• Title/Summary/Keyword: 안전성 강화

Search Result 1,271, Processing Time 0.029 seconds

A Study on the Emergency Response Empowerment for Captain Based on the Analysis of Maritime Accidents (사고분석을 통한 선장 비상대응 역량강화 연구)

  • Chae, Chong Ju;Park, Young Sun;Jo, So Hyun;Kang, Suk Young;Lee, Ho;Kim, Hong Beom
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.4
    • /
    • pp.413-422
    • /
    • 2019
  • Maritime accidents are always accompanied by human/property damages. If management level ship's of icers properly respond to emergency situation in a correct manner based on knowledge required by international conventions, when maritime accidents occur, it will be possible to minimize such human/property damages. To improve the ability to deal with maritime accidents, this study analyze maritime accident cases to identify which competencies ships' officers' were lacking, compared the emergency response competencies required by international conventions, analyzed various emergency management manuals of shipping companies and carried out questionnaire surveys to suggest improvements of emergency response capability for ship's master. Through the analysis of maritime accidents, it was identified that management level ship's officers lacked competencies regarding damage stability and intact stability, and that the training for emergency response required by international conventions had been insuf iciently carried out. In addition, even though emergency management manuals of ships were generally adequate, it has been identified that there were limitations in terms of practical use of emergency response manual. Therefore, based on the questionnaire, this study proposed the expansion of emergency response training required by international conventions based on use of simulators, and the development of guidelines or manuals for effective and efficient response in emergency situations.

The Meaning and Tasks of Guidelines for Utilization of Healthcare Data (보건의료 데이터 활용 가이드라인의 의미와 과제)

  • Shin, Tae-Seop
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.31-55
    • /
    • 2021
  • The Personal Information Protection Act, one of the revised 3 Data Laws, established a special cases concerning pseudonymous data. As a result, a personal information controller may process pseudonymized information without the consent of data subjects for statistical purposes, scientific research purposes, and archiving purposes in the public interest, etc. In addition, as a follow-up to the revised Personal Information Protection Act, a 'Guidelines for Utilization of Healthcare Data' was prepared, which deals with the pseudonymization in the medical sector. The guidelines are meaningful in that they provide practical criteria for accomplices by defining specific interpretations and examples that take into account the characteristics of healthcare data. However, the guidelines need to clarify the purpose of using pseudonymous data and strengthen the fairness of the composition of the data deliberation committee. The guidelines also require establishing a healthcare data compensation framework and strengthening the protection of rights for vulnerable subjects. In addition, the guidelines need to be adjusted for inconsistency with the Bioethics and Safety Act and the Medical Service Act. It is expected that this study will contribute to the creation of a safe environment for the utilization of healthcare data as well as the improvement of related laws and systems.

A study on the development of analytical method for zinc pyrithione in cosmetics (화장품 중 zinc pyrithione 분석방법 개발에 대한 연구)

  • Jung, Jung-sul;Bae, Kyeong-mi;Son, Seung-hwan;Park, Jung-woo;Kim, Ji-hyun;Hong, Sung-taeg;Sun, Yle-shik
    • Analytical Science and Technology
    • /
    • v.28 no.3
    • /
    • pp.160-167
    • /
    • 2015
  • This study aims to develop a new analytical method to detect zinc pyrithione, the ingredient of cosmetics appointed as restricted ingredients and used as preservatives.. The analytical method was based on data gathered from the relevant literature. Information about the amounts of these ingredients was researched in order to select the base-matrix materials used to validate the analytical method. After selecting and preparing the base-matrix materials, the analytical method was validated by method validation procedures. The analytical method was verified first by inter-laboratory validation and then through analyzing the cosmetics sold in the market. Based on the results of this study, guidelines are proposed for the analysis of restricted ingredients in cosmetics, which will provide a method to test the cosmetics circulating in the Korean market. The use of the proposed guidelines will increase the quality of the cosmetics as well as the safety of human health, which will enhance the competitiveness of the Korean cosmetics industry and lead to an increase in the exportation of cosmetics.

