• Title/Summary/Keyword: 방어 모델

Search Result 367, Processing Time 0.027 seconds

Applicability of FDS for the Fire Hazard Analysis of the Fire Zone at Nuclear Power Plants (원전 화재방호구역의 화재위험 분석을 위한 FDS 적용성)

  • Jee, Moon-Hak;Lee, Byung-Kon
    • Fire Science and Engineering
    • /
    • v.20 no.4 s.64
    • /
    • pp.13-18
    • /
    • 2006
  • The fire protection regulation for the nuclear power plants is based on the qualitative fire hazard assessment and the quantitative fire risk analysis, and the fire risk is managed by the fire protection plan with the appropriate balance among the fire prevention, fire suppression and the minimization of the fire effect. In these days, the zone model or the field model is generally used for the detail evaluation for the fire risk. At this paper, with consideration of the present trend, we evaluate whether the quantitative fire risk analysis and the assessment of fire result for fire areas at nuclear power plants can be possible by use of Fire Dynamics Simulator (FDS) that is the state-of-the-art fire modeling tool. Consequently, it is expected that the quantitative fire risk evaluation propelled by the fire modeling can be available as an applicable tool to improve the core damage frequency as well as the quantitative fire risk analysis.

Calculation of Internal Exposure Dose in Korean Man Resulting from Single and Chronic Intake of Tritium (트리튬($^{3}H$)의 단일(單一) 및 만성섭취(晩性攝取)에 대한 한국인(韓國人)의 내부피복(內部被曝) 선량(線量) 계산(計算))

  • Kim, Jang-Lyul;Yook, Chong-Chul;Ha, Chung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.8 no.2
    • /
    • pp.8-14
    • /
    • 1983
  • The doses to Korean adult by a single and chronic intake of tritiated water are determined using a three compartment model, which describes the retention of tritium radionuclide in body water and in bound organic form in the body. The results show that the total dose of a single intake, using retention half-time for the three-compartment of 9, 30, and 450 days, is 17.64 mrads ($176.4{\mu}Gy$) per 1mCi/kg ($3.7{\times}10^7Bq/kg$) intake, 97% of which is due to tritium in body water and 3% to bound tritium in tissue. In the chronic intake of 1mCi/day($3.7{\times}10^7Bq/day$) tritiated water, the total dose is 85.5 mrad/day(0.855mGy/day). Furthermore, in this study (MPC) a and (MPC)w values of tritium for Korean man are calculated by using the modified formula originated from ICRP Publication-2. From the results, we found that the (MPC) a, w values of ICRP underestimated approximately 50%, the (MPC)a, w values of Korean man must be elevated as high as approximately 50% than that of ICRP.

  • PDF

Socio-hydrologic Modeling Approach to Understand Influence of Multi-purpose Dam (사회-수문 모델링 기법을 이용한 다목적댐 영향 분석)

  • Lee, Slee Min;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.126-126
    • /
    • 2019
  • 과거부터 수자원분야는 공학적인 측면을 주로 강조하였으며, 따라서 인문사회학적 요소(예, 토지이용, 인구, 생태 환경, 경제발전 등)가 종종 배제된 채 시설물 계획이 이루어졌다. 그러나, 경제가 발전하고 사회의 모습이 복잡해짐에 따라, 수자원 관련 시설물의 계획에 있어 다양한 인문사회학적 요소를 고려할 필요성이 높아지고 있다. 본 연구에서는 사회-수문 모델링 기법을 이용하여 사회-수문 상호 간 순환적 관계를 파악하고, 특히 다목적댐이 인문사회에 미치는 영향을 정략적으로 파악하고자 하였다. 우리나라는 기후변화에 의한 극한가뭄과 홍수발생 빈도가 증가하고 있다. 이에 대한 대책으로, 다목적댐을 건설하여 효율적인 수자원 관리를 하고 있다. 본 연구에서는 대상지역으로 국내 강원도의 횡성댐을 선정하였다. 횡성댐은 하류에 위치한 횡성군과 원주시에 생 공 농업용수를 공급하는 용수원의 역할과 섬강 하류지역에 발생하는 홍수를 방어하는 역할을 하고 있다. 횡성댐 유역의 사회-수문학적 관계를 이해하기 위해 인과지도를 이용한 시스템 요소간의 상호연관성을 파악하였고, 이를 바탕으로 수문학적 요소와 인문사회학적 요소 사이의 관계식을 구성하였다. 수자원 분야에 해당하는 요소로는 생 공 농업용수 이용량 및 댐 저수량과 방류량을 선정하였으며, 인문사회학적 요소는 인구, 공업지역 농경지 주거지역의 면적 및 지역 내 총생산액을 선정하였다. 이와 같은 사회-수문학 요소를 바탕으로 해당 지역의 사회-수문 전체의 동태적 변화를 이해하기 위해 시스템 동적모의(System Dynamics) 모형을 이용한 모델링을 진행하였다. 다목적댐 건설 전 후로 대상지역의 용수 이용량과 인구 및 지역 총생산액 등의 데이터를 수집하여 모델을 검증하였다. 나아가 구현한 모형을 활용하여 향후 기후변화 발생 시 다목적댐이 대상지역의 용수이용 및 인구변화, 지역경제에 미치는 영향을 정량적으로 분석하였다. 본 연구는 인문사회분야와 수자원분야 사이의 영향관계를 이해하고, 모델을 이용한 정량적인 분석을 통해 향후 수자원 시설물 계획 및 정책마련을 위한 의사결정도구로 활용될 수 있을 것으로 기대한다.

