RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Study on the Response for Drone Terrorism in Nuclear Facilities by Analyzing Statistical Data of Drone Incidents

        Sundo Choi,Hyeseung Kim,Seokwoo Sohn 한국방사성폐기물학회 2022 한국방사성폐기물학회 학술논문요약집 Vol.20 No.2

        As drone technology and industry develop around the world, the use of drones are increasing in number and expanding to different fields. On the other hand, illegal flight and terrorist incidents using drones are also increasing day by day. In Korea, it is reflected in the “Design Basis Threat (DBT)”, which is the standard for designing and evaluating the physical protection system of nuclear power plants in accordance with the “Act on Physical Protection and Radiological Emergency”, that nuclear power plants continue to establish physical protection against drone threats. A total of 141 drone attacks or incidents have occurred around the world since 2015. Cases related to the Russian-Ukraine war, in which so many cases occurred, were excluded. There were 112 cases (79%) of terrorism or suspected terrorism using a single drone. There were 4 cases of terrorism using more than 5 drones, and a total of 20 drones were used to attack an oil facility in Yemen (2019). By region, a total of 111 incidents occurred in Middle East & North Africa. By country, there were 49 cases in Iraq, 35 cases in Saudi Arabia, and 8 cases in Syria. Among major countries, three cases occured in Korea, five in the United States, two in England, Canada, and Italy, and one in Japan and France. Since 2021, there have been 15 drone attacks. Multiple drones were used in attacks targeting military or large-scale Important National Facilities such as the Saudi oil refinery, Indian Kashmir air base, and reconnaissance of Iranian Natanz nuclear and surrounding military facilities. Also in 89% of the cases, the drones were loaded with explosives in order to cause large-scale damage. Accordingly, nuclear power plants, which are important national facilities, need to establish a system that can detect and respond to multiple drones. Furthermore, additional protective measures are needed for areas that are expected to be severely damaged which can be established by evaluating the impact of explosives on major points in the plant. In additionthere is a high possibility of terrorism by organizations aiming for national turmoil rather than individual terrorists. So it is important to identify signs of terrorism in advance and prepare through cooperation with related agencies.

      • A Study on the Analysis of Accident Scenarios at Spent Fuel Storage Facilities and Evaluation of the Protective Performance of Spent Fuel Storage Facilities Against Design Basis Threat

        Sundo Choi,Minho Kang,Jihwan Cha,Kihaeng Nam 한국방사성폐기물학회 2023 한국방사성폐기물학회 학술논문요약집 Vol.21 No.1

        In the wake of the Fukushima NPP accident, research on the safety evaluation of spent fuel storage facilities for natural disasters such as earthquakes and tsunamis has been continuously conducted, but research on the protection integrity of spent fuel storage facilities is insufficient in terms of physical protection. In this study, accident scenarios that may occur structurally and thermally for spent fuel storage facilities were investigated and safety assessment cases for such scenarios were analyzed. Major domestic and international institutions and research institutes such as IAEA, NEA, and NRC provide 13 accident scenario types for Spent Fuel Pool, including loss-of-coolant accidents, aircraft collisions, fires, earthquakes. And 10 accident scenario types for Dry Storage Cask System, including transportation cask drop accidents, aircraft collisions, earthquakes. In the case of Spent Fuel Pool, the impact of the cooling function loss accident scenario was mainly evaluated through empirical experiments, and simulations were performed on the dropping of spent nuclear fuel assembly using simulation codes such as ABAQUS. For Dry Storage Cask System, accident scenarios involving structural behavior, such as degradation and fracture, and experimental and structural accident analyses were performed for storage cask drop and aircraft collision accidents. To evaluate the safety of storage container drop accidents, an empirical test on the container was conducted and the simulation was conducted using the limited element analysis software. Among the accident scenarios for spent fuel storage facilities, aircraft and missile collisions, fires, and explosions are representative accidents that can be caused by malicious external threats. In terms of physical protection, it is necessary to analyze various accident scenarios that may occur due to malicious external threats. Additionally, through the analysis of design basis threats and the protection level of nuclear facilities, it is necessary to derive the probability of aircraft and missile collision and the threat success probability of fire and explosion, and to perform protection integrity evaluation studies, such as for the walls and structures, for spent fuel storage facilities considering safety evaluation methods when a terrorist attack occurs with the derived probability.

