검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 41

        1.
        2023.08 KCI 등재 SCOPUS 구독 인증기관 무료, 개인회원 유료
        There has been a tectonic shift in the trade relationship between the United States (US) and China. This can be seen in the passage of new US legislation, recent US trade restrictions on exports and investment transactions with China, and worsening US relations with the World Trade Organization (WTO), particularly with its dispute resolution system. The Trump administration initiated a haphazard tariff and trade war with China, reversing decades of US trade policy pursuant to its long-standing stances of supporting free trade. To the dismay of many in the trade community within the US and globally, the trade actions by President Trump have been significantly extended and broadened by the Biden administration in its first two years, despite the expectation that it would reverse many of Trump’s policies. In this article, I present seven observations concerning President Trump’s and President Biden’s trade policies.
        4,600원
        2.
        2023.08 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Recent, there has been a need for a terminal device with artificial intelligence to detect emergency situations in various means of transportation to prevent overdischarge of the battery even when parking the vehicle for a long time so that the driver can properly prepare. The transmission system, which guides the situation and location information of the vehicle, uses AHD video technology and RTOS technology to reduce the load of wireless networks by increasing the video playback rate through UDP implementation by WiFi, and stabilizes through wireless networks and low-power sensors using LoRa services.
        4,000원
        4.
        2022.10 구독 인증기관·개인회원 무료
        Nuclear power plants, like other national critical infrastructures, could be under the threat of terrorism or other malicious action. Thus, a nuclear power plant has a robust security system that includes security guards, sensors, barriers, access control systems, lights, and alarm stations with security procedures. However, an effective security system is hard to design because a chain is only as strong as its weakest link, and there could be a vulnerable hole even in the robust security system. Thus, an effective security system requires the evaluation of all possible scenarios. Evaluation software for security system effectiveness assists in systematically assessing all the possible attack scenarios. Many countries developed security effectiveness evaluation software. The first software was developed by the U.S. Sandia National Laboratories in the 1980s. Now there are several commercially available software packages with a function to simulate limited-scope combat between security guards and attacking enemies. However, academic communication is comparatively weak because it may contain sensitive information on the vulnerability of nuclear power plants. We developed original software called Tools for Evaluating Security Systems (TESS) to identify the most vulnerable path to the designated target and model the security systems of all South Korean nuclear power plants. We also used commercial security effectiveness evaluation software, AVERT, to model the same nuclear power plants. TESS was developed to verify the results of commercial security effectiveness evaluation software for the purpose of regulatory use. For the feasibility test, we compared the results of two software with those of force-on-force (FoF) exercises in nuclear power plants. According to the relevant Act, every nuclear power plant site should perform the FoF exercises every year. KINAC was in charge of evaluating the FoF exercise and used several of its results for the study. In the results, even in some differences in detail, the two software and FoF exercises showed qualitative similarity. Conclusively, evaluation software is a useful tool to design and/or assess the security systems of nuclear power plants. We modeled the security systems of all South Korean nuclear power plants, and compared the developed software, a commercial software and FoF exercises. The results showed qualitative similarity. We provided the results of evaluation to nuclear operators for the better security of nuclear power plants.
        5.