The Accidents Analysis for Safety Training in The Container Terminal (컨테이너터미널에서 안전교육이 사고에 미치는 영향 분석)

  • Cha, Sang-Hyun;Noh, Chang-Kyun
    • Journal of Navigation and Port Research
    • /
    • v.40 no.4
    • /
    • pp.197-205
    • /
    • 2016
  • Our country, which relies on maritime transport a majority of import and export trade volume and faced with unexpected accidents, it is difficult to operate the normal function of container terminal. It also caused by reliability issue raised is likely to be given a blow to the new volumes to attract and maintain existing volumes. Under this views, the container terminal is a situation that highlights the role of the harbor workers and cope with aggressive work to provide the best quality services to customers 365 days. On these grounds, the heavy work burden is passed on to the harbor workers and caused accidents every year. The study was analyzed the safety status of the container terminal under the real following the conditions as disaster status analysis, insufficient safety training circumstances and safety training from 2012 year to 2015 in the target current K.Y terminal. As a result of equipments safety training analysis, it shows that 2012 year happened 45 cases and 31 cases in 2013 year until not practicing the training over the Gantry Crane equipment. One hand 23 cases took place in 2014 while preparation training and the other intensive training period of 2015, 8 cases occurred. it shows that 2012 year happened 13 cases and 19 cases in 2013 year until not practicing the training over the Transfer Crane equipment. One hand 12 cases took place in 2014 while preparation training and the other intensive training period of 2015, 8 cases occurred. it shows that 2012 year happened 9 cases and 9 cases in 2013 year until not practicing the training over the Yard Tractor equipment. One hand 9 cases took place in 2014 while preparation training and the other intensive training period of 2015, 4 cases occurred. Because safety training of the container terminal was given to greatly impact on the mandatory safety training, self-educational enforcement and specified equipments safety training, hence the container terminal is to strengthen the safety education to prevent accidents in advance.

A Study on the Introduction of Performance Certification System of Inspection and Diagnostic Equipment for Infrastructure (시설물 진단장비의 성능인증제 도입에 관한 연구)

  • Hong, Sung-Ho;Kim, Jung-Gon;Cho, Jae-Young;Kim, Do-Hyoung;Kim, Jung-Yeol;Kim, Young-Min
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.104-115
    • /
    • 2022
  • Purpose: Infrastructure inspection and its diagnostics technique have been rapidly developing recently. Therefore, it is important to secure the reliability of diagnostic equipment, and this paper deals with inspection of diagnostic equipment, introduction to a certification system and development plans for infrastructure. Method: Several certification systems are established and introduction plans are reviewed through experts by synthesizing the contents of certification research for existing infrastructure diagnosis equipment. In addition, the revision of the law for introduction of the system is reviewed, detailed operation regulations are prepared and phased development plans are reviewed, which are based on the operation scenario. Result: Inspection and certification plans were constructed through four routes in order to consider infrastructure inspection and diagnostic equipment in use, and new diagnostic equipment using state-of-the-art technology. Furthermore, market confusion depending on the introduction of a new certification system is minimized and reliability is secured by transforming a simple inspection system in the short term into a formal certification system in the long term. The law amendments according to the introduction of the system were reviewed and detailed operation regulations were developed. Also, phased development plans, which are based on the long-term development scenario including manpower, infrastructure and specifications, were presented. Conclusion: It is important to secure reliability through the distribution and certification of diagnostic equipment using 4th industrial technology to strengthen the safety management of infrastructure at the national level since the infrastructure is various in type and increasingly large in size. It is also essential to train human resources who can use new technology with inspection and diagnosis system in order to enhance the safety management of all infrastructures. Moreover, it is necessary to introduce a regular inspection system for infrastructure that combines loT technology in the long-term point of view and to promote the introduction by giving active incentives to institutions that actively accept it.

