• Title/Summary/Keyword: Real-Time Security Management

Search Result 274, Processing Time 0.028 seconds

Development of a Portable Detection System for Simultaneous Measurements of Neutrons and Gamma Rays (중성자선과 감마선 동시측정이 가능한 휴대용 계측시스템 개발에 관한 연구)

  • Kim, Hui-Gyeong;Hong, Yong-Ho;Jung, Young-Seok;Kim, Jae-Hyun;Park, Sooyeun
    • Journal of radiological science and technology
    • /
    • v.43 no.6
    • /
    • pp.481-487
    • /
    • 2020
  • Radiation measurement technology has steadily improved and its usage is expanding in various industries such as nuclear medicine, security search, satellite, nondestructive testing, environmental industries and the domain of nuclear power plants (NPPs). Especially, the simultaneous measurements of gamma rays and neutrons can be even more critical for nuclear safety management of spent nuclear fuel and monitoring of the nuclear material. A semiconductor detector comprising cadmium, zinc, and tellurium (CZT) enables to detect gamma-rays due to the significant atomic weight of the elements via immediate neutron and gamma-ray detection. Semiconductor sensors might be used for nuclear safety management by monitoring nuclear materials and spent nuclear fuel with high spatial resolution as well as providing real-time measurements. We aim to introduce a portable nuclide-analysis device that enables the simultaneous measurements of neutrons and gamma rays using a CZT sensor. The detector has a high density and wide energy band gap, and thus exhibits highly sensitive physical characteristics and characteristics are required for performing neutron and gamma-ray detection. Portable nuclide-analysis device is used on NPP-decommissioning sites or the purpose of nuclear nonproliferation, it will rapidly detect the nuclear material and provide radioactive-material information. Eventually, portable nuclide-analysis device can reduce measurement time and economic costs by providing a basis for rational decision making.

A Study on the Introduction of Electronic Commerce for Purchasing Section in Hospitals - Focused on the Understanding of Purchasing Managers - (병원구매업무에 있어서의 전자상거래 도입에 관한 연구 - 구매부서 관리자의 인식도를 중심으로 -)

  • Hwang, Eun-Bum;Nam, Sang-Yo;Ha, Ho-Uk;Lee, Chang-Eun
    • Korea Journal of Hospital Management
    • /
    • v.6 no.3
    • /
    • pp.69-89
    • /
    • 2001
  • This study is focused that the electronic commerce(EC) on the purchasing section may improve the efficiency and transparency of the hospitals management. After reviewing the purchasing activity of hospitals, I study the introduction, expected effects, and problems of EC. So, I am going to provide basic information for activating EC. The samples are managers of 170 hospitals, which are located on Seoul. As a result of collection this survey, I analyze 79 hospitals. For data analysis, I use $X^2$-test and ANOVA for purchasing management and the relevance of EC according to the level of care. The results of this study are 1. The problems on the management of purchasing section are: firstly, they don't have sufficient time to study market. Secondly, it is difficult to find competitive suppliers. And, lastly, they cannot gather a lot of information about the price of products. 2. There are many answers of the needs on the introduction of B2B. However, some hospitals think they don't need it. But, the most answers are that the EC will be settled within 4 years. So, we can realize that these hospitals are getting interested on the EC. On the other hand, I find that they prefer outside EC companies for the introduction of EC. 3. On the expected effects on EC, first is the effectiveness of the market survey. The next is to collect information of adequate price of products owing to clear transaction, find easier new suppliers and gather useful data. 4. On the external problems of the introduction of EC, there is low credibility related to the security and the weakness of suppliers' information system. Especially, on the Real Transaction Price Payment system, the bigger bed size, the higher understanding on these problems. On the internal problems of the introduction of EC, first is the burden of the introduction of EC and operating cost. Especially, on the burden of the disclosure of revenue source, the smaller bed size, the higher understanding on this problem So, this is a point which deserves my attention statistically. However, this shows relatively little understanding about incomplete the standard of product category and the weak information system of hospital. Through this study, I am going to suggest 3 points for the activation of the introduction of EC on hospitals. 1. The reform of the Real Transaction Price Payment System on medical supplies and materials for medical treatment 2. The establishment of the standard of product category 3. The promotion of information system based on network.

  • PDF

Development of Multi-function Sensor Integration Module System for Smart Green Building (스마트 그린빌딩 구현을 위한 다기능 센서 통합 모듈 시스템 개발)

  • Kim, Bong-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.4799-4804
    • /
    • 2013
  • Green IT technology for the growth of low-carbon green environment and future development of the new technology. Therefore, in this paper, data generated by the security module for RFID applications, smart green building Sung multi-function sensor integrated module that can be integrated environment for building monitoring and management system has been developed. The development of a thermal sensor, temperature sensor, smog sensor, CO2 sensor, O2 sensor, tension sensor and damage detection sensor module with integrated system module integrated multi-functional sensors implemented in the paper. In real-time monitoring by allowing was design and developed system that can be implemented smart green building environment for the environment inside buildings.

