• Title/Summary/Keyword: 안전한 활용

Search Result 8,302, Processing Time 0.042 seconds

Study on the Analysis of Spatial Structure in Jeju Island Focusing on Parking Status (주차실태를 중심으로 한 제주도 공간구조 분석 연구)

  • Hwang, Kyung-Soo;Yang, Jeong-Cheol;Jo, Hang-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.667-675
    • /
    • 2021
  • The purpose of this study is as follows: First, to analyze the spatial structure of Jeju by analyzing the rate of parking demand and supply; Second, to determine the parking service imbalance between regions; and third, to elucidate the causes of this spatial structural parking service imbalance and provide effective measures. Due to the rapid population and tourism growth, Jeju is suffering from traffic congestion and serious parking problems. For this, the ways to efficiently utilize the existing parking spaces were identified through spatial structure analysis based on the parking demand and supply in the Jeju area. As short-term policy, the following changes were proposed: switching to small-scale eup or myeon blocks of parking space, use of shared parking system, and repairing side streets in residential areas. As mid-to-long-term policy, it is linked to other means of transportation as follows: parking demand management policy through modal share by reorganizing public transportation routes or expanding traffic facilities; securing park-and-ride lots; and different parking pricing for different time periods. To implement these policies, each area of the public sector, private sector, and private-public partnership should develop the bond of sympathy by areas and participants.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.

Evaluation of the Optimal Grouser Shape Ratio of Dozer Considering the Ground Conditions (지반 특성을 고려한 도저의 최적 그라우저 형상비 평가)

  • Baek, Sung-Ha;Kwak, Tae-Young;Choi, Changho;Lee, Seong-Hwan
    • Journal of the Korean Geotechnical Society
    • /
    • v.37 no.3
    • /
    • pp.31-41
    • /
    • 2021
  • A dozer is a construction machinery used to move soil mass along large open tracts of land. Soil thrust generated on the soil-track interface determines the performance of the dozer; to improve the tractive performance of the dozer, the outer surface of the continuous-track is designed to protrude with grousers. In this study, we calculated soil thrust of the dozer equipped with grousers with various shape ratios, and evaluated the optimal grouser shape ratio considering ground conditions. Grouser generated additional soil thrust on the side of the continuous-track (e.g., side soil thrust) and converted the shearing surface (e.g., from soil-track interface to soil-soil interface), increasing the soil thrust of dozer by about 1.3 to 1.6 times. The effect of grouser's shape ratio on the soil thrust of dozer differed with the relative density of the ground. As the shape ratios of grouser increased, soil thrust of dozer decreased at the relative density of 40% and increased at the relative density of 80%. Based on these results, it can be concluded that the shape ratio of grouser severely affects the dozer's performance; thus, careful consideration of the optimal shape ratio of grouser is of great importance in the mechanical design, evaluation, and optimization of the undercarriage of dozers.

Possibility of Risk Accidents and Response Strategies for Participants in Agencies in Charge of Employment for the Elderly: Focusing on occupational risk accidents and COVID-19 risk accidents (노인일자리 전담기관 참여자의 위험사고 발생가능성과 대응 전략: 업무상 위험사고와 코로나-19 위험사고를 중심으로)

  • Park, Jae-Young;Youn, Ki-Hyok;Lee, Jin-Yeol
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.6
    • /
    • pp.65-73
    • /
    • 2022
  • This study identified the level of awareness of dangerous accidents by empirically analyzing the possibility of hazardous accidents at work and the possibility of dangerous accidents due to COVID-19 targeting the participating seniors who are active in the Senior Club, an organization dedicated to job placement for the elderly. The purpose of this study is to provide basic data for preparing measures to improve risk accidents that may occur in organizations in charge of job placement for the elderly and to suggest countermeasures to prevent dangerous accidents. For this purpose, data were collected from the elderly participating in 16 senior clubs in Busan, and 425 of the collected 430 were ultimately used. As a result of this study, first, it was found that the elderly who participated in a job-dedicated institution for the elderly generally perceived the possibility of occupational risk accidents and risk factors due to COVID-19 to be low. Second, it was found that there was a statistically significant difference in the probability of occurrence of hazardous accidents at work according to demographic characteristics during the participation period, and the probability of occurrence of dangerous accidents with COVID-19 was found to have statistically significant differences in the classification and age of the participating elderly. Based on the results of this study, the project manager suggested creating a safety accident management record sheet, preparing a risk management manual, and establishing a risk management system reflecting the individual characteristics of the participants.