      • A Study on the Performance Test of Biometrics for Counterfeit Technology in Nuclear Facilities

        Sundo Choi,Hyeseung Kim 한국방사성폐기물학회 2022 한국방사성폐기물학회 학술논문요약집 Vol.20 No.2

        In order to enter a nuclear power plant, access approval is required in advance, and biometric information such as fingerprints of visitors must be registered when issuing a key card, and only those certified through biometric equipment can enter the nuclear facilities (Protected area II). Fingerprint recognizers and facial recognizers are installed and operated in domestic nuclear facilities for access control. Domestic nuclear facilities establish and implement a protection system in accordance with physical protection requirements under the “Act on Physical Protection and Radiological Emergency” and “Physical Protection Regulations” of each nuclear facility. Detailed implementation standards are specified in Regulation Standard (RS) documents established and distributed by KINAC. Biometrics are mentioned in a KINAC RS-104 (Access Control) document. In this study, it was analyzed what points should be considered in order to prepare for performance tests and establish plans for biometric devices. In order for the results of performance evaluation of biometric devices to obtain high reliability and to be applied to nuclear facilities in the future, standardized performance evaluation targets, procedures, standards, and environments must be created. In order to collect samples such as fingerprints for performance evaluation, the size roll of the sample shall be determined, and the appropriateness of the sample size shall be evaluated in consideration of reliability and error range. In addition, the analysis results for the characteristics (gender, age, etc.) of the sample should be presented. When collecting samples, conflicts with other laws such as personal information protection should be considered, and the reliability of the performance test result data should be analyzed and presented. Quality evaluation should also be performed on forged biometric information data such as silicon fingerprints. In addition, when establishing a performance evaluation plan, a systematic evaluation procedure should be established by referring to domestic and foreign certification and evaluation systems such as the Korea Internet & security Agency (KISA). In order to improve the completeness of the access control system using the biometrics of nuclear facilities, it is necessary to test the performance of biometric devices and to install and operate only devices that have the ability to defend against counterfeit technology. In this study, it was analyzed what points should be considered in order to prepare for performance tests and establish plans for biometric devices.

      • KCI등재

        Survey on the Diagnostic Process of Amyotrophic Lateral Sclerosis

        Sundo Kim,Seong-Woong Kang,Wonah Choi,Jung-Hyun Park,Youngsang Lee 대한재활의학회 2011 Annals of Rehabilitation Medicine Vol.35 No.1

        Objective To emphasize the need for precise diagnosis of amyotrophic lateral sclerosis (ALS), a progressive and degenerative disease of upper and lower motor neurons that often present initially with weakness at the upper or lower extremities, and frequently misdiagnosed as myelopathy, radiculopathy, peripheral neuropathy or arthropathy that may ultimately lead to unnecessary treatments including surgical procedures. Method We retrospectively reviewed medical records of 331 ALS patients who visited our hospital between 1998 and 2008. Symptoms at onset, progression of disease, radiologic findings, surgeries prior to diagnosis of ALS, outcome after surgery or conservative treatments, and electrodiagnostic study results were reviewed. Results Among the 331 patients with ALS, 34 (10.3%) had a history of surgical procedure and 37 (11.1%) underwent conservative treatment prior to diagnosis of ALS. 34 patients with a mean disease duration at diagnosis of 20.0±14.9 months, had surgery for symptoms that were later attributable to ALS. In 30 of the 34 patients, symptoms did not resolve after the intervention. 37 patients with a mean disease duration at diagnosis of 16.6±14.3 months, underwent conservative treatments such as physical therapy prior to diagnosis of ALS. Only in one patient (2.7%), symptoms improved after conservative treatment. Conclusion In the absence of a single confirmatory study for the diagnosis of ALS, clinical findings may be misinterpreted, leading to an erroneous diagnosis. Therefore, closer and more careful follow-up is necessary for patients with limb weakness in the absence of sensory symptoms, or bulbar abnormalities such as dysarthria and dysphagia.

      • Development of Installation Standards and Evaluation Indicators for Passive Infrared Sensor in National Security Facilities

        Hyeseung Kim,Sundo Choi 한국방사성폐기물학회 2022 한국방사성폐기물학회 학술논문요약집 Vol.20 No.2

        For national security, approximately 500 facilities have been designated as national security facilities. It is divided into grades A, B, and C depending on the fields such as electrics, energy and public service. In 2016, KINAC developed and suggested the installation standards and evaluation indicators for security equipment for national security facilities and they have been utilized to evaluate and manage the facilities. In order to update them by reflecting the recent security trend of the facilities and new technology, KINAC have investigated and updated the installation standards and evaluation indicators for security equipment. As a part of developing installation standards and evaluation indicators for national security facilities project, we conducted survey to identify the status and capabilities of facilities: how the security system is well designed, which type of security equipment is utilized. According to the results, the passive infrared (PIR) sensor is commonly used for interior intrusion detection (not included in 2016 project). Therefore, we investigated the passive infrared sensor and provided its installation standards and evaluation indicators. PIR sensor detects the energy generated by the objects which is different as their temperatures. PIR sensors do not emit any energy like active infrared sensor, and do not measure the energy. Rather, PIRs measure variation in thermal radiation. PIR sensor detects thermal energy by sensing the change between a heat source and the background temperature. In this paper, the characteristics and features of PIR sensor were discussed. Considering them, the standards and indicators to install/evaluated the PIR sensors were also proposed. The results would support national security facility to design and evaluate their security system.

