• 제목/요약/키워드: Integrated Protection

Search Result 502, Processing Time 0.027 seconds

Evaluating Quantitative Expansion Goals of the National Protected Areas Integrated System (국가 보호지역 통합 시스템의 양적 확대 목표에 대한 평가)

  • Hong, Jin-Pyo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.21 no.3
    • /
    • pp.57-65
    • /
    • 2018
  • The study is conducted to establish the National Protected Areas Integrated System(NPAIS) which includes National Protected Areas(NPAs) and other conservation measures in terms of effective ways for biodiversity conservation. Additionally, it is carried out to evaluate progress toward quantitative expansion goals in Aichi biodiversity Target 11. The NPAIS consists of NPAs and other effective area-based conservation measures(OECMs). There are two different types of OECMs. OECMs type I, including water-source protection Areas(WPA), riparian zones(RZ), fishery-resource protection zones (FPZ), and urban natural park zones(UNPZ), is a potential protected area which is recommended to be incorporated into the NPAs for effective management. OECMs type II means development restriction zones(DRZ), natural recreation forests(NRF), and buffer zones for Korea national arboretum(BKNA). As a result of evaluating the quantitative expansion goals of the NPAIS, terrestrial and inland water protected areas exceed 17% of the quantitative goal in Aichi biodiversity Target 11. The larger the area of individual OECMs and the lower the degree of overlap with NPAs, the higher the contribution of them to the terrestrial and inland water protected areas. DRZ contributes to enlarge more than 3% of quantitative expansion. And RZ and NRF contribute more than 1%. The marine protected areas are expanded by $1,425km^2$ through FPZ, but the expanded area is very small as comparing with the total marine area. It adds only 0.321% to the quantitative expansion. The rest of OECMs also has very poor quantitative expansion contributions in the marine area. Consequently, the NPAIS is effective for quantitative expansion of land areas, but not for marine areas.

A Control Room Dose Assessment for a 1300 MWe PWR Following a Loss of Coolant Accident (냉각재(冷却材) 상실사고시(喪失事故時) 1300 MWe 급(級) PWR원전(原電) 주제어실(主制御室)의 선량평가(線量評價))

  • Chang, Si-Young;Ha, Chung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.14 no.1
    • /
    • pp.34-45
    • /
    • 1989
  • The habitability of a reactor control room in a French 1300 MWe P'4 type PWR has been evaluated through the exposure dose assessment for the reactor operator following a Loss of Coolant Accident. The main hypotheses adopted in this evaluation are based on the French Standard Safety Analysis Report. A simple computer program, named COREX(Control Room EXposure), was developed to calculate : the time-integrated radioactivities released from the reactor building, the volume factors for radionuclides concerned and the resulting time-integrated external whole body and internal thyroid doses to the reactor operators staying in the control room up to 30 days following the LOCA. The results obtained in this study, on the whole, well agreed with those proposed by the EDF(Electricite de France) except for the case of the whole body exposure, which was attributed to the differences in the volume factors for the radionuclides concerned.

  • PDF

A Fully-integrated High Performance Broadb and Amplifier MMIC for K/Ka Band Applications (K/Ka밴드 응용을 위한 완전집적화 고성능 광대역 증폭기 MMIC)

  • Yun Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1429-1435
    • /
    • 2004
  • In this work, high performance broadband amplifier MMIC including all the matching and biasing components, and electrostatic discharge (ESD) protection circuit was developed for K/Ka band applications. Therefore, external biasing or matching components were not required for the operation of the MMIC. STO (SrTiO3) capacitors were employed to integrate the DC biasing components on the MMIC, and miniaturized LC parallel ESD protection circuit was integrated on MMIC, which increased ESD breakdown voltage from 10 to 300 V. A pre-matching technique and RC parallel circuit were used for the broadband design of the amplifier MMIC. The amplifier MMIC exhibited good RF performances and good stability in a wide frequency range. The chip size of the MMICs was $1.7{\pm}0.8$ mm2.

Study of Platform for Real-Time Medical Information Protection and Management (실시간 의료정보 보호 및 관리를 위한 플랫폼에 관한 연구)

  • Jeong, Chang Won;Lee, Sung Gwon;Joo, Su Chong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.245-250
    • /
    • 2014
  • In recent years, the developments of medical technology and emergency medical services have been changed to home from the hospital. In this regard, the researches for the prevention or early diagnosis have become actively. In particular, bio-signal monitoring is applied to a variety of u-healthcare application services. The proposed system in this paper is to provide a security technology to protect the medical information measured from the various sensors. Especially, bio-signal information is privacy-sensitive personal information that must be protected. We applied a two-dimensional code technology, QR code, for the protection and management. In the client side, it can analyze the QR code and confirm the results on devices. Finally, with this proposed platform, we show the results of application service to verify the creation and distribution of integrated image file between the bio-signal and medical image information.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

Evaluation of Durum Wheat Genotypes for Resistance against Root Rot Disease Caused by Moroccan Fusarium culmorum Isolates