        2022.10 구독 인증기관·개인회원 무료
        Because a cyber-attack on industrial control system (ICS) and/or critical infrastructure such as NPPs is evolving, it is necessary to develop a cyber security regulation technology corresponding to the attack technology. Nevertheless, it is almost impossible to test actual I&C systems in NPPs for evaluating cyber security against new vulnerabilities or attack vectors. So, a testing environment is needed to conduct penetration tests and evaluate the overall cyber security of NPPs. For that purpose, KINAC is developing a cyber security test bed and has plans to apply the insight from the test bed to cyber security regulation in NPPs. Conceptually, the test bed is divided into two parts, H/W parts and S/W parts. The S/W part is mainly composed of a NPPs simulator, especially APR 1400 simulator model. Originally, the I&C systems are implemented by computer codes in the simulator model, however, parts of I&C systems in the simulator are implemented by H/W in the test bed. Then, these actual H/W-based I&C systems are wired to the simulator. Because the cyber security test only can be carried out on real I&C systems (H/W-based I&C systems), it is important to decide on the scoping of HIL in the simulator. In this decision process, the purpose of testing should be considered a priority. The decision process of scoping HIL in the simulator in line with the test purpose is discussed in this paper. For example, if the test purpose is to evaluate the consequences of NPPs induced by cyber-attacks, safety analysis results may be utilized in the decision process. Especially, if the consequences are fuel integrity in NPPs, level 1 PSA results may be used to decide the HIL scope. In that case, most of the I&C systems are safety-grade I&C systems. The number of safety-grade I&C systems is still too much so, more analysis should be accomplished to narrow down the numbers. To derive the most mitigation measures by comparing the mitigation measures in each initiating event may be one example of narrowing down the number of I&C systems. From these processes, the scope of HIL in the simulator corresponds to the test purpose may be decided.
        6.
        2022.08 KCI 등재 구독 인증기관 무료, 개인회원 유료
        국민기초생활보장수급 독거노인의 지역별 분포는 시𐩐군𐩐구 단위의 자료 부족으로 인하여, 이들에 대한 정보는 지역별 구분 없이 통합된 수치에 따라 해석되고 있다. 이에 본 연구는 기초생활수급 독거노인의 지역별 분포와 분포에 따른 핫스팟을 추적하였다. 시・군・구 단위에서의 분석이 가능한 2020년 지역사회건강조사 자료를 활용하여 250개의 기초지방자치단체를 대상으로 핫스팟 분석을 시행하였다. 분석 결과 전라남도에 기초생활수급 독거노인의 핫스팟이 집중되고 있는 것으로 나타났다. 본 연구는 기초생활 수급 독거노인 인구의 지역적 분포 특성을 정량적이고 가시적인 근거로 제시하고 있다. 더 나아가 지역별 기초생활수급 독거노인의 핫스팟을 추적하여 공간 불평등과 노인복지를 연계하는 시도를 선보인 연구로, 향후 중요한 참고자료로 활용될 수 있을 것으로 기대된다.
        4,000원
        7.
        2022.05 구독 인증기관·개인회원 무료
        In accordance with the Enforcement Decree of the Act on Physical Protection and Radiological Emergency, operators of Nuclear Power Plants (NPP)s must conduct full cyber security exercise once a year and partial exercise at least once every half year. Nuclear operators need to conduct exercise on systems with high attack attractiveness in order to respond to the unauthorized removal of nuclear or other radioactive material and sabotage of nuclear facilities. Nuclear facilities identify digital assets that perform SSEP (Safety, Security, and Emergency Preparedness) functions as CDA (Critical Digital Assets), and nuclear operators select exercise target systems from the CDA list and perform the exercise. However, digital assets that have an indirect impact (providing access, support, and protection) from cyber attacks are also identified as CDAs, and these CDAs are relatively less attractive to attack. Therefore, guidelines are needed to select the exercise target system in the case of unauthorized removal of nuclear or other radioactive material and sabotage response exercise. In the case of unauthorized removal of nuclear or other radioactive material, these situations cannot occur with cyber attacks and external factors such as terrorists must be taken into consideration. Therefore, it is necessary to identify the list of CDAs that terrorists can use for cyber attacks among CDAs located in the path of stealing and transporting nuclear material and conduct intensive exercise on these CDAs. A typical example is a security system that can delay detection when terrorists attack facilities. In the case of sabotage exercise, a safety-related system that causes an initiating event by a cyber attack or failure to mitigate an accident in a DBA (Design Basis Accident) situation should be selected as an exercise target. It is difficult for sabotage to occur through a single cyber attack because a nuclear facility has several safety concepts such as redundancy, diversity. Therefore, it can be considered to select an exercise target system under the premise of not only a cyber attack but also a physical attack. In the case of NPPs, it is assumed that LOOP (Loss of Offsite Power) has occurred, and CDA relationships to accident mitigation can be selected as an exercise target. Through exercise on the CDA, which is more associated with unauthorized removal of nuclear or other radioactive material and sabotage of nuclear facilities, it is expected to review the continuity plan and check systematic response capabilities in emergencies caused by cyber attacks.
