• Title/Summary/Keyword: 개인보호장비

Search Result 80, Processing Time 0.021 seconds

A Design and Implementation of Camera Information File Creation Tool for Efficient Recording Data Search in Surveillance System (보안 관제 시스템에서 효율적인 영상 검색을 위한 카메라 연동 정보 파일 자동 생성 도구의 설계 및 구현)

  • Hwang, Gi-Jin;Park, Jae-Pyo;Yang, Seung-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.55-61
    • /
    • 2016
  • For the purpose of video security equipment is to protect personal property and life against from terrorism or recent threats. In this study, if you proceed with the recorded data search, we propose a method for increasing the user's search convenience. It has predefined data structure which is between camera's movement path and relationship. Also, design and implement a tool that automatically generates a files which has inter camera related information on the control center in a multi-camera is installed environment. Using generated file, minimize searching time and increase searching efficiency.

Analysis of Effects of Lightning on PAV Using Computational Simulation and a Proposal to Establish Certification Guidance (전산 시뮬레이션을 통한 PAV 낙뢰 영향성 분석 및 인증기술에 관한 연구)

  • Park, Se-Woong;Kim, Yun-Gon;Kang, Yong-Seong;Myong, Rho-Shin
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.6
    • /
    • pp.60-69
    • /
    • 2019
  • Companies around the world are actively developing Personal Air Vehicle (PAV) to solve the serious social problem of traffic jams. Airworthiness certification for PAV is required, since it is a manned vehicle. As with aircraft, the critical threat to the safe operation of PAV is lightning strike with strong thermal load and magnetic fields. Lightning certification issue also remains important for PAV, since there are still insufficient development of PAV-related lightning certification technologies, guidelines, and requirements. In this study, the SAE Aerospace Recommended Practice (ARP), an international standard certification guideline recognized by the Federal Aviation Administration (FAA), was analyzed. In addition, the guideline of lightning certification was applied to a PAV. The impact of lightning on PAV was also analyzed through computational software. Finally, the basis for the establishment of the PAV lightning certification guidance was presented.

Effect of wearing personal protective equipment on cardiopulmonary resuscitation: Focusing on 119 emergency medical technicians (개인보호장비 착용이 심폐소생술에 미치는 영향: 119 구급대원을 중심으로)

  • Shin, Dong-Min;Kim, Seung-Yong;Shin, Sang-Do;Kim, Chu-Hyun;Kim, Tae-Han;Kim, Kyoung-Yong;Kim, Jeong-Hee;Hong, Eun-Jeong
    • The Korean Journal of Emergency Medical Services
    • /
    • v.19 no.3
    • /
    • pp.19-32
    • /
    • 2015
  • Purpose: This study examined the effect of wearing personal protective equipment (PPE) on cardiopulmonary resuscitation (CPR), positive airway pressure, and the posture of emergency medical technicians (EMTs) when conducting CPR. Methods: Twenty 119 EMTs performed 30:2 CPR on a manikin for 4 min. Imaging data were digitized with Kwon3D XP (version 4.0). Data were collected by analyzing the motion when starting in one cycle, such as pressing to the maximum and in the final position (relaxed), and were analyzed with SPSS 18.0. Results: The angle of the elbow joints was significantly reduced (p < .05). The trunk angle was statistically significantly (p < .01, p < .001) increased. The angular velocities of the shoulder joint and left elbow joint were reduced (p > .05). The angular velocity of the trunk was significantly reduced in the starting and maximum compression postures. The hand-escape time was increased. The average compression depth was increased but not significantly (p > .05). The positive airway pressure was reduced (p > .05). Conclusion: The angle of the elbow joints and the angular velocity of the trunk were reduced, and the angle of the trunk was increased. The success of CPR and positive airway pressure was reduced.

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

The danger and vulnerability of eavesdropping by using loud-speakers (스피커를 이용한 도청 위험에 대한 연구)

  • Lee, Seung Joon;Ha, Young Mok;Jo, Hyun Ju;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1157-1167
    • /
    • 2013
  • The development of electronic devices has recently led to many problems such as personal information rape and leakage of business information. Conventional loud-speakers have been generally used to output devices. It can be, however, operated as a micro-phone which was abused as a means for eavesdropping since the speaker and microphone have basically the equivalent structure. Most importantly, the general peoples are not aware of the approaching danger about using speaker as microphone. And, traditional eavesdropping detection equipment does not check the attack. In this paper, we demonstrate that there is a serious danger and vulnerability in using loud-speakers since they can be used as eavesdropping devices.

