• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.024 seconds

Analysis methodology of local damage to dry storage facility structure subjected to aircraft engine crash

  • Almomani, Belal;Kim, Tae-Yong;Chang, Yoon-Suk
    • Nuclear Engineering and Technology
    • /
    • v.54 no.4
    • /
    • pp.1394-1405
    • /
    • 2022
  • The importance of ensuring the inherent safety and security has been more emphasized in recent years to demonstrate the integrity of nuclear facilities under external human-induced events (e.g. aircraft crashes). This work suggests a simulation methodology to effectively evaluate the impact of a commercial aircraft engine onto a dry storage facility. A full-scale engine model was developed and verified by Riera force-time history analysis. A reinforced concrete (RC) structure of a dry storage facility was also developed and material behavior of concrete was incorporated using three constitutive models namely: Continuous Surface Cap, Winfrith, and Karagozian & Case for comparison. Strain-based erosion limits for concrete were suitably defined and the local responses were then compared and analyzed with empirical formulas according to variations in impact velocity. The proposed methodology reasonably predicted such local damage modes of RC structure from the engine missile, and the analysis results agreed well with the calculations of empirical formulas. This research is expected to be helpful in reviewing the dry storage facility design and in the probabilistic risk assessment considering diverse impact scenarios.

Investigating the Relationship Between Accessibility of Green Space and Adult Obesity Rates: A Secondary Data Analysis in the United States

  • Kim, Junhyoung;Lee, Sujung;Ramos, William
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.3
    • /
    • pp.208-217
    • /
    • 2021
  • Objectives: In spite of the importance of green space for reducing obesity-related problems, there has been little exploration of whether access to green space (e.g., parks and recreational facilities) influences the obesity rate of adults in the United States. The purpose of the study was to investigate the relationships among accessibility of green space, obesity rates, and socioeconomic and demographic variables among adults living in the State of Indiana, United States. Methods: We conducted a secondary data analysis to investigate the relationships among accessibility to green space, obesity rates, and socio-demographic variables with employing Geographic Information System in order to measure the accessibility of green space. Results: This study found that accessibility of green space served as a strong predictor of reduced obesity rates among adults (β=-2.478; p<0.10). In addition, adults with higher education levels, as well as better access to green space, were found to have even lower obesity rates (β=-0.188; p<0.05). Other control variables such as unemployment rates, food security, and physical inactivity are additional factors that influence obesity rates among adults. Conclusions: Accessibility of green space may play an important role in facilitating physical activity participation and reducing obesity rates.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Simulation for the Propagation Pattern Analysis of Code Red Worm (Code Red 웜 전파 패턴 분석을 위한 시뮬레이션)

  • Kang, Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.155-162
    • /
    • 2006
  • It was well known that how much seriously the Internet worm such as the Code Red had an effect on our daily activities. Recently the rapid growth of the Internet speed will produce more swift damage us in a short term period. In order to defend against future worm, we need to understand the propagation pattern during the lifetime of worms. In this paper, we analyze the propagation pattern of the Code Red worm by a computer simulation. In particular, we show that an existing simulation result about the number of infectious hosts does not match the observed data, and then we introduce a factor of revised human countermeasures into the simulation. We also show the simulation results presenting the importance of patching and pre-patching of the Internet worm.

  • PDF

Welfare Policy Visualization Analysis using Big Data -Chungcheong- (빅데이터를 활용한 복지정책 시각화분석 -충청도 중심으로-)

  • Dae-Yu Kim;Won-Shik Na
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.15-20
    • /
    • 2023
  • The purpose of this study is to analyze the changes and importance of welfare policies in Chungcheong Province using big data analysis technology in the era of the Fourth Industrial Revolution, and to propose stable welfare policies for all generations, including the socially underprivileged. Chungcheong-do policy-related big data is coded in Python, and stable government policies are proposed based on the results of visualization analysis. As a result of the study, the keywords of Chungcheong-do government policy were confirmed in the order of region, society, government and support, education, and women, and welfare policy should be strengthened with a focus on improving local health policy and social welfare. For future research direction, it will be necessary to compare overseas cases and make policy proposals on the stable impact of national welfare policies.

Numerical investigation of glass windows under near-field blast

  • Chiara Bedon;Damijan Markovic;Vasilis Karlos;Martin Larcher
    • Coupled systems mechanics
    • /
    • v.12 no.2
    • /
    • pp.167-181
    • /
    • 2023
  • The determination of the blast protection level and the corresponding minimum load-bearing capacity for a laminated glass (LG) window is of crucial importance for safety and security design purposes. In this paper, the focus is given to the window response under near-field blast loading, i.e., where relatively small explosives would be activated close to the target, representative of attack scenarios using small commercial drones. In general, the assessment of the load-bearing capacity of a window is based on complex and expensive experiments, which can be conducted for a small number of configurations. On the other hand, nowadays, validated numerical simulations tools based on the Finite Element Method (FEM) are available to partially substitute the physical tests for the assessment of the performance of various LG systems, especially for the far-field blast loading. However, very little literature is available on the LG window performance under near-field blast loads, which differs from far-field situations in two points: i) the duration of the load is very short, since the blast wavelength tends to increase with the distance and ii) the load distribution is not uniform over the window surface, as opposed to the almost plane wave configuration for far-field configurations. Therefore, the current study focuses on the performance assessment and structural behaviour of LG windows under near-field blasts. Typical behavioural trends are investigated, by taking into account possible relevant damage mechanisms in the LG window components, while size effects for target LG windows are also addressed under a multitude of blast loading configurations.

