• Title/Summary/Keyword: 안전한 활용

Search Result 8,329, Processing Time 0.043 seconds

A Design of Framework for Secure Communication in Vehicular Cloud Environment (차량 클라우드 환경에서 안전한 통신을 위한 프레임워크 설계)

  • Park, Jung-oh;Choi, Do-hyeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2114-2120
    • /
    • 2015
  • Vehicle cloud technology is a fusion technology of vehicle communication technology and cloud computing used in wired and wireless Internet, and has attracted attention as a new IT paradigm. It is expected that it would contribute to resolve the road traffic problem with effective communication by providing computer, sensor, communication, device, and resource. but security is necessary to apply vehicle cloud environment and it have to resolve security threats and various attacks occurred in wired and wireless vehicle environment. Therefore, in this paper, we designed security framework to provide secure communication between vehicle and vehicle, and vehicle and the Road side in the vehicle cloud environment. Safety and security of the vehicle environment was satisfied with the security requirements of the vehicle and cloud-based environment, and increased efficiency than the conventional vehicle network communication protocols.

A Study on Work Safety and Standard Contract for Popular Culture Production Staff (대중문화예술제작물스태프의 작업 안전과 표준계약에 관한 소고)

  • Kim, Si Yeol;Lee, Kyung Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.630-640
    • /
    • 2019
  • A series of recent events have laid the groundwork for discussions on the safety issues regarding production staff in the popular culture industry. In Korea, the standard contract has been pursued as a means of dealing with issues involving popular culture production staff. However, the existing standard contract failed to incorporate the characteristics and requirements in today's market, which greatly restricted its efficacy in real-world cases. Therefore, this study seeks to significantly improve the provisions in the standard contract that govern obligations between contractual parties, and the work safety of the production staff. To this end, considering the main causes of safety accidents and actual contracts, this study groups contractual provisions into several categories: the removal of adverse factors affecting optimal competency, factors causing individual staff's negligence, and external factors causing negligence. Then, this study proposes specific provisions to be included in each category.

A Study on System Integration between Community Mapping and Drone Mapping for Disaster Safety Management (재난안전 관리를 위한 커뮤니티매핑과 드론매핑의 연계방안 연구)

  • Lee, JongHoon;Pyo, KyungSoo;Kim, SeongSam
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_2
    • /
    • pp.873-881
    • /
    • 2019
  • There are limitations to the manager's investigation of all damage sites and establishment of management plan in terms of manpower and cost. Community mapping can be used to overcome these problems with the information. However, it is difficult to make decisions when multiple information are registered in multiple areas of damage. Because community mapping information are registered only with pictures and simple contents, it is so difficult for the manager to clearly understand the site situation. This study suggests a methodology to support decision-making processes during disaster management through system integration between the community mapping and the drone mapping. By applying the proposed method, decision makers can make a timely judgment effectively on the damage situation. It is expected that the proposed method will save time, manpower, and cost in the recovery phase.

Electrical Arc Detection using Artificial Neural Network (인공 신경망을 이용한 전기 아크 신호 검출)

  • Lee, Sangik;Kang, Seokwoo;Kim, Taewon;Lee, Seungsoo;Kim, Manbae
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.791-801
    • /
    • 2019
  • The serial arc is one of factors causing electrical fires. Over past decades, various researches have been carried out to detect arc occurrences. Even though frequency analysis, wavelet and statistical features have been used, arc detection performance is degraded due to diverse arc waveforms. Therefore, there is a need to develop a method that could increase the feature dimension, thereby improving the detection performance. In this paper, we use variational mode decomposition (VMD) to obtain multiple decomposed signals and then extract statistical features from them. The features from VMD outperform those from no-VMD in terms of detection performance. Further, artificial neural network is employed as an arc classifier. Experiments validated that the use of VMD improves the classification accuracy by up to 4 percent, based on 14,000 training data.

Data Processing Method for Real-time Safety Supervision System in Railway (실시간 철도안전 관제를 위한 데이터 처리 방안 연구)

  • Shin, Kwang-Ho;Jung, Hye-Ran;Ahn, Jin
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.4
    • /
    • pp.445-455
    • /
    • 2016
  • A goal of the Real-time railway safety supervision system is to improve the safety oversight efficiency and to prevent accidents by integrating existing distributed monitoring systems, train, signal, power and facilities. So, the system require better performance regarding real-time processing based on big data. The disk-based database that is used in existing railway control systems has a problem with real-time processing; memory-based databases haves a limitation in terms of big-data processing; and time series databases haves a limitation in terms of real-time processing. So, we need a new database architecture for simultaneous real-time processing based on big data. In this study, we review the existing railway monitoring systems and propose a new database architecture for a real-time railway safety supervision system.