Encryption scheme suitable to RFID Systems based on EPC Generation2 (Gen2 기반 RFID 시스템에 적합한 암호 기법 설계)

  • Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.67-75
    • /
    • 2008
  • RFID(Radio Frequency Identification) system is an automated identification system that consists of tags and readers. They communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to substitute a bar-code system. But RFID system creates new threats to the security and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve privacy problems against attacks, but it is difficult to apply to RFID system based on low-cost Gen2. Therefore, We will propose a new encryption scheme using matrix based on Gen2 in RFID system in paper, and We will analyze our encryption scheme in view of the security and efficiency through a simulation and investigate application environments to use our encryption scheme.

Design and Implementation of a Sensor Technology-based Safety Shoe Recognition System to Prevent Safety Accidents (안전사고 예방을 위한 센서 기술 기반 안전화 인식 시스템 설계 및 구현)

  • Kyoung-Jin Oh;Jeong-Min Park;Kwang-Jin, Kwak
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.163-170
    • /
    • 2023
  • With the introduction of the law regarding severe penalties for major accidents, employers, management executives, and corporations have significantly increased the number of safety managers and invested extensively in acquiring ISO certifications to prevent accidents in industrial sites. Moreover, the implementation of the Smart Safety Management System (SSMS) has facilitated the management of personnel and safety equipment. While IoT-based management systems have been applied to safety gear such as helmets, safety harnesses, and protective clothing, the responsibility for safety shoes still primarily lies with on-site managers and individuals, leaving a vulnerability to accidents. In this study, we aim to implement a Raspberry Pi-based sensor device to proactively detect workers' safety shoe usage upon entering the site. The goal is to confirm the usage of safety shoes and prevent accidents that may occur due to non-compliance with safety shoes regulations.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

Status of Health and Safety Management in Occupational Hygiene Laboratories in Korea

