• Title/Summary/Keyword: Environment Information

Search Result 26,472, Processing Time 0.515 seconds

Development of a Quality Assurance Safety Assessment Database for Near Surface Radioactive Waste Disposal

  • Park J.W.;Kim C.L.;Park J.B.;Lee E.Y.;Lee Y.M.;Kang C.H.;Zhou W.;Kozak M.W.
    • Nuclear Engineering and Technology
    • /
    • v.35 no.6
    • /
    • pp.556-565
    • /
    • 2003
  • A quality assurance safety assessment database, called QUARK (QUality Assurance Program for Radioactive Waste Management in Korea), has been developed to manage both analysis information and parameter database for safety assessment of low- and intermediate-level radioactive waste (LILW) disposal facility in Korea. QUARK is such a tool that serves QA purposes for managing safety assessment information properly and securely. In QUARK, the information is organized and linked to maximize the integrity of information and traceability. QUARK provides guidance to conduct safety assessment analysis, from scenario generation to result analysis, and provides a window to inspect and trace previous safety assessment analysis and parameter values. QUARK also provides default database for safety assessment staff who construct input data files using SAGE(Safety Assessment Groundwater Evaluation), a safety assessment computer code.

Web-Enabled Collaborative Design Environment

  • Kim, Hyun;Yoo, Sang-Bong;Lee, Hyun-Chan
    • ETRI Journal
    • /
    • v.22 no.3
    • /
    • pp.27-40
    • /
    • 2000
  • Recently, advanced information technologies have opened new possibilities for collaborative designs. In this paper, a web-enabled collaborative design environment is proposed, where the product data based on STandard for the Exchange of Product model data (STEP) is managed in a hierarchical database and the product metadata is used to efficiently search and utilize information scattered over the network. Several integrity constraints are depicted using EXPRESS to validate the combination of data from different sources. The knowledge represented as metadata and constraints on the interacting features differentiate this environment from previous ones. The collaborative conferencing system is also introduced to communicate and collaborate simultaneously among the related designed. As a result, the proposed environment allows the distributed designers to more efficiently obtain, exchange and communicate the design information throughout the design process.

  • PDF

Wireless Sensor Network Implementation for Smart Environment Monitoring (스마트 환경 모니터링을 위한 센서 네트워크 구현)

  • Cho, Seong-Cheol;Nam, Do-Hyun;Kim, Nag-Hwan;Hur, Tae-Sung;Min, Hong-Ki
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.701-702
    • /
    • 2006
  • In this paper, we embodied the environment monitoring system that can acquire correct data in real-time. And we used module that is 2.4GHz IEEE 802.15.4 / Zigbee network for radio communication between nodes. The nodes sense the data of temperature, humidity, illumination periodically. The nodes store the data in their buffer and transmit. We confirmed that the system is in real-time as it is changed instantly due to the varying environment by the simulation Therefore, we can construct the efficient and correct system as applied this system to monitor the environment.

  • PDF

The Change in News Video Production Environment by the Introduction of Network Production System

  • Won, Sung-Hoon;Choi, Won-Ho;Kim, Chee-Yong
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.1
    • /
    • pp.110-116
    • /
    • 2011
  • The production environment of fast and accurate news video has been continuously changing together with technology advance. Especially, the editing of the news video advanced focusing on the non-linear system by the introduction of digital technology and the recording of news video advanced to 'tapeless' base. In this new news video production environment, the recorded news videos are transmitted, edited and archived through the NPS (Network Production System), which dramatically improves the efficiency of the news video production. However, there are some issues which need to be resolved in the introduction of NPS. The purpose of this research is to identify the necessity of NPS introduction in the changing news video production environment, explore the issues which should be resolved and suggest the proper way to introduce the NPS to broadcasting companies.

A Context-Aware Recommender System for Ubiquitous Computing Environment: CARS

  • Ahn, Do-Hyun;Kim, Jae-Kyeong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.05a
    • /
    • pp.131-138
    • /
    • 2005
  • Recommender systems have been widely advocated as a way of coping with the problem of information overload in e-business environment. Most of the existing recommender systems focused on what kind of items to recommend, although when to recommend to the target customer considering their context is an important issue. Even right item might be a spam advertisement or wrong recommendation for the customer if it can not be recommended at the right context. It is particularly important for recommendations where the user's context is changing rapidly, such as in both handheld and ubiquitous computing environment. Therefore, we propose CARS (Context-Aware Recommender System) based on CBR and context-awareness for ubiquitous computing environment. CBR is used to generate a target customer class and proper context. Context-awareness is used to gather suer context information from sensors, networks, device status, user profiles, and other sources. An illustrative case example is suggested to explain the procedure of CARS.

