• Title/Summary/Keyword: 사전 예방

Search Result 1,217, Processing Time 0.025 seconds

An Analysis on the Problems of the Serious Disaster Punishment Act from the Construction Industry's Perspective and Proposed Improvement Measures (건설업계 관점에서의 중대재해처벌법 시행에 따른 문제점 분석 및 개선방안)

  • Lee, Dae-Hyeong;Lee, Jun-Yong;Son, Chang-Baek
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.2
    • /
    • pp.187-196
    • /
    • 2023
  • The objective of this study was to analyze the awareness, necessity, and challenges of the Serious Disaster Punishment Act within the domestic construction industry, which is subject to the legislation implemented by the government. The research aimed to propose future improvement measures. According to the findings, safety officials consider securing more young and competent domestic skilled workers, as well as improving safety management standards and workers' safety awareness, to be the most crucial factors in preventing and reducing safety accidents. Furthermore, the primary improvement plan for the Serious Disaster Punishment Act involves clarifying ambiguous provisions in the current law. Government policy support is necessary to enhance the effectiveness of the Serious Disaster Punishment Act, and revisions should focus on preventive measures that contribute to the establishment of a safe working environment.

A study on machine learning-based anomaly detection algorithm using current data of fish-farm pump motor (양식장 펌프 모터 전류 데이터를 이용한 머신러닝 기반 이상 감지 알고리즘에 관한 연구)

  • Sae-yong Park;Tae Uk chang;Taeho Im
    • Journal of Internet Computing and Services
    • /
    • v.24 no.2
    • /
    • pp.37-45
    • /
    • 2023
  • In line with the 4th Industrial Revolution, facility maintenance technologies for building smart factories are receiving attention and are being advanced. In addition, technology is being applied to smart farms and smart fisheries following smart factories. Among them, in the case of a recirculating aquaculture system, there is a motor pump that circulates water for a stable quality environment in the tank. Motor pump maintenance activities for recirculating aquaculture system are carried out based on preventive maintenance and data obtained from vibration sensor. Preventive maintenance cannot cope with abnormalities that occur before prior planning, and vibration sensors are affected by the external environment. This paper proposes an anomaly detection algorithm that utilizes ADTK, a Python open source, for motor pump anomaly detection based on data collected through current sensors that are less affected by the external environment than noise, temperature and vibration sensors.

Checklist Development for Preventing of Major Accidents of Formwork Using Gang-form (갱폼 공사 중대재해 사고 예방을 위한 체크리스트 개발)

  • Jeong Kyeongtae;Kim Siyu;Oh Jeongeun;Lee Donghoon
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.5 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • Gang-foam is used in many construction projects because it is not only precise in terms of vertical, horizontal, and specifications, but also easy to install and dismantle. However, major accidents occur every year due to non-compliance with safety rules and work order, also manuals and checklists currently in use are insufficient. Thirty-seven surveys was conducted by analyzing major accident cases of domestic gang-form construction project and deriving 20 risk factors and 43 check points. Based on the survey, the importance and appropriateness of check points were evaluated. As a result of this study, a checklist was presented, check points were placed in the order of importance based on assembly, installation, dismantling, and lifting of the Gang-form process. The checklist was organized so that workers could comply with safety rules and work order. Through this, it is expected to prevent major accidents and contribute to efficient safety management.

IoT Edge Architecture Model to Prevent Blockchain-Based Security Threats (블록체인 기반의 보안 위협을 예방할 수 있는 IoT 엣지 아키텍처 모델)

  • Yoon-Su Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.77-84
    • /
    • 2024
  • Over the past few years, IoT edges have begun to emerge based on new low-latency communication protocols such as 5G. However, IoT edges, despite their enormous advantages, pose new complementary threats, requiring new security solutions to address them. In this paper, we propose a cloud environment-based IoT edge architecture model that complements IoT systems. The proposed model acts on machine learning to prevent security threats in advance with network traffic data extracted from IoT edge devices. In addition, the proposed model ensures load and security in the access network (edge) by allocating some of the security data at the local node. The proposed model further reduces the load on the access network (edge) and secures the vulnerable part by allocating some functions of data processing and management to the local node among IoT edge environments. The proposed model virtualizes various IoT functions as a name service, and deploys hardware functions and sufficient computational resources to local nodes as needed.

