• Title/Summary/Keyword: 인간침입

Search Result 57, Processing Time 0.028 seconds

Review on Assessment Methodology for Human Intrusion Into a Repository for Radioactive Waste (방사성폐기물 처분장 인간침입 평가 방법론에 관한 고찰)

  • Cho, Dong-Keun;Kim, Jung-Woo;Jeong, Jong-Tae;Baik, Min-Hoon
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.14 no.3
    • /
    • pp.297-305
    • /
    • 2016
  • An approach to assess inadvertent human intrusion into radwaste repository was proposed with the assumption that the intrusion occurs after a loss of knowledge of the hazardous nature of the disposal facility. The essential boundary conditions were derived on the basis of international recommendations, followed by an overall approach to deal with inadvertent human intrusion. The interrelation between societal factors, human intrusion scenarios, and protective measures is described to provide a concrete explanation of the approach, including the detailed procedures to set up the human intrusion scenario. The procedure for deriving protective measures is also explained with four steps, including how to derive a safety framework, general measures, potential measures, and eventual protective measures on the basis of stylized scenarios. It is expected that the approach proposed in this study will be used effectively to reduce the potential for and/or the consequences of human intrusion during the entire process of realizing a disposal facility.

네트워크 침입탐지를 위한 복제 선택 알고리즘의 적용

  • 김정원;최종욱;정길호
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.06a
    • /
    • pp.315-329
    • /
    • 2001
  • 외부침입탐지 시스템(IDS: Intrusion Detection System)은 컴퓨터의 외부 침입을 자동으로 탐지하는 시스템이다. IDS의 주요목표는 외부사용자들이나 내부 사용자들에서 권한이 없는 사용자, 컴퓨터 오용(misuse) 혹은 잘못된 사용(abuse)을 탐지하는 것이다. 파이어 월(Firewall)이나 암호화와 같은 침입 방지 시스템에 관한 연구와 병행하여 최근 IDS에 대한 다양한 연구가 이루어지고 있다. 침입탐지와 바이러스 탐지에 대한 새로운 접근 방법으로서 면역학적 방법이 동원되고 있다. 이 연구에서는 인간의 인체면역 시스템으로부터 얻어진 몇 가지 주요한 Feature들을 외부침입 탐지에 적용하여 기존의 침입탐지 방법에서 오는 한계점을 극복하여 경고 오류(alarm error rate)를 줄이고자 한다. 따라서 본 연구에서는 외부침입을 탐지하고 시스템을 치유하는 인간의 인체 면역에 대해 기초적인 연구를 진행하였으며 이러한 인체면역 기저들을 네트워크 환경에서 어떻게 실제적으로 적용할 것인 지를 연구하였으며 실제 네트워크 데이터를 적용하여 본 연구에서 제안한 모델에 대한 성능을 테스트하였다.

  • PDF

Study on the Well Scenario of the LILW Disposal Facility in Korea (중·저준위 방사성폐기물 처분시설의 우물 이용 시나리오를 적용한 안전평가 연구에 대한 고찰)

  • Jeong, Mi-Seon;Cheong, Jae-Yeol;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.1
    • /
    • pp.63-72
    • /
    • 2015
  • The low and intermediate-level radioactive waste generated in Korea is disposed of at Wolsong Disposal Facility. For the safety of a disposal facility, it must be assessed by considering some abnormal scenarios including human intrusion as well as those by natural phenomena. The human intrusion scenario is a scenario that an incognizant man of the disposal facility will be occurred by the drilling. In this paper, the well usage scenario was classified into the human intrusion event as the probability of the well drilling is very low during the man's lifecycle and then was assessed by using conservative assumptions. This scenario was assessed using the dilution factor of contaminants released from a disposal facility and then it was introduced the applied methodology in this study. The assessed scenario using this methodology is satisfied the regulatory limits.

Study on the Institutional Control Period Through the Post-drilling Scenario Of Near Surface Disposal Facility for Low and Intermediate-Level Radioactive Waste (중·저준위 방사성폐기물 천층처분시설에서 시추 후 거주시나리오 평가를 통한 폐쇄 후 제도적 관리기간 연구)

  • Hong, Sung-Wook;Park, Jin-Baek;Yoon, Jung-Hyun
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.12 no.1
    • /
    • pp.59-68
    • /
    • 2014
  • The public's access to the disposal facilities should be restricted during the institutional control period. Even after the institutional control period, disposal facilities should be designed to protect radiologically against inadvertent human intruders. This study is to assess the effective dose equivalent to the inadvertent intruder after the institutional control period thorough the GENII. The disposal unit was allocated with different kind of radioactive waste and the effects of the radiation dose to inadvertent intruder were evaluated in accordance with the institutional control period. As a result, even though there is no institutional control period, all were satisfied with the regulatory guide, except for the disposal unit with only spent filter. However, the disposal unit with only spent filter was satisfied with the regulatory guide after the institutional control period of 300 years. But the disposal unit with spent filter mixed with dry active waste could shorten the institutional control period. So the institutional control period can be reduced through the mixing the other waste with spent filter in disposal unit. Therefore, establishing an appropriate plan for the disposal unit with spent filter and other radioactive waste will be effective for radiological safety and reduction of the institutional control period, rather than increasing the institutional control period and spending costs for the maintenance and conservation for the disposal unit with only spent filter.

