• Title/Summary/Keyword: 관제일지

Search Result 1,631, Processing Time 0.026 seconds

The Development Strategy of Shanghai's Air Transportation (상해항공운수발전전각)

  • Peng Youlian
    • Proceedings of the KOR-KST Conference
    • /
    • 1993.07a
    • /
    • pp.235-247
    • /
    • 1993
  • 이십일세기상해항공운수발전전략연구, 시이 $\ll$진흥상해, 개발포동, 복무전국, 면향세계$\gg$ 적방침작위지도, 병통과이상해포동개방개\ulcorner\ulcorner\ulcorner장강삼각주지구내지정개장강류역경제발전, 축보사상해발전성위\ulcorner\ulcorner지 구경제, 김융, 무역중심지일작위목표개전전략연구. 상해재아국두\ulcorner\ulcorner의현대화건설진정중점유겁기중요적지위, 저장성위태평양서안최인적 제무역중심지일, 목전, 상해항공운수적현상여기재국민경제중적전략지 위급여세계경제발달국가급지구례여뉴약, 륜돈, 파려, 지가가, 동경, 향항, 신가파등국제대성시상비차거태대, 안통계수거상해1990년항공운수탄토량약시미국뉴약1986년적1.5%, 시향항적10%좌우, 가견상해민\ulcorner\ulcorner수적 발전속도이경한제료상해경제적등비, 한제료포동개방개발급여국내 외정치경제화문화적교류, 위료사상해항공운수여상해적국민경제급사사회 발전상괄응, 대력발전항공운수기박재미첩. 수착상해경제발전, 능원, 원재료적증가, 외향형경제발전급금후궤십년상해인민수입증가화경제결 구조정.고정첨기출적발전급국제교왕적증가. 예측이십일세기상해여객 운수량급화운량장성배증가, 소이탐색일개여상해경제발전전략목표상괄 응적현대화항공교통운수체계, 발혼항공운수특유적우핵시십분필요적. 본연구보고종이하오개방면대상해이십일세기항공운수발전전략진행천술. 일, 개술발전상해항공운수적필요성급긴박성. 이, 상해민용항공운수현상대상해지구주요승운인동방항공공사항선 망, 운력, 기대, 기장현상작료분석,설명상해민항유우운력불족, 기출 장비체후, 자김결, 불능만족상해경제등비발전적수요. 공중교통관제, 통신도항, 기무유수, 항유공응등방면야도불동정도지한 제료항공운수적발전, 필수인기겁대적중시. 삼, 상해항공운수적예측화전망, 통과자료연구급수거분석, 리용수 학모형대이십일세기상해항공운량진행예측, 제출발전상해항공운수적전 략목표급발전중점. 예측2020년 상해항공항총객운탄토량4300만인/년, 화운량달120만돈; 2050년객운량장달18150만인차/년, 화운량518만돈. 사, 발전상해민항기출경제정책, 제출위료$\ll$진흥상해, 개발포동, 복무전국, 면향세계$\gg$ 화도이십일세기중기국민경제달도중등발달국가수 평굉관전략목표적실현, 제료필수재지도사상상파교통운수진정방도전략 산업지위, 환응재관리체제상채취과단유효적개혁조시, 재기출경제정책 상급여대력부지. 오, 전략목표, 위파상해건설성위태평양서안최대적경제, 김융, 무역적중심, 요구상해항공항성위화동지구통향세계각지항선망출발참, 구성대외개방선면축심, 실현국제항선적함접화국내항반적전항, 형성다축심복사식항선망; 가강기장건설, 개피포동제이국제기장건설, 괄응포동개발경제발전적수요.

  • PDF

A Practical Feature Extraction for Improving Accuracy and Speed of IDS Alerts Classification Models Based on Machine Learning (기계학습 기반 IDS 보안이벤트 분류 모델의 정확도 및 신속도 향상을 위한 실용적 feature 추출 연구)

  • Shin, Iksoo;Song, Jungsuk;Choi, Jangwon;Kwon, Taewoong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.385-395
    • /
    • 2018
  • With the development of Internet, cyber attack has become a major threat. To detect cyber attacks, intrusion detection system(IDS) has been widely deployed. But IDS has a critical weakness which is that it generates a large number of false alarms. One of the promising techniques that reduce the false alarms in real time is machine learning. However, there are problems that must be solved to use machine learning. So, many machine learning approaches have been applied to this field. But so far, researchers have not focused on features. Despite the features of IDS alerts are important for performance of model, the approach to feature is ignored. In this paper, we propose new feature set which can improve the performance of model and can be extracted from a single alarm. New features are motivated from security analyst's know-how. We trained and tested the proposed model applied new feature set with real IDS alerts. Experimental results indicate the proposed model can achieve better accuracy and false positive rate than SVM model with ordinary features.

