• Title/Summary/Keyword: Protection Standards

Search Result 679, Processing Time 0.027 seconds

Technological and economic study of ship recycling in Egypt

  • Welaya, Yousri M.A.;Abdel Naby, Maged M.;Tadros, Mina Y.
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.4 no.4
    • /
    • pp.362-373
    • /
    • 2012
  • The ship recycling industry is growing rapidly. It is estimated that the International Maritime Organization's (IMO) decision to phase-out single hull tankers by 2015 will result in hundreds of ships requiring disposal. At present, the ship recycling industry is predominantly based in South Asia. Due to the bad practice of current scrapping procedure, the paper will highlight the harm occurring to health, safety and environment. The efforts of the Marine Environment Protection Committee (MEPC) which led to the signing of the Hong Kong International Convention are also reviewed. The criteria and standards required to reduce the risk and damage to the environment are discussed and a proposed plan for the safe scrapping of ships is then presented. A technological and economic study for the ship recycling in Egypt is carried out as a case study. This includes the ship recycling facility size and layout. The equipment and staff required to operate the facility are also evaluated. A cost analysis is then carried out. This includes site development, human resources, machineries and equipment. A fuzzy logic approach is used to assess the benefits of the ship breaking yard. The use of the fuzzy logic approach is found suitable to make decisions for the ship breaking industry. Based on given constraints, the proposed model has proved capable of assessing the profit and the internal rate of return.

Study on the Solving Conflicts between Fishing Village Community and Residents in using Community Fishing Ground (마을어장 이용에 따른 어촌계와 주민간의 갈등 해소 방안 연구)

  • CHOI, Young-Chan
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.21 no.4
    • /
    • pp.568-575
    • /
    • 2009
  • On the conflict factors in using community fishing ground and their solutions, some conclusions are derived with the survey for fishing villages, residents, tourists as follows: Jeju Island has beautiful sceneries with seas in all the directions and so remarkable potential as personal experience fishing village. For sustainable development of ecological tourism in each fishing village, systematic, long-term development plans and management systems through decision making with residents in fishing and non-fishing villages are demanded. For tourist development of fishing village, protection management systems for marine and swampy land are needed first of all. Next, economical profit and the participation of resident have first priority, and also individual standards for each village are urgently prepared based on the results of basic research on each village. Finally, educations on environment and fishing village with professional tourist guide are needed. Ecological protection, environmental education, resident participation, local government's concern, and financial support could solve residential conflicts and make Jeju Island a Mecca of local fishing village tourism.

Determination of Derived Release Limits for a CANDU Nuclear Power Plant (CANDU형 원전에서의 유도방출한도 결정)

  • Kim, Kyo-Youn;Hwang, Hae-Ryong;Kim, Jong-Kyung
    • Journal of Radiation Protection and Research
    • /
    • v.19 no.1
    • /
    • pp.23-35
    • /
    • 1994
  • A computer code DRL was developed to calculate the derived release limits at CANDU type nuclear power plants. The derived release limits resulting from DRL code is to set guidelines for the release of radionuclides in airborne and water-borne effuents during normal operations of a CANDU type nuclear power plant. The DRL code generally follows the methodology Prescribed in the CSA standard N288.1-M87 and uses the Parameter values recommended in the same standards. The DRL code was used to calculate a set of preliminary derived release limits for the Wolsong NPP.

  • PDF

A Study of Environment & Bullet-Proof Capability Test Method for KLTV's Transparent Armour (한국형 전술차량 방탄유리 환경 및 방호력 시험 적용 기법 연구)

  • Park, Jinwon;Park, Youngchan;Kim, Seonjin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.1
    • /
    • pp.69-73
    • /
    • 2018
  • Korean-peacekeeper's transparent armors in Iraq showed delamination, cracking and clouding a decade ago. And there were also similar deterioration recurrences in KLTV during the operational test a few years ago. Also, the differences between operational capability & lab Bullet-proof test condition, and insufficiency of military protection spec resulted in incomplete bullet-proof results. Moreover, although so many ground weapon systems have been developed, there were not secure test & evaluation codes to verify transparent armoured glasses equal to advanced-overseas products. So in this study, first, environmental test codes were established that all tests should be carried out as the application of only one specimen with newly adopted thermal shock test instead of completing each test with different one. Second, protection standards were integrated through the analysis of global developed country's specifications and reinforced as adding to the real mock-up condition if vehicle's glasses are smaller than standard specimen. Hereby, by applying to test-codes which including actual operational & vehicular conditions, the gap between development test and operational environment was minimized.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

