• Title/Summary/Keyword: 사고정보

Search Result 4,840, Processing Time 0.041 seconds

Efficient Design of a Disaster Broadcasting System using LTE Modem (이동 LTE모뎀을 활용한 재난방송시스템 설계)

  • Moon, Chaeyoung;Kim, Semin;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.292-294
    • /
    • 2018
  • Recently, damage caused by natural disasters such as fire, earthquake, heavy rains and heavy snow is increasing. In addition, traffic accidents due to freezing, fog and fire in tunnels and bridges are frequently occurring. In such a disaster situation, it is very important to take prompt action by the person in charge of managing the facility and area.To this end, a disaster broadcasting system is used, but in the existing system, the broadcasting room and the speaker are connected by a wired connection. Also, the person in charge has to be in the broadcasting room to broadcast, which has a problem of delaying the time. In this paper, we design a disaster broadcasting system using LTE modem. The designed system enables a broadcasting person to make a call to a broadcasting system from anywhere using a cellular phone and a public telephone. Broadcasting via telephone is possible only with the telephone number pre-registered in the system and can be registered / deleted by the administrator. The registered telephone number, incoming voice file, and announcement voice for automatic broadcasting are stored in the system internal SD memory for convenient management. This disaster broadcasting system is expected to contribute to quick and convenient disaster broadcasting.

  • PDF

A Survey Study on University Students' Recognition for The Disabled - Focusing on Universities in Chungcheong Province (대학생의 장애인에 대한 인식에 관한 조사연구 - 충청도 대학을 중심으로 -)

  • Jeon, Mi-Young;Lee, Han-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.1-13
    • /
    • 2017
  • It is revealed that there are more registered disabled people in our country who have their disability because of acquired factors such as accidents than because of innate deformity. This phenomenon will continue and the incidence of acquired disability will increase more and more. Even though there is noticeable change, the social recognition toward the disabled is still negative. Particularly, university students are in the early adulthood according to the development of life-cycle, and this is the period that people have diverse social relationships, depart from unified frame and work in various fields, and set up their own thoughts and ideology with knowledge and skills acquired from university education. Therefore, in this study, we are going to search the recognition of the university students, who are in the previous period of entering into the society, toward the disabled, and if they have negative prejudice or attitude against the disabled, we are going to find the ways to improve on their awareness positively. The subjects of the survey were randomly selected among 230 out of total 250 students by visiting thirteen universities in Chungcheong Province, and were analyzed by using SPSS (ver. 18.0) program. T-test and One-way ANOVA were used as analytical methods to look into the difference of analysis of frequency, descriptive statistic, reliability analysis and attitudes for comprehending sociodemographic characteristics of the subjects of the survey. In conclusion, it has to be not a temporary or event-like training, but a training that makes people have positive recognition and attitude towards accurate information, knowledge, human rights, disability, and diversity. This thesis has a limitation to be generalized to the university students all over the country since the region is limited to a certain area.

Fostering Primary Pre-service Teachers' Computational Thinking through Self-Assessment (초등예비교사를 위한 컴퓨팅 사고력 자기평가 방법)

  • Kim, Misong;Choi, Hyungshin
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.1
    • /
    • pp.61-70
    • /
    • 2018
  • It is urgent in the context of the Fourth Industrial Revolution that students become creative and integrative thinkers. In this vein, in the last few years, drawing upon constructivism as an innovative learning paradigm, new coding curricula using MIT's Scratch have been introduced in the number of countries to enhance computational thinking (CT). However, constructivism encouraging collaborative and active learning may not be explicitly utilized in instructional design focusing mainly on learning to code as technical skills - some of which exist today in large numbers of school and after-school code activities. To respond to such a misleading way of developing CT through coding, the present study aims to propose the benefits of CT self-assessment rubrics for primary pre-service teachers within a CT course entitled "Problem Solving by Computational Thinking". Our findings show how meaningful collaborative CT self-assessment in a group impacts their learning of CT. We end this paper with the discussion of implications of our findings for CT assessment towards a new paradigm in education.

