• Title/Summary/Keyword: 수동적 안전

Search Result 156, Processing Time 0.022 seconds

A Study on Automatic Bridge Lantern Support for Safe Bridge Lantern Inspection (안전한 교량등 점검을 위한 자동 교량등 지지대에 관한 연구)

  • Min-Yong Lim;Seung-Gi Gug
    • Journal of Navigation and Port Research
    • /
    • v.48 no.4
    • /
    • pp.267-273
    • /
    • 2024
  • Bridge lanterns are installed on bridges or piers to signal the presence of these structures on navigational routes and navigable waters, and they fall under the category of light wave signals in Aids to Navigation. In Korea, medium to large bridges installed over major rivers and seas are equipped with bridge lanterns, which are necessary for routes frequented by ships and require periodic inspections on a monthly or multi-month basis. However, most bridge lanterns are mounted externally on bridge railings as fixed or manual rotary supports, posing a high risk of fatal falls during inspections. Furthermore, high -traffic bridges demand quick maintenance works due to complaints about traffic disruption, thus increasing work hazards. Consequently, this study introduced a tailored automatic bridge lantern support concept based on different types of bridge lantern installations, aiming for safe and rapid inspections. Additionally, the study sought to achieve full automation of the bridge lighting system by integrating it with a management program for monitoring and controlling bridge lanterns, utilizing both wired and wireless communication technologies. These findings provide foundational design data for new and refurbished bridges that will be installed in the future.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.

신선농산물 생산에서의 농약오염과 농약폭로-흡수 -일본을 중심으로-

  • 최진옥
    • Proceedings of the Korean Society of Postharvest Science and Technology of Agricultural Products Conference
    • /
    • 2000.04a
    • /
    • pp.14-15
    • /
    • 2000
  • 현재의 농업에서 농약의 사용은 불가결한 것이다. DDT의 등장으로 농약만능시대의 막이 열린 이래 세계에서 10만종 이사의 농약이 탄생했다. 현재 전세계의 생산량은 매년 1천만 톤을 넘어섰고 일본의 경우 등록되어 있는 농약수는 원체(화합물종류)로서 367종, 상품명으로서는 약 5800 종류가 판매되고 있다. 년간 일본의 농약생산량은 약 60만 톤으로 농약의 수출량과 수입량이 거의 같기 때문에 생산량이 사용량에 상당하는 것으로 본다. 농약의 식품오염의 측면에서 보면, 단위 면적당 세계 제 1위의 농약 사용국인 일본은 시장에 유통되고 있는 농작물에도 상당한 양의 농약이 잔류하는 것으로 본다. 물론 식품위생법에 26종의 농약에 대해 53작물을 대상으로 하는 잔류농약기준이 있지만, 농약성분이 400종 이상이며 산포 대상이 되는 작물은 53작물보다 훨씬 많다. 또한 한 두 종류의 작물밖에 대상이 되지 않는 농약도 많아서 잔류농약기준은 식품의 안전성 확보면에서는 부족한 것이 많아. 따라서 농산물 생산자 스스로가 농약사용기준을 정확하게 지켜주기를 바랄 뿐이다. 한편으로는, 이러한 현실에 비추어서 농약사용이 일상화된 농업자에게 있어 농약으로 인한 건강상의 문제 또한 적지 않다. 농업자의 건강관리 대책의 일환으로 실시하는 건강진단 및 조사에 따르면, 만성적인 질환뿐만 아니라 농약산포작업후에 나타나는 증세(기침, 피부이상, 불쾌감, 두통, 인후염, 구토)를 경험한 작업자는 예방의학적인 견지에서 농업자의 농약폭로실태파악 및 교육을 해오고 있으나 그다지 설득력을 얻지 못하여 보다 확실한 인체내 흡수량을 측정하는 방법을 생각하게 되었다. 즉 뇨중 농약 대사물을 폭로지표로 하는 생물학적 모니터링(biological monitoring)을 시도, 농업현장에 있어서의 그 실증과 유용성에 대한 검토를 하고자 하였다. 농작업 가운데서 가장 위험하다고 보는 농약산포작업 (수동식 분무기를 이용한 하우스작물 및 동력분무기를 사용한 노지작물)을 대상으로 생물학적모니터링을 실시한 결과 업자의 뇨로부터 농약의 체내흡수를 반영하는 농략의 뇨 분비성 대사물을 측정할 수 있었다. 즉 뇨나 혈액등의 생체시료를 이용한 생물학적모니터링의 농약에의 응용은 서구와는 달리 대부분이 규제가 없는 소규모 자가영농으로 정해진 농약사용지침보다 많은 농약을 사용한다거나, 또는 개인의 습관이나 작업환경에 따라 폭로조건이 달라서 실질적인 폭로-흡수의 정도가 불분명한 경우등에도 충분히 대응할 수 있어 농약사용자 개개인의 농약 폭로-흡수의 정도를 분명하게 밝힐 수 있다. 게다가 평가의 결과를 농약사용의 일선에 있는 농업자에게 피드백 하여 주므로서 농약에 대한 인식을 새롭게 하고 농약취급시의 건강장해예방행동을 촉구하는 등의 효과도 높은 것으로 예방의학적인 유용성이 크다고 볼 수 있다.

