• Title/Summary/Keyword: 안전한 활용

Search Result 8,329, Processing Time 0.037 seconds

Utilization of Technical Resources in the Emergency Recovery Process of Flood Damage of Local Governments (지방자치단체의 홍수피해 응급복구 과정에서의 기술자원 활용방안)

  • Heo, Sun Bum;Cho, Won Cheol;Lee, Tae Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.7-12
    • /
    • 2012
  • This study analyzed appropriate equipment combination for emergency recovery after flood disasters and proposed an alternative approach for economic and rapid emergency recovery based on the utilization of human resources who have practical experience in construction business and in equipment operation. The current countermeasures and response to flood disaster including emergency procedures and methodologies are investigated and related legal framework was also analyzed. Currently, some emergency recovery works are over payed and delayed due to unclear and inefficient processes on equipment and human resources mobilization during and after flood disasters, particularly in local governments. Best practices in mobilizing equipment and human resources were compiled, theoretical foundation was investigated and analyzed, and improved emergency recovery schemes were proposed for effective flood disaster countermeasures in local government. Prioritization in equipment and human resources mobilization was also proposed considering equipment transportation distance and accessability to disaster sites. This study also proposed improved ways to utilize experts in local areas in supporting community emergency response volunteers for disaster risk management.

A Study on the Reasonable Estimation of Consequence of Chemical Release (화학사고 피해영향 범위의 합리적 산정방안에 대한 연구)

  • Cho, Guysun;Lim, Juntaig;Han, Jeongwoo;Baek, Eunsung;Yu, Wonjong;Park, Kyoshik
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.5
    • /
    • pp.20-28
    • /
    • 2020
  • In this study, the damage impact range in the case of a hydrofluoric acid leak accident was predicted using formula calculation, impact assessment simulations, and CFD simulations, and the results were compared and analyzed with the actual environmental impact report. Formula calculation was performed by using the leak source model and diffusion model. Impact assessment simulation was performed by KORA provided by the Korean Ministry of Environment, ALOHA by the United States Ministry of Environment, and PHAST, which is relatively widely used among commercialization programs, and the STAD-CMM+program for CFD simulation. Was utilized. Considering convenience, speed, acceptability, and economics from the user's perspective, ALOHA and KORA were the most appropriate methods for predicting the impact of hydrofluoric acid leakage. In addition, the results of this study will help to reduce unnecessary regulations in the process of government policy development and optimize the investment in the safety field of the company, effectively utilizing the limited resources of the government and the company.

Protective plan by the drone development in Major National Facilities (무인항공기 발전에 따른 국가중요시설 보호방안)

  • Cho, Min Sang;Shin, Seung Gyoon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.3-9
    • /
    • 2015
  • With the development of technology, small UAVs are used in various forms. From military UAV to the Amazon drone, the UAVs are applied to increasing fields for its merits which can replace human work more fast and precisely than what human used to do. Yet, the use and development of UAVs cannot be embraced indiscreetly. There exist negative aspects along with its convenience and positive use. In military use, for instance, the use of UAV can handle dangerous missions in place of human beings but at the same time, it can be very threatening weapons that put people in danger of being attacked at unknown time and places. Therefore, this study discusses the safety measures for major national facilities. Through theoretical understanding of UAVs and major national facilities, the study explores into key concepts and reviewed the cases that threatened our nation's safety. The study also makes suggestions on the policies of the use of UAV to secure national safety.

Estimation and Verification of Commercial Stability Augmentation System Logic for Small UAV (소형무인기 상용 안정성 증대 장치 로직 추정과 검증)

  • Ko, Dong-hyeon;Rahimy, Mohamad;Choi, Keeyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.11
    • /
    • pp.821-829
    • /
    • 2019
  • Because rotorcraft is unstable, it needs a stability system such as flybar. Recently, sensor technology has been developed, it uses a stability augmentation system to improve stability instead of flybar. To use of these rotorcraft which include stability augmentations system for unmanned system, flight control computer, include stability augmentations system function, must be required. In this paper, a reverse-engineering method of estimating Algorithm of Commercial Stability Augmentation System is proposed, the result is applied in the flight computer to make an unmanned rotorcraft system. Finally using a validated algorithm, it is possible to establish a system of unmanned automatic rotorcraft system.

A Study for the Necessity and Recognizing Usability of Recruit Education Curriculum for Security Personnel (민간경비원 신임교육과목 필요성 및 활용성 인식에 관한 연구)

  • Bang, Whan-Bog
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.195-220
    • /
    • 2008
  • Various Kinds of social pathology and crimes that threaten our daily safety are on the increase in process of time as a result of the development of science and technology empty of moral sense, Value Confusions, apolaustic tendency, economic and social transformation recently. Moreover the effective provision of police service lies beyond the boundaries of the police organization. Therefore private security personnel have made an effort for safety and protection of group as well as an individual through the introduction of private security industry based on a benefit principle and private security industry is being become complexes utilizing technology as well as high-end devices through various international events. The field of private security industry in Korea is being extended rapidly with expansionism of society and public services but the quality improvement is declining. Furthermore the study of recruit education program for security personnel as the basis of quality improvement is insufficient compared with the study of police service. Consequently, this investigation is going to contribute to development of recruit education program for security personnel through the analysis about difference of each subject usability for education about electronic security and facility guard.