        8.
        2021.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In this study, the Euro NCAP-based AEB system evaluation simulation was conducted by applying the calculated corrected TTC by road condition estimation of scenarios (CPFA, CPNC, CPLA) of the V2P situation scenario using PC-Crash, a program used for traffic accident analysis. The scenario was evaluated in consideration of the two road conditions. the low-speed conditions among every scenarios avoided collision, but in the medium and high-speed conditions has been collided with pedestrian. It was confirmed that the time point at recognizing pedestrian was lower than set TTC at which AEB system was operated, even though the AEB was operated immediately, a collision occurred due to insufficient braking distance. As in this study, if studies such as V2V, V2P, and V2B considering road friction are actively conducted, it is expected to be useful data for automobile accident prevention and accident analysis.
        4,000원
        9.
        2021.11 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Today, the question on the legal instruments of international organisations that impose direct sanctions on individuals and legal entities have surfaced, such as the United Nations Security Council (UNSC) Resolutions. States are obliged to implement the UNSC Resolutions but would face difficulties in this course. The UNSC’s coercive approach rubs international security against democratic legitimacy, especially when the Resolutions violate due process of law, principle of legality and human rights. To date, Indonesia’s stance on international law (including UNSC Resolutions) under its legal system remains unclear. This study analyses the implementation of the UNSC Resolutions in Indonesia, which has no uniformity without a UN Act. The case of North Korean vessel, MV Wise Honest, highlights the growing confusion in Indonesia because violation of the UNSC Resolutions has not been governed. Conclusively, Indonesia needs to enact a UN Act to provide legal certainty in the implementation of the UNSC Resolutions.
        4,900원
        10.
        2021.10 KCI 등재 구독 인증기관 무료, 개인회원 유료
        In this study, the AEB system evaluation simulation was conducted by applying a corrected TTC from 0s to 3s obtained by estimating the road-friction factor and slope applying two scenarios(CCRs and CCRm) that may occur in V2V situation using PC-CrashⓇ, a program used for traffic accident analysis. As a result of two scenarios : At 0.8 of road-friction factor and 0° slope which adapted default model of TTC had longer braking distance so that it crashed. At 0.2 of road-friction factor with corrected TTC slidingly crashed due to slope and braking condition. CCRs and CCRm scenario showed that the maximum slipped distance of the collision avoidance situation was 31.7m, 87.7m. And the collision speed was 35.7km/h at 50km/h and 66.1km/h at 80km/h.
        4,000원
        11.
        2021.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        The railroad facilities are intended for long-term operation as the initial acquisition costs necessary for infrastructure construction are high. Therefore, regular maintenance of railroad facilities is essential, and furthermore, system reliability through systematic performance evaluation is required. In this study, the signal control system of railroad electrical equipment was selected as the subject of research and the performance evaluation target facility selection study was conducted using AHP. The results of the study can contribute to the reliability of the signal control system as well as to the reliability of the railroad system, which is a higher system.
        4,000원
        12.
