• Title/Summary/Keyword: Water security

Search Result 430, Processing Time 0.029 seconds

Assessing the Green Total Factor Productivity of Water Use in Mainland China

  • Ning, Meng;Wu, Zheru;Zhou, Zhitian;Yang, Duogui
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.201-206
    • /
    • 2021
  • The significance of high-quality development and green total factor productivity has attracted widespread attention and research, while few studies on green total factor productivity that considers the use of water resources have been conducted in the context of water shortages and water stress. In this study, the green total factor productivity of water use from 2005 to 2015 in mainland China is evaluated based on the global Malmquist-Luenberger productivity index. Results show that: (1) China's green total factor productivity of water use has been improving since 2005 with an annual global Malmquist-Luenberger productivity index of 1.0104. (2) At the regional level, the eastern zone in mainland China owns the highest green total factor productivity of water use, while that in the intermediate zone ranks last. (3) The green total factor productivity of water use in the southern region (1.0113) significantly higher than that in the northern region (1.0095), and also higher than the national average level in the same period. BPC index has been the most important incluencing factor of green total factor productivity of water use at both national level and regional level since 2011.

A study on operation efficacy and security improvement through structural modification of CCTV network for bansong water purification plant (반송정수장 CCTV망의 구조개선을 통한 운영효율화 및 보안성 개선사례에 관한 연구)

  • Park, Yeunchul;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.32 no.2
    • /
    • pp.193-200
    • /
    • 2018
  • Owing to the development in information and communications technologies have improved the technology for high-speed transmission of massive data, which has changed closed-circuit television (CCTV) video transmission technology. In particular, digitization of the CCTV video format and streaming technology has made it possible to minimize transmission loss and integrate video transmission and camera control(pan/tilt). It has also become possible to provide additional services like remote emergency warning broadcasting with just Internet Protocol (IP). However, because of the structural problems of IP, these changes have also brought about the threat of hacking of CCTV monitoring systems. In this study, we propose a methode to optimize network management by examining cases of enhancement of operational efficiency and security by improving the structure of CCTV monitoring network.

Development of Portable Hybrid Water Purifier System (재난·재해용 포터블 하이브리드 정수시스템 개발)

  • Ryu, Ji-Hyeob;Choi, Rang-Kyu;Park, Hun
    • Journal of Korean Society of societal Security
    • /
    • v.3 no.2
    • /
    • pp.47-55
    • /
    • 2010
  • It was developing of portable hybrid water purification system for clean water production in the disaster area. because there are no way to supply a drinking water to the victims of calamity. currently, the government has been supplying bottled water to victims. but it is a limit to the reserves. It is composed of a filter, a feed pump, a solar-cell, a controller, and a case and is possible supplying a drinking water not to limit time and a place. Field test was carried out to developed portable water purification system and the purified water was satisfied a criterion for a drinking water.

  • PDF

Custody Transfer of Bundle layer in Security Mechanism for Under water Inter net of Things (UIoT)

  • Urunov, Khamdamboy;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.506-523
    • /
    • 2015
  • The intent is to determine whether or not the custody transfer is helpful for data transmission in challenging underwater communications when running Bundle protocol or underwater protocols. From the point of view defending side, Underwater Acoustic Network (UAN) will be a serious threat for its strong functionality long rang and high precision of surveillance and detection. Therefore, countermeasures must be taken to weaken its effect. Our purpose is analyzed that how to benefit from the UIoT to learn from, exploit and preserve the natural underwater resources. Delay/Disruption Tolerant Network (DTN) is essential part of the network heterogeneity communication network. The vulnerability and potential security factors of UIoT are studied thereafter. Security mechanisms for an underwater environment are difficult to apply owing to the limited bandwidth. Therefore, for underwater security, appropriate security mechanisms and security requirements must be defined simultaneously. The paper consists of mathematical and security model. Most important point of view in the security challenges of effective Buffer and Storage management in DTN.

