• Title/Summary/Keyword: 위험도 행렬

Search Result 32, Processing Time 0.027 seconds

Development of The Criticality Evaluation System for Rare Metals Stockpiling (희유금속 비축 적정성 평가체계 수립)

  • Kim, Yu-Jeong;Kim, Dae-Hyung;Kim, Jinsoo;Kim, Juhan
    • Resources Recycling
    • /
    • v.27 no.3
    • /
    • pp.66-77
    • /
    • 2018
  • The import amount of rare metal in Korea is about 6,034 million USD, but the self-sufficiency of rare metals is about only 1%. In order to secure the stable supply of rare metals, it is necessary to operate an efficient stockpile system. In this study, we established a system to assess the adequacy of stockpiles by quantifying the risk factors of tangible and intangible risks in order to establish an efficient stockpile strategy. The model developed in this study aims to select the rare metals that need to be stockpiled first and to suggest the direction of the stockpiling policy in accordance with technological change and market change from the mid and long term viewpoint. The evaluation results derived from the model can quantitatively measure the security level of each rare metal and enable relative comparison between the rare metals using criticality matrix. Therefore, it is expected that more efficient stockpile policy will be possible if the proposed model is utilized in the future policy making.

A Study on the OTP Generation Algorithm for User Authentication (사용자 인증에 적합한 OTP 생성 알고리즘에 관한 연구)

  • Kim, Dong-Ryool
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.283-288
    • /
    • 2015
  • A disposable password is necessary to avoid any danger by the use of a static password and reinforce the user's authentication. In order to prevent personal information from being exposed, OTP generation algorithm is regarded as important. The OTP generation algorithm we suggest in this thesis generates 256-bit-size OTP Data by using Seed value and Time value. This value that the generated OTP Data are arranged with a matrix and a 32-bit-value is extracted on an irregular basis becomes the final value. We can find out that the more OTP generation frequency we have, the lower probability of clash tolerance we get in our suggested algorithm, compared to the previous algorithm.

Mapping Technique for Flood Vulnerable Area Using Surface Runoff Mechanism (지표유출메커니즘을 활용한 홍수취약지구 표출 기법)

  • LEE, Jae-Yeong;HAN, Kun-Yeun;KIM, Hyun-Il
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.4
    • /
    • pp.181-196
    • /
    • 2019
  • Floods can be caused by a variety of factors, and the main cause of floods is the exceeding of urban drainage system or river capacity. In addition, rainfall frequently occurs that causes large watershed runoff. Since the existing methodology of preparing for flood risk map is based on hydraulic and hydrological modeling, it is difficult to analyse for a large area because it takes a long time due to the extensive data collection and complex analysis process. In order to overcome this problem, this study proposes a methodology of mapping for flood vulnerable area that considered the surface runoff mechanism. This makes it possible to reduce the time and effort required to estimate flood vulnerabilities and enable detailed analysis of large areas. The target area is Seoul, and it was confirmed that flood damage is likely to occur near selected vulnerable areas by verifying using 2×2 confusion matrix and ROC curve. By selecting and prioritizing flood vulnerable areas through the surface runoff mechanism proposed in this study, the establishment of systematic disaster prevention measures and efficient budget allocation will be possible.

A Study on the Measurement of Knowledge Relatedness Density and Technological Complexity in South-east Region (동남권 지역의 지식 간 연관성 밀도와 기술 복합성 측정에 관한 연구)

  • Park, Gi-Woong;Kim, Donghyun
    • Journal of the Korean Regional Science Association
    • /
    • v.37 no.3
    • /
    • pp.3-18
    • /
    • 2021
  • The fourth Industrial Revolution is transforming the industrial structure of the region, and it is necessary to develop new industries and technologies that reflect regional characteristics. The purpose of this study is to measure the knowledge relatedness and technological complexity in Busan, Ulsan, and Gyeongnam, and to identify technologies with potential for regional industrial differentiation strategies. Using patent data from 2015 to 2019, co-occurrence matrices were derived from 652 IPC codes, and the knowledge relatedness density and technology complexity index were calculated. Network analysis was performed using the knowledge relatedness density. As a result of analysis, it was found that mechanical engineering occupied a large proportion, followed by chemistry and electrical engineering. As a result of applying the risk-benefit framework to derive technologies with the potential to differentiate local industries, the technological capabilities of low-risk-high-benefit were different. Among mechanical engineering, technologies such as engine, machine operation, and transportation were included in Busan. In Ulsan, environmental technology in chemical and materials, and heat treatment technology in mechanical engineering were technologies with low-risk and high-benefit capabilities. Gyeongnam showed competence in mechanical engineering, chemistry, and electrical engineering in some areas such as Gimhae, Yangsan, and Changwon. The results of this study are meaningful in that they identified technologies with potential for selecting and deriving strategic industries for regional growth based on latent knowledge in the region.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Development of Fault Prediction System Using Peak-code Method in Power Plants (피크코드 기법을 이용한 발전설비 고장예측 시스템 개발)

  • Roh, Chang-Su;Do, Sung-Chan;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.4
    • /
    • pp.329-336
    • /
    • 2008
  • The facilities with new technologies in the recent power plants become larger and need a lot of high cost for maintenance due to stop operations and accidents from the operating machines. Therefore, it claims new systems to monitor the operating status and predict the faults of the machines. This research classifies the normal/abnormal status of the machines into 5 levels which are normal-level/abnormal-level/care-level/dangerous-level/fault and develops the new system that predicts faults without stop operation in power plants. We propose the regional segmentation technique in the frequency domain from the data of the operating machines and generate the Peak-codes similar to the Bar-codes, The high efficient and economic operations of the power plants will be achieved by carrying out the pre-maintenance at the care level of 5 levels in the plants. In order to be utilized easily at power plants, we developed the algorithm appling to a notebook computer from signal acquisition to the discrimination.

