• Title/Summary/Keyword: Remote work

Search Result 579, Processing Time 0.022 seconds

Development of Web-based Power Plant Simulator System (원격 훈련용 발전 시뮬레이터 개발)

  • Byun, Seung-Hyun;Kang, Hae-su;Woo, Joo-Hee;Lee, Jee-Hoon;Kim, Duck-Ho
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.2
    • /
    • pp.277-283
    • /
    • 2021
  • Power plant simulators have been used for operator training, control verification and engineering verification. In general, simulators can be used in the place where they are installed by only single user group at a time. Considering high cost of simulator development, a lot of available scenarios, the diversity of user level and accessibility based on users' work location, development of simulator system that can be used by multiple user groups regardless of location is required in order to enhance utilization of simulators. In this paper, the simulator system that can be used by multiple user group simultaneously without location limitation is proposed. The simulator system is composed of simulator servers, database servers, HMI servers, a web server, web clients. Simulator server consists of control model, process model that are developed for Circulating Fluidized Bed power plant located overseas. A web server manages user accounts, operation procedures, multiple server access between web client group and simulator server group. In other words, a web server makes a user group select a simulator server at a time. The developed simulator system is integrated after implementing process model, control model, HMI, and web server. Web client systems are installed on local site where power plant is located, while simulator servers, HMI servers, database servers, and a web server are located in KEPCO RI. The developed simulator system is verified by steady-state test, malfunction test and so on via remote access.

VDI deployment and performance analysys for multi-core-based applications (멀티코어 기반 어플리케이션 운용을 위한 데스크탑 가상화 구성 및 성능 분석)

  • Park, Junyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1432-1440
    • /
    • 2022
  • Recently, as Virtual Desktop Infrastructure(VDI) is widely used not only in office work environments but also in workloads that use high-spec multi-core-based applications, the requirements for real-time and stability of VDI are increasing. Accordingly, the display protocol used for remote access in VDI and performance optimization of virtual machines have also become more important. In this paper, we propose two ways to configure desktop virtualization for multi-core-based application operation. First, we propose a codec configuration of a display protocol with optimal performance in a high load situation due to multi-processing. Second, we propose a virtual CPU scheduling optimization method to reduce scheduling delay in case of CPU contention between virtual machines. As a result of the test, it was confirmed that the H.264 codec of Blast Extreme showed the best and stable frame, and the scheduling performance of the virtual CPU was improved through scheduling optimization.

Automation of Tasks and Knowledge-Intensive Services: A Sectorial Approach to the Impact of Covid 19 in Argentina

  • Martinez, Ricardo Gabriel;Leone, Julian Gabriel;Repeti, Juan Manuel Rodriguez
    • Iberoamérica
    • /
    • v.23 no.2
    • /
    • pp.273-307
    • /
    • 2021
  • The covid 19 pandemic led to an economic collapse and multiple impacts upon Argentina's labour dynamics. As well as in other parts of the region, falls in employment rates (both due to an increase in unemployment and significant withdrawals from the labour force) were combined with wage reductions for those who were able to keep their jobs. Thus, two important processes for the labour market complimented each other: a structural shock associated with a tasks automation as a reorganisation and substitution of factors, with a cyclical recession caused by the pandemic. The international experience shows the amplifying impact the latter has on the former, generating long-term consequences mainly in routine-intensive jobs. However, the knowledge-intensive services sector appears to be the most capable of cushioning the recessionary shock (both in terms of wages and labour absorption), even with nuances within the sector depending on the extent of the shutdown measures and its capability to switch to remote work. Finally, the task approach is decisive in capturing the ability to adapt both the cyclical and structural processes, absorbing a large part of the explanatory potential that sectoral classifications tend to bring about.

Prospects For The Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Rohach, Oksana;Pryhalinska, Tetiana;Kvasnytsya, Iryna;Pohorielov, Mykhailo;Rudnichenko, Mykola;Lastochkina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.353-357
    • /
    • 2022
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.

Radiological safety analysis of a newly designed spent resin mixture treatment facility during normal and abnormal operational scenarios for the safety of radiation workers

  • Jaehoon Byun;Seungbin Yoon;Hee Reyoung Kim
    • Nuclear Engineering and Technology
    • /
    • v.55 no.5
    • /
    • pp.1935-1945
    • /
    • 2023
  • The radiological safety of workers in a newly developed microwave-based spent resin treatment facility was assessed based on work location and operational scenarios. The results show that the remote-operation room worker was exposed to maximum annual dose of 3.19E+00 mSv, which is 15.9% of the dose limit, thereby confirming radiological safety. Inside the pathway, annual doses in the range of 7.87E-02-2.07E-01 mSv were measured initially at the mock-up tank and later at the point between the spent resin separation and treatment parts. The dose of emergency maintenance workers was below the dose limit (4.08E-03-4.99E+00 mSv); however, before treatment (separation and microwave), the dose of maintenance and repair workers exceeded the dose limit. The doses of the effluent removal workers at the zeolite and activated carbon storage tank and spent resin storage tank were the lowest at 2.79E-01-2.87E-01 mSv and 9.27E-01 mSv in "1 h" and "4-5 h of operation", respectively. The immediately lower and upper layers of the facility room exhibited the highest annual doses of 1.84E+00 and 3.22E+00 mSv, respectively. Through this study, a scenario that can minimize the dose considering the movement of spent resin through the facility can be developed.