Security Technique using SSH Tunneling for CCTV Remote Access (SSH 터널링을 이용한 CCTV 원격접속 보안기법)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.148-154
    • /
    • 2016
  • Video security has recently emerged as an important issue owing to CCTV video image spill accidents over the Internet. KISA recommends the use of encryption protocols for remote access through its guidelines for CCTV personal video information protection. But still, many products do not adhere to the guidelines, and those products are easily exposed to security threats, such as hacking. To solve these security vulnerabilities, this paper proposes a CCTV system that connects from remote locations, and is implemented by using secure shell (SSH) tunneling techniques. The system enhances security by transmitting encrypted data by using SSH. By using the tunneling technique, it also solves the problem of not being able to access a CCTV recorder located inside a firewall. For evaluation of the system, this paper compares various CCTV remote access schemes and security. Experimental results on the effectiveness of the system show it is possible to obtain remote access without a significant difference in transmission quality and time. Applying the method proposed in this paper, you can configure a system secure from the threats of hacking.

도로안정성을 고려한 친환경적 터널 갱문 설계 및 시공사례

  • Wi, Yong-Gon;Kim, Do-Hyeong;Kim, Yeong-Geun;Kim, Il-Hwan;Gwon, Jae-Seok;Lee, Won-U
    • Proceedings of the Korean Society for Rock Mechanics Conference
    • /
    • 2004.04a
    • /
    • pp.199-217
    • /
    • 2004
  • 터널 설계에 있어 갱구부의 위치 및 갱문형식의 선정은 터널 및 갱구사면의 안정성뿐만 아니라, 주위환경과의 조화 및 자연환경 훼손 최소화 등과 같은 환경적인 측면에서도 매우 중요한 부분이다. 현행 국내의 경우 경제성과 시공성 위주의 갱구부 위치 선정으로 과다 절취구간이 발생되어 환경훼손, 민원문제 발생, 과다한 용지 매입비용 등의 여러 가지 부작용이 발생되고 있다. 또한, 갱문 형식의 선정에 있어서 갱구부의 지형여건 및 제반 환경적 영향을 고려하지 않고 원통절개형과 면벽식 갱문의 획일적인 적용으로 주변지형과의 부조화를 이루는 사례가 다수 발생하고 있으며, 갱구부 상단의 유실된 토석이 완충공간의 부족으로 도로 노면상에 낙하되는 사고가 발생하고 있어 그에 대한 대책이 필요한 실정이다. 이와 같은 문제점을 보완하기 위해 갱구부 절취구간 최소화를 위한 구체적인 최소토피고 기준을 마련하였으며, 갱구상단 지형경사의 완급, 갱문주위의 배수기능, 낙석${\cdot}$산사태 등의 발생가능성 등을 고려한 새로운 갱문형식을 제안하고 체계적인 검토를 수행하였다. 이를 통해 점차 강화되는 환경보호정책 방향에 부응하고 자연환경 훼손을 최소화하며, 특히 해빙기와 집중호우시 낙석${\cdot}$눈사태로부터 도로의 안전을 확보할 수 있는 터널 갱문부 설계기준을 제시하였다. 또한, 실제 고속도로 터널의 설계 적용사례를 통하여 본 설계기준의 적용성을 분석하였으며, 실제 갱문 시공사례를 소개하여 향후 설계 및 시공에 도움이 되고자 하였다.

  • PDF

A Study on the Validity and Utility of Urban Plan Facilities for Prevention of Disaster (재해예방을 위한 도시계획시설의 타당성과 효용성에 관한 연구)

  • Choi, Woong;Park, Jeong Yong;Kim, Young Gyun
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.1
    • /
    • pp.57-65
    • /
    • 2011
  • Studying the operation of urban control plan and control program of urban plan facilities to present development direction of urban plan in the future by performing multi-variate analysis, the research acquired the following conclusion. It is required to institutionally activate the inhabitants' participation by reflecting spontaneous participation and opinion of inhabitants to adminstration so that the effect of business can be maximized in the stage of establishing urban control plan. Furthermore, the participation of role dividing type is necessary to adjust and connect the interest of expert that has experience in practical business of overall urban plan, inhabitant and self-governing body. It is required to reduce the service supplied by government so as to enhance policy of plan-first and development last for facilities with high importance and utility such as road, park and water supply/sewage, etc as well as to seek control program that expands the participation of private sector for administration for which private service is possible.