A Study on ICS Security Information Collection Method Using CTI Model (CTI 모델 활용 제어시스템 보안정보 수집 방안 연구)

  • Choi, Jongwon;Kim, Yesol;Min, Byung-gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.471-484
    • /
    • 2018
  • Recently, cyber threats are frequently occurring in ICS(industrial control systems) of government agencies, infrastructure, and manufacturing companies. In order to cope with such cyber threats, it is necessary to apply CTI to ICS. For this purpose, a security information collection system is needed. However, it is difficult to install security solution in control devices such as PLC. Therefor, it is difficult to collect security information of ICS. In addition, there is a problem that the security information format generated in various assets is different. Therefore, in this paper, we propose an efficient method to collect ICS security information. We utilize CybOX/STIX/TAXII CTI models that are easy to apply to ICS. Using this model, we designed the formats to collect security information of ICS assets. We created formats for system logs, IDS logs, and EWS application logs of ICS assets using Windows and Linux. In addition, we designed and implemented a security information collection system that reflects the designed formats. This system can be used to apply monitoring system and CTI to future ICS.

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

Cost-Benefit Analysis on Marine Transportation Safety Facility Using CVM(Contingent Valuation Method) (CVM을 이용한 해상교통안전시설 투자 편익 분석)

  • Kim, Sooyeob;Lee, Gunwoo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.73-75
    • /
    • 2014
  • Marine transportation facility is public goods for the general public and their safety. The study used the Contingent Valuation Method (CVM), a method to estimate economic value of non-market goods, such as environmental goods. In order to analyze economic effects of marine accidents preventable by the VTS, the study estimated costs caused by marine accident cases. It conducted surveys with people and shipping companies in local areas where VTS is to be established in the future. According to a survey with people in areas where marine transportation control center is to be built (Tongyoung), the yearly benefit from building new VTS is estimated at KRW 11billion. If fees are paid in the form of income tax for five years from 2014, corresponding benefits during the same period will reach KRW 47.3 billion in current value. An analysis on economic validity of VTS establishment in Tongyong showed the B/C ration stood at 3.193, far higher than 1. The Net Present Value (NPV) was KRW 32.5 billion and the Internal Rate of Return (IRR) turned out to be 37.4% which was higher than social discount rates of 53.5%. On balance, the establishment has reasonable economic validity.

  • PDF

An Architecture for Managing Faulty Sensing Data on Low Cost Sensing Devices over Manufacturing Equipments (전문 설비의 이상신호 처리를 위한 저비용 관제 시스템 구축)

  • Chae, Yuna;Kim, Changi;Ko, Haram;Kim, Woongsup
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.3
    • /
    • pp.113-120
    • /
    • 2018
  • In this study, we proposed a monitoring system for identifying and handling faulty sensing stream data on manufacturing equipments where low-cost sensors can be safely used. Low cost sensors will lessen the cost of implementing distributed monitoring system, but suffer from sensor noises and inaccurate sensed data. Therefore, a distributed monitoring system with low cost sensors should identify faulty signal data as either of sensor fault or machine fault, and filter out faulty signals from sensing fault. To this end, we adopted a fourier transform based diagnostic approach mixed with a weighed moving averaging method, in order to identify faulty signals. We measured how effective our approach is and found out our approach can filter out one-third faulty signals from our experimental environment. In addition, we attached wireless communication modules to reduce sensor and network installation cost. To handle massive sensor data efficiently, we employed unstructured data format with NoSQL based database.

The introduction of Traffic Inducement Security System in Korea - Centering on Curriculums - (한국의 교통유도경비 도입방안 -교과과정을 중심으로-)

  • Lee, Sang-Won;Lee,, Seung-Chal
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.147-164
    • /
    • 2010
  • A variety of work zone including road single-sharing construction add surrounding disorder and increase inconvenience of vehicles and pedestrians and furthermore danger of traffic accidents, which sometimes result in human life damages. Traffic delay due to vehicles and users generating in the course of using large-scale multiplex facilities bring about a great economic loss. Now, a lot of regulations and laws related to traffic safety system on construction sites etc. are established, but can not display efficacy desirably. It brings about continuous economic loss due to human life accidents and delay. For the purpose of solving the problems, it is necessary to import systems such as traffic inducement Security (Japan) and traffic controller (CANADA, USA) This article suggest how improve civil safety and reduce Social cost. therefore This thesis aims at analyzing advanced cases of foreign countries, looking into Korean status, and presenting importing ways of traffic inducement Security appropriate to Korea. It is reasonable to grant grade1, grade2, and technical experts to traffic inducement Security who pass regulated educations and examinations. In addition, by reversing regulations and laws, it is necessary only those who have the licenses of traffic induction guarder etc. can establish construction sites and disordered places on roads. Theory educations for education time must include basic educations and expert educations. Basic educations must include understanding regulations and laws and understanding affairs. Expert educations must include traffic control, safety educations, understanding of traffic accidents, operation of traffic control facilities, and traffic accident settlements. Traffic affairs educations must include traffic induction affairs in sites (hand signals, safety material establishment, traffic accident settlements, and urgent treatments).

