• Title/Summary/Keyword: 공공 안전

Search Result 834, Processing Time 0.031 seconds

Effects of Launching Vehicle's Velocity on the Performance of FTS Receiver (발사체의 속도가 FTS 수신기의 성능에 미치는 영향)

  • Kang, Sanggee
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.27-32
    • /
    • 2014
  • A doppler shift is generated by moving a transmitter or receiver operated in communication systems. The doppler frequency shift between a transmitter and a receiver or the frequency offset present in transceivers must be removed to get the wanted system performance. FTS is used for preventing an accident from operating abnormally and for guaranteeing public protection. A launching vehicle's initial velocity is very fast in order to escape the earth and the amount of doppler shift is large. Recently many studies to adopt the next generation FTS are ongoing. To introduce new FTS, the effects of doppler shift on the performance of the new FTS must be studied. In this paper the doppler effect caused by launching vehicle's velocity affecting the performance of FTS receiver is investigated into two cases, one is for EFTS as a digital FTS and the other is for FTS using a tone signal. Noncoherent DPSK and noncoherent CPFSK are considered as the modulation methods of EFTS. In the cases of the doppler frequency shift of 200Hz present in EFTS using noncoherent DPSK and noncoherent CPFSK are simulated. Simulation results show that $E_b/N_o$ of 0.5dB deteriorates in the region of near BER of about $10^{-5}$ in RS coding. And there is no performance variation in $E_b/N_o$ or $E_b/N_o$ is worsened about 0.1dB in the same BER region for the case of using convolutional and BCH coding. Quadrature detector used in FTS using tone signals is not influenced by the doppler frequency shift.

Public Shared Service Centers for Collaborative Government: A Case Study of the United States and the United Kingdom (협업정부 구현을 위한 행정공유서비스센터 도입방안 연구 - 정부 공유서비스센터 선진국 사례연구를 기반으로 -)

  • Hong, Kil Pyo;Chung, Choong Sik;Kim, Pan Suk
    • Informatization Policy
    • /
    • v.21 no.3
    • /
    • pp.33-55
    • /
    • 2014
  • Public Shared Service Centers (PSSC) consolidate functions such as human resources, information technology, financial management or accounting into one office to serve an organization. A prominent example from the United States is the Federal Information Technology Shared Services Strategy. It supports mission, administrative, and infrastructure-related IT functions through providing organizations in the Executive Branch of the Federal Government (Federal Agencies) with policy guidance on the full range and lifecycle of intra- and inter-agency information technology (IT) shared services. This study looks at the Federal Information Technology Shared Services Strategy in order to draw lessons for fostering collaborative government through the use of PSSC. It finds the following factors are critical for success when implementing IT shared services: (1) agency leadership must be solidly behind their IT shared service plan, or the needed changes will not happen at the business unit, program, or system levels; (2) there must be a move away from internally-centered, program-specific thinking, and a move toward a paradigm of consuming and providing IT shared services with multiple groups whenever possible; and (3) successfully managing "loss of control" issues is central, and optimizing business processes is essential to move from stove-piped workflows to processes that work across the agency enterprise and beyond. Therefore, the study suggests that a Korean model of PSSC implementation be introduced, and that good IT Governance is a crucial component of PSSC strategies.

Implementation of Rule Management System for Validating Spatial Object Integrity (공간 객체 무결성 검증을 위한 규칙 관리 시스템의 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1393-1403
    • /
    • 1999
  • 공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.

Effects of Flood Peak Location on Riverbed Variation (하천의 하상변동에 대한 첨두 유량 발생위치의 영향)

