• Title/Summary/Keyword: 안전마크

Search Result 165, Processing Time 0.026 seconds

An International Tendency on Designating of Ship's Refuge (기술논문 - 선박피난처 지정에 대한 국제동향)

  • Jeong, Jung-Shik;Kim, Cheol-Seung;Park, Sung-Hyun;Jeong, Jae-Yong;Cho, Ik-Soon
    • Journal of Korea Ship Safrty Technology Authority
    • /
    • s.32
    • /
    • pp.46-56
    • /
    • 2012
  • 해양사고 예방 또는 해양사고 시 2차 피해 감소를 위한 관점에서 안전수역, 안전항구 및 최적 수리장소의 제공 또는 제공되는 장소까지 안전한 수로의 안내는 해양선진국으로 갖추어야 할 핵심 해사안전 서비스의 하나로 볼 수 있다. Erika호 해양사고와 같은 중대사고로 큰 손해를 겪은 국제사회는 피난처의 중요성을 깨닫고 여러 해를 거친 검토 끝에 피난처의 제공목적, 선장과 구조자의 책임지침 등을 담은 IMO Res. A.949(23) 및 A.950(23)과 같은 피난처 관련 지침을 제정하게 되었다. 이 지침을 바탕으로 덴마크, 미국, 캐나다, 남아프리카에서는 MAS 체제, 잠재적 피난처(PPOR, Potential Places of Refuge), 국가비상계획 포함 등의 방법으로 피난처를 지정하여 활용하고 있었다. 위의 요소들을 고려할 때, 우리나라 연안을 통항하는 선박들에 대한 최적의 피난처를 지정하기 위해서 연안해역 및 항만의 자연환경, 해상 및 기상조건, 과거 해양사고통계 및 분석자료, 항적도 및 교통량 등 해상교통환경의 평가를 위한 기초자료가 수집되어야 한다.

  • PDF

원격감시시스템을 이용한 증류공정의 안전운전

  • 최춘일;이성근;변윤섭;안대명;황규석
    • Proceedings of the Korean Institute of Industrial Safety Conference
    • /
    • 2003.10a
    • /
    • pp.335-338
    • /
    • 2003
  • 최근의 통계에 따르면 국내의 인터넷 인용율은 2000년도에 44.7%, 2001년도에 56.6%, 2002년도에는 55.2%로 아이슬랜드(60.8%), 스웨덴(57.3%)에 이어 세계에서 세번째로 높은 것으로 나타났다. 또한 인구 100명당 PC보급율 또한 미국(62.5대), 덴마크(57.68대)에 이어 한국(55.58대)이 세계3위를 기록해 명실상부한 정보화 선진국임이 입증되고 있다. 따라서 잘 발달된 infrastructure을 이용하는 기술개발은 초고속정보이용을 가능케하고 있다. 근래에 들어 인터넷을 기반으로 기본적인 활용인 문자, 음성 및 영상 전송 등의 데이터 전송뿐만 아니라, 근래에는 인터넷을 통한 remote control 및 monitoring system에 대한 연구가 활발히 진행되고 있다. 기존의 증류공정은 DCS(Dispersion Control System)로써 공정상태(온도, 압력, 유량, 레벨, 순도등)를 Control room까지 선로를 통하여 신호전달이 이루어지고 있다. 따라서, 제한된 지역에서만 I/O(Input/output)이 이루어지고 있다. 이로 인해 안전감시시스템의 효율성이 떨어지고 있는 게 사실이다. 본 연구에서는 PC기반의 프로그램을 바탕으로 인터넷을 이용한 remote control 및 monitoring system을 개발함으로써 close Network에서 Open Network으로 발전시켰다. 여기서 local plant의 안전시스템 알고리즘은 그대로 Server system에 도입하였으며 사용자의 실정에 맞게 손쉽게 설정을 할 수 있도록 확장성을 높였다. 이는 PC기반의 시스템을 구축함으로써 가능하게 된 것이다. 또한, 웹 상에서의 무차별적 접근으로부터 보호하기 위하여 감시 대상의 성질에 따라 프로그램상에서 차별적 접근형식을 택할 수 있으며, control room의 indicator들과 controller를 프로그램상에 그대로 이식시킴으로써 감시자에게 충분한 정보제공 및 원격제어가 가능하도록 하고있다.

