• Title/Summary/Keyword: 외부사고

Search Result 504, Processing Time 0.02 seconds

Quantitative Risk Assessment for Gas-explosion at Buried Common Utility Tunnel (지하 매설 공동구 내부 가스 폭발에 대한 위험성 평가)

  • Jang, Yuri;Jung, Seungho
    • Journal of the Korean Institute of Gas
    • /
    • v.20 no.5
    • /
    • pp.89-95
    • /
    • 2016
  • Keeping the gas pipelines in the common utility tunnel is useful because it has a lower risk of corrosion than conventional burial, and can prevent from excavating construction. But, explosions in common utility tunnels can cause greater damage from the blast overpressure compared to outdoor explosions, due to nature of the confined environment. Despite this fact, however, research on common utility tunnels has been limited to fire hazard and little has been studied on the dangers of explosions. This study developed scenarios of methane gas explosion caused by gas leak from gas piping within the common utility tunnel followed by unknown ignition; the study then calculated the extent of the impact of the explosion on the facilities above, and suggested the needs for designing additional safety measures. Two scenarios were selected per operating condition of safety devices and the consequence analysis was carried out with FLACS, one of the CFD tools for explosion simulation. The overpressures for all scenarios are substantial enough to completely destroy most of the buildings. In addition, we have provided additional measures to secure safety especially reducing incident frequency.

A Study on the Setting Method of the File System Audit Function of Windows for Enhancing Forensic Readiness (포렌식 준비도 제고를 위한 윈도우의 파일 시스템 감사 기능 설정 방안에 관한 연구)

  • Lee, Myeong-Su;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.79-90
    • /
    • 2017
  • If digital forensic investigators can utilize file access logs when they audit insider information leakage cases or incident cases, it would be helpful to understand user's behaviors more clearly. There are many known artifacts related to file access in MS Windows. But each of the artifacts often lacks critical information, and they are usually not preserved for enough time. So it is hard to track down what has happened in a real case. In this thesis, I suggest a method to utilize SACL(System Access Control List) which is one of the audit functions provided by MS Windows. By applying this method of strengthening the Windows's audit settings, even small organizations that cannot adopt security solutions can build better environment for conducting digital forensic when an incident occurs.

Fast Geocoding of UAV Images for Disaster Site Monitoring (재난현장 모니터링을 위한 UAV 영상 신속 지오코딩)

  • Nho, Hyunju;Shin, Dong Yoon;Sohn, Hong-Gyoo;Kim, Seongsam
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_4
    • /
    • pp.1221-1229
    • /
    • 2020
  • In urgent situations such as disasters and accidents, rapid data acquisition and processing is required. Therefore, in this study, a rapid geocoding method according to EOP (Exterior Orientation Parameter) correction was proposed through pattern analysis of the initial UAV image information. As a result, in the research area with a total flight length of 1.3 km and a width of 0.102 ㎢, the generation time of geocoding images took about 5 to 10 seconds per image, showing a position error of about 8.51 m. It is believed that the use of the rapid geocoding method proposed in this study will help provide basic data for on-site monitoring and decision-making in emergency situations such as disasters and accidents.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

Analysis on driver's visual behaviour at the curve sections of a national road for enhancing traffic safety (교통안전 증진을 위한 국도 곡선부에서의 운전자 시각행태 분석)

  • 김홍상;금기정;김명수;박영진
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.3
    • /
    • pp.7-16
    • /
    • 2002
  • It is very important to research drivers' visual behavior. Angle of vision is very important and accounts for more than 90% as the source of driving information. In curve sections, drivers can know the front circumstances and drive more safely and comfortably through facilities guiding their eye movements. Therefore, the standards of installation and effectiveness of these facilities to guide drivers' gaze need to be reconsidered considering characteristics of drivers' eyes The national road no. 34 (Jincheon IC, Buckamri-Yiriangmun section), which is a high-accident-frequency location, is chosen for experimental place. The aim of this study is to understand the process of drivers' visual movement which is drivers' visual behavior and to check the facilities to guide their eyes. Another goal of this study is to improve facilities to guide drivers' eyes on a result basis of considering drivers' visual behavior especially for traffic safety in a high-accident-frequency curve sections.

A Study on the Structured Weakness Classification for Mobile Applications (모바일 애플리케이션을 위한 보안약점 구조화 기법에 대한 연구)

  • Son, Yunsik;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1349-1357
    • /
    • 2012
  • In recent years, security accidents which are becoming the socially hot issue not only cause financial damages but also raise outflow of private information. Most of the accidents have been immediately caused by the software weakness. Moreover, it is difficult for software today to assure reliability because they exchange data across the internet. In order to solve the software weakness, developing the secure software is the most effective way than to strengthen the security system for external environments. Therefore, suggests that the coding guide has emerged as a major security issue to eliminate vulnerabilities in the coding stage for the prevention of security accidents. Developers or administrators effectively in order to use secure coding coding secure full set of security weaknesses organized structurally and must be managed. And the constant need to update new information, but the existing Secure Coding and Security weakness is organized structurally do not. In this paper, we will define and introduce the structured weakness for mobile applications by the surveys of existing secure coding and coding rules for code analysis tools in Java.