  • PDF

Cyber Weapon Model for the National Cybersecurity (국가사이버안보를 위한 사이버무기 모델 연구)

  • Bae, Si-Hyun;Park, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.223-228
    • /
    • 2019
  • Recently, the United States has been trying to strengthen its cybersecurity by upgrading its position as an Unified Combatant Command that focuses on the Cyber Command in the United States, strengthening operations in cyberspace, and actively responding to cyber threats. Other major powers are also working to strengthen cyber capabilities, and they are working to strengthen their organization and power. The world demands economic power for its own interests rather than its own borders. But Cyber World is a world without borders and no defense. Therefore, a cyber weapon system is necessary for superiority in cyberspace (defense, attack) for national cybersecurity. In this paper, we analyze operational procedures for cyber weapons operation. And we design cyber weapons to analyze and develop the best cyber weapons to lead victory in cyberwarfare. It also conducts cyber weapons research to solve the confrontation between Cyber World.

Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines (다중 검색엔진을 활용한 보안관제 모델 개선방안)

  • Lee, Je-Kook;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.1
    • /
    • pp.284-291
    • /
    • 2021
  • As the current security monitoring system is operated as a passive system only for response after an attacker's attack, it is common to respond to intrusion incidents after an attack occurs. In particular, when new assets are added and actual services are performed, there is a limit to vulnerability testing and pre-defense from the point of view of an actual hacker. In this paper, a new security monitoring model has been proposed that uses multiple hacking-related search engines to add proactive vulnerability response functions of protected assets. In other words, using multiple search engines with general purpose or special purpose, special vulnerabilities of the assets to be protected are checked in advance, and the vulnerabilities of the assets that have appeared as a result of the check are removed in advance. In addition, the function of pre-checking the objective attack vulnerabilities of the protected assets recognized from the point of view of the actual hacker, and the function of discovering and removing a wide range of system-related vulnerabilities located in the IP band in advance were additionally presented.

A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling (AAWP와 LAAWP를 확장한 웜 전파 모델링 기법 연구)

  • Jun, Young-Tae;Seo, Jung-Taek;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.73-86
    • /
    • 2007
  • Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

Effective Adversarial Training by Adaptive Selection of Loss Function in Federated Learning (연합학습에서의 손실함수의 적응적 선택을 통한 효과적인 적대적 학습)

  • Suchul Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.1-9
    • /
    • 2024
  • Although federated learning is designed to be safer than centralized methods in terms of security and privacy, it still has many vulnerabilities. An attacker performing an adversarial attack intentionally manipulates the deep learning model by injecting carefully crafted input data, that is, adversarial examples, into the client's training data to induce misclassification. A common defense strategy against this is so-called adversarial training, which involves preemptively learning the characteristics of adversarial examples into the model. Existing research assumes a scenario where all clients are under adversarial attack, but considering the number of clients in federated learning is very large, this is far from reality. In this paper, we experimentally examine aspects of adversarial training in a scenario where some of the clients are under attack. Through experiments, we found that there is a trade-off relationship in which the classification accuracy for normal samples decreases as the classification accuracy for adversarial examples increases. In order to effectively utilize this trade-off relationship, we present a method to perform adversarial training by adaptively selecting a loss function depending on whether the client is attacked.

The Determination of Radon Progeny Concentration in Controlled Radon Environment (라돈을 제어하는 환경에서 라돈 자핵종의 농도 결정)

  • Seo, Kyung-Won;Lee, Byung-Kee
    • Journal of Radiation Protection and Research
    • /
    • v.18 no.1
    • /
    • pp.37-51
    • /
    • 1993
  • A standard radon chamber and a radon generator adjusted by ventilation system which had used in this research were assumed to calculate theoretically the concentration of radon progeny using Jacobi model theory. On the one hand, the filter sampled from the radon standard chamber and the radon generator was measured and analysed by the alpha spectrometry method. It is clear that measured result shows a good agreement with theoretical result. Therefore, it is observed that this research can made a great contribution to more accurate internal dose assessment by alpha emission of radon progeny in indoor radon environment, and fast individual measurement and determination of concentration for radon progeny.

  • PDF