  • PDF

Remote Care Using Medical Bed System Equipped With Body Pressure Sensors (체압 센서를 이용한 의료용 침대의 원격 케어)

  • Jaehyeok Jeung;Sanghyun Bok;Junhee Lim;Bokyung Oh;Youngdae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.619-625
    • /
    • 2023
  • In this paper, the remote care of medical beds with multiple body pressure sensors is described. Falling is one of the factors that seriously threaten the safety of patients and harm their health. In this study, a new bed was developed to overcome this. The bed system consists of a keyboard that can operate, a keyboard controller that manages the movement of the keyboard, a sensor that measures body pressure, a sensor controller that transmits and receives sensor values, a main controller that checks it and operates automatically or manually according to the algorithm, and a server that oversees all these information. The bed system checks the patient's location through a sensor and wirelessly alerts the server through the main controller when the patient determines that there is a risk of falling, so that the nurse or nurse can recognize the patient's dangerous condition. The server may receive state data transmitted from the wired/wireless terminal to monitor whether the bed system is operating normally. The controller of the keyboard operates a keyboard-type mechanism and automatically controls the prevention of bedsores connected by body pressure sensors to physically separate the area to which the patient's pressure is applied to prevent bedsores. The main controller checks the presence of the patient's bed and transmits it to the server. In conclusion, the proposed system can smart monitor the user's state and perform remote care.

A Real-Time and Statistical Visualization Methodology of Cyber Threats Based on IP Addresses (IP 주소 기반 사이버공격 실시간 및 통계적 가시화 방법)

  • Moon, Hyeongwoo;Kwon, Taewoong;Lee, Jun;Ryou, Jaecheol;Song, Jungsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.465-479
    • /
    • 2020
  • Regardless of the domestic and foreign governments/companies, SOC (Security Operation Center) has operated 24 hours a day for the entire year to ensure the security for their IT infrastructures. However, almost all SOCs have a critical limitation by nature, caused from heavily depending on the manual analysis of human agents with the text-based monitoring architecture. Even though, in order to overcome the drawback, technologies for a comprehensive visualization against complex cyber threats have been studying, most of them are inappropriate for the security monitoring in large-scale networks. In this paper, to solve the problem, we propose a novel visual approach for intuitive threats monitoring b detecting suspicious IP address, which is an ultimate challenge in cyber security monitoring. The approach particularly makes it possible to detect, trace and analysis of suspicious IPs statistically in real-time manner. As a result, the system implemented by the proposed method is suitably applied and utilized to the real-would environment. Moreover, the usability of the approach is verified by successful detecting and analyzing various attack IPs.

Study on the Shortening Effect of the Egress Travel Time Based on an Escape Scenarios by Using Shuttle Elevators for Lotte Tall Building's Evacuation Plan (초고층건물 피난계획시 피난용 엘리베이터 이용에 의한 피난소요시간의 단축효과 연구)

  • Park, Hyung-Joo;Lee, Young-Jae
    • Fire Science and Engineering
    • /
    • v.32 no.6
    • /
    • pp.46-54
    • /
    • 2018
  • A total of 19 elevators for evacuation were installed in the Lotte World Tower and it is planned to operate the shuttle using the manual key from five refuge floors to the 1st floor in an emergency. In the event of a fire or other disaster, it is necessary to conduct intensive analysis to determine how much RSET reduction could be achieved using the evacuation elevator compared to the existing evacuation plans. When the optimal transportation sharing ratio by the evacuation elevators was 40% at the Lotte World Tower, the RSET of the evacuation scenario in parallel with the elevators in the entire building was calculated to be 1 hour and 2 minutes. The RSET of a conventional evacuation scenario (Walking along the stairs without using the elevators) was calculated to be 1 hour 29 minutes, therefore, the former evacuation scenario were found to have a shortening effect of approximately 27 minutes compared to the latter. On the other hand, to maintain this effect, each part of the evacuation route using the elevator must have the capability to protect the evacuee from any hazards caused by fires, such as smoke, flame, and radiant heat during the evacuation. Moreover, the evacuation route should be continuous from the residence position of the elevator user to the final evacuation site, and be recognized easily.