Evaluation of Evacuation Safety of High School According to Change in the Width of Hallway

  • Seon-Yong Jeong;Hong-Sang Lee;Ha-Sung Kong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.60-72
    • /
    • 2023
  • The purpose of this study is to measure the change in evacuation time at high schools according to the change in hallway width using an evacuation simulation program and to analyze the result of such change. In order to measure the evacuation time according to the change in the hallway width according to the 「Rules on the Standards for Evacuation and Fire Protection Structures of Buildings」 and to analyze the change in evacuation time resulted from the increase in the number of occupants, a scenario was constructed by applying the 「performance-oriented design method and standard for firefighting facilities, etc.」. As a result of the experiment, it was found that the evacuation time was the shortest when the width of the hallway was the widest, which was 3m. On the other hand, the evacuation time took the longest at 1.8m, which was the width of the second narrowest hallway. For the safety of high school students who spend a lot of time at school, it is necessary to secure a wide hallway width when building a new school or to provide periodic safety education in the case of an existing school whose hallways are considered narrow.

Proposed CCPS model for comprehensive security management of CCTV (영상정보처리기기(CCTV)의 포괄적 보안관리를 위한 암호·인증·보호·체계(CCPS) 모델 제안)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.657-660
    • /
    • 2021
  • A video information processing system (CCTV) requires comprehensive administrative, physical, and technical security management to collect, transmit and store sensitive information. However, there are no regulations related to video information processing, certification methods for the technology used, and application standards suitable for security technology. In this paper, we propose a cryptography, certification, protection, system (CCPS) model that can protect the system by including encryption technology for application to the video information processing system and authentication measures for the technology used in the system configuration.

  • PDF

Factors Affecting the Intention to Distribute in Sort Plastic Waste of Vietnamese People: A Case Study in Ho Chi Minh City

  • Thai Dinh TRUONG;Thich Van NGUYEN
    • Journal of Distribution Science
    • /
    • v.21 no.8
    • /
    • pp.35-45
    • /
    • 2023
  • Purpose: This paper (1) identifies the factors that affect people's changing habits towards waste sorting, (2) evaluates the benefits of waste sorting to the environment and (3) designs communication strategies to change people's behavior and habits in sorting plastic waste in Ho Chi Mnh City, Vietnam. Research design, data and methodology: Using the data from 309 people that are living in Ho Chi Minh City and Structural Equation Modeling (SEM), to evaluate variables and test the hypotheses. Results: Research results show that attitudes, subjective standards, behavioral control, and facilities affect people's intention to classify plastic waste. We find that environmental concerns greatly influence people's attitudes. In contrast, environmental concerns have a relatively weaker effect on people's degree of behavioral control. Conclusion: Environmental protection is a matter of concern in the world. In Vietnam, this issue has been institutionalized into law to create a basis for improving the effectiveness of environmental protection activities. This article has some limitations. Firstly, sample is limited to HCMC residents; the study results are not representative of the entire population of Vietnam. This paper is based on cross-sectional data, which is not the best way to establish a causal relationship between the intention to sort plastic waste and its drivers.

A Statistical Methodology Study for Measuring Privacy Disclosure Riskin Open Data Environment (오픈 데이터 환경에서 개인정보 노출 위험 측정을 위한 통계적 방법론 연구)

  • Sieun Kim;Ieck-chae Euom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.323-333
    • /
    • 2024
  • Recently, Syntheic data has been in the spotlight as a technology that can protect personal information while maintaining the patterns and characteristics of actual data. Accordingly, technical and institutional research on synthetic data is actively being conducted, but it is difficult to actively use synthetic data due to the lack of clear standards and guidelines. This study is a preliminary study for quantifying the disclosure risk of synthetic data, and derives a privacy disclosure risk index through statistical methodology and suggests specific application measures to comply with the General Data Protection Regulation(GDPR). It is expected that the disclosure risk and the balance of data utility can be controlled through the privacy disclosure risk index of this study in an open data environment.