Posts

Showing posts with the label Dept.Courses

Comprehensive List of Shipboard Systems in Commercial Vessels

Image
  Comprehensive List of Shipboard Systems in Commercial Vessels Beyond the core navigation, power, safety, cargo, and crew welfare systems, modern commercial ships incorporate a wide range of specialized systems to optimize operations, improve efficiency, and comply with international maritime regulations. Below is a detailed breakdown of shipboard systems, including advanced and auxiliary systems often overlooked. 1. Navigation & Control Systems (Ensuring Safe and Efficient Maneuvering) 📌 Core systems responsible for vessel control, automation, and positioning. Integrated Bridge System (IBS) – Merges multiple navigation tools into a single console for improved efficiency. Voyage Data Recorder (VDR) – The "black box" that records navigational and operational data for accident investigation. Speed Log System – Measures ship speed over water or ground using Doppler sensors. Echo Sounder (Depth Finder) – Detects underwater terrain to prevent grounding. Rudd...

Updated Potential Risks & Risk Management: Including Cybersecurity & Hacking Threats

Image
Updated Potential Risks & Risk Management: Including Cybersecurity & Hacking Threats In addition to mechanical failures, environmental hazards, and operational issues, modern commercial ships face increasing risks from cyber threats and hacking attempts . Below is an expanded breakdown of Potential Risks and Risk Management Strategies , incorporating cybersecurity threats that could compromise ship operations. 🚨 Potential Risks (Including Cybersecurity & Hacking Threats) 1. Navigation & Control System Risks 🛑 GPS Spoofing & Jamming → False positioning or loss of location data. 🛑 ECDIS Hacking → Tampering with electronic charts can mislead navigation. 🛑 Autopilot/Steering System Manipulation → Unauthorized control takeover, leading to collisions or groundings. 🛑 Dynamic Positioning (DP) Cyber Intrusion → Remote access breach could disable station-keeping systems. 2. Power & Energy Management System Risks 🛑 Power Management System (PMS) Exploit...

Major Systems Installed on Commercial Ships – Detailed Functionality, Risks, and Risk Management

Image
Major Systems Installed on Commercial Ships – Detailed Functionality, Risks, and Risk Management Commercial ships, such as container ships, bulk carriers, oil tankers, LNG carriers, and car carriers , are equipped with complex systems to ensure safe, efficient, and environmentally compliant operations . Below is an in-depth analysis of each system, explaining how they work, potential risks, and how these risks can be managed. 1. Navigation & Control Systems 📌 Function: These systems ensure safe and precise maneuvering of the vessel. 1.1 Steering System How It Works: The rudder is controlled by a hydraulic or electric actuator, responding to the helm’s commands. The system may be manually operated or automatically controlled by an autopilot. Potential Risks: Hydraulic failure → Loss of steering capability. Electrical faults → System malfunction. Cyber threats → Unauthorized remote control of steering. Risk Management: Redundant hydraulic circuits and eme...

What Suppliers Need to Do for Compliance with IACS UR E27

Image
  IACS UR E27 (Unified Requirement E27) establishes cybersecurity requirements for IT and OT systems on ships to ensure cyber resilience and protection against cyber threats. Suppliers, including OEMs, software vendors, and network solution providers , must comply with these standards to secure type approvals, classification society certifications, and customer trust . Below are the key actions suppliers must take to ensure compliance with IACS UR E27 . 🔹 1. Develop and Deliver Secure Products 📌 Why is this important? IACS UR E27 mandates that hardware and software used on ships must be securely designed, developed, and tested to prevent cyber vulnerabilities. ✅ What Suppliers Must Do: Follow Secure Software Development Lifecycle (SDLC) principles (IEC 62443, ISO/IEC 27001). Conduct threat modeling and risk assessments before product release. Apply secure coding practices (e.g., input validation, memory protection). Implement data encryption and integrity prote...

[Curriculum] Sungkyunkwan University - Department of Information Security - Course Sequence by Areas of Interest

Image
The order in which subjects are approached may vary depending on the student's major, interests, and learning goals. However, generally, taking courses in the following sequence allows for efficient learning. (Source: Sungkyunkwan University GSIC ) 1. Basic Courses First, it is essential to understand fundamental theories and basic concepts. The following courses help build foundational knowledge: Introduction to Digital Forensics (FSI5056) : Establishes the basics of digital forensics and teaches various methods for collecting and analyzing digital evidence. Korea University Graduate School of Information Security Introduction to Cryptography (GSIS001) : Covers the fundamental principles and applications of encryption technologies for data protection. Life Coding Database (GSID003) : Introduces key concepts and practical skills for data storage and management. Operating Systems (GSID021) : Helps understand the structure and functions of operating systems, which are the core of com...

(Environment) (AWS, Mac) Project Execution and Modeling in an Enterprise Setting

Image
I have resumed engineering and modeling tasks , which I had temporarily set aside to focus on project management and new business planning . For a project that involves optimizing (tuning) individual models for image and text processing , as well as integrating multiple models —a skill I honed during my Ph.D. program—I now require a complex and well-structured work environment . To ensure optimal efficiency under the given constraints , I plan to set up, refine, and document the work environment for future reference. "If I had eight hours to chop down a tree, I would spend six hours sharpening the axe." – Abraham Lincoln (1861–1865), the 16th President of the United States Review of Work Environment 1. Managing Work on an Unstable Server & Data Backup ✅ Backup & Record Management: Using SFTP to store and synchronize data in a structured manner. ✅ GitHub Usage: Limited to baseline model development and version control for key components. ✅ Code & Data Managem...

"GNN (Graph Neural Network) ML Learning" (1) Curriculum - Approach

Image
Shifting Perceptions and Expectations of AI from Companies The way companies perceive and expect from AI is evolving. Until now, aside from cutting-edge research and product development , the role of AI engineers and data scientists in enterprises can generally be categorized as follows: Image Processing : Companies have widely utilized CNN-based models for object recognition and comparison (performance improvement). To overcome data scarcity, techniques like few-shot learning have been applied in areas such as product search, similar image/product recommendation, and design generation . Text Processing : Enterprises have leveraged various Transformer-based models trained on proprietary datasets for customer intent recognition and sentiment analysis . Data-Driven Decision Support : Companies often assume they possess sufficient data, but in many cases, they lack the necessary datasets. AI teams analyze available data, form hypotheses , and generate insightful reports to support an...

Natural Language Processing" (1) Curriculum - Overview and Hands-on Practice

Image
Subject: Natural Language Processing (NLP) Through my work in implementing AI chatbots and taking the Natural Language Processing (NLP) course, I realized that since the introduction of the "Attention Is All You Need" paper and the breakthrough models like "Transformer" , "BERT" , and "GPT-2" , there has been a significant increase in both corporate and academic interest in dialog systems such as AI chatbots and customer support services , with NLP technologies at their core. This shift can be attributed to the advancements in NLP technologies , which have reached a point where natural language services are widely accepted without significant resistance . In this context, I want to explore what Natural Language Processing (NLP) is, why the interest in it has grown rapidly , and what technologies have made this possible . Additionally, I will present the requirements and methods for developing AI services based on NLP technology . Approach...