• Title/Summary/Keyword: Security Verification

Search Result 688, Processing Time 0.025 seconds

Numerical Simulation of Salinity Intrusion into Groundwater Near Estuary Barrage with Using OpenGeoSys (OpenGeoSys를 이용한 하굿둑 인근 지하수 내 염분 침투 수치모의)

  • Hyun Jung Lee;Seung Oh Lee;Seung Jin Maeng
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.157-164
    • /
    • 2023
  • The estuary dam is a structure installed and operated in a closed state except when flood event occurs to prevent inland saltwater intrusion and secure freshwater supply. However, the closed state of dam leads to issues such as eutrophication, so it is necessary to examine the extent of saltwater intrusion resulting from the opening of sluice gates. Groundwater, due to its subsurface conditions and slow flow characteristics, is widely analyzed using numerical models. OpenGeoSys, an open-source software capable of simulating Thermal- Hydraulic- Mechanical- Chemical phenomena, was adopted for this study. Simulations were conducted assuming natural flow conditions without dam and operating considering busy farming season, mostly from March to September. Verification of the model through analytical solutions showed error of 3.7%, confirming that OpenGeoSys is capable of simulating saltwater intrusion for these cases. From results simulated for 10 years, considering for the busy farming season, resulted in about 46% reduction in saltwater intrusion length compared to natural flow conditions, approximately 74.36 m. It may be helpful to make choices to use groundwater as a water resource.

A Simulation of a Small Mountainous Chachment in Gyeoungbuk Using the RAMMS Model (RAMMS 모형을 이용한 경북 소규모 산지 유역의 토석류 모의)

  • Hyung-Joon Chang;Ho-Jin Lee;Seong-Goo Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.17 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • In Korea, mountainous areas cover 60% of the land, leading to increased factors such as concentrated heavy rainfall and typhoons, which can result in debris flow and landslide. Despite the high risk of disasters like landslides and debris flow, there has been a tendency in most regions to focus more on post-damage recovery rather than preventing damage. Therefore, in this study, precise topographic data was constructed by conducting on-site surveys and drone measurements in areas where debris flow actually occurred, to analyze the risk zones for such events. The numerical analysis program RAMMS model was utilized to perform debris flow analysis on the areas prone to debris flow, and the actual distribution of debris flow was compared and analyzed to evaluate the applicability of the model. As a result, the debris flow generation area calculated by the RAMMS model was found to be 18% larger than the actual area, and the travel distance was estimated to be 10% smaller. However, the simulated shape of debris flow generation and the path of movement calculated by the model closely resembled the actual data. In the future, we aim to conduct additional research, including model verification suitable for domestic conditions and the selection of areas for damage prediction through debris flow analysis in unmeasured watersheds.

The data transparency of RPS using blockchain method

  • Kang, Dae-Ho;Cho, Kyu-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.81-88
    • /
    • 2020
  • The Renewable Portfolio Standard(RPS) which is in operated by country for many years is eco-friendly energy business. Although a variety of institute are accessing the RPS, it consists of a centralized system. Also, it shows opacity of data access in user's point of view. And each institutes is possessing their own data collected by themselves. Therefore decentralization and integrated control is demanded. Also, when institutes are attacked, the interruption of RPS can be existed. For resolving this issue, this study proposes the RPS using blockchain. Using the consortium method of blockchain, every institutes has possessing same data inserting REC data in block data, it is resolvable that transparency and security issue as transaction through verification of certain block. Furthermore, in case of one institute is paused by external attack, the role can be replaced by other institutes. This study tried the processing of putting data through ethereum network, therefore it presents the possibility of introducing the blockchain method in RPS.

