity and model execution time. Thus, the SWAT Topographic Feature Extraction Error (STOPFEE) Fix module, which can extract topographic feature of high resolution DEM from low resolution and updates SWAT topographic feature automatically, was developed and evaluated in this study. The analysis of average slope vs. DEM cell size revealed that average slope of watershed increases with decrease in DEM cell size, finer resolution of DEM. This falsification of topographic feature with low resolution DEM affects soil erosion and sediment behaviors in the watershed. The annual average sediment for Soyanggang-dam watershed with DEM cell size of 20 m was compared with DEM cell size of 100 m. There was 83.8% difference in simulated sediment without STOPFEE module and 4.4% difference with STOPFEE module applied although the same model input data were used in SWAT run. For Imha-dam watershed, there was 43.4% differences without STOPFEE module and 0.3% difference with STOPFEE module. Thus, the STOPFEE topographic database for Soyanggang-dam watershed was applied for Chungju-dam watershed because its topographic features are similar to Soyanggang-dam watershed. Without the STOPFEE module, there was 98.7% difference in simulated sediment for Chungju-dam watershed for DEM cell size of both 20 m and 100 m. However there was 20.7% difference in simulated sediment with STOPFEE topographic database for Soyanggang-dam watershed. The application results of STOPFEE for three watersheds showed that the STOPFEE module developed in this study is an effective tool to extract topographic feature of high resolution DEM from low resolution DEM. With the STOPFEE module, low-capacity computer can be also used for accurate hydrology and sediment modeling for bigger size watershed with the SWAT. It is deemed that the STOPFEE module database needs to be extended for various watersheds in Korea for wide application and accurate SWAT runs with lower resolution DEM.

Construction of cooperative teaching system to support dynamics in gifted students' social studies learning (영재학생들의 사회과 학습의 역동성을 지원하는 협력교수 체제의 구안)

  • Park, Hae-Jin;Back, Sun-Hwa;Nam, Youl-Soo;Noh, Kyung-Hyun;Lee, Su-Seong
    • Journal of Gifted/Talented Education
    • /
    • v.15 no.1
    • /
    • pp.11-36
    • /
    • 2005
  • Cooperative teaching emerged as one of the interesting topics on curriculum administration and teaching-learning method in BSA(Busan Science Academy). The purpose of this study is to do research on social studies learning with respect to cooperative teaching, and to develop the model of cooperative teaching. The results of this study are as follows: First, We surveyed both the concept of cooperative teaching in all aspects and the methodological application on cooperative teaching. Second, We searched all teaching-learning methods in BSA in terms of cooperative teaching. Third, We studied cooperative teaching system on social studies considering current environmental factors. Forth, We performed seminar class which is constructed as one of the cooperative teaching models. The topic of seminar was 'The distortion and falsification of Koguryeo history in China'. The participants of seminar were volunteer students and social studies teachers whose subjects were geography, history, social studies, and ethics. And the participants conducted the research and cooperative learning based on teacher's subjects and subtopics. Fifth, The interactions between teacher and teacher, student and student, and teacher and student in the process of seminar preparation and publication were conducted very excitedly. Especially we found the possibility of cooperative teaching by the interaction between teachers. Finally, students developed the mind-frame to participate in social studies learning actively, and learned the method to research social affairs for themselves, and extended the eyes to approach social affairs with different opinions.

A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data (보건의료정보의 법적 보호와 열람.교부)

  • Jeong, Yong-Yeub
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.