Hazardous Material Process Risk Evaluation Using HAZOP and Bow-tie (HAZOP 및 BOW-TIE를 이용한 위험물질 취급공정의 위험성평가)

  • Min-Seo Nam;Byung-Tae Yoo
    • Journal of the Korean Institute of Gas
    • /
    • v.28 no.1
    • /
    • pp.35-43
    • /
    • 2024
  • With continuous advancements in industry, science, and technology, there is a steady increase in the number and utilization of new chemicals. The growing societal emphasis on chemical safety management is paralleled by an increasing public demand for robust safety measures. While various ministries at the government level oversee the safety management of chemical substances, the occurrence of accidents related to chemical substances remains frequent each year due to problems such as aging facilities and careless handling. Upon analyzing domestic chemical accident cases, incidents occurred predominantly in the sequence of leakage, explosion, fire, and others. The main causes of these accidents were examined, revealing facility defects and non-compliance with safety management as the primary contributing factors. In this study, Hazard and Operability Analysis (HAZOP) was employed to identify hazardous risk factors associated with the handling of hydrofluoric acid in workplaces, and a risk assessment was performed using Bow-Tie method. Based on the results of this study, it is expected to enhance safety management plans aimed at preventing chemical accidents in workplaces dealing with similar facilities. Ultimately, these insights contribute to the development of an advanced chemical safety management system, capable of proactively preventing potential chemical accidents.

Analyzing Preliminary Survey Results for the Establishment of a Korean Medicine Chronic Disease Management Program : Insights from Patients with Diabetes and Pre-diabetes. (한의 당뇨 만성질환 관리제 구축을 위한 사전 설문조사 결과 분석 - 당뇨 및 당뇨 전단계 환자를 대상으로)

  • Huiyong Kwak;Eunji Ahn;Soeun Park;Dongsu Kim
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.27 no.3
    • /
    • pp.47-67
    • /
    • 2023
  • Objectives : The objective of this study is to examine the findings of a survey assessing the treatment and management status of individuals with diabetes and pre-diabetes, along with their inclination to participate in the Korean Medicine Chronic Disease Management Program. Methods : The survey focused on individuals with diabetes and pre-diabetes, gathering information on respondents' demographic details, diabetes diagnosis, duration of diabetes, attitudes and experiences regarding Korean medicine diabetes treatment, and their willingness to participate in the 'Korean Medicine Chronic Disease Management Program'. Results : 33.1% of participants reported prior experience with Korean medicine treatment for diabetes. The intention to actively utilize Korean medicine treatment was positively observed, with a response rate of 61.1% expressing a favorable inclination and 8.9% indicating a negative stance. Furthermore, 75.3% of patients expressed their intention to participate in the 'Korean Medicine Chronic Disease Management Program' in the future. Among those expressing this intention, 81.4% stated a preference for the 'Korean-Western medicine combined management' in the chronic disease management Program. Conclusions : Patients' willingness to participate in 'Korean Medicine Diabetes Management Program' is high, but lack of information about Korean medicine is a factor that deprives people of the opportunity to experience Korean medicine treatment, and non-medical factors such as difficulty in visiting and administrative complexity are factors that impede participation in the 'Korean Medicine Chronic Disease Management Program'. It should be considered for improvement when formulating policies.

