• Title/Summary/Keyword: 위해요소 식별

Search Result 278, Processing Time 0.03 seconds

Research on R&D requirement planning support strategies to foster arms exports: focused on researching the evaluation model of marketability of weapon systems (방산수출을 고려한 R&D 소요기획 지원전략 연구: 무기체계 시장성 평가모델 연구를 중심으로)

  • Han, Bong-Yoon;Won, Jun-Ho
    • Journal of Technology Innovation
    • /
    • v.20 no.3
    • /
    • pp.93-128
    • /
    • 2012
  • Defense technology planning identifies medium-and long-term core technologies to accomplish future defense goals and suggests strategies for future R&D. In order to promote the export-oriented defense industry, planning paradigms should be shifted from technology-oriented planning that focuses on weapon systems to market- oriented R&D planning. This study aims to strategically support 'preliminary technology planning' the Defense Agency for Technology and Quality is pushing ahead with. Through market-orientation analysis models of weapon systems based on defense R&D planning, data research on previous market-oriented research, and the analyses and examples of global defence markets, it evaluates market attractiveness to UAVs and drew methods for exploring markets and enhancing competitiveness of military equipment. The market-oriented analysis model of weapon systems is considered to be a helpful reference as a relevant factor for decision making on establishing and verifying requirement planning. In particular, if a market-oriented defense R&D planning process is established institutionally, it will enable us to make export strategies tailored to different equipment from the planning phase and to support marketing strategically.

  • PDF

A Study on the Ship Information Fusion with AIS and ARPA Radar using by Blackboard System (블랙보드 시스템을 이용한 AIS와 ARPA Radar의 선박 정보 융합에 대한 연구)

  • Kim, Do-Yeon;Park, Gyei-Kark;Kim, Hwa-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.1
    • /
    • pp.16-21
    • /
    • 2014
  • In recent, the maritime traffic has increased with an increase in international trading volumes and the growing popularity of marine leisure activities. As increasing of maritime traffic, marine accidents happened continually and there are possibilities of accidents at sea. According to the analysis of marine accidents, most accidents occurred by human error of seafarers. To reduce the accidents by human error, the various assistance system for assist seafarers have been proposed. It is required to real-time data management method for applying to real-time system, but most proposed assistance system used off-line data for analysis. In this paper, we aim to build a navigation supporting system for providing safety information to deck officer with data of AIS(Automatic Identification System) and ARPA Radar(Automatic Radar Plotting Aids Radar), and proposed a management algorithm for real-time ship information with blackboard system and verified the validity.

Development of TLCSM Based Integrated Architecture for Applying FRACAS to Defense Systems (국방 무기체계 FRACAS 적용을 위한 TLCSM 기반 통합 아키텍처 구축)

  • Jo, Jeong-Ho;Song, Hyeon-Su;Kim, Bo-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.190-196
    • /
    • 2020
  • FRACAS(Failure Reporting, Analysis and Corrective Action System) has been applied in various industries to improve the reliability of the systems. FRACAS is effective in improving reliability by repeating failure analysis, proper corrective action, and result verification for identified failures. However, FRACAS has many limitations in terms of process, data collection and management to be integrated into the existing development environment. In the domestic defense industry, studies on the development of FRACAS system and process improvement have been conducted to solve the difficulties of applying FRACAS, but most of them are concentrated in the operation/maintenance phase. Since FRACAS should be conducted in consideration of TLCSM(Total Life Cycle System Management), it is necessary to study the reference architecture so that FRACAS can be applied from the early design phase. In this paper, we studied the TLCSM-based integrated architecture considering the system life cycle phases, FRACAS closed-loop process, and FRACAS essentials in order to effectively apply FRACAS throughout the life cycle of defense systems. The proposed architecture was used as a reference model for FRACAS in a shipboard combat system.

A Requirement Priority Process of Embedded Systems based on the Dependency and Aspect (의존과 관점 기반 임베디드 시스템의 요구사항 우선순위 프로세스)

  • Hwang, Wi-Yong;Kang, Dong-Su;Song, Chee-Yang;Seong, Jae-Seok;Baik, Doo-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.767-790
    • /
    • 2009
  • Setting up a priorityfor an embedded system is greatly significant because a release plan at the early stage of product developments can properly be established through right decision making procedures based on the priorities. For instance, both dependencies among requirements and the aspects of product developers should be considered into the priorities to improve the embedded system. Especially, trade-offs among the requirements, which are quite different depending on H/W and S/W architecture styles they use, should be acknowledged without exception. However, the selection process on the priority has hitherto been fairly systematic in the existing environment where hardware and software are not being considered at once. Therefore, this paper suggests an dependency and aspect-based model and process for the requirements of the priority. For this, the paper analyzes the trade-offs between the requirements depending on the disparate Architecture styles of H/W and S/W, and it also reflects the viewpoints of the developers. For thelast thing, the model and process suggested will be applied to the case of the development of both cell phones and cameras to gain authenticity and reliability. In conclusion, the danger occurring when the release plan is constructed can be minimized by screening the priorities that optimizes the embedded system more explicitly.