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

A Study on Features of Smart Phone Users (스마트 폰 사용자 특성에 관한 탐색적 연구)

  • Ha, Tai-Hyun
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.177-184
    • /
    • 2010
  • Mobile phones users are not only able to use smart phone services in real time whenever and wherever they desire, but also they can acquire appropriate information that they need. The features of smart phone services and users are examined in this study because there are not enough studies on such unique features of smart phone services. In accordance with the results of the study the features of smart phone services and users can be categorized as follows: 1) the requisite features of smart phone services are immediate connectivity and. 2) The requisite features for smart phone users are user friendliness and user innovation. 3) The requisite features of smart phone technology are security and linkage.

  • PDF

Design and Implementation of School Affairs Management System using PHP on the Internet (인터넷 상에서 PHP를 이용한 학사관리 시스템의 설계 및 구현)

  • Moon, Jin-Yong;Koo, Yong-Wan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3148-3154
    • /
    • 2000
  • In this paper. the design and implementationof the on-line registration system for the school affairs is described. The environments for the system configurations include a PC server under Linux Iperating System. Apache Web-server, and MySQL as database engine. In addition, PHP, which becomes a popular Internet server-based script language lately, is used to implement a real-time database. In order to avoid overload problems during short-term registration period, which deconstraces the typical surge of traffics, the proposed system is designed to minimize the unnecessary interfacing tasks. On administrator side task, the sytem is designed to have environments by separating the dechcated server that restricts the scope of specific database thasks. In doing so, it become possibal to build an optical system by distributing, balancing the transaction load, maintainimg the security and efficient administrative tasks.

  • PDF

Cache Reliability Enhancing Method for Recursive DNS (Recursive DNS의 캐쉬 정보 신뢰성 향상 기법)

  • Ju, Yong-Wan;Lee, Eung-Jae;Nam, Kwang-Woo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.227-238
    • /
    • 2008
  • As the internet users rise up rapidly, DNS information forgery can cause severe socio-economic damages. However, most studies on DNS information security reached the breaking point in applying to actual circumstances because of the limit of existing DNS system version, the increasement of management burden and etc. The paper proposes the real-time method for detecting cache poisoning of DNS system independent of analysing the DNS forgery types in the current DNS service environment. It also proposes the method of enhancing the reliability for the cache information of Recursive DNS system by post-verifying the cache information of the DNS system.

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS

  • Kan, Zhe;Wang, Xiaolei
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.632-644
    • /
    • 2019
  • The remote monitoring and warning system for dangerous chemicals is designed with the concept of the Cyber-Physical System (CPS) in this paper. The real-time perception, dynamic control, and information service of major hazards chemicals are realized in this CPS system. The CPS system architecture, the physical layer and the applacation layer, are designed in this paper. The terminal node is mainly composed of the field collectors which complete the data acquisition of sensors and video in the physical layers, and the use of application layer makes CPS system safer and more reliable to monitor the hazardous chemicals. The cloud application layer completes the risk identification and the prediction of the major hazard sources. The early intelligent warning of the major dangerous chemicals is realized and the security risk images are given in the cloud application layer. With the CPS technology, the remote network of hazardous chemicals has been completed, and a major hazard monitoring and accident warning online system is formed. Through the experiment of the terminal node, it can be proved that the terminal node can complete the mass data collection and classify. With this experiment it can be obtained the CPS system is safe and effective. In order to verify feasible, the multi-risk warning based on CPS is simulated, and results show that the system solves the problem of hazardous chemicals enterprises safety management.

Development of the Practical System for the Automated Damage Assessment (재해 피해조사 자동화를 위한 실용시스템 구축)

  • Jin, Kyeonghyeok;Kim, Youngbok;Choi, Woojung;Shim, Jaehyun
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.2
    • /
    • pp.73-78
    • /
    • 2008
  • Recently, large scale natural disasters such as floods and typhoons due to climate change have been occurring all over the world causing severe damages. Among the various efforts to reduce and recover damages, recently, advanced information technology and remote sensing techniques are applied in disaster management. In this study, a real-time automated damage estimation system using information technology and spatial imagery was developed to accomplish prompt and accurate disaster damage estimation. This system is able to estimate the damage amounts of public facilities such as roads, rivers, bridges automatically through spatial imageries including ground based digital images, aerial photos, satellite images of disaster sites. Based on these spatial imageries, the damage amounts are analyzed in the Web-GIS based analysis system. Consequently, the digital damage reports such as digital disaster information sheets and damage maps can be made promptly and accurately. This system can be a useful tool to carry out prompt disaster damage estimation and efficient disaster recovery.

  • PDF

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.