• Title/Summary/Keyword: Maritime equipment

Search Result 674, Processing Time 0.022 seconds

A Development of Welding Information Management and Defect Inspection Platform based on Artificial Intelligent for Shipbuilding and Maritime Industry (인공지능 기반 조선해양 용접 품질 정보 관리 및 결함 검사 플랫폼 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Woo, Yun-Tae;Yoon, Young-Wook;Shin, Sung-chul;Oh, Sang-jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.193-201
    • /
    • 2021
  • The welding has a high proportion of the production and drying of ships or offshore plants. Non-destructive testing is carried out to verify the quality of welds in Korea, radiography test (RT) is mainly used. Currently, most shipyards adopt analog-type techniques to print the films through the shoot of welding parts. Therefore, the time required from radiography test to pass or fail judgment is long and complex, and is being manually carried out by qualified inspectors. To improve this problem, this paper covers a platform for scanning and digitalizing RT films occurring in shipyards with high resolution, accumulating them in management servers, and applying artificial intelligence (AI) technology to detect welding defects. To do this, we describe the process of designing and developing RT film scanning equipment, welding inspection information integrated management platform, fault reading algorithms, visualization software, and testing and verification of each developed element in conjunction.

Development of Interlocking Signal Simulator for Verification of Naval Warship Engineering Control Logics (함정 통합기관제어체계의 제어로직 검증을 위한 연동신호 시뮬레이터 개발)

  • Lee, Hunseok;Son, Nayoung;Shim, Jaesoon;Oh, Jin-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1103-1109
    • /
    • 2021
  • ECS is a control device so that the warship can perform the mission stably by controlling and monitoring the entire propulsion system. As the recent provisions of the warship, it's propelling system is complicated than past, as the demand performance and mission of the warships are diverse. In accordance with the complicated propulsion system configuration, the demand for automatic control function of the ECS is increasing for convenient and stable propulsion system control for convenient and stable. As a result, verification of ECS stability and reliability is required. In this paper, we develop an interlocking signal simulator for verifying ECS control logic and communication protocol for warship with CODLOG propulsion systems. The simulator developed was implemented to simulate a signal of gas turbine, propulsion motors, diesel generator and 11 kinds of auxiliary equipment. The reliability of ECS was verified through the ECS communication program and the I/O signal static test with the simulator.

Case Study on the Bogie Arrangement of the Load-out System for On-ground Shipbuilding (선박 육상건조를 위한 로드-아웃 시스템의 보기 배치 사례 연구)

  • Hwang, John-Kyu;Ko, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.1
    • /
    • pp.153-160
    • /
    • 2022
  • This study presents the bogie arrangement of the load-out system for on-ground shipbuilding. The load-out system is one of the most important systems to perform the bogie arrangement of the on-ground shipbuilding technique without dry dock facilities, and this system is composed of four pieces of equipment: bogies, driving bogie with motors, trestles, and power packs. Also, the bogie arrangement analysis (BAA) is employed to simply calculate the reaction forces at the trestle for structural safety. In this context, the purpose of this study is to propose an optimal design method to perform the bogie arrangement satisfying structural safety requirements with minimal cost. It is expected that the proposed methodology will contribute to the effective practice as well as to the improvement of competitive capability for shipbuilding companies at the on-ground shipbuilding stage. Furthermore, we describe some problems and their solutions of the deformation that may occur in the bottom of the hull during the load-out process. As a result, it is shown that we applied it to the 114K crude oil tanker (Minimum bogie 54EA) and the 174K CBM LNG carrier (Minimum bogie 88EA), it can minimize the number of bogie and critical risks (Safety rate 1.61) during the load-out of on-ground shipbuilding. Through this study, the reader will be able to learn successful load-out operation and economic shipbuilding in the future.

Development of Foundation Structure for 8MW Offshore Wind Turbine on Soft Clay Layer (점토층 지반에 설치 가능한 8MW급 해상풍력발전기 하부구조물 개발)

  • Seo, Kwang-Cheol;Choi, Ju-Seok;Park, Joo-Shin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.2
    • /
    • pp.394-401
    • /
    • 2021
  • The construction of new renewable energy facilities is steadily increasing every year. In particular, the offshore wind farm market, which has abundant development scalability and a high production coefficient, is growing rapidly. The southwest sea has the highest possible offshore wind power potential, and related projects are to be promoted. This study presents a basic design procedure by the EUROCODE and considers structural safety in the development of an effective of shore wind foundation in the clay layer. In a previous study, the wind power generator of 5MW class was the main target, but the 8MW of wind turbine generator, which meets the technical trend of the wind turbine market in the Southwest sea, was selected as the standard model. Furthermore, a foundation that fulfills the geological conditions of the Southwest sea was developed. The structural safety of this foundation was verified using finite element method. Moreover, structural safety was secured by proper reinforcement from the initial design. Based on the results of this study, structural safety check for various types of foundations is possible in the future. Additionally, specialized structural design and evaluation guidance were also established.

