• Title/Summary/Keyword: IT Infrastructure

Search Result 4,892, Processing Time 0.03 seconds

Predictive maintenance architecture development for nuclear infrastructure using machine learning

  • Gohel, Hardik A.;Upadhyay, Himanshu;Lagos, Leonel;Cooper, Kevin;Sanzetenea, Andrew
    • Nuclear Engineering and Technology
    • /
    • v.52 no.7
    • /
    • pp.1436-1442
    • /
    • 2020
  • Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear infrastructure systems are vital to government, businesses, society and citizen's lives. It is crucial to design nuclear infrastructure for scalability, reliability and robustness. To do this, we can use machine learning, which is a state of the art technology used in various fields ranging from voice recognition, Internet of Things (IoT) device management and autonomous vehicles. In this paper, we propose to design and develop a machine learning algorithm to perform predictive maintenance of nuclear infrastructure. Support vector machine and logistic regression algorithms will be used to perform the prediction. These machine learning techniques have been used to explore and compare rare events that could occur in nuclear infrastructure. As per our literature review, support vector machines provide better performance metrics. In this paper, we have performed parameter optimization for both algorithms mentioned. Existing research has been done in conditions with a great volume of data, but this paper presents a novel approach to correlate nuclear infrastructure data samples where the density of probability is very low. This paper also identifies the respective motivations and distinguishes between benefits and drawbacks of the selected machine learning algorithms.

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

Network vision of disaster prevention management for seashore reclaimed u-City (해안매립 신도시의 재해 예방관리 네트워크 비젼)

  • Ahn, Sang-Ro
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.09a
    • /
    • pp.117-129
    • /
    • 2009
  • This paper studied the safety management network system of infrastructure which constructed smart sensors, closed-circuit television(CCTV) and monitoring system. This safety management of infrastructure applied to bridge, cut slop and tunnel, embankment etc. The system applied to technologies of standardization guidelines, data acquirement technologies, data analysis and judgment technologies, system integration setup technology, and IT technologies. It was constructed safety management network system of various infrastructure to improve efficient management and operation for many infrastructure. Integrated safety management network system of infrastructure consisted of the real-time structural health monitoring system of each infrastructure, integrated control center, measured data transmission using i of tet web-based, collecting data using sf ver, early alarm system which the dangerous event of infrastructure occurred. Integrated control center consisted of conference room, control room to manage and analysis the data, server room to present the measured data and to collect the raw data. Early alarm system proposed realization of warning and response within 5 minute or less through development of sensor-based progress report and propagation automation system using the media such as MMS, VMS, EMS, FMS, SMS and web services of report and propagation. Based on this, the most effective u-Infrastructure Safety Management System is expected to be stably established at a less cost, thus making people's life more comfortable. Information obtained from such systems could be useful for maintenance or structural safety evaluation of existing structures, rapid evaluation of conditions of damaged structures after an earthquake, estimation of residual life of structures, repair and retrofitting of structures, maintenance, management or rehabilitation of historical structures.

  • PDF

Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model (DEA 모형을 이용한 주요정보통신기반시설 취약점 분석·평가의 효율성 분석)

  • Sun, Jong-wook;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.853-862
    • /
    • 2021
  • Today, disturbance and paralysis of information and communication infrastructure by electronic infringement of national infrastructure is emerging as a threat. Accordingly, the government regularly implements the vulnerability analysis and evaluation system of major information and communication infrastructure to protect the information system and control system of major infrastructure, and invests increased human and material resources every year to efficiently operate it. However, despite the government's efforts, as infringement accidents and attempts targeting national infrastructure continue to occur, the government's resource input to prepare the information protection foundation has little effect on the information protection activity result calculation, making the evaluation system not efficient. The question arises that it is not. Therefore, in this study, we use the DEA model to review the efficient operation of the vulnerability analysis and evaluation system for major information and communications infrastructure, and suggest improvement measures to enhance the level of information protection based on the analyzed results.

A Case Study on Strategic Alignment for e-Transformation of Pulmuone (e-Transformation을 위한 풀무원의 전략적 연계 사례연구)

  • Yoon, Cheol-Ho;Kim, Sang-Hoon
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.183-194
    • /
    • 2005
  • This study validated the strategic alignment approach for e-Transformation of the traditional firm through the case analysis of e-Transformation practices performed in Pulmuone Inc., which had been managed and operated in a traditional mode. The e-Transformation approach identified in this study was focused upon the strategic alignment among 4 domains of business strategy, organizational infrastructure and processes, IT strategy, and IT infrastructure and processes, and was performed in the following process: 1) developing IT strategy to perform business strategy, 2) building IT infrastructure and processes to support IT strategy, and then 3) transforming organizational infrastructure and processes based on IT infrastructure and processes. The theoretical implication of this study is to empirically verify the Strategic Alignment Model hypothesized by Henderson and Venkatraman(1994) through the case analysis on e-Transformation of Korean traditional firm, and the practical contribution is to provide a feasible and effective guideline in carrying out e-Transformation of the typical traditional organization.

