• Title/Summary/Keyword: well integrity

Search Result 657, Processing Time 0.029 seconds

Blockchain Technology and Utilization Schemes in Tactical Communication Network

  • Yoo, In-Deok;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.49-55
    • /
    • 2018
  • In this paper, we propose schemes of blockchain utilization in tactical communication environment. The military tactical communication environment has similar characteristics with blockchain network such as distributed architecture, decentralization, and the need for data integrity. A communication node constituting a tactical communication network is constituted by a system capable of configuring and connecting a network for each node. When a communication node, having such capabilities, is configured as a node of blockchain network, various functions could be performed. In this paper, we propose utilization schemes of authentication, integrity, record management, and privilege control based blockchain technology. Functions for authentication, integrity verification, and record management need to ensure the stored data and could track history. The requirement of function's characteristics are matched to blockchain which is storing data sequentially and difficult to hack data, so that it could perform functionally and sufficiently well. Functions for authority control should be able to assign different privileges according to the state of the requestor. Smart contract will function when certain conditions are satisfied and it will be able to perform its functions by using it. In this paper, we will look over functions and utilization schemes of blockchain technology which could reliably share and synchronize data in a tactical communication environment composed of distributed network environment.

Electrical fire simulation in control room of an AGN reactor

  • Jyung, Jae-Min;Chang, Yoon-Suk
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.466-473
    • /
    • 2021
  • Fire protection is one of important issues to ensure safety and reduce risks of nuclear power plants (NPPs). While robust programs to shut down commercial reactors in any fires have been successfully maintained, the concept and associated regulatory requirements are constantly changing or strengthening by lessons learned from operating experiences and information all over the world. As part of this context, it is necessary not only to establish specific fire hazard assessment methods reflecting the characteristics of research reactors and educational reactors but also to make decisions based on advancement encompassing numerical analyses and experiments. The objectives of this study are to address fire simulation in the control room of an educational reactor and to discuss integrity of digital console in charge of main operation as well as analysis results through comparison. Three electrical fire scenarios were postulated and twenty-four thermal analyses were carried out taking into account two turbulence models, two cable materials and two ventilation conditions. Twelve supplementary thermal analyses and six subsequent structural analyses were also conducted for further examination on the temperature and heat flux of cable and von Mises stress of digital console, respectively. As consequences, effects of each parameter were quantified in detail and future applicability was briefly discussed. On the whole, higher profiles were obtained when Deardorff turbulence model was employed or polyvinyl chloride material and larger ventilation condition were considered. All the maximum values considered in this study met the allowable criteria so that safety action seems available by sustained integrity of the cable linked to digital console within operators' reaction time of 300 s.

Using Staganography method for Protection of Caption Information in the Motion Picture (스테가노그래피 기법을 이용한 동영상 자막정보의 저작권 보호)

  • Ham, Jun-Sick;Ryou, Hwang-Bin;Hong, Seong-Sik
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.835-842
    • /
    • 2003
  • The technical advancement in and the widespread expansion of use of the internet has recently led to an increase in high bandwidth multimedia data usage. This is largely due to an unfettered access to the internet. The intrinsic merit of the internet, however, brings about a side effect:multimedia date can easily be duplicated recklessly. This invokes the problem of intellectual property right violation. Focusing on this matter, multi-faceted studies are being conducted now. This paper aims to provide, by applying steganography and encryption methods into the SMIL files which supply subtitle data, the intellectual property protection of both motion picture and its subtitle data, as well as the integrity of the contents in question. In order to achieve the above goal, the authors show a particular method how to safely embed subtitle data into the given frames, after they separate subtitle data to encrypt them. By doing this, the authors suggests, the intellectual property right to the subtitle data as well as their integrity can be protected and achieved respectively. Besides, an integrity service for motion picture can be made.

광섬유 센서를 이용한 원자력 발전소 격납구조물의 가동전 가압 팽창을 통한 구조건전성 시험

  • 김기수
    • Composites Research
    • /
    • v.16 no.6
    • /
    • pp.56-61
    • /
    • 2003
  • In this Paper, a fiber Bragg grating(FBG) sensor system is described and FBGs are well-suited for long term and extremely severe experiments, where traditional strain gauges fail. In the system. a reflect wave-length measurement method which employs a tunable light source to find out the center wave-length of FBG sensor is used. We apply the FBG system to nuclear energy Power Plant for structural integrity test to measure the displacement of the structure under designed pressure and to check the elasticity of the structure by measuring the residual strain. The system works very well and it is expected that it can be used for a real-time strain, temperature and vibration detector of smart structure.

Research on Understanding of Game Information for the Elderly (중.노년층의 컴퓨터 게임이용과 인식에 대한 연구)

  • An, Jeong-Shin
    • The Korean Journal of Community Living Science
    • /
    • v.19 no.2
    • /
    • pp.235-244
    • /
    • 2008
  • The purpose of this study was to examine the elderly generation's understanding of game information and for recognition of computer based games as a recreation activity for the mid-to late adults. This study investigated game use and personal thoughts about the influences of computer games on each generation. The study was conducted by survey with the subjects being 242 adults aged 40 to 72 living in Busan and Kyung-nam area. Findings indicated that 43.5% of adults used computers to access games. The purposes for computer use were: business, searching portal sites, and games. 44.8% of adults knew about game information education. 67.4% of adults who had someone as a game information resource reported that their children provided the game information. Most adults used arcade games and recognized the influences of game information as positive to adults and the elderly but negative to children and adolescents. Finally, the adults aged "after mid-life" who knew about game information education showed higher ego-integrity and psychological well-being. These findings have implications for the development of elderly education programs aimed at promoting quality of life for older adults.