  • Bouarda, Jamila;Bassi, Filippo M.;Wallwork, Hugh;Benchacho, Mohammed;Labhilili, Mustapha;Maafa, Ilyass;El Aissami, Aicha;Bentata, Fatiha
    • The Plant Pathology Journal
    • /
    • v.38 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Fusarium culmorum is one of the most important causal agents of root rot of wheat. In this study, 10 F. culmorum isolates were collected from farms located in five agro-ecological regions of Morocco. These were used to challenge 20 durum wheat genotypes via artificial inoculation of plant roots under controlled conditions. The isolate virulence was determined by three traits (roots browning index, stem browning index, and severity of root rot). An alpha-lattice design with three replicates was used, and the resulting ANOVA revealed a significant (P < 0.01) effect of isolate (I), genotype (G), and G × I interaction. A total of four response types were observed (R, MR, MS, and S) revealing that different genes in both the pathogen and the host were activated in 53% of interactions. Most genotypes were susceptible to eight or more isolates, while the Moroccan cultivar Marouan was reported resistant to three isolates and moderately resistant to three others. Similarly, the Australian breeding line SSD1479-117 was reported resistant to two isolates and moderately resistant to four others. The ICARDA elites Icaverve, Berghisyr, Berghisyr2, Amina, and Icaverve2 were identified as moderately resistant. Principal component analysis based on the genotypes responses defined two major clusters and two sub-clusters for the 10 F. culmorum isolates. Isolate Fc9 collected in Khemis Zemamra was the most virulent while isolate Fc3 collected in Haj-Kaddour was the least virulent. This work provides initial results for the discovery of differential reactions between the durum lines and isolates and the identification of novel sources of resistance.

An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks

  • Zhao, Zhen;Chen, Jie;Zhang, Yueyu;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4250-4267
    • /
    • 2015
  • Although many revocable group signature schemes has been proposed in vehicular ad hoc networks (VANETs), the existing schemes suffer from long computation delay on revocation that they cannot adapt to the dynamic VANETs. Based on Chinese remainder theorem and Schnorr signature algorithm, this paper proposes an efficient revocable group signature scheme in VANETs. In the proposed scheme, it only need to update the corresponding group public key when a member quits the group, and in the meanwhile the key pairs of unchanged group members are not influenced. Furthermore, this scheme can achieve privacy protection by making use of blind certificates. Before joining to the VANETs, users register at local trusted agencies (LTAs) with their ID cards to obtain blind certificates. The blind certificate will be submitted to road-side units (RSUs) to verify the legality of users. Thus, the real identities of users can be protected. In addition, if there is a dispute, users can combine to submit open applications to RSUs against a disputed member. And LTAs can determine the real identity of the disputed member. Moreover, since the key pairs employed by a user are different in different groups, attackers are not able to track the movement of users with the obtained public keys in a group. Furthermore, performance analysis shows that proposed scheme has less computation cost than existing schemes.

Low-cost privacy protection integrated monitoring system using interest emphasis method (관심강조 방법을 활용한 저비용 사생활보호 통합관제시스템)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.234-239
    • /
    • 2021
  • Recently, as the installation of a large number of high-performance CCTVs for crime prevention and traffic control has increased rapidly, the problem of increasing system requirements for response to privacy infringement factors and analysis of high-definition image information transmitted from multiple cameras has been actively emerging. Accordingly, there is a need for a method for responding to privacy infringement and a method for efficiently processing surveillance images input from multiple cameras. In this paper, in order to reduce the processing cost of the input image and improve the processing speed, an integrated image is generated by grouping images input from a plurality of cameras. After analyzing the pre-generated integrated video, it detects a preset privacy event or an event that highlights interest. Depending on whether or not an event is detected, you will perform an editing operation corresponding to the event.

Design of a Low Drop-out Regulator with a UVLO Protection Function (UVLO 보호기능이 추가된 LDO 레귤레이터 설계)

  • Park, Won Kyeong;Lee, Su Jin;Park, Yong Su;Song, Han Jung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.239-244
    • /
    • 2013
  • This paper presents a design of the CMOS LDO regulator with a UVLO protection function for a high speed PMIC. Proposed LDO regulator circuit consists of a BGR reference circuit, an error amplifier and a power transistor and so on. UVLO block between the power transistor and the power supply is added for a low input protection function. Also, UVLO block showed normal operation with turn-off voltage of 2.7V and turn-on voltage of 4 V in condition of 5 V power supply. Proposed circuit generated fixed 3.3 V from a supply of 5V. From SPICE simulation results using a $1{\mu}m$ high voltage CMOS technology, simulation results were 5.88 mV/V line regulation and 27.5 uV/mA load regulation with load current 0 mA to 200 mA.

Synchronized Sampling Structure applied HW/SW platform for LAN-based Digital Substation Protection (LAN 기반 디지털 변전소 보호를 위한 동기 샘플링 구조적용 HW/SW 플랫폼 기술)

  • Son, Kyou Jung;Nam, Kyung-Deok;An, Gi Sung;Chang, Tae Gyu
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.178-185
    • /
    • 2020
  • This paper proposes precise time synchronization-based synchronized sampling structure applied HW/SW platform for LAN-based protection of future digital substations. The integrated software of the proposed platform includes IEC 61850 protocol, IEEE 1588 precision time protocol and synchronized sampling structure. The proposed platform expected to provide a basis of an application of future distributed sensing data-based protection and control methods by providing synchronized measurement among IEDs. The implementation of the proposed HW/SW platform technique was performed using TMDXIDK572 multi-core/multi-processor evaluation module and its time synchronization performance and synchronized sampling function were confirmed through the performance tests.