A Study on the Ubiquitous Cave Systems (유비쿼터스 동굴시스템에 관한 연구)

  • Oh, Jong-Woo
    • Journal of the Speleological Society of Korea
    • /
    • no.90
    • /
    • pp.35-56
    • /
    • 2009
  • The purpose of this paper is to analyze the implementation of the karst infrastructure systems for the u-cave. IT based u-cave represents spatial information derived fields, such as geographical distribution of the cave boundaries, physical configuration of the cave locations and formation characteristics of the karst history. These three aspects relate to karst infrastructure systems, cave monitoring center and spatial database implementation. In terms of the IT based u-cave infrastructure implementation systems, the u-cave depends on IT contents and spatial features. uIT contents are strongly related to IT839 strategy due to the national agenda is "u-Korea". Cave should contribute to u-cave construction through the spatial analyses methods including USN, RFID, LiDAR, ELD, and GIS technologies. For these methods various cave functions will guide to u-cave's distribution, location, and characteristics of karst. The infrastructure consists of landforms and speleothem facilities, underground related facilities, environmental protection systems, and cave planning. These six units of the cave infrastructures have spatial databases that consist of spatial configuration, such as 4-D in order to draw the spatial distribution of the limestone and lava caves. IT based u-cave system infrastructure implementation should deal with IT convergence to generate fusion affects.

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Analysis of Contribution to Net Zero of Non-Urban Settlement - For Green Infrastructure in Rural Areas - (비도시 정주지의 탄소중립 기여도 분석 - 농촌지역 그린인프라를 대상으로 -)

  • Lee, Dong-Kyu;An, Byung-Chul
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.50 no.3
    • /
    • pp.19-34
    • /
    • 2022
  • This study was conducted to provide basic data that can be used when establishing Net Zero policies and implementation plans for non-urban settlements by quantitatively analyzing the Net Zero contribution to green infrastructure in rural areas corresponding to non-urban settlements. The main purpose is to first, systematize green infrastructure in rural areas, secondly derive basic units for each element of green infrastructure, and thirdly quantify and present the impact on Net Zero in Korea using these. In this study, CVR(Content Validity Ration) analysis was performed to verify the adequacy of green infrastructure elements in rural areas derived through research and analysis of previous studies, is as follows. First, Hubs of Green infrastructure in rural area include village forests, wetlands, farm land, and smart farms with a CVR value of .500 or higher. And Links of Green infrastructure in rural area include streams, village green areas, and LID (rainwater recycling). Second, the basic unit for each green infrastructure element was presented by classifying it into minimum, maximum, and median values using the results of previous studies so that it could be used for spatial planning and design for Net Zero. Third, when Green infrastructure in rural areas is applied to non-urban settlements in Korea, it is analyzed that it has the effect of indirectly reducing CO2 by at least 70.76 million tons and up to 141.16 million tons. This is 3.4 to 6.7 times the amount of CO2 emission from the agricultural sector in 2019, and it can be seen that the contribution to Net Zero is very high. It is expected to greatly contribute to the transformation of the ecosystem. This study quantitatively presented the carbon-neutral contribution to settlements located in non-urban areas, and by deriving the carbon reduction unit for each element of green infrastructure in rural areas, it can be used in spatial planning and design for carbon-neutral at the village level. It has significance as a basic research. In particular, the basic unit of carbon reduction for each green infrastructure factors will be usable for Net Zero policy at the village level, presenting a quantitative target when establishing a plan, and checking whether or not it has been achieved. In addition, based on this, it will be possible to expand and apply Net Zero at regional and city units such as cities, counties, and districts.

A Case Study on the relaxation of rock blocks caused by trees in slopes (절토사면의 수목에 의한 블록이완 사례 연구)

  • Kim, Soo-Lo;Kim, Yong-Soo;Shin, Chang-Gun;Ahn, Sang-Ro
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2006.03a
    • /
    • pp.738-743
    • /
    • 2006
  • Falling rocks are classed by the collapse to wide meaning. it is a kinds of earth disaster that has happen every year. Falling rocks are defined as blocks which had fallen from the cliff. It is caused by the relaxation of discontinuous structures like as a joint, a foliation, a bedding, and so on. Usually, the Relaxation of blocks from the rock face is happened by various kinds factors that are acted as a complex. Sometimes, the tree can be a factor of the weakness or relaxation of rock blocks and a cause of the falling rock.

  • PDF

Development of Structural Health Monitoring System based USN for a Huge Infrastructure (USN 기반의 대형 사회 기반 시설물 계측 시스템 개발)

  • Kim, Tae-Bong
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.1
    • /
    • pp.7-12
    • /
    • 2016
  • With due to the recent development of USN (Ubiquitous Sensor Network) technology, a monitoring system has been developing for assuring the structural integrity of infrastructure through normal or long term measurements during their lifetime. An accident such as a collapse of infrastructure may cause not only loss of life but also damage to the economy of the nation. In order to enhance the availability of infrastructure and to be able to maintain their lifetime, it is necessary to monitor and to evaluate continuously the structural integrity throughout their entire lifetime. The purpose of this paper is to develop a monitoring system integrated with evaluation function based on the ubiquitous technology. The most essential part of this study is focusing more on developing a specific module convertible to A/D, which is to enhance the applicability of sensors that had not been applied to existing monitoring systems. Conclusively it has been successfully enhanced to make more diverse the number of sensors and measuring techniques for the monitoring system.