  • Chae, Kuk-Sheok;Park, Sang-Deog;Kim, Nam-Ho;Kim, Min-Kyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1591-1595
    • /
    • 2006
  • 하천은 인간에게 있어 물을 공급하는 중요한 하나의 공급원인 동시에 재해를 발생시킴으로서 인간에게 큰 피해를 줄 수 있는 위험물로서 존재한다. 이러한 이면을 가진 하천은 하천 자체로는 하천의 특성이 변화하지 않으며, 인위적이나 자연적인 원인으로 변화하는 것이다. 특히 강도가 큰 강우가 발생하였을 때 하천의 특성은 크게 변화한다. 강우시 하천은 유출량 증가와 유사량의 시공간적인 변화로 인해 형상거동의 자기조절 기작을 통하여 유역밖으로 이들을 안전하게 배출시키는 기능을 발휘한다. 하천 합류부는 각기 다른 특성을 가진 두 흐름이 만나는 지점으로 흐름과 지형 둘 다 변화하며, 합류부 이후에는 그 이전과는 다른 특성을 나타낸다. 따라서 합류부는 하천의 흐름상에서 중요한 부분이라고 할 수 있다. 본 연구에서는 강릉에 위치한 경포천과 제 1지류인 위촌천이 합류하는 구간을 대상으로 하여 홍수시 첨두유량의 크기와 발생위치 및 홍수 모의기간에 따른 하상변동에 대해 연구하였다. 이를 위해 1차원 하상 변동 모형인 HEC-6를 이용하여 하상변동을 모의하고 그 결과를 실측 하상변동량과 비교분석하였다. 유입수문곡선에서 첨두유량의 발생위치는 전반부, 중앙부, 후반부로 구분하였고, 홍수모의 기간은 1년, 5년, 10년으로 하였으며 1년 이상의 수문곡선은 1년의 수문곡선을 모의 기간만큼 반복 발생시키는 것으로 하였다. 그 결과 하상변동은 홍수 모의기간, 유입수문곡선의 첨두유량 발생위치와 첨두유량의 크기에 따라 그 양상이 현저히 달라지는 것을 확인하였다. 유입유량 조건에서 동일수문곡선의 반복에 따른 모의기간 별 하상변동은 퇴적과 침식의 규모가 확대되는 형태로 나타나는 것을 알 수 있다. 미치는 시간축척의 영향을 파악하기 위해 $70{\sim}90$ 시간 동안 실험을 수행하였다. 세굴의 측정은 투명한 아크릴로 제작된 수제 내부에 CC카메라를 수제 전 후면 및 측면에 설치하여 월류수제의 세굴 발생을 실시간으로 측정하며 동시에 수제의 각 면에 각각 3개의 압력센서를 설치하여 압력분포를 측정함으로써, 월류수제 주변의 압력변화에 따른 세굴심의 실시간 변화를 비교할 수 있도록 하였다. 수심이 연중 $25{\sim}35m$를 유지하는 H호의 경우 간헐식 폭기장치를 가동하는 기간은 물론 그 외 기간에도 취수구의 심도를 표층 10m 이하로 유지 할 경우 전체 조류 유입량을 60% 이상 저감할 수 있을 것으로 조사되었다.심볼 및 색채 디자인 등의 작업이 수반되어야 하며, 이들을 고려한 인터넷용 GIS기본도를 신규 제작한다. 상습침수지구와 관련된 각종 GIS데이타와 각 기관이 보유하고 있는 공공정보 가운데 공간정보와 연계되어야 하는 자료를 인터넷 GIS를 이용하여 효율적으로 관리하기 위해서는 단계별 구축전략이 필요하다. 따라서 본 논문에서는 인터넷 GIS를 이용하여 상습침수구역관련 정보를 검색, 처리 및 분석할 수 있는 상습침수 구역 종합정보화 시스템을 구축토록 하였다.N, 항목에서 보 상류가 높게 나타났으나, 철거되지 않은 검전보나 안양대교보에 비해 그 차이가 크지 않은 것으로 나타났다.의 기상변화가 자발성 기흉 발생에 영향을 미친다고 추론할 수 있었다. 향후 본 연구에서 추론된 기상변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하

  • PDF

A Study on the Establishment of Industrial Security Education Programs in Korea (한국 산업보안교육 프로그램의 정립에 관한 연구)

  • Choi, Sun-Tae;Yu, Hyeong-Chang
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.185-208
    • /
    • 2010
  • This study is to suggest the current security education programs and improvement of industrial security curriculums in Korea. We live in a world of insecurity; the world is changing at an ever accelerating pace. Life, society, economics, international relations, and security risk are becoming more and more complex. The nature of work, travel, recreation, and communication is radically changing. We live in a world where, seemingly with each passing year, the past is less and less's guide to the future. Security is involved in on one way or another in virtually every decision we make and every activity we undertake. The global environment has never been more volatile, and societal expectations for industrial security and increasing if anything. The complexities of globalization, public expectation, regulatory requirements, transnational issues, jurisdictional risks, crime, terrorism, advances in information technology, cyber attacks, and pandemics have created a security risk environment that has never been more challenging. We had to educate industrial security professional to cope with new security risk. But, how relevant is a college education to the security professional? A college degree will not guarantee a job or advancement opportunities. But, with a college and professional training, a person has improved chances for obtaining a favored position. Commonly, Security education and experience are top considerations to find a job so far, also training is important. Today, Security is good source to gain competitive advantage in global business. The future of security education is prospect when one considers the growth evident in the field. Modern people are very security-conscious today, so now we had to set up close relevant industrial security programs to cope with new security risk being offered in colleges or several security professional educational courses.