Development of Hazardous Work Mapping Methodology Based on Layout of Workplace Handling The Accident Preparedness Substances (사고대비물질 취급 사업장 Layout기반 위험작업 Mapping 방법론 개발)

  • Kim, Jin Hyung;Yang, Jae Mo;Yong, Jong-Won;Ko, Byung Seok;Yoo, Byungtae;Ko, Jae Wook
    • Korean Chemical Engineering Research
    • /
    • v.52 no.6
    • /
    • pp.736-742
    • /
    • 2014
  • If an accident occurs at work places that handle 'the accident preparedness substances', it causes more property damage and casualties than accidents of normal chemical substances. Even though various systems and regulations have been operated in order to prevent accidents, techniques for reducing and removing human error, which is one of the main reasons of accidents, are still inadequate. In this paper, hazardous work digitization, potential hazard verification, and work evaluation based on domestic technical guidelines have been performed through a case study of the accident of hydrofluoric acid leakage in Gumi in September 2012, and development of a new risk mapping method has been studied to supplement existing systems.

The Effects of ISO 22301 and ISMS Certification Requirements on Business Performance: Focusing on Mediation of Corporate Culture (ISO 22301과 ISMS 인증 요구사항이 기업성과에 미치는 영향 : 기업문화 매개를 중심으로)

  • Lee, Sun-won;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.3
    • /
    • pp.558-576
    • /
    • 2020
  • Purpose: This study wanted to empirically study the effects of ISO 22301 and ISMS certification requirements on Business Performance. Method: For research, a survey was conducted on ISO 22301 and ISMS-certified companies to collect data and use SPASS18 and AMOS18 for statistical analysis. Results: Verification of the hypotheses through the questionnaire demonstrated that BCP, BCM operation, management, and access control of ISO 22301 and ISMS certification requirements, including BIA, risk assessment, BCP, BCM, BCM operation, management, and access security requirements, affect the enterprise's performance (quality improvement, customer satisfaction, financial performance) through the intermediation of the enterprise culture, and the feasibility of the survey paper is high. Conclution: This study has derived the impact of ISO 22301 and ISMS certification requirements on business performance, and based on this, it is deemed necessary to present improvements to ISO 22301 and ISMS certification, and to study future ISO 22301 certification activation and domestic certification, BCMS.

Design and Implementation Testbed of Home Network based PLC (PLC 기반의 홈 네트워크 테스트베드 설졔 및 구현)

  • Kim, Hyeock-Jin;Han, Kuy-Ban;Jean, Byoung-Chan
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.4
    • /
    • pp.143-150
    • /
    • 2009
  • Remote control service, monitoring, gear service of information electronic appliance, various services of security service and so on of Home network that is by link of Ubiquitous environment are offered. These services need verification process through priority test to use and are changed. If test using actuality information electronic device for test, much expenses and time may be invested. Home network test bed offers softness of research using control model and simulator, in this paper, Wish to design and embody home network test bed to do environment construction of home network and test of application service. Because use istent power line just as it is without necessity to establish circuit in addition by solution of home network testbed, expense costs to be less and establishment used easy PLC. Also, propriated Wireless sensor network that use Zigbee by solution of home network testbed. Appliance check and monitor square do by Home Auto that know embodied, and embodied by Home Gateway that interlink terminals of Home Auto and out of.

  • PDF

A Case Study on the Testing of Middleware software (미들웨어 소프트웨어의 시험사례 연구)

  • Yang, Hae-Sool;Lee, Ha-Yong;Park, Ju-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.110-120
    • /
    • 2009
  • Recently raising the recognition and it joins in about software quality evaluation and authentication and the recognition is augmented in about importance of the high quality security which leads a quality investment from the software development enterprise. The quality investor do to become accomplished but substantially from which degree level, quality investment it leads and the verification of software quality improvement does not become accomplished substantially and with without being it does and wants the enterprises where are clear the quality improvement which leads a quality investment does not set the direction where the problem occurs. From the research which it sees international ISO/IEC 9126 where it is standard and in about software test ISO/IEC 12119 where it is a guide it constructed the metric in base and software tentative instance it led and is accumulated and the defect data which it analyzed. result escape it investigated/to analyze quality level and it analyzed is weak from development process part and a defect level and the quality rating instance of Middleware] software and escape a disposal plan it investigated. The research which it sees it leads and it induces it is quantitative/that there is a possibility of being sufficient it sees the quality increase of Middleware software and the demand which is qualitative.