A Reliability Enhancement Technique of Mobile Payment (모바일 결제의 신뢰성 향상 방안)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.319-325
    • /
    • 2016
  • A variety of services for mobile payments by the activation of FinTech have been developed. Various payment methods were developed, and an authentication method was developed to improve the reliability of the payment. On the other hand, when mobile easy payment services are used, they have weak security because the authentication by phone number. Therefore, this paper proposes a technique for increasing the reliability of the authentication process using the unique device ID of the mobile device to improve the authentication process based on the telephone number. The core research contents are the architecture and process for the authentication of mobile payments based on the mobile device ID. The mobile payment architecture consists of a mobile device, authentication service, and mobile payment application. The mobile device consists of mobile device ID and phone number, and the authentication server consists of authentication module and encryption module. The mobile payment service consists of a pre-authentication module and decryption module. The process of mobile payment service is processed by the encrypted authentication information (device ID, phone number, and authentication number) among mobile devices, authentication server, and mobile payment application. The mobile device sends the telephone number and the device ID to the authentication server and the authentication server authenticates the user through an authentication process and encryption process. The mobile payment application performs the pre-authentication process by decrypting the received authentication number. This paper reports a difference that can prevent the risk of leakage of the authentication number in existing payment services through the authentication process of the authentication server and the pre-authentication process of the mobile payment service of this paper.

A Study on the Way of Securing the Practical Effectiveness of Oil Record Book (기름기록부 실효성 확보에 관한 연구)

  • Choi, Jung-Hwan;Lee, Sang-Il
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.4
    • /
    • pp.389-397
    • /
    • 2014
  • The purpose of this thesis is studying for a legal basis and definition of Oil Record Book. In the thesis, comparing with the laws related to punishment for false entry of Oil Record Book of the maritime countries and korea Act. Studying the improvement marine pollutants from ships by suggesting legal and institutional proposal which are able to make themselves increase effectiveness for recording and inspection of Oil Record Book. Suggest the solution of the problems raised in this thesis, First, The Oil Record Book should not be the evidence which is having the effectiveness simply after the accident of marine pollution, but take sanction on pre-inspection of Oil Record Book as establish the concrete administrative punishment for each contents-based record of Oil Record Book. Second, It should set up of judgement criteria of false entry of Oil Record Book by port state control officer. Third, It should strengthen the legal effectiveness of Oil Record Book contents such as Code(c) ; oil residue, Code(d); relating to bilge discharge by including premeditation for false entry of Oil Record Book. Also, The enhancement of role for marine pollution prevention manager raise the effectiveness of Oil Record Book as recognizing the importance of Oil Record Book.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Exploring Strategies for Applying TRIZ to Technology Education (기술과 교육에서 TRIZ(창의적 문제해결 이론)의 적용 방안 탐색)

  • Moon, Daeyoung
    • 대한공업교육학회지
    • /
    • v.31 no.2
    • /
    • pp.155-176
    • /
    • 2006
  • The purpose of this study was to explore the strategies for applying TRIZ to technology education. This study was carried out through literature review on contradiction, 40 principles, 76 standard solutions, multi screen method, effects, the law of technology evolution, and ARIZ, and questionnaire survey to investigate the validity. Through this study the strategies for applying TRIZ to technology education were proposed and the validity was identified. Only the '40 Principles' was appropriate to technology education of elementary and middle school. The results of this study were as follows; In elementary school technology education, segmentation, extraction, local quality, asymmetry, consolidation, universality, counterweight, do it in reverse, mediator, self service, dispose, flexible membranes or thin films, changing the color, homogeneity, rejecting and regenerating parts, and composite materials were suitable. And in middle school technology education, segmentation, extraction, local quality, asymmetry, consolidation, universality, counterweight, prior counteraction, prior action, cushion in advance, do it in reverse, dynamicity, partial or excessive action, continuity of useful action, convert harm into benefit, mediator, self service, dispose, flexible membranes or thin films, changing the color, homogeneity, rejecting and regenerating parts, transformation of properties, phase transition, thermal expansion, and composite materials were suitable.