Development of Polyclonal Antibodies to Abdominal and Subcutaneous Adipocytes for Fat-Reduced Hanwoo Beef Production (한우 체지방 감소 쇠고기 생산을 위한 복강 및 피하지방 항체 개발)

  • Choi, Chang-Weon;Kim, Yu-Hyun;Kim, Sang-Jin;Song, Man-Kang;Kwon, Eung-Gi;Oh, Young-Kyoon;Hong, Seong-Koo;Choi, Seong-Ho;Baek, Kyung-Hoon
    • Food Science of Animal Resources
    • /
    • v.28 no.5
    • /
    • pp.651-659
    • /
    • 2008
  • This study aimed to develop polyclonal antibodies to regional inedible adipocytes of Korean native cattle (Hanwoo) and investigate cross-reactivity of the antibodies. Patterns in plasma membrane proteins (PMPs) from abdominal and subcutaneous adipocytes of Hanwoo isolated by collagenase digestion were investigated using SDS-PAGE. As antigens, abdominal and subcutaneous adipocyte PMPs of Hanwoo were injected to sheep 3 times at 3 wk intervals for passive immunization, and non-immunized serum and antisera were collected before and after the injections. Titers of the antisera obtained from sheep and their cross-reactivities with heart, kidney, liver, lung, muscle, and spleen of Hanwoo were determined by ELISA. Isolation and culture of abdominal and subcutaneous adipocytes of Hanwoo were performed for analysing LDH concentration. Based on the SDS-PAGE analysis, specific proteins of PMPs in abdominal and subcutaneous adipocytes appeared despite rather similar patterns between both adipocytes. At the level of 1:1,000 dilution, little antibody reactivity appeared in non-immunized serum whereas the antisera had relatively strong reactivity up to the level of 1:128,000 and 1:64,000 dilution. These findings may indicate that strong antibodies against adipocyte PMPs can be developed using an immunological approach. Extremely low reactivities of abdominal and subcutaneous adipocyte antisera were detected with PMPs of the organs. Both antisera strongly reacted with each adipocyte PMPs and showed statistically (p<0.01) higher cross-reactivities compared with non-immunized serum. In conclusion, these results may indicate that the present polyclonal antibodies against regional inedible adipocyte PMPs are well developed and have safety in cross-reactivities with body organs. Further studies on in vivo cross-reactivity and fat reduction of the antibodies against abdominal and subcutaneous adipocytes PMPs of Hanwoo should be required for inedible fat-reduced high quality beef production.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Hepatic Vessel Segmentation using Edge Detection (Edge Detection을 이용한 간 혈관 추출)

  • Seo, Jeong-Joo;Park, Jong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.51-57
    • /
    • 2012
  • Hepatic vessel tree is the key structure for hepatic disease diagnosis and liver surgery planning. Especially, it is used to evaluate the donors' and recipients' liver for the LDLT(Living Donors Liver Transplantation) and estimate the volumes of left and right hepatic lobes for securing their life in the LDLT. In this study, we propose a method to apply canny edge detection that is not affected by noise to the liver images for automatic segmentation of hepatic vessels tree in contrast abdominal MDCT image. Using histograms and average pixel values of the various liver CT images, optimized parameters of the Canny algorithm are determined. It is more time-efficient to use the common parameters than to change parameters manually according to CT images. Candidates of hepatic vessels are extracted by threshold filtering around the detected the vessel edge. Finally, using a system which detects the true-negatives and the false-positives in horizontal and vertical direction, the true-negatives are added in candidate of hepatic vessels and the false-positives are removed. As a result of the process, the various hepatic vessel trees of patients are accurately reconstructed in 3D.

Development of Door Control Unit for the Electric Plug-in Door of Subway Train (전동차 전기식 플러그도어 출입문 제어 장치 개발)

  • Joung, Eui-Jin
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.4
    • /
    • pp.47-53
    • /
    • 2011
  • The Electric Multiple Unit (EMU) has many types of door system such as sliding door, plug door etc.al. according to customer's requirements. The sliding door is widely used in Korea but has weak point in the noise problem. In the low operation speed, the noise coming from outer side of the EMU is not an important factor. As the speed is higher than before, noise is increased and make a problem. The main cause of noise is the imperfect air tightness in the EMU. The plug door system has advantages for the noise reduction characteristic in the high speed area. We have been developing electric plug-in door. The door is controlled by Door Control Unit(DCU) following the order of Automatic Train Protection (ATP) that is a kind of train signalling system. DCU has to simultaneously open and close the doors and the operation of it is related to the passengers safety. So DCU is a safety device that is important to reliability and safety. DCU is composed of several devices of control, motor driving, Input/Output, communication and power. In this paper, we will describe the functions, characteristic, requirement, subsystem and test results of DCU used for the electric plug-in door.