• Title/Summary/Keyword: Defense Technology Protection

Search Result 116, Processing Time 0.023 seconds

Roles of Virtual Memory T Cells in Diseases

  • Joon Seok;Sung-Dong Cho;Seong Jun Seo;Su-Hyung Park
    • IMMUNE NETWORK
    • /
    • v.23 no.1
    • /
    • pp.11.1-11.11
    • /
    • 2023
  • Memory T cells that mediate fast and effective protection against reinfections are usually generated upon recognition on foreign Ags. However, a "memory-like" T-cell population, termed virtual memory T (TVM) cells that acquire a memory phenotype in the absence of foreign Ag, has been reported. Although, like innate cells, TVM cells reportedly play a role in first-line defense to bacterial or viral infections, their protective or pathological roles in immune-related diseases are largely unknown. In this review, we discuss the current understanding of TVM cells, focusing on their distinct characteristics, immunological properties, and roles in various immune-related diseases, such as infections and cancers.

Intelligent Surveillance System for Urban Transit using Context-aware technology (도시철도 지능형 종합 감시시스템을 위한 상황인식기술 적용방안 연구)

  • An, Tae-Ki;Shin, Jeong-Ryol;Lee, Woo-Dong;Kim, Moon-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.399-400
    • /
    • 2007
  • The one of the necessary technologies to live in the ubiquitous society that we can exchange some informations whenever it is and wherever we are, is the technology of context-awareness. The technology of context-awareness can be used various fields-medical science, national defense, national security and etc. and the technology can affect our society by and large. The technology of context-awareness is also applicable to many fields in the urban transit. In this paper, we describe the present condition of the technology of context-awareness and the examples of practical application of it and suggest some plans that are applicable to build an intelligent surveillance system for urban transit. We can connect the operating officer who is in the nearest to the place where the some events happened within the urban transit service area through the intelligent surveillance system for urban transit and we can eel a foothold in perceiving automatically various events within urban transit service area. So, the technology of context-awareness is the basic technology to realize an intelligent surveillance for urban transit, for the security of passengers and the protection of facilities in urban transit.

  • PDF

A method for selecting the evaluation index of defence R&D project by AHP (계층분석법에 의한 국방연구개발 평가지표 선정에 관한 연구)

  • Park, Seong;Hong, Yeon-Woong;Na, Joong-Kyung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.5
    • /
    • pp.961-970
    • /
    • 2012
  • To evaluate companies that participated in the defense R&D project, 27 variables are chosen through literature survey, feature analysis of defense R&D and interviews with military experts. 17 variables are selected after factor analysis which is applied to reduce the number of variables and to detect structure in the relationships among variables, that is to classify variables using Likert-type scales. And then 17 variables are prioritized by AHP (analytic hierarchy process) method. It is shown that communication skill & cooperation strategy, level of technology, possession of needs technology have high priorities. However, protection plan of technology leakage, expertise of subcontractors, software development plan have low priorities.

Japanese Space Policy - Where is she going?

  • Hashimoto, Yasuaki
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.9
    • /
    • pp.435-443
    • /
    • 1997
  • Passing 26 years from 1970 when the first satellite was launched into the orbit, Japan developed and successfully launched H-II from Tanegashima Space Center in 1994. During those period, Japanese space policy has experienced a big shake from independent development to technology import from the US, and back again to independent development. In general, the H-II rocket which was manufactured by 100% domestic technology, brings Japan from the old era (experimental stage) to the new era (practical use stage). Fundamental Policy of Japan's Space Activities, which decides such policy as mentioned, was revised in January, 1996 this year after an interval of 7 years. This revised outline confirms the result of Japanese space technology until present and identifies the future direction and framework of her space activities for a period of coming ten years on the basis of a ong-term perspective towards the 21st century. However, when comparing with the last Fundamental Policy in 1989, there seems no big change in it, and a long-term perspective is also not seen there. The description varies on some important points in international space law, like international cooperation, protection of environment, commercial use, etc. In addition, the immaturity as well as the necessity of broader discussion are felt because neither this Fundamental Policy nor The National Defense Program Outline treated any national and international security matters concerning outer space. Considering the present time when Japan enters into the practical use of outer space, such as application, commercial use and launching service, etc, it is doubtful whether new Fundamental Policy was properly planned or not. It seems necessary to use several measures by which the public opinion, opinions from industry and debate on the security are reflected in the policy making.

  • PDF

Overcoming Cybercrime in Ukraine (Cyberterrorism)

  • Pravdiuk, Andrey;Gerasymenko, Larysa;Tykhonova, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.181-186
    • /
    • 2021
  • Ensuring national security in cyberspace is becoming an increasingly important issue, given the growing number of cybercrimes due to adaptation to new security and protection technologies. The purpose of this article is to study the features of counteracting, preventing, and detecting crimes in the virtual space of Ukraine on the example of cases and analysis of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The research methodology is based on the method of analysis and study of cases of crime detection in the virtual environment of the State Center for Cyber Defense and Countering Cyber Threats CERT-UA and the Cyber Police Department of the National Police of Ukraine. The results show that the consistent development of the legal framework in 2016-2020 and the development of a cyber-defense strategy for 2021-2025 had a positive impact on the institution-building and detection of cybercrime in Ukraine. Establishing cooperation with developed countries (USA) has helped to combat cybercrime by facilitating investigations by US law enforcement agencies. This means that international experience is effective for developing countries as a way to quickly understand the threats and risks of cybercrime. In Ukraine, the main number of incidents concerns the distribution of malicious software in the public sector. In the private sector, cyber police are largely confronted with the misappropriation of citizens' income through Internet technology. The practical value of this study is to systematize the experience of overcoming cybercrime on the example of cases of crime detection in a virtual environment.

