• Title/Summary/Keyword: Protection time

Search Result 2,901, Processing Time 0.033 seconds

Investigation of aerodynamic behaviour of a high-speed train on different railway infrastructure scenarios under crosswind

  • Jiqiang, Niu;Yingchao, Zhang;Zhengwei, Chen;Rui, Li;Huadong, Yao
    • Wind and Structures
    • /
    • v.35 no.6
    • /
    • pp.405-418
    • /
    • 2022
  • The aerodynamic behaviour of a CRH high-speed train under three infrastructure scenarios (flat ground, embankment, and viaduct) in the presence of a crosswind was simulated using a 1/8th scaled train model with three cars and the IDDES framework. The time-averaged and instantaneous flow field around the model were examined. The employed numerical algorithm was verified through a wind tunnel test, and the grid and timestep resolution analyses were conducted to ensure the reliability of the data. It was noted that the flow around the rail line was different under different infrastructure scenarios, especially in the case of the embankment, which degraded the aerodynamic performance of the train under the crosswind. The flow around the train on the flat ground and viaduct was different, although the aerodynamic performance of the train was similar in both cases. Moreover, the viaduct accidents were noted to have the most critical consequences, thereby requiring the most attention. The aerodynamic performance of the train on the windward track of the embankment under the crosswind was worse than that of the train on the leeward track. But for the other two infrastructure scenarios, the aerodynamic performance of the train on the windward track is relatively dangerous, which is mainly caused by the head car. These observations suggest that the aerodynamic behaviour of the train on an embankment under a crosswind must be carefully considered and that certain wind protection measures must be adopted around rail lines in windy areas.

A Study on the Effects That SMEs' Response to Non-Tariff Barriers Exerts on Export Performance: Focusing on Technical Barriers to Trade

  • Joo, Se-Hwan;Lee, Jae-Sung
    • Journal of Korea Trade
    • /
    • v.25 no.6
    • /
    • pp.105-125
    • /
    • 2021
  • Purpose - This study analyzes the effects that the response to the technical barriers to trade (TBT), which are used by various countries as means to restrict imports, exerts on exports at a time when protectionism is emerging in the face of a global economic downturn. TBT has been widely used in developed countries for the safety and protection of their people. Recently, the use of TBT as a tool of protectionism has increased considerably in developing countries as well. Therefore, this study analyzes the South Korean SMEs' response and export performance. Design/methodology - To analyze SMEs' response to TBT and their export performance, this study conducted empirical analysis through statistical analysis. To this end, the research established a theory based on previous research and designed its hypothesis and research model. To verify the hypothesis and research model, factor analysis addressing validity and reliability was performed using SPSS 25 and AMOS 26, and the structural equation model was analyzed. Findings - This study found the causal relationship between the independent variable, the mediating variable, and the dependent variable adopted against the theoretical background to have little or no effect, in contrast with previous studies. In a break from previous studies, all hypotheses were rejected for innovation strategic competencies, one of the sub-factors of the independent variable, which is believed to be a result of the lack of practical research related to TBT. Originality/value - Previous studies performed analysis using trade statistics or macro data. A number of such studies analyzed the relationship between technical regulation and trade volume. This study differs from previous studies in some respects, because it analyzed the export performance of companies by establishing a hypothesis and implementing a research model with the factors analyzed in previous studies. In addition, a new attempt has been made by classifying the TBT response factors into technology competencies, human resource competencies, and innovation strategic competencies, and utilizing technology innovation and the export support system as mediating effects.

The direction of application of the RMF-based risk management system considering interoperability (상호운용성을 고려한 RMF 기반의 위험관리체계 적용 방향)

  • Kwon, Hyuk-Jin;Kim, Sung-Tae;Joo, Ye-na
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • The RMF (Cyber Security Risk Management Framework) is a more strengthened U.S. defense cybersecurity framework that is currently used throughout the U.S. federal government beyond the defense sector. In the past decade, the proportion of cyber warfare in non-regular warfare encountered by the United States, especially cyberattacks caused by China and North Korea, has been increasing. In the end, the U.S. is newly establishing an RMF system to prepare a more strengthened cybersecurity policy at the pan-government level, and the U.S. Department of Defense aims to expand the U.S. defense RMF evaluation policy beyond the federal government level. The South Korean military has already applied RMF at the request of the U.S. that notified the policy to apply RMF when obtaining F-35A. The application of RMF by the Korean military is no longer inevitable. Now is the time for the Korean military to seriously think about what to prepare for the early establishment of a successful Korean RMF system.

Effectiveness study of a cement mortar coating based on dune sand on the carbonation of concrete

  • Korichi, Youssef;Merah, Ahmed;Khenfer, Med Mouldi;Krobba, Benharzallah
    • Advances in concrete construction
    • /
    • v.13 no.4
    • /
    • pp.315-325
    • /
    • 2022
  • Reinforced concrete structures are exposed throughout their lifetime to the phenomenon of carbonation, which considerably influences their durability by causing corrosion of the reinforcements. The fight against this phenomenon is usually ensured by anti-carbonation coatings which have the possibility of limiting the permeability to carbon dioxide or with coatings which absorb the CO2 present in the air. A coating with good crack-bridging (sealing) capacity will prevent water from entering through existing cracks in concrete. Despite the beneficial effect of these coatings, their durability decreases considerably over time with temperature and humidity. In order to use coatings made from local materials, not presenting any danger, available in abundance in our country, very economical and easy to operate is the main objective of this work. This paper aim is to contribute to the formulation of a corrected dune sand-based mortar as an anti-carbonation coating for concrete. The results obtained show that the cement mortar based on dune sand formulated has a very satisfactory compressive strength, a very low water porosity compared to ordinary cement mortar and that this mortar allows an improvement in the protection of the concrete against the carbonation of 60% compared to ordinary cement mortar based on alluvial sand. Moreover, the formulated cement mortars based on dune sand have good adhesion to the concrete support, their adhesion strengths are greater than 1.5MPa recommended by the standards.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