  • PDF

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

  • Choi, Seul-Ki;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1611-1625
    • /
    • 2019
  • The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.

A STUDY ON BIM-BASED 5D SIMULATION IN WEB ENVIRONMENT

  • Jae-Bok Lim;Jae-Hong Ahn;Ju-Hyung Kim;Jae-Jun Kim
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.169-172
    • /
    • 2013
  • Building Information Modeling (BIM) is an effective decision-making platform that helps to save project cost and enhance quality of construction. By generating and linking a wide variety of objects data, BIM can be effectively utilized, and it should be ensured that object properties maintain consistency throughout the project period of design, estimates, construction, maintenance and repair. This study examined how to utilize BIM data in a construction project, by linking cost and schedule data in web environment, to better utilize the information and maintain consistency of the BIM information. To do so, the model integrated WBS data and CBS data, linked them with BIM model to realize 5D simulation in web environment. As a result, cost and schedule data could be simultaneously acquired, and object properties-cost, schedule, location-as well. These are expected to contribute to developing a BIM-based automatic data-processing system in web environment.

  • PDF

Radio environment maps: The survey of construction methods

  • Pesko, Marko;Javornik, Tomaz;Kosir, Andrej;Stular, Mitja;Mohorcic, Mihael
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3789-3809
    • /
    • 2014
  • Radio environment maps (REMs) and geolocation database represent an important source of information for the operation of cognitive radio networks, replacing or complementing spectrum sensing information. This paper provides a survey of methods for constructing the radio frequency layer of radio environment map (RF-REM) using distributed measurements of the signal levels at a given frequency in space and time. The signal level measurements can be obtained from fixed or mobile devices capable of sensing radio environment and sending this information to the REM. The signal measurements are complemented with information already stored in different REM content layers. The combined information is applied for estimation of the RF-REM layer. The RF-REM construction methods are compared, and their advantages and disadvantages with respect to the spatial distribution of signal measurements and computational complexity is given. This survey also indicates possible directions of further research in indirect RF-REM construction methods. It emphasizes that accurate RF-REM construction methods should in the best case support operation with random and clustered signal measurements, their operation should not be affected by measurements outliers, and it must estimate signal levels comparably on all RF-REM locations with moderate computational effort.

A Mobile Service Method of S&T Information Content for Ubiquitous Environment - focused on KISTI's Scent of Science Service - (유비쿼터스 환경을 위한 과학기술 콘텐츠의 모바일 서비스 방안 - KISTI의 과학향기 사례를 중심으로 -)

  • Hyun, mi-hwan;Lee, choong-mo;Kim, sun-tae;Kim, ji-young;Yae, yong-hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.469-472
    • /
    • 2008
  • Although wireless devices ar the most suitable for ubiquitous environment, they have restrictive capacities when using internet services than desktop environment. Considering different system features of mobile devices such as small display and limited input capability, an alternative scheme to access the Web efficiently is required. In the paper, we propose a mobile service method of S&T information content to support ubiquitous environment though the case study of KISTI's Scent of Science content service based on mobile.

  • PDF

Semi-supervised based Unknown Attack Detection in EDR Environment

  • Hwang, Chanwoong;Kim, Doyeon;Lee, Taejin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4909-4926
    • /
    • 2020
  • Cyberattacks penetrate the server and perform various malicious acts such as stealing confidential information, destroying systems, and exposing personal information. To achieve this, attackers perform various malicious actions by infecting endpoints and accessing the internal network. However, the current countermeasures are only anti-viruses that operate in a signature or pattern manner, allowing initial unknown attacks. Endpoint Detection and Response (EDR) technology is focused on providing visibility, and strong countermeasures are lacking. If you fail to respond to the initial attack, it is difficult to respond additionally because malicious behavior like Advanced Persistent Threat (APT) attack does not occur immediately, but occurs over a long period of time. In this paper, we propose a technique that detects an unknown attack using an event log without prior knowledge, although the initial response failed with anti-virus. The proposed technology uses a combination of AutoEncoder and 1D CNN (1-Dimention Convolutional Neural Network) based on semi-supervised learning. The experiment trained a dataset collected over a month in a real-world commercial endpoint environment, and tested the data collected over the next month. As a result of the experiment, 37 unknown attacks were detected in the event log collected for one month in the actual commercial endpoint environment, and 26 of them were verified as malicious through VirusTotal (VT). In the future, it is expected that the proposed model will be applied to EDR technology to form a secure endpoint environment and reduce time and labor costs to effectively detect unknown attacks.