  • PDF

An Experimental Study on the Structural Behavior of Steel Grid Shear Wall subjected to Axial Force and Cyclic Lateral Load (축력과 반복수평력을 받는 격자강판 내진보강벽의 구조거동에 관한 실험적 연구)

  • Park, Jung Woo;Sim, Ki Chul;Park, Jin Young;Lee, Young Hak;Kim, Heecheul
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.25 no.6
    • /
    • pp.525-532
    • /
    • 2012
  • The recently constructed buildings are ensuring seismic safety with enhanced design criteria. But, the buildings unapplied enhanced design criteria are very weak. In this study, steel grid shear wall is proposed as a solution of seismic retrofit to ensure safety of the existing buildings for the earthquake. And the structural performance experiments were carried out under axial force and cyclic lateral loads. The two specimens were made of a reference RC frame and steel grid shear wall in-filled RC frame. The test setup configured with two dynamic actuators, for the axial force with a 500kN capacity actuator and for the cyclic lateral load applied with the 2,000kN actuator. Compared with control specimen, the strength, stiffness, ductility, energy dissipation capacity of the seismic retrofit structures is evaluated.

Watermark Authentication Cryptography for Medical Image Security (의료영상 보안을 위한 워터마크 인증 암호화 기법)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.759-766
    • /
    • 2017
  • In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.

Development of a Safe Electronic Book Viewer with Copyright Protection (안전한 저작권 보호를 제공하는 전자책 뷰어의 개발)

  • 정재헌;오동익;김현철;정순영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.276-281
    • /
    • 2001
  • 전자책은 기존의 종이책을 디지털화한 것, 또는 디지털화되어 책의 형식과 유사하게 정보를 전달할 수 있는 컨텐츠를 말한다. 컴퓨터 기술의 발전 및 인터넷의 급속한 확산과 전자책이 갖는 장점이 복합적으로 결합되어, 이에 대한 관심이 전세계적으로 집중되고 있다. 하지만 전자책 뷰어의 제한된 기능과 독자적인 문서포맷의 사용, 허술한 보안의 문제점등으로 인해, 예상에 비해서는 활성화가 더딘 상황이다. 본 논문에서는 이러한 기존 전자책의 단점을 보완하기 위해 본 연구팀이 개발한 전자책 시스템에 대해 설명하고자 한다. 개발된 시스템은 환경조절 기능, 책갈피 기능, 책장 넘기는 효과등을 가진 전자책 뷰어를 포함하고 있고, 전자책의 표준 규약인 XML을 기반으로 하여 문서포맷을 통일한다. 또한, 전자책 컨텐츠에 워터마크를 삽입하여 저작권을 보호하고, 안전한 통신 수단인 PKI를 기반으로 전자책을 배포한다.

  • PDF

A Study on Labeling Regulation for Reliability and Understanding Improvement of Health Functional Food (건강기능식품의 신뢰도 및 이해도 향상을 위한 표시제도 연구)

  • Kang, Eun-Jin;Kim, Ji-Yeon;Kwon, O-Ran;Kim, Myung-Chul;Kim, Gun-Hee
    • Journal of Food Hygiene and Safety
    • /
    • v.23 no.1
    • /
    • pp.51-61
    • /
    • 2008
  • This study was performed to improve of Health Functional Food(HFF) through investigating the label system. The logo on HFF to increase the reliance, understanding and quality warranty for consumers was developed through competition. In order to investigate the consumer's awareness about HFF label system a nationwide survey was conducted in metropolitan areas (6 cities) and middle-sizes cities (6 cities). The subjects was 2000(male 519, female 1481) adults aged 20 over, and information was collected by in-person interviews. The major results were as follows. 63.0% of consumer responded they need certification mark for HFF and trust function information of text/graphic format than text format. 85.3% of consumers chose the long claim including the mechanism because 38% reported that they could confide the information, 36% reported it is easy to understand and 26% reported that they thought it is more effective than short claim. As 58.8% of the total consumers answered that the manufacturers marked the nutrition function claim without the permit of the KFDA, a reliable certification mark developed by this research is expected to contribute in improving the label system of HFF, rising reliability and perception of consumer.