Preliminary Study for Risk Assessment Estimation of Urban Underground Connect Section Using VISSIM : Comparison of Characteristics Based on Diverge/Merge (VISSIM을 활용한 도심 지하도로 연결로 위험도 산정을 위한 기초연구 : 분·합류부 기준 특성 비교)

  • Park, Sang Hyun;Lee, Jin Kak;Yang, Choong Heon;Kim, Jin Guk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.5
    • /
    • pp.59-74
    • /
    • 2021
  • The domestic road space is reaching the limit of planar space distribution, and Increasingly, the importance of three-dimensional space distribution through the development of underground space. therefore, In this study, a study was conducted on a traffic control method that can safely induce two different traffic flows in the connection between the ground road and the underground road. Through VISSIM, we calculated the appropriate amount of outflow and inflow traffic compared to the capacity of the main line when there is a Merge/Diverge section in the underground road. and Through the analysis of the number of conflicts, the appropriate traffic control level for safety in the underground, A basic study was conducted on the level of risk in the underpass according to the level of delay in the ground part through the analysis of the delay scenario of the ground road.

Convergence Influences of Nurses' Professional Autonomy and Empathy on Patient Safety Culture (간호사의 전문직 자율성과 공감능력이 환자안전문화에 미치는 융복합적 영향)

  • Lee, Seong-Su;Choi, Hye-Ran
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.231-241
    • /
    • 2019
  • This study was a descriptive survey to identify influences of nurses' professional autonomy and empathy on patient safety culture. The participants were 191 nurses working at a general hospital in Seoul. The data were collected using structured questionnaires and analyzed using the SPSS/WIN 24.0 program. Patient safety culture had a significant correlation with nurses' professional autonomy (r=.26, p<.001) and the subscales of empathy, which were perspective-taking (r=.30, p<.001) and empathic concern (r=.27, p<.001). Factors influencing patient safety culture were perspective-taking (${\beta}=.27$, p<.001), professional autonomy (${\beta}=.20$, p=.004), and a total clinical career of over ten years (${\beta}=.17$, p=.012). The results of this study could be the basic data for the development of programs that enhance the professional autonomy and empathy of nurses. In addition, it is necessary to study repeatedly in various groups in the future.

Enhancement of a Secure Remote Working Environment using CloudHSM and edge-DRM Proxy (Cloud HSM와 edge-DRM Proxy를 활용한 안전한 원격근무 환경 강화 연구)

  • Kim, Hyunwoo;Lee, Junhyeok;Park, Wonhyung
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.25-30
    • /
    • 2021
  • Due to the current COVID-19 pandemic, companies and institutions are introducing virtual desktop technology, one of the logical network separation technologies, to establish a safe working environment in a situation where remote work is provided. With the introduction of virtual desktop technology, companies and institutions can operate the network separation environment more safely and effectively, and can access the business network quickly and safely to increase work efficiency and productivity. However, when introducing virtual desktop technology, there is a cost problem of high-spec server, storage, and license, and it is necessary to supplement in terms of operation and management. As a countermeasure to this, companies and institutions are shifting to cloud computing-based technology, virtual desktop service (DaaS, Desktop as a Service). However, in the virtual desktop service, which is a cloud computing-based technology, the shared responsibility model is responsible for user access control and data security. In this paper, based on the shared responsibility model in the virtual desktop service environment, we propose a cloud-based hardware security module (Cloud HSM) and edge-DRM proxy as an improvement method for user access control and data security.

The Current Situation and Prospect of Safety Education Contents based on VR (VR기반 안전 교육콘텐츠 현황과 전망)

  • Lee, Young-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1294-1299
    • /
    • 2020
  • Recently, interest in safety education based on VR has been increasing, but it started rising doubts are growing over its effectiveness. Therefore, the purpose of this thesis project is to research the current status of safety education contents based on VR and present situations and future prospects for safety education based on VR. As a result of researching about safety education contents using VR, the movement or condition of characters in the contents in the VR environment was very unnatural. Especially, in simulations such as driving a VR device, the controller was skeptical about its efficiency because the operation was different from the actual environment. As a result, we would like to make suggestions and forecasts as follows: First, the production of real and twin environment in VR should be realized. Second, the natural movement of the character should be performed. Third, various controllers should be released in VR devices. Fourth, a realistic scenario should be developed.

A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink (이동 싱크를 가진 무선 센서 네트워크의 안전한 라우팅 기법)

  • Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.53-64
    • /
    • 2005
  • Previous secure routing protocols for wireless sensor networks assume that a sink is static. In many cases, however, a sink operated by man or vehicle is moving. A mobile sink creates a lot of technical problems such as reconfiguration of routing path exposure of sink location. and selection of secure access point node, which are not considered by many previous researches. In this paper, we propose a new secure routing scheme for solving such problems using hi-directional hash chain and delegation nodes of grid structure. This scheme provides a secure routing path and prevents attacker from recognizing the location of a mobile sink in sensor networks. This new method reduces the resource requirements compared to the cashed routing schemes. Simulation results also show that the system is secure and efficient enough.