Surface exposure age of (25143) Itokawa estimated from the number of mottles on the boulder

  • Jin, Sunho;Ishiguro, Masateru
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.45.2-46
    • /
    • 2020
  • Various processes, such as space weathering and granular convection, are occurring on asteroids' surfaces. Estimation of the surface exposure timescale is essential for understanding these processes. The Hayabusa mission target asteroid, (25143) Itokawa (Sq-type) is the only asteroid whose age is estimated from remote sensing observations as well as sample analyses in laboratories. There is, however, an unignorable discrepancy between the timescale derived from these different techniques. The ages estimated based on the solar flare track density and the weathered rim thickness of regolith samples range between 102 and 104 years [1][2]. On the contrary, the ages estimated from the crater size distributions and the spectra cover from 106 to 107 years [3][4]. It is important to notice that there is a common drawback of both age estimation methods. Since the evidence of regolith migration is found on the surface of Itokawa [5], the surficial particles would be rejuvenated by granular convection. At the same time, it is expected that the erasure of craters by regolith migration would affect the crater size distribution. We propose a new technique to estimate surface exposure age, focusing on the bright mottles on the large boulders. Our technique is less prone to the granular convection. These mottles are expected to be formed by impacts of mm to cm-sized interplanetary particles. Together with the well-known flux model of interplanetary dust particles (e.g., Grün, 1985 [6]), we have investigated the timescale to form such mottles before they become dark materials again by the space weathering. In this work, we used three AMICA (Asteroid Multi-band Imaging Camera) v-band images. These images were taken on 2005 November 12 during the close approach to the asteroid. As a result, we found the surface exposure timescales of these boulders are an order of 106 years. In this meeting, we will introduce our data analysis technique and evaluate the consistency among previous research for a better understanding of the evolution of this near-Earth asteroid.

  • PDF

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

Nutrition and health challenges among low-income families of young children in the post COVID-19 era: a qualitative study

  • Hyunjung Lee;Wilna Oldewage-Theron;Conrad Lyford;Stephanie Shine
    • Nutrition Research and Practice
    • /
    • v.17 no.6
    • /
    • pp.1185-1200
    • /
    • 2023
  • BACKGROUND/OBJECTIVES: In the United States, one in every 5 children is obese with greater likelihood in low-income households. The coronavirus disease 2019 (COVID-19) pandemic may have accelerated disparities in child obesity risk factors, such as poor dietary intake and increased sedentary behaviors, among low-income families because of financial difficulties, social isolation and other struggles. This study reveals insights into nutrition and health challenges among low-income families of young children in West Texas to better understand needs and develop interventions. SUBJECTS/METHODS: In-depth individual interviews were performed via Zoom among 11 families of children under the age of 3. A semi-structured interview guide was developed to explore 3 areas: changes in (1) dietary intake and (2) sedentary behaviors and (3) families' preferences regarding a parent nutrition education program. Each interview was audiorecorded, transcribed, and coded using MaxQDA software. RESULTS: Eating together as a family become challenging because of irregular work schedules during the COVID-19 pandemic. Most parents stated that their children's dietary habits shifted with an increased consumption of processed foods. Many parents are unable to afford healthful foods and have utilized food and nutrition assistance programs to help feed their families. All families reported that their children's screen time substantially increased compared to the pre-pandemic times. Moreover, the majority of parents did not associate child screen time with an obesity risk, so this area could be of particular interest for future interventions. Meal preparation ideas, remote modality, and early timing were identified as key intervention strategies. CONCLUSIONS: Online nutrition interventions that emphasize the guidelines for child screen time and regular meal routines will be effective and promising tools to reach low-income parents for early childhood health promotion and obesity prevention.

A Study On Operation for DevOps Using Zero Trust in Network Separation Environment (망분리 환경에서 제로 트러스트를 활용한 DevOps 운영에 관한 연구)

  • Bong-Yong Han;Young-Kun Choi;Ga-Yeon So;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.27-34
    • /
    • 2024
  • Network separation is an important policy that Cyber Incident prevent cyber and protect data. Recently, the IT environment is changing in software development, such as remote work, using the cloud, and using open sources. Due to these changes, fintech companies' development productivity and efficiency are lowering due to network separation regulations, and the demand for easing network separation continued. The government revised the regulations electronic financial supervision(hereafter EFS) in response to needs for mitigation of network separation in the IT environment and fintech companies. Some amendments to the EFS, which took effect on 01/01/2023, mitigate network separation only for research and development purposes in cloud environments. If software developed in a cloud development environment is applied to an operating system through a distribution system the existing perimeter-based security model will not satisfaction the network separation conditions. In this Study, we would like to propose a way to maintain the DevOps system in a network separation environment by Using the zero trust security system.