      • A Study on Identification of Vital Areas in Spent Fuel Storage Facilities to Protect Against Sabotage

        Minho Kang,Sundo Choi 한국방사성폐기물학회 2022 한국방사성폐기물학회 학술논문요약집 Vol.20 No.2

        The IAEA states that in the event of sabotage, nuclear material and equipment in quantities that can cause high radiological consequences (HRC), as well as the minimum systems and devices necessary to prevent HRC, must be located within one or more vital areas. Accordingly, in Article 2 of the ACT ON PHYSICAL PROTECTION AND RADIOLOGICAL EMERGENCY, the definition of the vital area is specified, and a nuclear facility operator submits a draft to the Nuclear Safety and Security Commission to establish vital areas and must obtain approval from Nuclear Safety and Security Commission. Since the spent fuel pool and new fuel storage area are areas where nuclear material is used and stored, they can be candidates for vital areas as direct targets of sabotage. The spent fuel pool is a wet spent fuel storage facility currently operated by most power plants in Korea to cool and store spent nuclear fuel. Considering the HRC against sabotage, it is necessary to review whether sepnt fuel pool needs to establish a vital area. In addition, depending on the status of plant operation during the spent fuel management cycle, the operation status of safety systems to mitigate accidents and power system change, so vital areas in fuel handling building (including spent fuel pool) also need to be adjusted flexibly. This study compares the results of the review on whether the essential consideration factors are reflected in the identification of essential safety systems and devices to minimize HRC caused by sabotage in the spent fuel storage system with the procedure for identifying the vital area in nuclear power plants. It was reviewed from the following viewpoints: Necessity to identify necessary devices to minimize the radiation effects against sabotage on the spent fuel pool, Review of necessary elements when identifying vital areas to minimize the radiation effects of spent fuel pool against sabotage, Necessity to adjust vital areas according to the spent fuel management cycle. The main assumptions used in the analysis of the vital area of the power plant need to be equally reflected when identifying vital areas in spent fuel pool. And, the results of this study are for the purpose of minimizing the radiological consequences against sabotage on the spent fuel storage system including the spent fuel pool and used to establish regulatory standards in the spent fuel storage stage.

      • Development of Evaluation Software for Security System Effectiveness

        Hyeseung Kim,Sundo Choi,Sung Soon Jang 한국방사성폐기물학회 2022 한국방사성폐기물학회 학술논문요약집 Vol.20 No.2

        Nuclear power plants, like other national critical infrastructures, could be under the threat of terrorism or other malicious action. Thus, a nuclear power plant has a robust security system that includes security guards, sensors, barriers, access control systems, lights, and alarm stations with security procedures. However, an effective security system is hard to design because a chain is only as strong as its weakest link, and there could be a vulnerable hole even in the robust security system. Thus, an effective security system requires the evaluation of all possible scenarios. Evaluation software for security system effectiveness assists in systematically assessing all the possible attack scenarios. Many countries developed security effectiveness evaluation software. The first software was developed by the U.S. Sandia National Laboratories in the 1980s. Now there are several commercially available software packages with a function to simulate limited-scope combat between security guards and attacking enemies. However, academic communication is comparatively weak because it may contain sensitive information on the vulnerability of nuclear power plants. We developed original software called Tools for Evaluating Security Systems (TESS) to identify the most vulnerable path to the designated target and model the security systems of all South Korean nuclear power plants. We also used commercial security effectiveness evaluation software, AVERT, to model the same nuclear power plants. TESS was developed to verify the results of commercial security effectiveness evaluation software for the purpose of regulatory use. For the feasibility test, we compared the results of two software with those of force-on-force (FoF) exercises in nuclear power plants. According to the relevant Act, every nuclear power plant site should perform the FoF exercises every year. KINAC was in charge of evaluating the FoF exercise and used several of its results for the study. In the results, even in some differences in detail, the two software and FoF exercises showed qualitative similarity. Conclusively, evaluation software is a useful tool to design and/or assess the security systems of nuclear power plants. We modeled the security systems of all South Korean nuclear power plants, and compared the developed software, a commercial software and FoF exercises. The results showed qualitative similarity. We provided the results of evaluation to nuclear operators for the better security of nuclear power plants.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