A Study on Geospatial Information Role in Digital Twin (디지털트윈에서 공간정보 역할에 관한 연구)

  • Lee, In-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.268-278
    • /
    • 2021
  • Technologies that are leading the fourth industrial revolution, such as the Internet of Things (IoT), big data, artificial intelligence (AI), and cyber-physical systems (CPS) are developing and generalizing. The demand to improve productivity, economy, safety, etc., is spreading in various industrial fields by applying these technologies. Digital twins are attracting attention as an important technology trend to meet demands and is one of the top 10 tasks of the Korean version of the New Deal. In this study, papers, magazines, reports, and other literature were searched using Google. In order to investigate the contribution or role of geospatial information in the digital twin application, the definition of a digital twin, we investigated technology trends of domestic and foreign companies; the components of digital twins required in manufacturing, plants, and smart cities; and the core techniques for driving a digital twin. In addition, the contributing contents of geospatial information were summarized by searching for a sentence or word linked between geospatial-related keywords (i.e., Geospatial Information, Geospatial data, Location, Map, and Geodata and Digital Twin). As a result of the survey, Geospatial information is not only providing a role as a medium connecting objects, things, people, processes, data, and products, but also providing reliable decision-making support, linkage fusion, location information provision, and frameworks. It was found that it can contribute to maximizing the value of utilization of digital twins.

Development of LiDAR-Based MRM Algorithm for LKS System (LKS 시스템을 위한 라이다 기반 MRM 알고리즘 개발)

  • Son, Weon Il;Oh, Tae Young;Park, Kihong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.174-192
    • /
    • 2021
  • The LIDAR sensor, which provides higher cognitive performance than cameras and radar, is difficult to apply to ADAS or autonomous driving because of its high price. On the other hand, as the price is decreasing rapidly, expectations are rising to improve existing autonomous driving functions by taking advantage of the LIDAR sensor. In level 3 autonomous vehicles, when a dangerous situation in the cognitive module occurs due to a sensor defect or sensor limit, the driver must take control of the vehicle for manual driving. If the driver does not respond to the request, the system must automatically kick in and implement a minimum risk maneuver to maintain the risk within a tolerable level. In this study, based on this background, a LIDAR-based LKS MRM algorithm was developed for the case when the normal operation of LKS was not possible due to troubles in the cognitive system. From point cloud data collected by LIDAR, the algorithm generates the trajectory of the vehicle in front through object clustering and converts it to the target waypoints of its own. Hence, if the camera-based LKS is not operating normally, LIDAR-based path tracking control is performed as MRM. The HAZOP method was used to identify the risk sources in the LKS cognitive systems. B, and based on this, test scenarios were derived and used in the validation process by simulation. The simulation results indicated that the LIDAR-based LKS MRM algorithm of this study prevents lane departure in dangerous situations caused by various problems or difficulties in the LKS cognitive systems and could prevent possible traffic accidents.

Multi-objective Optimization Model for Tower Crane Layout Planning in Modular Construction (모듈러 건축의 타워크레인 배치계획 수립을 위한 다중 최적화 모델 개발)

  • Yoon, Sungboo;Park, Moonseo;Jung, Minhyuk;Hyun, Hosang;Ahn, Suho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.22 no.1
    • /
    • pp.36-46
    • /
    • 2021
  • With an increasing trend toward high-rise modular construction, the simultaneous use of tower cranes at a modular construction site has recently been observed. Tower crane layout planning (TCLP) has a significant effect on cost, duration, safety and productivity of a project. In a modular construction project, particularly, poor decision about the layout of tower cranes is likely to have negative effects like additional employment of cranes and redesign, which will lead to additional costs and possible delays. It is, therefore, crucial to conduct thorough inspection of field conditions, lifting materials, tower crane capacity to make decisions on the layout of tower cranes. However, several challenges exist in planning for a multi-crane construction site in terms of safety and collaboration, which makes planning with experience and intuition complicated. This paper suggests a multi-objective optimization model for selection of the number of tower cranes, their models and locations, which minimizes cost and conflict. The proposed model contributes to the body of knowledge by showing the feasibility of using multi-objective optimization for TCLP decision-making process with consideration of trade-offs between cost and conflict.