Sender Authentication Mechanism based on DomainKey with SMS for Spam Mail Sending Protection (대량 스팸메일 발송 방지를 위한 SMS 기반 DomainKey 방식의 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • Although E-mail system is considered as a most important communication media, 'Spam' is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Therefore advanced anti-spam techniques are required to basically reduce its transmission volume on sender mail server or MTA, etc. In this study, we propose a new sender authentication model with encryption function based on modified DomainKey with SMS for Spam mail protection. From the SMS message, we can get secret information used for verification of its real sender on e-mail message. And by distributing this secret information with SMS like out-of-band channel, we can also combine proposed modules with existing PGP scheme for secure e-mail generation and authentication steps. Proposed scheme provide enhanced authentication function and security on Spam mail protection function because it is a 'dual mode' authentication mechanism.

Low-Frequency Normal Mode Reverberation Model (저주파수 정상모드 잔향음 모델)

  • Oh, Suntaek;Cho, Sungho;Kang, Donhyug;Park, Kyoungju
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.3
    • /
    • pp.184-191
    • /
    • 2015
  • In this paper, a normal mode reverberation model for a range-independent environment of shallow water is proposed to calculate the reverberation level in the low-frequency range. Normal mode is used to calculate the acoustic energy propagating from the source to the scattering area and from the scattering area to the receiver. Each mode is decomposed into up and down going waves to consider scattering strength at the scattering area. The scattering functional form combines Lambert's law with a Gaussian-like term near the specular direction based on Kirchhoff approximation considering bottom condition. For verification of the suggested model, the result is relatively compared to several solutions of the problem XI and XV in the Reverberation Modeling Workshop I sponsored by the US Office of Naval Research.

Experimental Study of Shape and Pressure Characteristics of Solitary Wave generated by Sluice Gate for Various Conditions (Sluice Gate를 이용한 고립파 발생조건에 따른 형상 및 압력 특성에 관한 실험적 연구)

  • Cho, Jae Nam;Kim, Dong Hyun;Lee, Seung Oh
    • Journal of the Korean Society of Safety
    • /
    • v.31 no.2
    • /
    • pp.70-75
    • /
    • 2016
  • Recently, coastal erosion has been widely in progress and the erosion level becomes also serious in the world wide, espeically in East Sea in Korea. Since it would threaten the life, economics and security risk, it is necessary to much comprehend the reason why coastal erosion has occurred according to the geographical characteristics. Meanwhile, analysis about hydrodynamics of the solitary wave such as tunami in swash zone is needed for the best management practice of coastal erosion. Solitary wave is nonlinear wave and can be reproduced in the laboratoy scale by openning suddenly a sluice gate with water head difference, of which methodology was found in the literature, since it could be simply determined by a significant wave height. Thus, in this sutdy the generation of solitary wave was experimentalized using the sluice gate. Experimental conditions were classified by angles of a beach slope, a water level in a beach slope and a difference of water level between in a headtank and a channel bed. Two kinds of dimensionless analyses based from experimental results in this study were presented; the first analysis indicates nondimensionalization between the wave height and the water level in a beach slope in order to investigate characteristics of solitary wave approaching the beach. The second shows the other nondimensionalization between dynamic pressure and static pressure on a beach slope to investigate the relationship between wave breaking and wave pressure. Under the same conditions as laboratory experiments, the numerical results computed with a SWAN model embedded in FLOW 3D were compared in terms of wave height, and pressure on the beach slope, which shows good agreement with each other. Overall results from this study could provide fundamental hydraulic data for the reliabile verification of numerical simulation results about coastal erosion in swash zone caused by solitary waves.