Fire Protection Regulations for Ensuring Fire Safety during Decommissioning Nuclear Power Plants in Korea (해체원전 화재안전 확보를 위한 화재방호 규정 고찰)

  • Kim, Jung-Wun;Park, Chan-Geun
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.134-140
    • /
    • 2020
  • Nuclear power plants (NPPs) in Korea are required to be maintained using a defense in-depth approach to prevent leakage of radioactive substances outside the plant and allow safe shutdown in the event of a fire. Periodic testing must be conducted to ensure that the fire protection facilities perform as required by the laws for various nuclear reactor types. In June 2017, for the first time in Korea, a nuclear plant, Kori Unit 1, was permanently shut down. It was prepared for decommissioning in accordance with the fire protection regulations imposed by the regulatory body. However, a standard protocol is necessary for systematically establishing the fire protection program for decommissioning of NPPs in the future. Therefore, the nuclear legal systems of countries with many operating nuclear power plants, such as the United States, Japan, Canada, and various European countries, were reviewed and guidelines for establishing a fire protection program for decommissioning NPPs was suggested; the fire protection requirements stated by Reg Guide 1.191 (Decommissioning fire protection program for NPPs during decommissioning and permanent shutdown) were used as a model. Suggestions for establishing legal regulations to optimize fire protection programs and secure basic technology for decommissioning NPPs were also made.

Mechanical Performance Study of Flexible Protection Tube for Submarine Cables (해저케이블용 유연보호튜브의 기계적 성능 연구)

  • Kyeong Soo Ahn;Yun Jae Kim;Jin-wook Choe;Jinseok Lim;Sung Woong Choi
    • Composites Research
    • /
    • v.37 no.2
    • /
    • pp.101-107
    • /
    • 2024
  • Demand for submarine cable is increasing due to advances in submarine power transmission technology and submarine cable manufacturing technology. Submarine cable use various types of protective equipment to prevent problems such as high maintenance costs in the event of cable damage and power outages during maintenance periods. Among them, flexible protection tube is a representative protective equipment to protect cables and respond to external forces such as waves and current. The flexible protection tube is made of polyurethane 85A hyperelastic material, so the calculation of mechanical behavior is carried out using mechanical properties based on experimental results. In this study, a study was conducted to determine the bending performance and tensile performance of flexible protection tube through analytical methods. The physical properties obtained through the multiaxial tensile test of polyurethane 85A were used for the analysis. Bending and tensile performance were determined for the maximum bending moment standard of 15 kN·m and the tensile load standard of 50 kN. As a result, it was confirmed that when the maximum bending moment of 15 kN·m of the flexible protection tube occurred, the bending performance of the MBR was secured at 13 m and when a tensile load of 50 kN, it was applied the maximum vertical displacement was 968 mm, confirming that the tensile performance was secured.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

A Study on the Design Verification by Using Finite Elements Method and Quality Improvement of Radar by Managing Change Points of 4M (유한요소 기법을 활용한 설계검증 및 4M 변경점 관리를 통한 레이더장비 품질 신뢰성 확보에 관한 연구)

  • Jo, Hee Jin;Pak, Se Jin;Lee, Nam Ho;Jung, Won Yong
    • Journal of Korean Society for Quality Management
    • /
    • v.47 no.3
    • /
    • pp.437-451
    • /
    • 2019
  • Purpose: The purpose of this study is to improve the quality of the PGM system by improving the structure and production process of slip-ring rotary joint for radar. Methods: The improvement measures for each cause are established through failure analysis of broken items. Specifically, changing in the housing to improve the heating system. Changing the transportation method to prevent damage to equipment during transport. Changing work process of the attenuator ring to prevent damage. etc. Results: The results of this study are as follows; improving the heating system reduces heat generated by the attenuator by about 7 degrees and obtain additional temperature margins. Reduction of defect rate because of adding X-band rotary joint run-out measurement test, ESS of slip-ring rotary joint and Transportation improvement(reinforced flight boxes, tube protection, etc). Getting stable VSWR values by improving work process of attenuator overheating due to a bad bonding process. Conclusion: Through this study, improvements were made to slip-ring rotary joint that failed repeatedly for various reasons. As a result of the application of the improvements, the same fault does not occur until now, so we can see that the quality of PGM has improved.

A Study of IP Spoofing Attack and Defense Through Proxy Server (Proxy Server를 통한 IP Spoofing 공격과 방어 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.281-284
    • /
    • 2010
  • The characteristics of International Hacking is that because even if with tracing techniques, nobody can find Real IP address of the attacker so it is true that Great difficulty in the investigation. so that an attacker goes through the Proxy Server Many times and they use techniques of IP Spoofing to hide their IP address. In this paper, study How attackers use IP Spoofing Technique and the application of Proxy Server. In addition, to Propose IP Spoofing attacks through the Proxy Server attack and defend methods also IP traceback methods so this study materials will contribute to the development of International Hacking and Security Protection Technology.

  • PDF