  • PDF

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF

Value Analysis of Barrier-free Facilities at Subway Stations Using CVM with a Double Bounded Dichotomous Choice Question (이중양분선택형 질문법을 이용한 CVM에 의한 지하철 역사 Barrier-free 시설의 가치분석)

  • Jung, Hun-Young;Baik, Sang-Keun;Baek, Eun-Sang
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.5
    • /
    • pp.205-216
    • /
    • 2008
  • As the aged and physically disabled people are expected to increase in the next several years, traffic demand especially for the 'mobility handicapped people' will be stronger. According to this trend, our society needs the improvement of social overhead capital for the aged and the disabled. First of all, Barrier-free of public transport facilities is urgent case. The purpose of this study is to estimate value of the Barrier-free facilities at subway stations by using Contingent Valuation Method(CVM) with Double Bounded Dichotomous Choice Question and to analyze the factor which affects the WTP(Willingness To Pay) of subway users by using Survival Analysis. As a result of this study, 'Elevators' and 'Escalators' are higher than 'Handicapped Gate Machines' and 'Ramps for Wheelchair' in the aspect of the average willingness to pay. Therefore the government is recommended to install the Barrier-free facilities for going up and down such as 'Elevators' and 'Escalators', and then supply others for just using subway, and passing such as 'Handicapped Gate Machines' and 'Ramps for Wheelchair'. Also, the average willingness to pay of 'mobility handicapped people' is higher than that of 'normal people'. It indicates that 'mobility handicapped people' value each Barrier-free facility high compared to 'normal people'.

A study of the status of UAS Certification System and Airworthiness Standards (민간 무인항공기시스템 인증체계 현황 및 관련규정 연구 동향 분석)

  • Ahn, Hyojung;Park, Jonghyuk;Yoo, Seungwoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.10
    • /
    • pp.893-901
    • /
    • 2014
  • UAS and related technology have been mainly developed for military use but, in recent years, various types of civil UAS have been using in a variety of applications. For example, there are multicopters to shoot aerial photography, pesticide spraying unmanned helicopter, and in addition there are radio control (R/C) aircraft to be used for hobbyists. UAV has spread rapidly enough that permitted experts as well as the public can use it but the related safety regulations are not properly equipped. We investigated the status of domestic and international UAS certification system and airworthiness standards. And the trends in research for the development and modification of the certification system were studied in this paper. As a result, most countries have studied to develop the related regulations and especially ICAO has tried to develop RPAS manual, standards and recommended plans and modify the related ICAO annex through the research group, ICAO UASSG. Based on the manual and SARPs, authorities, related organizations and companies have prepared to develop and modify regulations in accordance with the actual situation of each country.

A Study on the Applicability of IoT for Container Terminal (컨테이너 터미널의 사물인터넷(IoT) 적용가능성에 관한 연구)

  • Jeon, Sang-Hyeon;Kang, Dal-Won;Min, Se-Hong;Kim, Si-Hyun
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.2
    • /
    • pp.1-18
    • /
    • 2020
  • The Internet of things (IoT) has been applied to a variety of industrial uses such as public service sectors, medical industries, automotive industries, and so on. Led by smart cities, this is typical. However, from a logistics perspective, the level of application is insufficient. This study examines the applicability of IoT-related technology in a container terminal, an object of the present invention, to derive an applicable plan. Analytic network process (ANP) analysis reveals the following results for IoT applications in container terminals: operating systems (26.7%), safety/environmental/security systems (26.4%), equipment maintenance systems (25.3%), and facility maintenance systems (21.6 %). The second ANP analysis reveals the following results: Economy (40.2%), productivity (21.1%), service level (19.5%), and utilizing technology level (19.2%). The application or standard of evaluation is important when applying IoT technology to container terminals; however, it is not concentrated in a certain area. It is desirable to build each container system with linkage and efficiency from a macroscopic view.

Vehicle-to-Vehicle Broadcast Protocols Based on Wireless Multi-hop Communication (무선 멀티 홉 통신 기반의 차량간 브로드캐스트 프로토콜)

  • Han, Yong-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.53-64
    • /
    • 2009
  • Inter-vehicular communication that propagates information without infrastructures has drawn a lot of interest. However, it is difficult to apply conventional ad-hoc routing protocols directly in inter-vehicular communication due to frequent changes in the network topology caused by high mobility of the vehicles. MMFP(Multi-hop MAC Forwarding) is a unicast forwarding protocol that transport packets based on the reachability information instead of path selection or position information. However, delivering public safety messages informing road conditions such as collision, obstacles and fog through inter-vehicular communication requires broadcast rather than unicast since these messages contain information valuable to most drivers within a close proximity. Flooding is one of the simplest methods for multi-hop broadcast, but it suffers from reduced packet delivery-ratio and high transmission delay due to an excessive number of duplicated packets. This paper presents two multi-hop broadcast protocols for inter-vehicular communication that extend the MMFP. UMHB(Unreliable Multi-Hop Broadcast) mitigates the duplicated packets of MMFP by limiting the number of nodes to rebroadcast packets. UMHB, however, still suffers from low delivery ratio. RMHB(Reliable Multi-Hop Broadcast) uses acknowledgement and retransmission in order to improve the reliability of UMHB at the cost of increase in transmission delay, which we show through simulation is within an acceptable range for collision avoidance application.

  • PDF