        2020.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        With the advent of the 4.0 era of logistics due to the Fourth Industrial Revolution, infrastructures have been built to receive the same services online and offline. Logistics services affected by logistics 4.0 and IT technology are rapidly changing. Logistics services are developing using technologies such as big data, artificial intelligence, blockchain, Internet of things, and augmented reality. The convergence of logistics services and various IT new technologies is accelerating, and the development of data management solution technology has led to the emergence of electronic cargo waybill to replace paper cargo waybill. The electronic waybill was developed to supplement paper waybill that lack economical and safety. However, the electronic waybill that appeared to complement the paper waybill are also in need of complementation in terms of efficiency and reliability. New research is needed to ensure that electronic cargo waybill gain the trust of users and are actively utilized. To solve this problem, electronic cargo waybill that combine blockchain technology are being developed. This study aims to improve the reliability, operational efficiency and safety of blockchain electronic cargo waybill. The purpose of this study is to analyze the blockchain-based electronic cargo waybill system and to derive evaluation indicators for system supplementation.
        4,300원
        13.
        2019.07 KCI 등재 구독 인증기관 무료, 개인회원 유료
        최근 선진국과 국제무역기구의 동향에 따르면, 9·11테러 이후 선진해운국들은 국제 사회의 주요 이슈로 등장한 선박, 항만, 항공, 철도 등을 포함한 국제물류 전 단계에서의 보안과 효율성 강화, WCO, 미국, EU가 주도하는 무역안전망 등을 확보를 위한 국제물류보안체제 구축을 적극적으로 추진하고 있다. 특히 최근 자율운항선박 및 위험물 운반선박 등과 관련된 사이버 보안 위험에 대한 관심과 관리의 중요성 부각되고 있음에도 불구하고, 여전히 단위 연결점에 대한 안전관리만 이루어지고 해상물류 전 구간에서 발생할 수 있는 보안 사고를 사전에 예방하는 관리가 이루어지지 못하고 있는 실정이다. 따라서 이 연구에서는 선박 보안사고의 실태 및 원인을 파악하여 선박보안 관리의 특성을 고찰함과 동시에 선박보안 관리 시스템의 취약성을 분석하였다. 그리고 이 연구는 해상공급사슬보안(maritime supply chain security)의 개념과 특징, 보안위험과 공급사슬의 취약성을 파악하고, 국제기구와 관련된 해상공급사슬보안제도와 주요국의 해상공급사슬보안 인증제도에 대한 현황 분석 및 시사점을 도출하여 해운물류회사의 경쟁력 향상을 위한 정책적 개선(안)을 제시하였다.
        7,800원
        15.
        2018.08 KCI 등재 구독 인증기관 무료, 개인회원 유료
        Currently, the commercialization of the 5th Generation (5G) service is becoming more prevalent in domestic communication network technology. This has reduced communication delay time and enabled large-capacity data transmission and video streaming services in real-time. In order to keep pace with these developments, K-water has introduced a smart process control system in water purification plants to monitor the status of the water purification process. However, since wireless networks are based on the public Long Term Evolution (LTE) network, communication delay time remains high, and high-resolution video services are limited. This is because communication networks still have a closed structure due to expense and security issues. Therefore, with 5G in its current form, it is very difficult to accommodate future services without improving the infrastructure of its communication networks. In recognition of these problems, this study implemented the authentication and management function of wireless networks on a wired network management system in the K-water Bansong water purification plant. The results confirmed that wired Local Area Network (LAN) services give a higher security performance than an expensive commercial wireless LAN system. This was achieved by using an Internet Protocol (IP) address management system of wired networks and the packet filtering function of the Layer2 (L2) switch. This study also confirmed that it is possible to create a wireless LAN service that is 3.7 times faster than the existing LTE communication network.
        4,000원
        16.