Russia's Eurasian strategy and Korea-Russia Cooperation - With reference to the economic cooperation of the inter-local governments - (러시아의 유라시아 전략과 한·러 협력 - 지방자치단체 간 경제협력을 중심으로 -)

  • Park, Sangnam
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.5-28
    • /
    • 2019
  • This study suggests that Korea - Russia economic cooperation, which has been sluggish in the meantime, should be revitalized as a small, medium sized business that can be practiced at the local level of both countries. Some large scales of national projects were difficult to realize due to some internal and external factors. Therefore, if Russia's Far East region of the complementary economic structure with the Korea's Gyeonggi Province of Korea could form the basis of cooperation by centering on SMEs, it further can be positive for promoting cooperation among South Korea, North Korea and Russia. The trilateral cooperation among two Koreas and Russia is necessary for the balance of political and economic powers in the East Asia. China's retaliation case regarding THAAD (Terminal High Altitude Area Defense) clearly showed that the greater the economic dependence on a particular country, the more threatening it could be. Therefore, it is important for the political and economic security to keep the balance by diversifying economic cooperation counterparts. As China's influence in the global economy grows, building value chains for mutual prosperity with various neighboring countries is gaining great importance. To this end, this paper examined Russia's Eurasian Strategy, New East Policy, and Far East Development Policy which were designed to seek the way to establish Russia's independent economic zone not absorbed by Europe and China.

  • PDF

A Study on the Loss Cost of Delayed Weaponization of Weapons System (무기체계 전력화 지연이 미치는 손실비용에 대한 연구)

  • Juhong Park;Myoungjin Choi
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.321-330
    • /
    • 2023
  • The Korean military has sought to build an all-round military force against the national and international security environment and future asymmetric threats as well as the military threats it faces. However, while raising the need for timely electrification, there are few cases of quantitatively evaluating the loss when electrification is delayed, making it difficult for our military to provide a logical basis to support the importance of the electrification period. Therefore, through this study, we tried to analyze the index of loss cost that can support the need for timely electrification with logical and quantitative data and present it as a logical basis. To this end, the loss cost was calculated in terms of combat efficiency, equipment utilization rate, and maintenance requirements, which can be quantitatively calculated based on "combat readiness," a general impact on the military in case of delayed timely electrification.

A Study on Clean Bill of Lading under the Uniform Customs Practices

  • Jaesung LEE
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.11 no.4
    • /
    • pp.29-39
    • /
    • 2023
  • Purpose - Disputes arising from documentary letter of credit transactions are not decreasing. According to a statistical data from the ICC, 60-70% of letters of credit in use around the world, so, Incoterms rule specifically defines the bill of lading review procedure. Research design, data, and methodology - The refusal due to large or small inconsistencies in terms and conditions when first presenting documents with bill of lading. First of all, confusion was caused by the ambiguous regulation as the bill of lading is a document that serves as evidence of the transportation contract. Result - Bill of lading indicates the rights to the cargo as well as a bill of lading, which is evidence of a transportation contract concluded between carriers, is a document that allows a carrier to receive or ship cargo and ship it by sea. It is a security that promises to be delivered through transportation to the rightful holder of the bill of lading. Conclusion - Because of its importance, the Uniform customs practices for Letters of Credit stipulate acceptance requirements for transport documents, including bills of lading. In addition, the International Standard Banking Practices (ISBP) established by the International Chamber of Commerce also provide supplementary provisions.

A refinement and abstraction method of the SPZN formal model for intelligent networked vehicles systems

  • Yang Liu;Yingqi Fan;Ling Zhao;Bo Mi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.64-88
    • /
    • 2024
  • Security and reliability are the utmost importance facts in intelligent networked vehicles. Stochastic Petri Net and Z (SPZN) as an excellent formal verification tool for modeling concurrent systems, can effectively handles concurrent operations within a system, establishes relationships among components, and conducts verification and reasoning to ensure the system's safety and reliability in practical applications. However, the application of a system with numerous nodes to Petri Net often leads to the issue of state explosion. To tackle these challenges, a refinement and abstraction method based on SPZN is proposed in this paper. This approach can not only refine and abstract the Stochastic Petri Net but also establish a corresponding relationship with the Z language. In determining the implementation rate of transitions in Stochastic Petri Net, we employ the interval average and weighted average method, which significantly reduces the time and space complexity compared to alternative techniques and is suitable for expert systems at various levels. This reduction facilitates subsequent comprehensive system analysis and module analysis. Furthermore, by analyzing the properties of Markov Chain isomorphism in the case study, recommendations for minimizing system risks in the application of intelligent parking within the intelligent networked vehicle system can be put forward.