Matrix Character Relocation Technique for Improving Data Privacy in Shard-Based Private Blockchain Environments (샤드 기반 프라이빗 블록체인 환경에서 데이터 프라이버시 개선을 위한 매트릭스 문자 재배치 기법)

  • Lee, Yeol Kook;Seo, Jung Won;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • Blockchain technology is a system in which data from users participating in blockchain networks is distributed and stored. Bitcoin and Ethereum are attracting global attention, and the utilization of blockchain is expected to be endless. However, the need for blockchain data privacy protection is emerging in various financial, medical, and real estate sectors that process personal information due to the transparency of disclosing all data in the blockchain to network participants. Although studies using smart contracts, homomorphic encryption, and cryptographic key methods have been mainly conducted to protect existing blockchain data privacy, this paper proposes data privacy using matrix character relocation techniques differentiated from existing papers. The approach proposed in this paper consists largely of two methods: how to relocate the original data to matrix characters, how to return the deployed data to the original. Through qualitative experiments, we evaluate the safety of the approach proposed in this paper, and demonstrate that matrix character relocation will be sufficiently applicable in private blockchain environments by measuring the time it takes to revert applied data to original data.

Experience of Disaster Response Team in Jecheon Sports Center Fire

  • Ha, Jeongmin;Kim, Hyun-Jung;Kim, Jin-Hwa;Park, Dahye
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.1
    • /
    • pp.39-48
    • /
    • 2022
  • Purpose : This study aimed to determine the experiences of the disaster response team 9 participants who participated in the disaster after the fire incident occurred in Jecheon Sports Center and their meaning and essence. Methods : Nine disaster response teams were the subjects of the study, and Individual in-depth interviews were conducted. Data were collected online between January 6 and April 30, 2021, from the software ZoomTM. This study was conducted as a qualitative study by applying Giorgi's phenomenological experiential research method, which has an advantage in revealing the essential structure and meaning of experience. Results : Three major themes were derived from the study results: the stimulus through unfamiliar experiences, the grievances due to work environment and regional characteristics, and dullness resulting from hiding and enduring. The following 17 sub-themes were identified: learning through unfamiliar experiences, frustration due to unexpected circumstances, shock from unfamiliar experiences, doing my best in the present, confidence due to increased experience, disunified system, intervention of various interests, the atmosphere that puts responsibility on others, inactive help, unforgettable regional characteristics, working without time to settle, tolerating it in my own way, memories left in the unconsciousness, sudden suffering from memories that come to mind, movement in anxiety and tension, dullness, work with colleagues in the same situation. Conclusion : This study is meaningful in that it attempted to provide basic data in preparing a long-term strategy for effective policy direction and institutional protection based on the systematic mental health management of the disaster response team. Additionally, this study's results can be used as primary data for future research among Disaster Response Team.

Efficiency Analysis of Security Management System of Affiliates of Conglomerate Using DEA-SBM Model (DEA-SBM 모형을 이용한 대기업 계열사 보안관리 체계 효율성 분석)

  • Jung, Hyuk;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.341-353
    • /
    • 2022
  • Conglomerates are strengthening cooperative relations by sharing information and dispatching manpower with each other to improve the overall competitiveness and technology of the group, including affiliates, and to enhance synergy. As a result, we are making every effort to increase the level of information protection of the entire group, but information leakage accidents that bypass affiliates and partner companies continue to occur. In addition, the results of the evaluation of the security management system of affiliates conducted by the parent company and the effectiveness of the actual security level have been raised. In addition, each company has limited resources that can be put into security management, so it is time for an more efficient security management system than ever before. In this study, the efficiency of operating the security management system of affiliates of steel companies is reviewed using the DEA-SBM model, and based on the analysis results, improvement measures to improve the level of security management are suggested.

A Proposal for Workers to Mandatorily Wear High-visibility Safety Clothing in Korea through the Analysis of the Current Status and Evaluation of Its Visibility (국내 고시인성 안전의복의 착용 현황 분석 및 시인성 평가를 통한 착용 의무화 제안)

  • Kang, Inhyeng;Choe, Byongho;Oh, Cheol;Youk, Ji Ho
    • Fashion & Textile Research Journal
    • /
    • v.24 no.4
    • /
    • pp.471-478
    • /
    • 2022
  • In roadside workplaces, more attention should be paid to the safety of workers. The roadside workers underestimate the effect of the brightness of their clothes and judge that drivers will recognize them easily, and the drivers misjudge that the roadside workers are far away and that the vehicle can be stopped in sufficient time. Therefore, customized safety education reflecting this and wearing work clothes with certified visibility functions are required. In Korea, it is not compulsory for roadside workers and vehicle guide attendants to wear work clothes with a visibility function. In this study, the distance ahead perceived by drivers was measured using manikins wearing certified and non-certified reflective safety vests. The perception distance of the non-certified reflective safety vest was 1.4 times longer than that of the certified reflective safety vest, thus confirming the importance of wearing a certified reflective safety vest. To prevent roadside workers from suffering traffic accidents, we propose the enactment of a law that makes it mandatory for them to wear high-visibility safety clothing. Specifically, Article 32 of the Enforcement Regulation of the Road Traffic Act should include high-visibility safety clothing in life protection equipment, and additionally, to prevent secondary accidents, we propose the enactment of a law requiring the installation and wearing of certified reflective safety vests in vehicles.

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.