  • Yang, Hyukseung;Choi, Jaewook;Yoon, Seokjoon;FARR, Terry
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.17 no.1
    • /
    • pp.53-62
    • /
    • 2007
  • 목적: 1990년대 초반부터 시작된 우리나라의 산업 보건에 대한 사회적 관심의 증대와 시장의 요구에 따라 산업위생기관의 양적인 팽창이 이루어지긴 하였으나 실험실 관련 안전보건규정이 미비한 상태에서 추진되어 산업위생 실험실에서 다양한 유해 위험성 인자를 취급함에도 불구하고 사용되는 량이 소규모로 인해 안전보건과 관련된 사항은 대부분 간과하고 있으며, 산업위생 실험실의 안전보건관리 실태는 선진외국에 비해 상당히 낙후되어 있는 실정이다. 따라서 본 연구는 우리나라 산업위생 실험실과 관련한 안전보건관리 실태를 평가함으로써 향후 실험실의 안전보건관리 수준을 향상 시키는데 효과적인 자료로 활용하는데 기여하고자 한다. 방법: 산업위생실험실의 안전보건 실태를 파악하기 위해 설문조사를 수행하였으며, 설문은 실험실의 전반적인 안전보건, 화학물질 저장 및 용기, 가연성 및 인화성 화학물질, 가스 실린더, 의사전달, 응급처치 및 비상사태 장비, 정리정돈, 소방안전, 전기안전, 개인보호구, 흄후드 및 환기, 및 이황화탄소 취급 사례로서 12개 영역으로 구성되었다. 연구대상은 2001년 한국산업안전공단 정도관리프로그램에 참여한 기관으로서 총 대상은 119개 기관이었다. 연구기간은 2002년 7월 01일부터 8월 30일까지 약 60일 이었다. 설문은 반송봉투에 넣어 설문완성 후 연구자에게 보낼 수 있도록 배려하였으며, 1차 설문을 보낸 후 2주 후에 설문 참여를 독려하기 위해 엽서를 발송하였고, 다시 2주 후에 각 산업위생기관에 개별 전화 연락을 취하였다. 그 결과 63% (75개 기관)의 완성된 설문을 얻을 수 있었다. 설문의 총 조사항목은 79문항으로 구성되어 있으며, 산업위생실험실의 안전보건 수준을 정량적으로 평가하기 위해 안전보건 매뉴얼, 교육훈련프로그램 및 한국산업안전공단 실험실 지침서를 보유한 기관과 그렇지 않은 기관간의 차이는 선별된 67문항에 대해 각 문항에 합당하거나 적절할 경우 1점을 부여하는 방식으로 점수화하였다. 이들의 관련성을 파악하기 위하여 Microsoft-Excel 2000 프로그램을 이용하여 two-tailed t-test 분석을 실시하였다. 결과 1. 산업위생실험실 운영과 관련한 67개 항목(항목별로 각 1점 부여)에 대한 안전보건 성과지수화 (100점으로 점수 환산) 결과 안전보건 매뉴얼을 보유한 기관은 $42.98{\pm}13.36$(p<0.001)점, 교육훈련프로그램을 보유한 기관은 $50.75{\pm}14.12$(p<0.01)점, 한국산업안전공단 실험실 지침서를 보유한 기관은 $43.58{\pm}11.92$(p<0.01)점으로 그렇지 않은 기관에 비해 통계적으로 유의하게 높은 점수분포를 보였다. 2. 화학물질 보관 캐비닛이 있는 기관 중 64.8%의 기관은 화학물질을 알파벳 순으로, 27.8%는 분류 기준에 따라, 그리고 7.4%는 무작위로 보관하고 있었다. 3. 단지 8.0% (6개)의 기관만이 실험실내에 눈세정 분수(2 개), 샤워기(3개) 및 눈세정물병(3개, 2개 중복 응답 기관)과 같은 응급처치 장치 및 물품을 갖추고 있었다. 4. 89.0%의 기관이 흄후드내에 화학물질을 보관하고 있었다. 5. 물질안전보건자료, 흄후드 기록지, 비상사태 절차서 및 한국산업안전공단 실험실 지침서와 같은 문서관리는 부적절하게 관리 및 기록되고 있었다. 6. 대부분의 산업위생 실험실은 응급처치 장비, 화학물질 또는 가스용기 보관실과 같은 실험실 안전설비가 부족할 뿐만 아니라 정리정돈, 화학물질 저장 캐비닛, 안전보호구 및 흄후드와 같은 관리가 미비하였다. 결론: 이상의 결과에 근거하여 기관장은 실험실의 안전보건관리를 위하여 문서관리체계를 제공하고, 모든 실험실 종사자가 적절한 개인보호구를 착용할 수 있도록 하며, 비상 장비를 설치하고, 실험실과 관련한 적절한 규정을 제정하며, 교육훈련 프로그램을 제공하여야 한다. 또한 실험실 종사자는 실험 중 적절한 개인보호구의 착용하고, 비상장비 이용에 대한 교육훈련에 참여하며, 적절한 실험실 운영관리에 대한 책임감을 가져야 한다. 위의 권고사항 이행을 위해서 KOSHA는 KQCP 프로그램에 실험실 안전보건관리 항목을 삽입하여 주기적인 평가를 수행할 필요가 있다. 우리나라 실험실의 특성을 고려할 때 본 연구결과는 일반 실험실에도 적용될 수 있을 것으로 생각된다.

Analysis of the Engagement Effects of DIRCM against a Man Portable Air Defense System (휴대용대공유도탄에 대응하는 지향성적외선방해장비의 교전효과 분석)

  • Jeong, Chunsik
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A MANPADS(Man Portable Air Defense System), which tracks infrared energy, is light enough for individuals to carry and can against to a variety of aircraft, making it widely deployed around the world, posing a major threat to aircraft. A flare has been developed as an IRCM(Infrared Countermeasures) that protects the life of friendly aircraft and combatants by deceiving such guided missiles. However, DIRCM, which can overcome the problems of existing IRCM, is being developed mainly in some developed countries, and the need for it has been increasing gradually. This paper modeled first generation IR seeker of AM modulation method, the second generation IR seeker of FM modulation method, and the third generation IR seeker of pulse modulation method among various MANPADS, and modeled the scattering light phenomenon in the seeker when laser beams are investigated in DIRCM. Using this, jamming simulations were performed in various engagement environments of the MANPADS and aircraft equipped with DIRCM, and the miss distance of the guided missiles and aircraft were analyzed. Simulation results show that DIRCM, which irradiates a modulated laser beam with one jamming code, deceives both first, second and third generation MANPADS at 1km and 2km of engagement distance. In particular, the survival rate of aircraft equipped with DIRCM increased when the distance of engagement increased from 1km to 2km, and the survival rate was at least 99% at 2km of engagement distance.