Method for evaluating the safety performance and protection ability of the mobile steel protective wall during the high-explosive ammunition test (고폭탄 탄약시험 간 이동형 강재 방호벽의 안전성능 판단 및 유효 방호력 평가 방법)

  • Jeon, In-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.573-582
    • /
    • 2021
  • In this study, a series of processes for evaluating the effective protection against barriers that should be equipped in institutions that perform reliability tests on high-risk ammunition, such as high-explosive ammunition, were introduced. The impact that high-explosive bombs can have on personnel includes damage to the eardrum and lungs caused by explosion overpressure and penetrating wounds that can be received by fragments generated simultaneously with the explosion. Therefore, a high-explosive with COMP B explosives as its contents were set up, and an explosion protection theory investigation to calculate the degree of damage, numerical calculations and simulations were performed to verify the protection power. A numerical calculation revealed the maximum explosion overpressure on the protective wall when the high-explosive exploded and the penetration force of the fragment against a 50 mm-thick protective wall to be 77.74 kPa and 41.34 mm, respectively. In the simulation verification using AUTODYN, the maximum explosion overpressures affecting the firewall and personnel were 56.68 kPa and 18.175 kPa, respectively, and the penetration of fragments was 35.56 mm. This figure is lower than the human damage limit, and it was judged that the protective power of the barrier would be effective.

The Legend's Modernization and Horror Strategy - Focus on uncanny stories concerning army (전설의 현대화와 공포의 전략 - 군대괴담을 중심으로 -)

  • Jin, Eun-Jin
    • (The)Study of the Eastern Classic
    • /
    • no.68
    • /
    • pp.439-472
    • /
    • 2017
  • The purpose of this paper is to confirm how traditional legends are changing and existing in modern times, and how they are inheriting and developing legendary values and meanings. The subject of the study is uncanny stories concerning army that is judged to be worthwhile alongside uncanny stories concerning school. The uncanny stories concerning army are urban legends that are active in the internet. It can be defined as 'a narrative story that raises fear with supernatural and strange experiences in the army'. In addition to the internet community sites, humor sites and game sites are actively handed down. Recently, ghost stories have appeared on the site, and uncanny stories concerning army are easily collected from these various sites. The uncanny stories concerning army can be divided into three types: ghost experience type, Bulgogi GP type, mystery radio type. The ghost experience type has the largest number of version, the contents are rich and varied. It does not deviate much from the traditional notion of ghosts. Bulgogi GP type has a frenzied horror from its name. It is related to actual events and raises horror. Mystery radio type is a romantic material used in movies and dramas. However, unlike movies and dramas, uncanny stories concerning army are perceived as fearsome. The uncanny stories concerning army continues to emphasize that the story is actually experienced in the title and content. It has presented concrete evidence. The emphasis on truthfulness is intended to make fear more realistic. This comes from the desire for safety. Uncanny stories concerning army focus on horror. So It tries to reveal the history and truthfulness of the story itself. As a result, the history of reality, the truth of reality, and the realistic ideology are erased. Historical and truthfulness of traditional legends has been varied in the case of uncanny stories concerning army.

Security Analysis of KS X 4600-1 / ISO IEC 12139-1 (원격 검첨용 PLC 기술(KS X 4600-1 / ISO IEC 12139-1) 보안성 분석)

  • Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.65-75
    • /
    • 2011
  • Power Line Communication (PLC) is a system for carrying data on a conductor used for electric power transmission. Recently, PLC has received much attention due to connection efficiency and possibility of extension. It can be used for not only alternative communication, in which communication line is not sufficient, but also for communication between home appliances. Korea Electronic Power Cooperation (KEPCO) is constructing the system, which automatically collects values of power consumption of every household. Due to the randomness and complicated physical characteristics of PLC protocol (KS X4600-1), it has been believed that the current PLC is secure in the sense that it is hard that an attacker guesses or modifies the value of power consumption. However, we show that the randomness of the protocol is closely related to state of the communication line and thus anyone can easily guess the randomness by checking the state of the communication line. In order to analyze the security of PLC, we study the protocol in detail and show some vulnerability. In addition, we suggest that PLC needs more secure protocol on higher layers. We expect that the study of PLC help in designing more secure protocol as well.