Structural Safety Assessment of Tie-down for Securing Helicopter (헬리콥터 고정용 안전장치 구조 안전성 평가)

  • Myung Su Yi;Kwang-Chul Seo;Joo Shin Park
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.4
    • /
    • pp.372-379
    • /
    • 2023
  • International oil prices are expected to increase from $85 a barrel this year to up to $100 a barrel in the second half of the year; this is likely to increase orders for offshore plants in the global market. One main characteristic of offshore plants is that a large helideck is located on the top side, and aluminum alloys are used as the basic material of the structure for weight reduction and corrosion resistance. Shipowners are increasing the size of helicopters to quickly evacuate lives in the event of an emergency, and the safety use load of devices that can stably secure helicopters to the deck is also required to increase. Owing to the nature of the aluminum material, the structural strength caused by welding is greatly reduced; therefore, the fixing device must be designed by embedding it in the deck and fixing it with bolts. In this study, a model applying aluminum alloy 6082-T6 was developed to develop a helicopter fastening device that can be used for large helidecks (diameter = 28 m). The developed item was verified through nonlinear structural strength calculation to satisfy the load used for the actual fastening condition. The load condition with a 45° showed a lower ultimate strength than the 90° case owing to local plastic collapse. The nonlinear structural collapse behavior showed a result similar to that of the experimental test. The main contents derived from this study are considered to be reference materials when evaluating the structural strength of similar aluminum equipment.

Measurement and Quality Control of MIROS Wave Radar Data at Dokdo (독도 MIROS Wave Radar를 이용한 파랑관측 및 품질관리)

  • Jun, Hyunjung;Min, Yongchim;Jeong, Jin-Yong;Do, Kideok
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.32 no.2
    • /
    • pp.135-145
    • /
    • 2020
  • Wave observation is widely used to direct observation method for observing the water surface elevation using wave buoy or pressure gauge and remote-sensing wave observation method. The wave buoy and pressure gauge can produce high-quality wave data but have disadvantages of the high risk of damage and loss of the instrument, and high maintenance cost in the offshore area. On the other hand, remote observation method such as radar is easy to maintain by installing the equipment on the land, but the accuracy is somewhat lower than the direct observation method. This study investigates the data quality of MIROS Wave and Current Radar (MWR) installed at Dokdo and improve the data quality of remote wave observation data using the wave buoy (CWB) observation data operated by the Korea Meteorological Administration. We applied and developed the three types of wave data quality control; 1) the combined use (Optimal Filter) of the filter designed by MIROS (Reduce Noise Frequency, Phillips Check, Energy Level Check), 2) Spike Test Algorithm (Spike Test) developed by OOI (Ocean Observatories Initiative) and 3) a new filter (H-Ts QC) using the significant wave height-period relationship. As a result, the wave observation data of MWR using three quality control have some reliability about the significant wave height. On the other hand, there are still some errors in the significant wave period, so improvements are required. Also, since the wave observation data of MWR is different somewhat from the CWB data in high waves of over 3 m, further research such as collection and analysis of long-term remote wave observation data and filter development is necessary.

A Study on the Utilization of Naval Personnel According to Characteristics of New Generations: Discussion from the Perspective of Generation Z, a Newly Emerging Generation (신세대의 특성에 따른 해군 인력 활용의 과제 - 또 다른 신세대, Z세대 관점에서의 고찰)