Features of the Implementation of Public Authority in the Context of Modern International Security Challenges: Information Component

  • Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.123-128
    • /
    • 2022
  • The main purpose of the study is to determine the features of the implementation of public authority in the context of modern international security challenges. The fact that public authority is a necessary regulator of the life of society ensures its development, unity, and manageability, which is an important factor in the organization and orderliness of society adds to the actualization of the research topic. The research methodology includes a set of theoretical methods of analysis. Based on the results of the study, key aspects of the implementation of public authority in the context of modern international security challenges were identified. The study has limitations, and they relate to the practical aspect of the implementation of public authority in the context of modern international security challenges.

Database of Navigational Environment Parameters (Water Depth, Sediment Type and Marine Managed Areas) to Support Ships in an Emergency

  • Kim, Tae-Ho;Yang, Chan-Su
    • Journal of Navigation and Port Research
    • /
    • v.43 no.5
    • /
    • pp.302-309
    • /
    • 2019
  • This study introduces the navigational environment database(DB) compiling water depth, sediment type and marine managed areas (MMAs) in coastal waters of South Korea. The water depth and sediment data were constructed by combining their sparse points of electronic navigation chart and survey data with high spatial resolution using the inverse distance weighting and natural neighbor interpolation method included in ArcGIS. The MMAs were integrated based on all shapefiles provided by several government agencies using ArcGIS because the areas should be used in an emergency case of ship. To test the validity of the constructed DB, we conducted a test application for grounding and anchoring zones using a ship accident case. The result revealed each area of possible grounding candidates and anchorages is calculated and displayed properly, excluding obstacle places.

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

Environmental and Socioeconomic Determinants of Grain Virtual Water Trade: An Empirical Analysis using Decomposition and Decoupling Model

  • Golden Odey;Bashir Adelodun;Seulgi Lee;Kyung Sook Choi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.394-394
    • /
    • 2023
  • The world's sustainable growth is being severely hampered by the inefficient use of water resources. Despite the widely acknowledged importance of trade in global and regional water and food security, societal reliance on local production as well as international trade remains inadequately assessed. Therefore, using South Korea as a case study, this study fills in this research gap by applying the virtual water concept, the logarithmic mean divisia index (LMDI) method, and the Tapio decoupling model. The virtual water concept was used to estimate South Korea's net virtual water trade for major grain crops from 1992 to 2017. Then, the LMDI method was utilized to assess the driving factors causing changes in net virtual water trade. Lastly, the Tapio decoupling model was used to investigate the decoupling relationships between economic growth and the driving factors of net virtual water trade. Results showed that South Korea remains a net importer of virtual water flows with respect to grain crops, with an average import of 16,559.24 million m3 over the study period. In addition, the change in net virtual water trade could be attributed to water intensity effect, product structure effect, economic effect, and population effect. However, water intensity and economic effects were the major decisive factors for decrease and increase in net virtual water trade respectively, while the population and product structure effects had minor positive influences on the net virtual water trade. Furthermore, water intensity and economic growth showed a strong decoupling in most periods, while the decoupling state between product structure and economic growth was observed as expansive negative decoupling. Likewise, population size and economic growth showed a weak decoupling in most periods. The results reveal South Korea's status as it concerns the virtual water trade of grain crops, thus providing valuable insights into the sustainability of trade activities for the management of local water resources.

  • PDF

The Analysis of Water Supply Capacity using Reliability Criteria - for the Nakdong River Basin - (신뢰성 기준을 적용한 용수공급능력의 해석 - 낙동강유역을 중심으로 -)

  • 차상화;지홍기;이순탁
    • Journal of Environmental Science International
    • /
    • v.11 no.12
    • /
    • pp.1227-1233
    • /
    • 2002
  • In general, the evaluation of water supply capacity is important factor to establish various establishment of water resource supply plan include water resource security and determination of dam's mass. But former researchs about estimation of water supply capacity were lack in continunity of evaluation basis, and didn't excute analysis on reliability criteria also. In this study, Nakdong river was selected for study basin, and then water supply capacity was analyzed by HEC-5 model using identical reliability criteria.