A Study on the Changing Factors in Rail Policy in the UK (영국철도정책의 변화요인조사를 통한 시사점 분석)

  • Lee, Yong-Sang;Chung, Byung-Hyun
    • Journal of the Korean Society for Railway
    • /
    • v.13 no.1
    • /
    • pp.108-118
    • /
    • 2010
  • This paper analyzes the changes in rail policy in the UK between 1948 and 2007. The UK rail system, once a nationalized industry, was privatized in 1994. Consequently it increased the role of government after 2000, which was a year of frequent rail accident. Recently the UK rail system has made solving global warming and EU interoperability in rail. This paper examines the main factors in changes in rail policy in the UK, which is through the ruling party's ideology, comprehensive transport policy, aimed at reducing global warming and rail accident. Moreover, this paper clarifies the characteristics of rail policy that is consistent with social role of rail, integrative transport policy and acknowledging the positive role of rail against global warming.

The Nature and Perspective of Informatics Education (정보교육의 본질과 전망)

  • Lee, YoungJun;Lee, EunKyoung
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.3
    • /
    • pp.1-11
    • /
    • 2008
  • All learners have to improve problem-solving abilities based on the principles of Computer Science and Computational Concepts as well as enhance their information technology fluency for living in the 21st century. However, there are no clear answers for fundamental questions such as 'What is Computer Science?' or 'What is the nature of Informatics education?'. Informatics education is threatened by the terminological confusion and misleading external images of Computer Science or Informatics education. Therefore, in this study, we closely reviewed perspectives on the nature and necessity of Informatics education and suggested a perspective to improve Informatics education. First, we examined how the definition of Computer Science has changed and pointed out that the Computer Science curriculum has operated differently from country to country because of the different viewpoints about Computer Science. Moreover, we presented evidence to assert that Informatics education should be considered as an independent science subject that is for all students. Finally, we suggested essential elements to insist that Informatics is a discipline to improve computational thinking. Essential elements consisted of 'Representations', 'Processes', 'Machines', 'Relationships' and 'Construction'. We suggested that the concept of Informatics should be extended based on these five elements.

  • PDF

A Study on the influence of firm's Information Security Activities on the Information Security Compliance Intention of Employees (기업의 정보보안 활동이 구성원의 정보보안 준수의도에 미치는 영향 연구)

  • Jung, Jaewon;Lee, Jung-hoon;Kim, Chae-ri
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.51-59
    • /
    • 2016
  • An internal and external threat against an information system has increased, and to reduce it, organization has spent a great deal of money and manpower. However, in spite of such investment, security threat and trouble have happened continuously. Organization has conducted information security activity through various policies. The study classified such activities into prevention-oriented activity and control-oriented activity, and researched how information security activity of organization affects members of an organization and obeys information security policy by using health belief model. As a result of the study, prevention-oriented activity has a meaningful impact on seriousness, and this seriousness affects compliance intention for information security. Control-oriented activity has a meaningful impact on benefits, and the benefits have an effect on compliance intention. When an organization conducts prior activities such as education, PR, and monitoring, this organization should emphasize negative results that can happened because of deviation. In addition, in case of exposure and punishment through post activities such as inspection and punishment, if the organization emphasizes the positive effects of exposure and punishment rather than emphasis of negative parts, information security activity will be more effective.

Background and Local Histogram-Based Object Tracking Approach (도로 상황인식을 위한 배경 및 로컬히스토그램 기반 객체 추적 기법)

  • Kim, Young Hwan;Park, Soon Young;Oh, Il Whan;Choi, Kyoung Ho
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2013
  • Compared with traditional video monitoring systems that provide a video-recording function as a main service, an intelligent video monitoring system is capable of extracting/tracking objects and detecting events such as car accidents, traffic congestion, pedestrian detection, and so on. Thus, the object tracking is an essential function for various intelligent video monitoring and surveillance systems. In this paper, we propose a background and local histogram-based object tracking approach for intelligent video monitoring systems. For robust object tracking in a live situation, the result of optical flow and local histogram verification are combined with the result of background subtraction. In the proposed approach, local histogram verification allows the system to track target objects more reliably when the local histogram of LK position is not similar to the previous histogram. Experimental results are provided to show the proposed tracking algorithm is robust in object occlusion and scale change situation.