  • PDF

Development of Freeway Incident Duration Prediction Models (고속도로 돌발상황 지속시간 예측모형 개발)

  • 신치현;김정훈
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.3
    • /
    • pp.17-30
    • /
    • 2002
  • Incident duration prediction is one of the most important steps of the overall incident management process. An accurate and reliable estimate of the incident duration can be the main difference between an effective incident management operation and an unacceptable one since, without the knowledge of such time durations, traffic impact can not be estimated or calculated. This research presents several multiple linear regression models for incident duration prediction using data consisting of 384 incident cases. The main source of various incident cases was the Traffic Incident Reports filled out by the Motorist Assistant Units of the Korea Highway Corporation. The models were proposed separately according to the time of day(daytime vs. nighttime) and the fatality/injury incurred (fatality/injury vs. property damage only). Two models using an integrated dataset, one with an intercept and the other without it, were also calibrated and proposed for the generality of model application. Some findings are as follows ; ?Variables such as vehicle turnover, load spills, the number of heavy vehicles involved and the number of blocked lanes were found to significantly affect incident duration times. ?Models, however, tend to overestimate the duration times when a dummy variable, load spill, is used. It was simply because several of load spill incidents had excessively long clearance times. The precision was improved when load spills were further categorized into "small spills" and "large spills" based on the size of vehicles involved. ?Variables such as the number of vehicles involved and the number of blocked lanes found not significant when a regression model was calibrated with an intercept. whereas excluding the intercept from the model structure signifies those variables in a statistical sense.

Early Results of VATS for Spontaneous Pneumothorax (자연기흉에 대한 비디오흉강경수술의 조기성적)

  • 김응중;박재형
    • Journal of Chest Surgery
    • /
    • v.29 no.7
    • /
    • pp.747-752
    • /
    • 1996
  • Video-assisted thoracic surgery(VATS) has been widely used in the treatment of spontaneous pneumothorax in spite of the absence of definitive data regarding the relative safety and long term results of this procedure. We reviewed 34 patients (group I) who underwent )8 video-assisted surgical procedures for spontaneous pneumothorax from June 1994 to December 1995 and compared the results of these patients with the results of another 14 patients (group ll) who underwent bullectomy through axillary Oho- racotomy during the same period. Average age, sex distribution, site and extent of pneumothorax, surgical indications, and complication rate showed no differences between the two groups. In group ll patients, th number and sites of bullae tend to be multiple compared to patients in group 1. The mean number of ends-GIA used for stapling of bullae was 2. 6 per patient with the range from 2 to 4 in group 1. The mean duration of chest tube drainage was not different between the two groups ().7 days and 3.9 days), but the mean time to discharge was significantly shorter in group I (5.6 days) than in group ll (8.9 days). Mean follow-up time was 12 and 11 months in each groups and ranged from 2 to 21 months. Pneumothorax recurred after three of 38 procedures in group I (7.9 %) with no recurrence in group ll. These data suggest that video-assisted thoracic surgery is a viable alternative to thoracotomy for the treatment of spontaneous pneumothorax with low morbidity and shorter hospital stay. However, it should be applied cautiously to patients with spontaneous pneumothorax because of the relatively high incidence of recurrence compared to axillary thoracotomy.

  • PDF

A Study on the Application Service of 3D BIM-based Disaster Integrated Information System Management for Effective Disaster Response (효과적인 재난 대응을 위한 3차원 BIM 기반 재난 통합정보 시스템 활용 서비스 제시)

  • Kim, Ji-Eun;Hong, Chang-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.143-150
    • /
    • 2018
  • Periodic and systemic disaster management has become more important than ever owing to the recent continuous occurrence of disasters, such as fires, earthquakes, and flooding. This management goes beyond simple disaster preparedness, which was introduced minimally under the existing legal system. For effective disaster management, facilities should be managed through regular maintenance on a daily basis, and in the case of an emergency, intuitive and accurate communication is essential regarding the situation and purpose. BIM manages the entire building property data using the effective 3D visualization model, so it can be used for various management purposes from design to facility maintenance. In this study, through an expert survey on the use of services in a BIM-based integrated disaster information system, the available areas of BIM data were organized in terms of facility information management, 3D visualization, and disaster control. Later, through the use service and DB definition within the BIM-based disaster integration information system, the main facilities monitoring and response services based on BIM and BIM-based spatial management service are proposed. Based on this study, it is hoped that the BIM-based application service functions within the system will be implemented to enable an effective system response.