  • PDF

A Study on the Improvement of Sailing Efficiency Using Big Data of Ship Operation (선박 운항 빅데이터를 활용한 운항 효율 향상 방법 연구)

  • Shin, Jung-Hun;Shim, Jeong-Yeon;Park, Jin-Woo;Choi, Dae-Han;BYEON, Sang-Su
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2017.04a
    • /
    • pp.244-244
    • /
    • 2017
  • Recently, A study is actively underway to apply to various industries, which are one of the major changes in the key drivers of the industry 4.0.. The data generated by the ship include various indicators such as the fuel volume, engine power, ground speed, speed, speed, main engine rpm, DFOC, SFOC, and FOC. This paper analyzes the sensitivity of the Gathering data and analyzes the impact energy efficiency of the vessel operation by analyzing the influence among each parameter, using the mathematical models, you create an surrogate model using the math model, comparative analysis of actual measurement data and predictive results were analyzed. Through the use of big data analysis technology, it is possible to identify the sensitivity between the energy efficiency related variables of the ship, The possibility of utilization of fuel efficiency indicators using of the surrogate model is identified.

  • PDF

Distributed Access Privilege Management for Secure Cloud Business (안전한 클라우드 비즈니스를 위한 접근권한 분산관리)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.369-378
    • /
    • 2011
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server. And we construct the model of access privilege management using AONT based XOR threshold Secret Sharing, In addition, our scheme enable to grant weight for access privilege using XOR Share. In chapter 4, we differentiate existing scheme and proposed scheme.

Case Analysis for Introduction of Machine Learning Technology to the Mining Industry (머신러닝 기술의 광업 분야 도입을 위한 활용사례 분석)

  • Lee, Chaeyoung;Kim, Sung-Min;Choi, Yosoon
    • Tunnel and Underground Space
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • This study investigated use cases of machine learning technology in domestic medical, manufacturing, finance, automobile, urban sectors and those in overseas mining industry. Through a literature survey, it was found that the machine learning technology has been widely utilized for developing medical image information system, real-time monitoring and fault diagnosis system, security level of information system, autonomous vehicle and integrated city management system. Until now, the use cases have not found in the domestic mining industry, however, several overseas projects have found that introduce the machine learning technology to the mining industry for improving the productivity and safety of mineral exploration or mine development. In the future, the introduction of the machine learning technology to the mining industry is expected to spread gradually.

Smartphone Applications/System Design Plan for Class Activation (수업 활성화를 위한 스마트폰 앱·시스템 설계 방안)

  • Lim, Kyung-Hee;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.213-223
    • /
    • 2021
  • In this study, a smartphone utilization system was designed to explore ways to use smartphones owned by more than 95% of Korean teenagers in school classes. First, the necessary functions were selected based on the factors related to adolescents and the factors of distraction, dependence, motivation, and cooperation in the preceding studies on the use of smartphone classes, and then three versions of the application were composed according to the educational roles of students, teachers, and parents. By using these applications, students can learn self-study, motivate learning, and actively interact, teachers can be more closely with students and facilitate lessons while giving detailed feedback, and parents can check the student's safe learning using smartphones. It is hoped that this measure will help to increase the educational effect by activating the use of smartphones in school classes.

A Basic Study on the Varying Thickness Detection of Steel Plate Using Ultrasonic Velocity Method (초음파 속도법을 활용한 강판의 두께 변화 탐지를 위한 기초연구)

  • Kim, WooSeok;Mun, Seongmo;Kim, Chulmin;Im, Seokbeen
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.6
    • /
    • pp.146-152
    • /
    • 2020
  • This study was initiated to develop an effective inspection method to detect defects such as corrosion in closed-cell steel members in steel-box girder bridges. The ultrasonic velocity method among various non-destructive method was selected as a rapid and effective method to derive the average propagation velocity in the medium by using the ultrasonic wave velocity method for specimens of different thickness. The regression analysis was performed based on the experimental results, and the results was interpolated to evaluate the prediction accuracy. If the material properties are identical, this ultrasonic velocity method can predict the thickness using the averaged transmitted velocity. In addition, a continuous scanning method moving at 200 mm/s was tested for scanning a wide area of a bridge. The results exhibited that the continuous scanning method was able to effectively scan the different thickness of a bridge.