  • Min, Seung-Un;Kim, Seong-Yeol
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.57-82
    • /
    • 2022
  • The objective of this treatise is to explore the limitations of the current navy manpower utilization system and the ways to improve it from the perspective of Generation Z. As Generation Z, following Millennials, has finally come of age, this new group is constituting a gradually greater proportion of military personnel. Due to the typical characteristics of naval operations, the harmony between Millennials and Generation Z, which is differentiated from Generation X in view of dispositions and traits, is one of the essential issues to be discussed. Generally, in a naval vessel, there are numerous pieces of equipment necessary to carry out a wide range of missions and a large number of crew members who operate them with consistent levels of fighting power. This is all while members are living together within the narrow space throughout the 24 hours of each day. Under such particular circumstances, any inter-generational conflicts may have a disruptive effect on the successful accomplishment of naval missions. Currently, new generations of military personnel are facing social difficulties in different aspects compared with the previous generations, and also have different viewpoints on the military. In this regard, in order to foster true harmony between generations, it is considered necessary to take a closer look at the inter-generational differences from their respective standpoints and to examine whether the military organization has taken adequate steps to respond to such changes. Accordingly, Chapters 1 and 2 cover the environments in which Millennials and Generation Z were raised during their childhood to young adulthood, which are distinct from those of older generations, their viewpoints formed based on such backgrounds, and the need to resolve various conflicts between generations. In Chapter 3, the current actions taken by overseas military powers to enhance the coexistence with Generation MZ are analyzed to find the significant implications they had. Chapter 4 examines the operation environments specific to the navy; identifies the potential barriers to achieving harmony between generations by assessing the current status of personnel utilization in the Korean navy in terms of the seaman, petty officer, and the officer, as well as policy; and outlines the solutions to drive harmony. Finally, Chapter 5 emphasizes the need to establish a genuine empathy between generations based on the understanding of unique inter-generational characteristics. This section also discusses the importance of addressing difficulties in utilizing technology-centered naval manpower, and forecasts a scenario of a naval organization that resolves the problem of utilizing naval personnel and the inter-generational conflicts in the future.

  • PDF

Study on the Patterns of Helicopter Emergency Medical Services in Ullung Island (울릉도 지역의 헬리콥터를 이용한 응급환자 후송 실태)

  • Kim, Tae-Hun;Lim, Hyun-Sul;Lee, Kwan
    • Journal of agricultural medicine and community health
    • /
    • v.27 no.1
    • /
    • pp.115-123
    • /
    • 2002
  • Objective: The aim of this study was to evaluate the patterns of helicopter emergency medical services (HEMS) in Ullung Island. Methods : The authors reviewed the records from emergency room diaries and the lists of helicopter transfers in the Ullung Public Health Medical Center over the 5-year period from Jan 1, 1997 to Dec 31, 2001. Results : One hundred thirteen cases were transferred by helicopters in 88 flights. According to year, the number of flights was 13(14.8%) and the number of cases was 15(13.3%) in 1997; 17(19.3%) and 21(18.6%) in 1998; 18(20.5%) and 20(17.7%) in 1999; 17(19.3%) and 20(17.7%) in 2000; and 23(26.1%) and 37(32.7%) in 2001. According to the kind of helicopter, the number of flights was 46(52.3%) and the number of cases was 60(53.1%) by Maritime police; and 19(21.6%) and 28(25.1%) by 119 rescue. According to time zone, there were no night flights. According to sex and age, there were 75 male cases(66.4%) and 28 cases(28.3%) of patients aged sixty years and over. The number of flights was 11(12.5%) and the number of cases was 15(13.3%) in November; 10 flights(11.4%) and 14 cases(12.4%) in March; and 7 cases(8.0%) in each of September, October and April. The most common season of helicopter transfer cases was autumn. According to transfer area, there were 48 cases (42.5%) in Pohang city, Gyeonsangbukdo; 35(31.0%) in Gangnung city, Gangwondo; and 17(15.0%) in Daegu metropolitan city. According to condition, there were 27 cases(23.9%) of cerebro-vascular accident, 13(11.5%) of fracture and 11(9.7%) of head injury. According to admission department, there were 42 cases(37.2%) in Neurosurgery, 21(18.6%) in Internal Medicine and 13(11.5%) in Orthopedic Surgery. According tothe Korea Standard Classification of Disease(3-KSCD), circulatory systemic disease(IX) and injury, intoxication and others (XIX) were the two most frequent categories with 34 cases(30.1%) each, followed by digestive system disease (XI) with 23 cases(20.4%). Conclusions : HEMS in Ullung Island leave much to be desired. Helicopters cannot make a night flight and are not equipped with medical facilities. HEMS in islands such as Ullung Island are essential. We hope that night flights, equipment-monitoring systems for emergency patients in the helicopters, and a law related to HEMS in the island will all be established.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.