• Title/Summary/Keyword: Effectiveness secure

Search Result 287, Processing Time 0.027 seconds

Study for Using VR Techniques Performance Evaluation of the Elevator Evacuation (VR기법을 활용한 엘리베이터 피난 성능평가에 관한 연구)

  • Ro, Se-Ho;Yoon, Sung-Wook;Rie, Dong-Ho
    • Fire Science and Engineering
    • /
    • v.25 no.1
    • /
    • pp.13-18
    • /
    • 2011
  • In the disaster prevention design, it is important point to secure escape way at event of fire which makes people away from the fire more quickly and safely. Development of construction techniques leads to build many skyscrapers, and skyscrapers contains various dangers and increase levels of disaster. At basic design stage for skyscrapers, evacuation scenario is considered that occupants are escape using escape stairs and emergency elevators simultaneously at fire, but there is no evacuation program to simulate using escape stairs and emergency elevators at the same time. In this study, evacuation simulation is performed using method of VR which is based on Virtools of 3DVIA Co., and Simulex of IES Co. for safety and effectiveness where occupants are escape using escape stairs and emergency elevators simultaneously at the fire.

Two-Stage Model for Security Network-Constrained Market Auction in Pool-Based Electricity Market

  • Kim, Mun-Kyeom
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.6
    • /
    • pp.2196-2207
    • /
    • 2017
  • This paper presents a two-stage market auction model in a pool-based electricity market, which explicitly takes into account the system network security. The security network-constrained market auction model considers the use of corrective control to yield economically efficient actions in the post-contingency state, while ensuring a certain security level. Under this framework, the proposed model shows not only for quantifying the correlation between secure system operation and efficient market operation, but also for providing transparent information on the pricing system security for market participants. The two-stage market auction procedure is formulated using Benders decomposition (BD). In the first stage, the market participants bid in the market for maximizing their profit, and the independent system operator (ISO) clears the market based on social welfare maximization. System network constraints incorporating post-contingency control actions are described in the second stage of the market auction procedure. The market solutions, along with the BD, yield nodal spot prices (NSPs) and nodal congestion prices (NCPs) as byproducts of the proposed two-stage market auction model. Two benchmark systems are used to test and demonstrate the effectiveness of the proposed model.

A Study on the Inhabitant's Satisfaction of Community Facilities Demonstration Project for Rural Elderly (농촌 고령자 공동시설지원 시범사업 주민만족도 조사 연구)

  • Kim, Jin-Hwan;Park, Chung-Shin;Song, Seo-Ho
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.17 no.4
    • /
    • pp.9-16
    • /
    • 2015
  • This study examined the current conditions of the community facilities constructed by demonstration project for rural elderly that were promoted for the last two years by the ministry of agriculture, food and rural affairs. The type of community facilities are community living home, community food service facility and small bath house. And it was accomplished satisfaction survey for analyzing the effects of demonstration project focused on inhabitants and users of community facilities constructed by demonstration project. The results are as follows. First, The satisfaction index of community facilities was evaluated high level in generally. Second, Inhabitants and users of facilities were presented high level satisfaction in humanity sector, especially. Third, It should be to establish maintenance and management plan such as supporting of linkage program and operation cost for secure the sustainability. Consequently, the implementation of community facilities demonstration project to improve the living conditions of rural elderly is entirely appropriate. The results of this study were considered to promoting demonstration project for improving quality of the facilities and securing effectiveness of the project.

Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software (전자정부 소프트웨어의 보안약점 진단도구 평가방법론)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.335-343
    • /
    • 2013
  • If the SW weaknesses, which are the main cause of cyber breaches, are analyzed and removed in the SW development stages, the cyber breaches can be prevented effectively. In case of Domestic, removing SW weaknesses by applying Secure SDLC(SW Development Life Cycle) has become mandatory. In order to analyze and remove the SW weaknesses effectively, reliable SW weakness diagnostic tools are required. Therefore, we propose the functional requirements of diagnostic tool which is suitable for the domestic environment and the evaluation methodology which can assure the reliability of the diagnostic tools. Then, to analyze the effectiveness of the proposed evaluation framework, both demonstration results and process are presented.

The Varies of Deviation on the Ship's Head up bearing of the electromagnetic Compass around Ship (선체 주변에서의 전자자기 컴퍼스의 선수방위 자차변화)

  • 조현정;신형일
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.35 no.1
    • /
    • pp.11-18
    • /
    • 1999
  • In order to secure accuracy and effectiveness of the electromagnetic compass as information sensor for ship's head up bearing with gyro compass, magnetic compass and electromagnetic compass on the sea and on the dock in land.The results obtained were as follows;1. Between the Northeast and the southsouthwest the deviation on ship's head up bearing on electromagnetic compass got easterly deviation with max. $53^{\cire}$on the East and between the Southwest and the Northnortheast westerly deviation with max. $34^{\cire}$ on the Northwest, of which values were not able to be corrected due to the angle excess of deviation adjustment.2. The varies of deviation seemed to have a tendency to increase easterly deviation on the Northeast and the East, easterly deviation after westerly deviation between the South and the Northwest, small one on the North and the Southeast.3. The varies of deviation of ship were larger than the one of around the dock, were extreme on the bow of forecastle deck and were stable on the ship's center line of compass deck at the dock in land.