Case Study of Deep Geological Disposal Facility Design for High-level Radioactive Waste (스웨덴 고준위방사성폐기물 심층처분시설의 설계 사례 분석)

  • Juhyi Yim;Jae Hoon Jung;Seokwon Jeon;Ki-Il Song;Young Jin Shin
    • Tunnel and Underground Space
    • /
    • v.33 no.5
    • /
    • pp.312-338
    • /
    • 2023
  • The underground disposal facility for spent nuclear fuel demands a specialized design, distinct from conventional practices, to ensure long-term thermal, mechanical, and hydraulic integrity, preventing the release of radioactive isotopes from high-temperature spent nuclear fuel. SKB has established design criteria for such facilities and executed practical design implementations for Forsmark. Moreover, in response to subsurface uncertainty, SKB has proposed an empirical approach involving monitoring and adaptive design modifications, alongside stepwise development. SKB has further introduced a unique support system, categorizing ground types and behaviors and aligning them with corresponding support types to confirm safety through comparative analyses against existing systems. POSIVA has pursued a comparable approach, developing a support system for Onkalo while accounting for distinct geological characteristics compared to Forsmark. This demonstrates the potential for domestic implementation of spent nuclear fuel disposal facility designs and the establishment of a support system adapted to national attributes.

Insensitivity Towards Safety and Tasks of KC Mark (Korea Certification Mark) (KC마크의 안전 불감과 과제)

  • Kim, Myeong-Yeol;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.1
    • /
    • pp.111-118
    • /
    • 2016
  • KC Mark is one of the country's integrated legal force to the minimum mandatory certification mark system for safety. That is absolutely needed for manufacturing and sales of goods in Korea. This thesis intended to see what is prevalent for both imports and domestic products for illegal and defect and rebuild the ecosystem as soon as possible for the healthy development through public awareness. In this theses point out the seriousness of the problem based on the various kinds of press releases, data of KCA(Korea Consumer Agency), MOTIE(Ministry of Trade, Industry and Energy) and KCA(Korea Customs Service) to the problem of certification system of KC mark and propose a solution to that issue. This study is considered to make befit the nation's place in the world and sustainable development is possible about the system of certification KC. This study expect more research on this issue in order to make enhance the confidence of KC mark.

Asymmetric Watermarking Using Public Key Infrastructure (공개키 기반 구조를 이용한 비대칭 워터마킹)

  • Jun Young-Min;Yang Sun-Ouk;Kim Gye-Young
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1282-1293
    • /
    • 2004
  • This paper proposes an asymmetric watermarking system using Public Key Infrastructure. The distinguishing characteristic of the proposed method connects between the two different techniques, cryptography technique and watermarking technique, by using the authentication technique. The connection between the two techniques are established based on the special qualities of each technique. Watermarks that are inserted into the digital contents consist of a digital signature described as an encrypted copyright information with the private key of a distributor or a copyright holder, and an authentication code. In the situation where the ownership of the digital contents has to be decided, authentication technique examines the data integrity of the digital contents based on an authentication and decides the ownership of the digital contents by examining whether it satisfies or not satisfies the integrity test. The formal case uses decryption method which compares the user defined copyright information, and the decrypted copyright information extracted from the watermark in the digital contents that are decrypted by distributors' public key The latter case determines the ownership by comparing the similarity between encrypted copyright information separated from the watermark that are extracted from the digital contents, and the user defined encrypted copyright information that are separated from the watermark The proposed method provides protection from the assault which attempts to identify or erase the encoding key.

  • PDF

A Moving Control of an Automatic Guided Vehicle Based on the Recognition of Double Landmarks (이중 랜드마크 인식 기반 AGV 이동 제어)

  • Jeon, Hye-Gyeong;Hong, Youn-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.721-730
    • /
    • 2012
  • In this paper the problem of a moving control of an automatic guided vehicle(AGV) which transports a dead body to a designated cinerator safely in a crematorium, an special indoor environment, will be discussed. Since a method of burying guided lines in the floor is not proper to such an environment, a method of moving control of an AGV based on infrared ray sensors is now proposed. With this approach, the AGV emits infrared ray to the landmarks adheres to the ceiling to find a moving direction and then moves that direction by recognizing them. One of the typical problems for this method is that dead zone and/or overlapping zone may exist when the landmarks are deployed. To resolve this problem, an algorithm of recognizing double landmarks at each time is applied to minimize occurrences of sensing error. In addition, at the turning area to entering the designated cinerator, to fit an AGV with the entrance of the designated cinerator, an algorithm of controlling the velocity of both the inner and outer wheel of it. The functional correctness of our proposed algorithm has been verified by using a prototype vehicle. Our real AGV system has been applied to a crematorium and it moves automatically within an allowable range of location error.