  • PDF

Effects of the Combination Herbal Extract on Working Memory and White Matter Integrity in Healthy Individuals with Subjective Memory Complaints : A Randomized, Double-Blind, Placebo-Controlled Clinical Trial

  • Kwon, Oran;Lee, Sunho;Ban, Soonhyun;Im, Jooyeon J.;Lee, Doo Suk;Lee, Eun Hee;Kim, Joohee;Lim, Soo Mee;Lee, Sang Gon;Kang, Ilhyang;Kim, Kyung-Hee;Yoon, Sujung;Lee, Sun Hea
    • Korean Journal of Biological Psychiatry
    • /
    • v.22 no.2
    • /
    • pp.63-77
    • /
    • 2015
  • Objectives The combination extract of four kinds of herbs, Gastrodia elata, Liriope platyphylla, Dimocarpus longan, and Salvia miltiorrhiza, has shown to have memory improving effects in mice. The aim of this study was to investigate the efficacy and safety of the herbal mixture for improving working memory as well as microstructural changes in white matter integrity in individuals with subjective memory complaints. Methods Seventy-five individuals with subjective memory complaints were assigned to receive either placebo (n = 15) or herbal mixture (low-dose group, n = 30 and high-dose group, n = 30) supplementation in an 8-week, randomized, double-blind, placebo-controlled clinical trial. Changes in working memory performance and fractional anisotropy (FA) values reflecting white matter integrity from baseline to 8-week endpoint were assessed. Results The herbal mixture group showed an increase in working memory performance compared to the placebo group (p for interaction = 0.001). In addition, the herbal mixture group showed an increase in FA values in the temporo-parietal regions (corrected p < 0.05), which are crucially involved in working memory function and are among the most affected regions in patients with cognitive impairments. Conclusions Findings from this study indicate that the herbal mixture may be a promising therapeutic option for individuals with subjective memory complaints.

Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools (사설 클라우드 환경에서 수집된 VM 데이터의 무결성 입증과 관련 포렌식 도구의 신뢰성 검증)

  • Kim, Deunghwa;Jang, Sanghee;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.223-230
    • /
    • 2013
  • Recently, a large number of corporations are adopting cloud solution in order to reduce IT-related costs. By the way, Digital Trace should have admissibility to be accepted as digital evidence in court, and integrity is one of the factors for admissibility. In this context, this research implemented integrity verification test to VM Data which was collected by well-known private cloud solutions such as Citrix, VMware, and MS Hyper-V. This paper suggests the effective way to verify integrity of VM data collected in private cloud computing environment based on the experiment and introduces the error that EnCase fails to mount VHD (Virtual Hard Disk) files properly.

Operations of Administration Tool and Consistency Properties for RBAC Database Integrity (RBAC 데이터베이스의 무결성을 위한 일관성 특성과 관리도구 동작)

  • 오석균;김성열
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.4
    • /
    • pp.16-21
    • /
    • 2000
  • Role Based Access Control(RBAC) reduces the cost of administering access control policies as well as making the process less error-prone. Administration tool is most important component in the concept of RBAC. The administration tool for the RBAC security system must be maintain the integrity of user-role and role-role relationships in the RBAC Database. Therefor, it is required set functions, properties defining integrity of database. When it will be designed security systems which is applying RBAC policy on the Linux(server system environments, this paper defines integrity of database for user-role and role-role relationships, and we propose formal specification of operation in order to manage these relationships. The proposed formal specification leads to the consistency requirements for the RBAC database which are defined as a set of relationship. Also, this paper can easily derive the implementation of the RBAC administration tool by formal specification of operations. It leads us tn the minimal set for a more efficiently implementation of administration tool.

  • PDF

An influence of mesohabitat structures (pool, riffle, and run) and land-use pattern on the index of biological integrity in the Geum River watershed

  • Calderon, Martha S.;An, Kwang-Guk
    • Journal of Ecology and Environment
    • /
    • v.40 no.2
    • /
    • pp.107-119
    • /
    • 2016
  • Background: Previous studies on the biological integrity on habitat and landuse patterns demonstrated ecological stream health in the view of regional or macrohabitat scale, thus ignored the mesoscale habitat patterns of pool, riffle, and runs in the stream health analysis. The objective of this study was to analyze influences on the mesohabitat structures of pool, riffle, and run reaches on the fish guilds and biological integrity in Geum-River Watershed. Results: The mesohabitat structures of pool, riffle, and run reaches influenced the ecological stream health along with some close relations on the fish trophic and tolerance guilds. The mesoscale components altered chemical water quality such as nutrients (TN, TP) and BOD and these, then, determined the primary productions, based on the sestonic chlorophyll-a. The riffle-reach had good chemical conditions, but the pool-reach had nutrient enrichments. The riffle-reach had a predominance of insectivores, while the pool-reach has a predominance of omnivores. Also, the riffle-reach had high proportions of sensitive fish and insectivore fish, and the pool-reach had high proportions of tolerant species in the community composition. The intermediate fish species in tolerance and omnivorous fish species in the food linkage dominated the community in the watershed, and the sensitive and insectivorous fishes decreased rapidly with a degradation of the water quality. All the habitat patterns were largely determined by the land-use patterns in the watershed. Conclusions: Trophic guilds and tolerance guilds of fish were determined by land-use pattern and these determined the stream health, based on the Index of Biological Integrity. This study remarks the necessity to include additional variables to consider information provided by mesohabitats and land-use distributions within the selected stream stretch. Overall, our data suggest that land-use pattern and mesohabitat distribution are important factors to be considered for the trophic and tolerance fish compositions and chemical gradients as well as ecological stream health in the watershed.

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF