• Title/Summary/Keyword: Industrial Technology Protection

Search Result 454, Processing Time 0.024 seconds

Anti-corrosive Effects of Multi-Walled Carbon Nano Tube and Zinc Particle Shapes on Zinc Ethyl Silicate Coated Carbon Steel

  • Jang, JiMan;Shon, MinYoung;Kwak, SamTak
    • Corrosion Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.1-5
    • /
    • 2016
  • Zinc ethyl silicate coatings containing multi walled carbon nanotubes (MWCNTs) were prepared, to which we added spherical and flake shaped zinc particles. The anti-corrosive effects of MWCNTs and zinc shapes on the zinc ethyl silicate coated carbon steel was examined, using electrochemical impedance spectroscopy and corrosion potential measurement. The results of EIS and corrosion potential measurement showed that the zinc ethyl silicate coated with flake shaped zinc particles and MWCNT showed lesser protection to corrosion. These outcomes were in agreement with previous results of corrosion potential and corrosion occurrence.

Effect of sun screen utilizing Porphyra-334 derived from Ocean Algae for skin protection (해양조류 유래 Porphyra-334의 UV 흡수능에 의한 피부세포 보호 효과)

  • Cho, Moon Jin;Jung, Hae Soo;Song, Mi Young;Seo, Hyo Hyun;Kulkarni, Atul;Suh, Seung Suk;Lee, Taek Kyun;Moh, Sang Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4272-4278
    • /
    • 2014
  • One of the most effective ways of preventing skin aging is to protect the skin from UV radiation, which was identified as the primary cause of photoaging. Therefore, it is necessary to develop natural and environment-friendly materials to the human skin. This study examined the effects of MAAs extracted from Chlamydononas hedleyi on UV protection and anti-inflammation in human skin cells. The function of porphyra-334 in the skin, which was isolated and purified from MMAs mixture, was tested in terms of its UV protective ability and anti-inflammation. As a result, porphyra-334 played a role in protecting the skin from UV radiation and anti-inflammation through the suppression of COX-2 expression. These results suggest that porphyra-334 can be a useful material in cosmetic products because it can protect the skin from UV radiation and anti-inflammation.

Introduction of Security Certification System for Shared Growth and Co-prosperity of Small and Medium Businesses (대·중소기업 동반성장과 상생을 위한 중소 협력업체의 보안인증 제도 도입 방안)

  • Shin, Hyungoo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.203-234
    • /
    • 2019
  • The damages from security accidents continue to increase as technology leaks from suppliers cause risks to the management of large companies, which are their customers, and their image and reliability to fall. However, the current industrial structure is practically impossible for large companies to form their own businesses and strategic alliances with business partners are essential, but it is changing into an industrial structure where the exchange of information is increased and the dependence of the information system is maximized, as well as legal demands and demands from stakeholders are increasing due to the complexity of the work process and the strengthening of security-related laws. The status of technology protection of small and medium-sized enterprises shows that they are not equipped with a security system due to relatively poor environment and financial difficulties compared to large enterprises, whereas the industrial structure between large and small business partners is indispensable for sharing the IT system, and the security system of large business, which is a customer company, should be improved by considering the fact that it is impossible to maintain security system between large businesses. Thus, the government intends to examine the system for shared growth of small businesses and the model for evaluating the capabilities of various agencies for information protection, and propose measures to introduce the certification system for small business partners.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

A Study on the Corrosion Behavior of Magnesium Alloy Sealed with Chemical Conversion Coating and Sol-gel Coating

  • Lee, Dong Uk;Chaudhari, Shivshankar;Choi, Seung Yong;Moon, Myung Jun;Shon, Min Young
    • Corrosion Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.175-182
    • /
    • 2021
  • Magnesium alloy is limited in the industrial field because its standard electrode potential is -2.363 V vs. NHE (Normal Hydrogen Electrode) at 25 ℃. This high electrochemical activity causes magnesium to quickly corrode with oxygen in air; chemical conversion coating prevents corrosion but causes surface defects like cracks and pores. We have examined the anti-corrosion effect of sol-gel coating sealed on the defected conversion coating layer. Sol-gel coatings produced higher voltage current and smaller pore than the chemical conversion coating layer. The conversion coating on magnesium alloy AZ31 was prepared using phosphate-permanganate solution. The sol-gel coating was designed using trimethoxymethylsilane (MTMS) and (3-Glycidyloxypropyl) trimethoxysilane (GPTMS) as precursors, and aluminum acetylacetonate as a ring-opening agent. The thermal shock resistance was tested by exposing specimens at 140 ℃ in a convection oven; the results showed changes in the magnesium alloy AZ31 surface, such as oxidization and cracking. Scanning electron microscope (FE-SEM) analysis confirmed a sealed sol-gel coating layer on magnesium alloy AZ31. Electrochemical impedance spectroscopy (EIS) measured the differences in corrosion protection properties by sol-gel and conversion coatings in 0.35 wt% NaCl solution, and the potentiodynamic polarization test and confirmed conversion coating with the sol-gel coating show significantly improved resistance by crack sealing.