        2017.06 KCI 등재 구독 인증기관 무료, 개인회원 유료
        본 논문의 목적은 한국의 안보 시스템을 포괄적 안보를 중심으로 재편해야 할 필요성을 세월호 참사 사 례를 중심으로 탐색적으로 고찰하는 것이다. 2014년 4월 16일에 발생한 세월호 참사는 한국식 발전 국 가형 자본주의 모델을 근본적으로 수정하고, 한국 사회의 질적 향상을 위한 사회 시스템 구축의 필요성 을 확인시켜 준 역사적으로 매우 중요한 재난이었다. 당시 대부분의 박근혜 정부 조직들이 세월호 참사 에 우왕좌왕 대처한 것과 달리 국방부는 일사불란하게 움직였으나 생존자를 모두 구출하는 데에 실패하 였다. 이와 같은 결과는 한국의 안보 시스템이 포괄적 안보에 기반 하여 민-군 관계를 촉진할 수 있는 방향으로 개혁되어야 함을 시사한다.
        6,100원
        18.
        2017.03 KCI 등재 구독 인증기관 무료, 개인회원 유료
        이 연구는 오늘날 교정시설의 특성에 맞도록 경비등급제도를 개선하고자 하는 데에 목적이 있다. 범죄인을 사회로부터 격리구금하고 사회에 복귀시키는 기능을 수행하는 교정시설은 적정한 수준의 경비가 필수적이다. 우리나라는 교정시설을 중경비시설, 일반경비시설, 완화경비시설, 개방시설 등의 네 가지 경비등급으로 분류하여 지정하고, 각 경비등급에 따른 교정시설에 수용되는 수형자도 중경비처우, 일반경비처우, 완화경비처우, 개방처우 등의 경비처우급으로 처우하고 있다. 각 교정시설의 경비등급은 수용되는 범죄자의 재범가능성과 사회적 위험성 등에 따라 지정된다. 각 수용자의 경비처우급은 분류심사 결과 나타난 도주 등의 위험성에 따라 보안 및 계호의 수준이 정해지고, 범죄성향의 진전과 개선정도, 교정성적에 따라 처우 수준이 정해진다. 각 교정시설마다 그 경비등급에 맞는 경비처우급의 수용자가 수용되는 것이 바람직하나, 대부분의 교정시설에서 S1급과 S4급 사이의 다양한 경비처우급 수용자가 혼합수용되어 있다. 거의 모든 교정시설에서 해당 시설의 경비등급에 부합하지 않는 경비처우급 수용자가 수용되어 있는 것이다. 또한, 개방교도소를 제외한 전국의 모든 교정시설이 거의 동일한 보안・계호 수준을 유지하는 등 경비등급과 관계없이 획일적으로 건축되어 있다. 그 해결방안으로, 법령을 개정하여 경비등급과 경비처우급을 일치시키지 않도록 하고, 대부분의 교정시설을 혼합 경비등급의 시설로 지정하여 같은 교정시설 내에서도 다양한 단계적 처우가 가능하도록 하는 것이 필요하다.
        6,600원
        20.
        2015.12 KCI 등재 구독 인증기관 무료, 개인회원 유료
        에너지자원의 안정적인 확보는 국가발전을 위한 가장 중요한 요소 중 하나이다. 본 연구는 혁신시스템 관점에서 우리나라의 에너지관련 정책결정시스템을 분석하고 그 문제점을 도출하였다. 혁신시스템의 구성요소 중 혁신주체 측면에서는 에너지의 안정적인 수송을 위한 전략적인 강화방안이 미흡하다는 한계를 가지고 있었으며, 연계측면에서는 국방영역을 제외한 혁신주체들 간의 연계는 비교적 양호하였으나 안보적 관점에서 중요한 역할을 담당하는 국방영역과 타 혁신주체들 간의 연계는 미흡한 것으로 분석되었다. 하부구조 측면에서는 에너지안보 관점에서 국방영역의 하부구조인 전력건설 논의가 미흡한 것으로 나타났으며, 마지막으로 제도적 측면에서는 에너지안보에 관한 국방영역의 역할에 대한 제도적 정립이 미흡하여 향후 국가 에너지안보와 관련된 거버넌스에서 국방영역의 참여가 제도적으로 명시될 필요가 있는 것으로 분석되었다.
        4,000원
        1 2 3