  • PDF

A Study of Improved Session Management for Mobile Web under BYOD environment (BYOD 환경을 고려한 모바일 웹을 위한 세션 관리 개선 방안 연구)

  • Kim, Young-hun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1117-1124
    • /
    • 2015
  • This paper explains a web session management system for mobile web environment with BYOD(Bring Your Own Device). This system operates by enhanced secure session token. This system consists of an unique identifier, time stamp, and encryption algorithm. The Unique identifier in this system classifies each mobile device for web security based on mobile environment with BYOD. And the Time stamp in this system that determine session effectiveness for web security. Also the Cipher algorithm in this system that protects session token information for web security. This paper analysis a security of session management system running on mobile web environment using the simulation techniques. The proposed method is more suitable than the other methods under enviroment mobile web environment with BYOD.

Vibration control in wind turbines for performance enhancement: A comparative study

  • Rezaee, Milad;Aly, Aly Mousaad
    • Wind and Structures
    • /
    • v.22 no.1
    • /
    • pp.107-131
    • /
    • 2016
  • The need for a more affordable, reliable, clean and secure energy has led to explorations in non-traditional sources, particularly renewable energies. Wind is one of the cleanest energy sources that plays a significant role in augmenting sustainability. Wind turbines, as energy convertors, are usually tall and slender structures, and depending on their location (inland or offshore), they can be subject to high wind and/or strong wave loadings. These loads can cause severe vibrations with detrimental effects on energy production, structural lifecycle and initial cost. A dissipativity analysis study was carried out to know whether wind turbine towers require damping enhancement or rigidity modifications for vibration suppression. The results suggest that wind turbines are lightly damped structures and damping enhancement is a potential solution for vibration lessening. Accordingly, the paper investigates different damping enhancement techniques for vibration mitigation. The efficacy of tuned mass damper (TMD), tuned liquid column damper (TLCD), tuned sloshing damper (TSD), and viscous damper (VD) to reduce vibrations is investigated. A comparison among these devices, in terms of robustness and effectiveness, is conducted. The VD can reduce both displacement and acceleration responses of the tower, better than other types of dampers, for the same control effort, followed by TMD, TSD, and finally TLCD. Nevertheless, the use of VDs raises concerns about where they should be located in the structure, and their application may require additional design considerations.

Study of Information Hiding Methods for SONAR Images in the Naval Combat System (정보은닉기법을 적용한 함정 전투체계 소나 영상의 정보관리 방안 연구)

  • Lee, Joon-Ho;Shin, Sang-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.779-788
    • /
    • 2015
  • The SONAR waterfall image(SWI) is used typically to target detection in SONAR operation and is managed with additional data linked in the naval combat system. The SWI and additional data are very important to classify a kind of target. Although additional data of the SWI is essential and must be kept together with the SWI, it was stored separately in the current system. In this paper, we propose an improved information management method in the naval combat system, where additional data can be contained in the SWI together by using information hiding techniques. The experimental results show that the effectiveness of information hiding techniques in the naval combat system. It is demonstrated that the information hiding techniques can be applied to the SWI that can make the naval combat system to be robust and secure.

Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks

  • Shivalingagowda, Chaya;Jayasree, P.V.Y;Sah, Dinesh.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1929-1950
    • /
    • 2020
  • Reliable and secure data transmission in the application environment assisted by the wireless sensor network is one of the major challenges. Problem like blind forwarding and data inaccessibility affect the efficiency of overall infrastructure performance. This paper proposes routing protocol for forwarding and error recovery during packet loss. The same is achieved by energy and hops distance-based formulation of the routing mechanism. The reachability of the intermediate node to the source node is the major factor that helps in improving the lifetime of the network. On the other hand, intelligent hop selection increases the reliability over continuous data transmission. The number of hop count is factor of hop weight and available energy of the node. The comparison over the previous state of the art using QualNet-7.4 network simulator shows the effectiveness of proposed work in terms of overall energy conservation of network and reliable data delivery. The simulation results also show the elimination of blind forwarding and data inaccessibility.

Improved Effects of Reinforced Wall with Types of Connection Methods (보강재 연결 유.무에 따른 보강토옹벽의 보강효과)

  • 신은철;최찬용
    • Geotechnical Engineering
    • /
    • v.14 no.5
    • /
    • pp.67-76
    • /
    • 1998
  • The commonly used method to secure the stability of reinforced retaining structure is the reinfocement of backfill with connection attached or unattached to the geogrid type wall. Laboratory model tests for both cartes were conducted to investigate the effectiveness of geogridreinforcement, length of reinforcement inclusion, failure envelop, and the relationships between the face wall displacement and vertical settlement. The bearing capacity of each case was also determined. According to the model test results, geogrid-reinforced rigid wall is very effective for increasing the bearing capacity and reducing the displacement of retaining wall. The observed sliding line of model test is similar to the theoretical one.

  • PDF