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

Resistance of Polystyrene-Impregnated Glued Laminated Lumbers after Exposure to Subterranean Termites in a Field

  • Dede HERMAWAN;Mahdi MUBAROK;Imam Busyra ABDILLAH;Yusuf Sudo HADI;Cossey YOSI;Aujchariya CHOTIKHUN;Rohmah PARI;Gustan PARI
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.1
    • /
    • pp.70-86
    • /
    • 2024
  • Termites are a serious threat to wood-based products in Indonesia. This study investigated the termite resistant property of glulam made from polystyrene-modified wood. Three tropical fast-growing wood species, namely mangium (Acacia mangium), manii (Maesopsis eminii), and rubberwood (Hevea brasiliensis), were prepared for flat-sawn laminae. After getting air-dried condition, the laminae were impregnated with polystyrene using potassium peroxydisulphate as a catalyst followed by polymerization at 80℃. Polystyrene-impregnated and control glued-laminated lumbers (glulams) were manufactured, and solid wood was provided. Three wood species and three wood products with six replicates were exposed in a field in Bogor, Indonesia, for four months, and before the tests, their density and moisture content were measured. At the end of the field tests, the weight loss and protection levels of each test sample were determined. A completely randomized factorial design was used for data analysis. The weight percentage gains for mangium, manii, and rubberwood were 22.30%, 18.22%, and 10.44%, respectively. The results showed that manii belonged to low-density wood, whereas the other two woods were medium-density wood, and the moisture content was the ambient moisture content, typical of the Bogor area. Regarding weight loss and protection level, mangium was the most durable against subterranean termite attacks, followed by rubberwood and manii. Among the wood products, the polystyrene-impregnated glulam presented the highest durability, followed by the control glulam and solid wood. Therefore, mangium and rubberwood polystyrene-impregnated glulams are recommended for future product development.

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

Protection of Cultural Heritage for the Modern Ages in Japan (일본 근대문화유산의 보호시책에 관한 연구)

  • Kim, Tai-Young;Kim, Dong-Sik
    • Journal of architectural history
    • /
    • v.9 no.2 s.23
    • /
    • pp.101-116
    • /
    • 2000
  • Many cultural heritages for the modern ages in Korea are becoming lost rapidly as a result of subsequent technological innovation and changes in industrial structures and other reasons. But they are indispensable for an understanding of history, tradition culture of Korea, and form the basis for development and advancement of future culture at the same time. Therefore, this study is aimed to review the protection of cultural heritage in Japan, establishing the protection policies in Korea. In Japan, The Advisory Committee for the Preservation and Utilization of Modern Cultural heritage was organized by The Agency for Cultural Affairs. And this classified modern cultural heritage into four fields, as like; (1)monuments, (2)buildings, (3)fine arts and historical heritage, and (4)life, culture, and technology to pursue concrete research and study. The next step is tarrying out investigations to identify these cultural heritages, which were once the backbone of Japanese modernization and are now in the process of being lost, in an effort to preserve them as cultural heritage of the Japanese modernization period. The investigation will have conducted on an about eight year scheme starting with 1996. And it's will ask all local boards of education(of the prefectures, cities, towns, and villages throughout the country) to supply all related records or documents available and to cooperate in field studies. So now, many cultural heritages for the modern ages in Japan have been designated as Important Cultural Properties, Registered Tangible Cultural Properties, Monuments, etc. And they have been prepared various tax policy(ex, reduction of the real estate tax). Also, that's examples are not only one by one but magnified with protection of large-scale construction associated with region. In addition, magnified with region's activities. In conclusion, in the process, protection has been extended to a broader variety of cultural properties and much consideration has been given to the methods of protection in Japan.

  • PDF

A Study on the fire-resistance of concrete-filled steel square tube columns without fire protection under constant central axial loads

  • Park, Su-Hee;Choi, Sung-Mo;Chung, Kyung-Soo
    • Steel and Composite Structures
    • /
    • v.8 no.6
    • /
    • pp.491-510
    • /
    • 2008
  • This paper presents a plan and guidelines that were drawn for Korean based research carried out on the fire-resistance of CFT columns. This research was carried out by reviewing the Korean regulations related to the fire-resistance of CFT columns and examining studies which had been made in Korea as well as overseas. The first phase of the study plan was to compare the fire-resistance of square CFT columns without fire protection (obtained through fire-resistance tests and numerical analyses) with estimated values (obtained through fire-resistance design formulas proposed in Korea and overseas). This comparison provided conclusions as outlined below. Fire-resistance tests conducted in this study proved that, when the actual design load is taken into consideration, square CFT columns without fire protection are able to resist a fire for more than one hour. A comparison was made of test and analysis results with the fire-resistance time based on the AIJ code, the AISC design formula and the estimation formula suggested for Korea. The results of this comparison showed that the test and analysis results for specimens SAH1, SAH2-1, SAH2-2 and SAH3 were almost identical with the AIJ code, the AISC design formula and estimation formula. For specimens SAH4 and SAH5, the estimation formula was more conservative than the AIJ code and the AISC design formula. It was necessary to identify the factors that have an influence on the fire-resistance of CFT columns without fire protection and to draw fire-resistance design formulas for these columns. To achieve this, it is proposed that numerical analyses and tests be conducted in order to evaluate the fire-resistance of circular CFT columns, the influence of eccentricity existing as an additional factor and the influence of the slenderness ratio of the columns. It is also suggested that the overall behavior of CFT structures without fire protection within a fire be evaluated through analysis simulation.