  • PDF

Analysis of Far Infrared Image for Accuracy Improvement in Night Discharge Measurement using Surface Image Velocimeter (표면영상유속계(SIV)의 야간 하천 유량 측정 정확도 향상을 위한 원적외선 영상 분석 연구)

  • Bae, In Hyuk;Yu, Kwonkyu;Kim, Seojun;Yoon, Byungman
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.455-455
    • /
    • 2016
  • 최근 기후변화로 빈번하게 발생하는 국지성 집중호우로 인해 홍수 피해가 증가하고 있으며, 이에 따라 유량 계측 자료의 필요성이 더욱 증대되고 있다. 현재까지 하천의 홍수 유량측정은 대부분 부자법에 의해 수행되어 왔지만, 측정 작업의 위험성이나 측정 정확도에 대해 여러 문제점이 지적되고 있다. 이에 비접촉식 측정 방법으로 안전하고 측정방식이 간편하며 높은 정확도를 갖춘 표면영상유속측정법(Surface Image Velocimetry, SIV)에 대한 연구가 활발하게 진행되고 있다. 다만 표면영상유속측정법의 경우 질 좋은 영상 촬영을 위해 밝은 빛이 필요하고, 일반적으로 매우 작은 규모의 하천을 제외하고는 영상 획득이 어렵다는 한계가 있다. 이와 같은 문제들을 해결하기 위해 최근 류권규 등(2015)은 영상 획득 장비로 원적외선 카메라의 적용성을 검토한 바 있다. 원적외선 카메라의 경우 별도의 조명을 필요로 하지 않기 때문에 주야간 구분 없이 사용 가능하다는 장점이 있으며 실제 하천에서 홍수와 함께 발생하는 안개의 영향 또한 받지 않아 고정식으로 설치하여 하천 유량측정 시스템을 구성하는 좋은 대안이 될 수 있음을 강조하였다. 다만, 원적외선 카메라는 야간에 적용시 주간과 비교하여 수표면의 움직임이 느리게 분석되는 경향이 있다고 하였다. 실험 결과를 보면, 소형 프로펠러 유속계로 측정한 수표면의 유속값에 비교하여 일반 캠코더 영상으로 산정한 유속 산정 결과의 상대오차는 최대 -10%인 반면, 원적외선 카메라 영상으로 산정한 유속 산정 결과의 오차는 -9%에서 -19%(주간), -10% 에서 -23%까지의 오차 범위를 나타내는 등 일반 캠코더에 비해 원적외선 카메라의 정확도가 다소 떨어지는 결과를 나타냈으며, 이러한 문제를 해결하기 위해서는 원적외선 영상의 명암값 분포 차이를 해결하기 위해 영상 처리 기법에 대한 추가적인 연구가 필요할 것이라고 하였다. 이에 본 연구에서는 원적외선 영상에 대한 다양한 영상 개선을 통해 표면영상유속계의 유속 측정 정확도를 높이고자 하였다. 이를 위해 우선, 적정 해상도와 시간간격을 제시하였으며, 영상의 색 보정과 영상 강화 등의 영상 개선을 통해 원적외선 영상을 이용한 유속 산정 정확도를 향상하였고, 마지막으로 다양한 야간 하천 흐름 조건에 적용하여 원적외선 영상을 활용한 표면영상유속계의 유속 측정 정확도를 높이고자 하였다.

  • PDF

Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC (PLC용 uC/OS 운영체제의 보안성 강화를 위한 실행코드 새니타이저)

  • Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.365-375
    • /
    • 2019
  • A PLC (Programmable Logic Controller) is a highly-reliable industrial digital computer which supports real-time embedded control applications for safety-critical control systems. Real-time operating systems such as uC/OS have been used for PLCs and must meet real-time constraints. As PLCs have been widely used for industrial control systems and connected to the Internet, they have been becoming a main target of cyberattacks. In this paper, we propose an execution code sanitizer to enhance the security of PLC systems. The proposed sanitizer analyzes PLC programs developed by an IDE before downloading the program to a target PLC, and mitigates security vulnerabilities of the program. Our sanitizer can detect vulnerable function calls and illegal memory accesses in development of PLC programs using a database of vulnerable functions as well as the other database of code patterns related to pointer misuses. Based on these DBs, it detects and removes abnormal use patterns of pointer variables and existence of vulnerable functions shown in the call graph of the target executable code. We have implemented the proposed technique and verified its effectiveness through experiments.