Evaluation of Freeway Mobile Work Zone Safety using Driving Simulations (주행 시뮬레이션을 활용한 고속도로 이동공사 안전성평가)

  • Park, Hyunjin;Oh, Cheol;Moon, Jaepil
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.124-140
    • /
    • 2017
  • There exists a limitation to provide proper advance information for safe maneuvering through guidance and caution signs in freeway mobile work zones, unlike fixed work zones. Although a work-protection vehicle is currently deployed at the rear of the work vehicle, more active countermeasures to prevent crashes are required. The purpose of this study was to propose a method to evaluate the safety in mobile work zones and to present effective countermeasures. Driving simulation experiments were conducted to analyze characteristics of driver's behavior in mobile and fixed work zones. Safety distance index (SDI) based on the comparison of stopping distances of a work-protection vehicle and a following subject vehicle was used to evaluate traffic safety. More dangerous driving behavior was observed in the mobile work zone. Especially, it was identified that the lane-change of vehicles following the work- protection vehicle was late. Therefore, it is necessary to actively introduce methods to provide warning information so that the driver can recognize the work-protection vehicle in advance and carry out appropriate evasive maneuvers.

Prediction of Travel Time and Longitudinal Dispersion for Water Pollutant by Using Unit Concentration Response Function (단위오염도틀 이용한 하천 오염물질의 이동시간과 종확산 예측)

  • Kim, Soo-Jun;Kim, Hung-Soo;Kim, Byung-Sik;Seoh, Byung-Ha
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.5 s.166
    • /
    • pp.395-403
    • /
    • 2006
  • This study suggests the use of a simple method, called the unit concentration response function(UCRF) for predicting travel time and dispersion of pollutants with the minimum information of study area instead of numerical models which are widely used In the Previous studies. However, the numerical models require time-consuming, tedious effort, and many data sets. So we derive the UCRF using some components such as travel time, peak concentration, and passage time of pollutant etc. We use the regression equation for the estimations of components which were developed from the investigations of many river basins in USA. This study used the regression equaiton for the UCRF to the accident of Dichloromethane leak into the Nakdong River occurred on June 30, 1994 and applied the UCRF for the predictions of travel time and dispersion. The predictions were compared with the results by QUAL2E model. The results by the regression equaiton and QUAL2E model had a good agreement between observed and simulated concentrations. Therefore, the regression equation for the UCRF which can simply estimate travel time and concentration of pollutants showed its applicability for the ungaged basin.

A Study on the Ferry Sewol Disaster Cause and Marine Disaster Prevention Informatization with Big Data : In terms of ICT Administrative Spatial Informatization and Maritime Disaster Prevention System development (세월호사고원인과 빅데이터 해양방재정보화연구 -ICT행정공간정보화와 해양방재시스템개발 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.567-580
    • /
    • 2016
  • In recent years, our society, because of the arrival of a new paradigm according to the rapid changes in ICT has entered into future smart society and the ubiquitous era. So it can be a notable turning point in the marine disaster prevention system with big data, aspects of the era change. Therefore, this study was to derive a desirable vision for the big data marine disaster prevention informatization in terms of ICT maritime disaster prevention system development as preparedness for the maritime disaster by applying 'scenario planning' as a foresight method. Soon this study derived a successful marine disaster prevention informatization strategy as preparedness for the maritime disaster like Ferry Sewol Disaster. It proposed the big data marine disaster prevention informatization system with the use of the administrative aspects of information with spatial informatization as big data information. Also this study explored the future leadership strategy of the big data marine disaster prevention informatization in smart society. Eventually in 2030 to around, In order to still remain our marine disaster prevention informatization as a leading ICT nation, this study suggested the following strategy. It is important to ready the advanced Big Data administrative spatial informatization system In terms of prevention of incidents like Ferry Sewol Disaster.