  • PDF

Object Position Estimation and Optimal Moving Planning of Mobile Manipulator based on Active Camera (능동카메라기반 이동매니퓰레이터의 물체위치추정 및 최적동작계획)

  • Jin, Tae-Seok;Lee, Jang-Myung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.5 s.305
    • /
    • pp.1-12
    • /
    • 2005
  • A Mobile manipulator - a serial connection of a mobile robot and a task robot - is a very useful system to achieve various tasks in dangerous environment. because it has the higher performance than a fixed base manipulator in regard to the size of it's operational workspace. Unfortunately the use of a mobile robot introduces non-holonomic constraints, and the combination of a mobile robot and a manipulator generally introduces kinematic redundancy. In this paper, first a method for estimating the position of object at the cartesian coordinate system acquired by using the geometrical relationship between the image captured by 2-DOF active camera mounted on mobile robot and real object is proposed. Second, we propose a method to determine a optimal path between current the position of mobile manipulator whose mobile robot is non-holonomic and the position of object estimated by image information through the global displacement of the system in a symbolic way, using homogenous matrices. Then, we compute the corresponding joint parameters to make the desired displacement coincide with the computed symbolic displacement and object is captured through the control of a manipulator. The effectiveness of proposed method is demonstrated by the simulation and real experiment using the mobile manipulator.

FEM Numerical Formulation for Debris Flow (토석류 유동해석을 위한 유한요소 수식화)

  • Shin, Hosung
    • Journal of the Korean Geotechnical Society
    • /
    • v.30 no.10
    • /
    • pp.55-65
    • /
    • 2014
  • Recent researches on debris flow is focused on understanding its movement mechanism and building a numerical simulator to predict its behavior. However, previous simulators emulating fluid-like debris flow have limitations in numerical stability, geometric modeling and application of various boundary conditions. In this study, depth integration is applied to continuity equation and force equilibrium for debris flow. Thickness of sediment, and average velocities in x and y flow direction are chosen for main variables in the analysis, which improve numerical stability in the area with zero thickness. Petrov-Galerkin formulation uses a discontinuous test function of the weighted matrix from DG scheme. Presented mechanical constitutive model combines fluid and granular behaviors for debris flow. Effects on slope angle, inducing debris height, and bottom friction resistance are investigated for a simple slope. Numerical results also show the effect of embankment at the bottom of the slope. Developed numerical simulator can assess various risk factors for the expected area of debris flow, and facilitate embankment design in order to minimize damage.

Development of a Korean Adult Female Voxel Phantom, VKH-Woman, Based on Serially Sectioned Color Slice Images (고해상도 연속절단면 컬러해부영상을 이용한 한국인 성인여성 복셀팬텀 VKH-Woman 개발)

  • Jeong, Jong Hwi;Yeom, Yoen Soo;Han, Min Cheol;Kim, Chan Hyeong;Ham, Bo Kyoung;Hwang, Sung Bae;Kim, Seong Hoon;Lee, Dong-Myung
    • Progress in Medical Physics
    • /
    • v.23 no.3
    • /
    • pp.199-208
    • /
    • 2012
  • The computational human phantom including major radiation sensitive organs at risk (OARs) can be used in the field of radiotherapy, such as the variation of secondary cancer risks caused by the radiation therapy and the effective dose evaluation in diagnostic radiology. The present study developed a Korean adult female voxel phantom, VKH-Woman, based on serially sectioned color slice images of Korean female cadaver. The height and weight of the developed female voxel phantom are 160 cm and 52.72 kg, respectively that are virtually close to those of reference Korean female (161 cm and 54 kg). The female phantom consists of a total of 39 organs, including 27 organs recommended in the ICRP 103 publication for the effective dose calculations. The female phantom composes of $261{\times}109{\times}825$ voxels (=23,470,425 voxels) and the voxel resolution is $1.976{\times}1.976{\times}2.0619mm^3$ in the x, y, and z directions. The VHK-Woman is provided as both ASCII and Binary data formats to be conveniently implemented in Monte Carlo codes.

A Method for Locating Bus Stops Considering Traffic Safety at Signalized Intersections (교통안전을 고려한 신호교차로 버스정류장 설치방법에 관한 연구)

  • Lee, Jung-Hwan;Kwon, Sung-Dae;Park, Je-Jin;Ha, Tae-Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.4D
    • /
    • pp.527-538
    • /
    • 2011
  • Currently, the only established criteria is on the location of bus stops on principal roads where uninterrupted flow mainly occurs. There are no clear guidelines on any method to locating bus stops considering the characteristics of bus operation and pedestrians. If the location or exterior of a bus stop is inappropriate, road users including bus drivers and pedestrians will be caused serious dangerous and inconvenience. In this study, the research below was performed in order to propose rational criteria for the location of bus stops integrated with or separated from speed-change lanes at signalized intersections considering smooth traffic flow and the characteristics of bus operation and pedestrians as well as traffic safety : First, the appropriate length of each of the near-side and far-side bus stops was calculated by categorizing bus stops to be constructed into those integrated with speed-change lanes and those separated from speed-change lanes. Secondly, the appropriate length of each of the bus stops divided into near-side bus stops and far-side bus stops and integrated with or separated from speed-change lanes was selected by considering the characteristics of pedestrians. Thirdly, whether the construction locations of bus stops were appropriate or not was determined based on the appropriate length of bus stops integrated with or separated from speed-change lanes, which was calculated and selected by considering traffic flow and the characteristics of pedestrians and considering traffic safety. The method for locating bus stops considering traffic flow, the characteristics of pedestrians, and traffic safety will be able to help suggestion criteria of bus stop and the location of safe and pleasant bus stops.