Automatic Intrusion Response System based on a Self-Extension Monitoring (자기확장 모니터링 기반의 침입자동대응 시스템)

  • Jang, Hee-Jin;Kim, Sang-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.489-497
    • /
    • 2001
  • In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. Information security products need to support an automatic response facility without human intervention in order to minimize damage to the attacked system and cope with the intrusion immediately. This paper presents an automatic intrusion response model which is developed on a Self-Extension Monitoring. It also proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested model. The Self-Extension Monitoring using self-protection and replication minimizes spatial limitations on collection of monitoring information and intruder tracing. It enhances the accuracy of intrusion detection and tracing.

  • PDF

CNN-based Object Detection for Human-Computer Interaction (인간-컴퓨터 상호작용을 위한 CNN 기반 객체 검출)

  • Pak, Myeong-Suk;Kim, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.1110-1111
    • /
    • 2019
  • 비전 기반 제스처 인식은 비 침입적이고 저렴한 비용으로 자연스러운 인간-컴퓨터 상호 작용을 제공한다. 로봇의 사용이 증가함에 따라 인간-로봇 상호 작용은 점점 더 중요해질 것이다. 최근 효율적인 딥러닝 기술이 연구되고 있다. 본 연구는 인간 컴퓨터 상호 작용을 위해 CNN을 기반으로 한 얼굴 및 손 동작의 인식을 위해 객체 검출 기법의 적용 결과를 제시한다.

Uncertainty Management on Human Intrusion Scenario Assessment of the Near Surface Disposal Facility for Low and Intermediate-Level Radioactive Waste: Comparative Analysis of RESRAD and GENII (중저준위방사성폐기물 표층처분시설의 인간침입 시나리오 평가에 대한 불확실성 관리: RESRAD와 GENII의 비교분석)

  • Kim, Minseong;Hong, Sung-Wook;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.4
    • /
    • pp.369-380
    • /
    • 2017
  • In order to manage the uncertainty about the evaluation and analysis of the human intrusion scenario of the Gyeongju Low and Intermediate Level Radioactive Waste(LILW) disposal facility, the calculation result by the GENII code was assessed using the RESRAD code, which was developed to evaluate the radiation effects of contaminated soil. The post-drilling scenario was selected as a human intrusion scenario into the near-surface disposal facility to analyze the uncertainty of the modeling by identifying any limitations in the simulation of each code and comparing the evaluation results under the same input data conditions. The results revealed a difference in the migration of some nuclides between the codes, but confirmed that the dose trends at the end of the post-closure control period were similar for all exposure pathways. Based on the results of the dose evaluation predicted by RESRAD, sensitivity analysis on the input factors was performed and major input factors were derived. The uncertainty of the modeling results and the input factors were analyzed and the reliability of the safety evaluation results was confirmed. The results of this study can be applied to the implementation 'Safety Case Program' for the Gyeongju LILW disposal facility.

지능형 보안망의 개발

  • 김영창;김영민;안형일;김응식
    • Proceedings of the Korean Institute of Industrial Safety Conference
    • /
    • 2000.11a
    • /
    • pp.82-87
    • /
    • 2000
  • 최근 들어 산업설비 및 건축물의 대형화, 다 기능화 추세가 두드러지게 나타나고 있는 가운데 외부침입에 의한 재산상의 피해 및 기밀누설 등의 문제가 급증하고있는 추세이다. 이에 외부침입에 대한 근원적인 원인과 발생가능성을 미연에 방지하는 보안시스템의 개발이 무엇보다도 중요해지고 있다. 기존의 보안시스템은 인간이 직접 경계활동을 벌이는 구조 또는 장력, 광케이블을 이용한 보안망의 구조를 가지고 있다. 이들 시스템은 보안효과의 비능률성, 고가, 기계적강도의 떨어짐 등의 문제를 지니고 있다 이에 본 연구는 울타리로써의 역할만을 강조하는 기존의 펜스의 기능에 자기 판단능력을 부여함으로서 한 단계 진보된 성능의 보안시스템 개발에 그 목적을 두고 있다(중략)

  • PDF

Dynamic Clonal Selection Algorithm with Gene Library Evolution using a Hypermutation (초돌연변이(Hypermutation)를 이용한 유전자 라이브러리 진화와 동적 선택 알고리즘)

  • 김정원;최종욱;김상진
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.417-422
    • /
    • 2002
  • 인공면역시스템을 이용한 침입탐지시스템 개발을 위해 적용한 동적 클론 선택(Dynamic Clonal Selection) 알고리즘과 그의 문제점을 소개하고 보다 개선된 동적 클론 선택 알고리즘을 제안한다. 이전 연구에서 침입탐지시스템이 흔히 접하게 되는 상황, 즉 과거 안정적으로 관찰되었던 정상행위가 합법적인 요인들로 인하여 갑작스러운 변화를 보일 경우 과거 생성되었던 기억탐지자가 정상행위를 비정상행위로 오류 판단하는 것을 막기 위하여 인간면역시스템의 체세포 돌연변이 (somatic hypermutation)를 이용하여 유전자 라이브러리를 진화시키는 방법을 첨가한 동적 클론 선택 알고리즘을 소개한다.

  • PDF