A Study on Collection and Analysis Method of Malicious URLs Based on Darknet Traffic for Advanced Security Monitoring and Response (효율적인 보안관제 수행을 위한 다크넷 트래픽 기반 악성 URL 수집 및 분석방법 연구)

  • Kim, Kyu-Il;Choi, Sang-So;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1185-1195
    • /
    • 2014
  • Domestic and international CERTs are carrying out security monitoring and response services based on security devices for intrusion incident prevention and damage minimization of the organizations. However, the security monitoring and response service has a fatal limitation in that it is unable to detect unknown attacks that are not matched to the predefined signatures. In recent, many approaches have adopted the darknet technique in order to overcome the limitation. Since the darknet means a set of unused IP addresses, no real systems connected to the darknet. Thus, all the incoming traffic to the darknet can be regarded as attack activities. In this paper, we present a collection and analysis method of malicious URLs based on darkent traffic for advanced security monitoring and response service. The proposed method prepared 8,192 darknet space and extracted all of URLs from the darknet traffic, and carried out in-depth analysis for the extracted URLs. The analysis results can contribute to the emergence response of large-scale cyber threats and it is able to improve the performance of the security monitoring and response if we apply the malicious URLs into the security devices, DNS sinkhole service, etc.

Research Trends of SCADA Digital Forensics and Future Research Proposal (SCADA 디지털포렌식 동향과 향후 연구 제안)

  • Shin, Jiho;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1351-1364
    • /
    • 2019
  • When SCADA is exposed to cyber threats and attacks, serious disasters can occur throughout society. This is because various security threats have not been considered when building SCADA. The bigger problem is that it is difficult to patch vulnerabilities quickly because of its availability. Digital forensics procedures and techniques need to be used to analyze and investigate vulnerabilities in SCADA systems in order to respond quickly against cyber threats and to prevent incidents. This paper addresses SCADA forensics taxonomy and research trends for effective digital forensics investigation on SCADA system. As a result, we have not been able to find any research that goes far beyond traditional digital forensics on procedures and methodologies. But it is meaningful to develop an approach methodology using the characteristics of the SCADA system, or an exclusive tool for SCADA. Analysis techniques mainly focused on PLC and SCADA network protocol. It is because the cyber threats and attacks targeting SCADA are mostly related to PLC or network protocol. Such research seems to continue in the future. Unfortunately, there is lack of discussion about the 'Evidence Capability' such as the preservation or integrity of the evidence extracting from SCADA system in the past researches.

A Study on the Policy Proposal and Model B2B2C for Safe Open Banking (안전한 오픈뱅킹 구축을 위한 정책 및 B2B2C 모델에 관한 연구)

  • Choi, Dae-Hyun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1271-1283
    • /
    • 2019
  • The fourth industrial revolution and digital transformation are also bringing major changes to the financial ecosystem in Korea. Already, global financial firms overseas are opening their financial markets and exploring new financial businesses by seeking ways to co-prosperity with fintech firms. However, it is also true that the domestic financial environment has failed to respond to the changes due to its monopolistic and closed structure. In response, the government began pushing for the introduction of open banking in December 2019 with the aim of fully opening the financial settlement system. However, unlike the existing simple financial transaction structure, open banking still has an unresolved part due to the unclear relationship of responsibilities between interested parties in the event of financial accidents due to the complex linkage structure of transactions such as financial firms, fintech firms and customers. This study analyzed the security threat of open banking in depth. By doing so, the government and financial firms want to present policy proposals that need to be improved to enhance the safety of open banking in korea and protect financial consumers, as well as new financial models that have improved the vulnerable parts of existing models.

Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert (사이버위기 경보 기반 사이버 방어 훈련장 설계 및 구축 연구)

  • Choi, Younghan;Jang, Insook;Whoang, Inteck;Kim, Taeghyoon;Hong, Soonjwa;Park, Insung;Yang, Jinsoek;Kwon, Yeongjae;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.805-821
    • /
    • 2020
  • Cyber defense exercise should require training on the latest cyber attacks and have a similar process to defense cyber attacks. In addition, it is also important to train on cyber resilience that can perform normal tasks or support equivalent tasks regardless of cyber attacks. In this paper, we proposed and developed a cyber range that can strengthen the elements of cyber resilience by performing cyber defense exercise in real time based on the cyber crisis alert issued when a cyber attack occurs in Korea. When BLUE, YELLOW, ORANGE, and RED warnings are issued according to the cyber crisis, our system performs proactive response, real time response, and post response according to the alarm. It can improve trainee's capability to respond to cyber threats by performing cyber defense exercise in a cyber crisis environment similar to the actual situation of Korea.