Photoelastic Stress Analysis for a Rhombus Plate under Compressive Load Using Image Processing Technique (압축하중을 받는 마름모 판에 대한 영상처리기법을 이용한 광탄성 응력 해석)

  • Liu, Guan Yong;Kim, Myung Soo;Baek, Tae Hyun
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.2
    • /
    • pp.148-154
    • /
    • 2014
  • Photoelasticity is a useful technique for obtaining the differences and directions of principal stresses in a model. In conventional photoelasticity, the photoelastic parameters are measured manually point by point. Identifying and measuring photoelastic data is time-consuming and requires skill. The fringe phase shifting method was recently developed and has been found to be convenient for measuring and analyzing fringe data in photo-mechanics. This paper presents an experimental study on the stress distribution along a horizontal line that passes the central point of a rhombus plate made of Photoflex (i.e., type of urethane rubber). The isoclinic fringe and/or principal stress direction is constant on this horizontal line, so a four-bucket phase shifting method can be applied. The method requires four photoelastic fringes that are obtained from a circular polariscope by rotating the analyzer at $0^{\circ}C$, $45^{\circ}C$, $90^{\circ}C$ and $135^{\circ}C$. Experimental measurements using the method were quantitatively compared with the results from FEM analysis; the results from the two methods showed comparable agreement.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Biological Properties of Propolis Isolated from Honeybees (프로폴리스의 생물학적 특성)

  • Kim, Sung-Kuk;Woo, Soon-Ok;Chang, Jong-Soo
    • Journal of Life Science
    • /
    • v.31 no.7
    • /
    • pp.686-697
    • /
    • 2021
  • Propolis is a resinous substance produced by honeybees, which they use to protect their hives. Honeybees produce propolis by mixing exudates from the various trees and plants with saliva and beeswax. It has been used since around 300 B.C. as a folk medicine to cure wounds. Propolis contains many physiologically active components, such as flavonoids, phenolic compounds, and beeswax. Because of its functional components, propolis has a wide spectrum of biological applications. The compounds in propolis and its biological activity can vary according to the location of nectar source and extraction method. Propolis is most commonly known for its anti-microorganism activity against bacteria, viruses, and fungi. Artepillin C and caffeic acid phenethyl ester (CAPE) have been identified as regulatory compounds that reduce inflammation and exert immunosuppressive reactions on T lymphocytes. Through its anti-inflammatory activity, propolis exhibits anti-tumor activity, including the inhibition of cancer cell proliferation, the blocking of tumor signaling cascades, and antiangiogenesis. However, for the more apply of propolis its analysis of nectar source, identifying of propolis compound, the molecular mechanism of propolis and the investigation of compounds synergistic effects are essential. In this study, we described the physiological activity of propolis isolated from honeybees.

Characteristics of Social Service Provision According to the Community Size and Financial Provision Types (지역적 환경과 제도적 특성을 고려한 사회서비스 공급체계 분석)

  • Kim, Eunjeong
    • Korean Journal of Social Welfare Studies
    • /
    • v.47 no.3
    • /
    • pp.5-33
    • /
    • 2016
  • This study investigates the current features of social service provision system focusing on the core institutional traits of the system and community environment. Specifically, the study analyzes the differences in the contents and characteristics of social service provision, according to the community types, such as metropolitan area, medium size cities, and rural area. Also, the study explores the relationships among the three major subsystems in the social service provision system based on the types of financial provisions. Furthermore, the interaction effects between the community factors and financial traits on the relationships among sub- components in the service provision system are investigated. In this study other organizations, service users and public sector are regarded as three major sub-components in the provision system. The study utilizes the raw data from '2015 Social Service Demand and Provision Survey', which interviewed 4,100 social service organizations. Results from analyses show that the gap among metropolitan area, medium cites, and rural area is not so much bigger in the diverse provision features(e.g. the competition level, the major focus on the users, and policy demands on public sector) of provider-provision-organizations than in those of both of user-provision-organization and of market-way-organizations. User-provision organizations show the distinct differences in terms of the focus points on the users, while marketed organizations do in terms of the policy demands to the public sector. In rural area, user-provision organizations act like provider-provision-organizations whereas they do market-way-organizations in the urban area. Research findings show that the social service provision types utilizing market mechanism(such as user-provision, and market-way) are not so well fit into the characteristics of rural area.

The composition and structure of Archival Information Packages(AIP) for a long-term preservation of electronic records (전자기록의 장기보존을 위한 보존정보패키지(AIP) 구성과 구조)

  • YIM, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.13
    • /
    • pp.41-90
    • /
    • 2006
  • It's needed for the archivists to design a flexible and stable ERMS(Electronic Records Management System) which can ingest and store records through a consistent way and let users search and use records easily what they want. The basis of the design for ERMS are the conceptual composition and the logical and physical structure of the records when they are stored and managed in the ERMS. This paper explains the process of defining components and designing structure of electronic records using 3-layered approaches which consist of conceptual, logical and physical layer and shows advantages of this approaches. After benchmarking the information models of OAIS which is a reference model for the long-term preservation of digital information objects, this paper applies the model of AIP to a record as a 'Record AIP' and discusses the composition and structure of it. It's a critical task to identify mandatory or optional metadata groups which consists of the 'Record AIP's in the conceptual layer. This paper emphases that the metadata group related to services for the record information to users is required as a result of benchmarking OAIS information models. Various issues about the structure of 'Record AIP's are discussed according to the kind of preservation strategy such as migration or emulation and whether the encapsulation of records is required or not in the logical layer.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.