• Title/Summary/Keyword: Safety System

Search Result 17,691, Processing Time 0.044 seconds

A Data Factorization Study for the Application of Digital Twin Technology to Container Ports (컨테이너 항만의 디지털 트윈 기술 적용을 위한 데이터 요인화 연구)

  • Nam, Jung-Woo;Kim, Yul-Seong;Shin, Young-Ran
    • Journal of Navigation and Port Research
    • /
    • v.46 no.1
    • /
    • pp.42-56
    • /
    • 2022
  • Due to the 4th Industrial Revolution announced at the Davos Forum, the World Economic Forum, in 2016, industrial trends around the world are changing rapidly and intelligently. Among them, the digital twin is drawing attention from all industries as a groundbreaking technology that reduces unnecessary costs and trial and error by implementing real objects, systems, and environments in the same way in the real virtual world and using them to perform simulation analysis. In particular, there is a lot of interest in the application of digital twin technology in solving ports safety and efficiency challenges at once. However, there is a lack of in-depth research for the application of digital twin technology in the port, and in particular, there is a lack of research on measurable data for the implementation of the digital twin in ports. The purpose of this study was to increase granularity and connectivity through measurable data investigation for the application of digital twin technology at container ports. Based on the study results, data factors for container port application were classified into crane data, operational data, physical data, and transportation data, and factor composition, correlation with factors, and fitness were confirmed through confirmatory factor analysis.

Thermo-hydraulic Numerical Analysis for the Leakage of Buried District Heating Pipe (열수송관의 누수에 대한 열-수리적 수치해석)

  • Shin, Hosung;Hong, Seung-Seo
    • Journal of the Korean Geotechnical Society
    • /
    • v.38 no.3
    • /
    • pp.17-26
    • /
    • 2022
  • Domestic district heating system needs safety management guidelines using the change of surface temperature to detect damages to buried heat pipes. This paper performed numerical analyses on the temperature change of ground surface due to the burial and leakage of heat pipes. Temperature difference between the ground surface above the buried heat pipes and the surrounding surface rises to a crescendo between 3 am and 8 am. It is more significant in winter rather than in summer. Low groundwater level magnifies the temperature increase of the ground surface by the heat pipe, which is smaller in the asphalt pavement than in the bare soil. Without leakage of the buried heat pipe, the temperature increment on the ground surface by the heat pipe is within 3.0℃ in the bare soil and 3.5℃ in the asphalt pavement. Leakage of the supply heat pipe in the bare soil increases the temperature on the ground surface gradually in the summer but rapidly in the winter. Asphalt pavement shows a lower increment and increasing rate of the temperature on the ground surface due to pipe leakage than bare soil surface. And leakage on both sides of the supply pipe takes 1-2 days for the temperature difference from the surrounding soil surface to reach 10℃.

Leading, Coincident, Lagging INdicators to Analyze the Predictability of the Composite Regional Index Based on TCS Data (지역 경기종합지수 예측 가능성 검토를 위한 TCS 데이터 선행·동행·후행성 분석 연구)

  • Kang, Youjeong;Hong, Jungyeol;Na, Jieun;Kim, Dongho;Cheon, Seunghun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.209-220
    • /
    • 2022
  • With the worldwide spread of African swine fever, interest in livestock epidemics has increased. Livestock transport vehicles are the main cause of the spread of livestock epidemics, but there are no empirical quarantine procedures and standards related to the mobility of livestock transport vehicles in South Korea. This study extracted the trajectory of livestock-related vehicles using the facility-visit history data from the Korea Animal Health Integrated System and the DTG (Digital Tachograph) data from the Korea Transportation Safety Authority. The results are presented as exposure indices aggregating the link-time occupancy of each vehicle. As a result, 274,519 livestock-related vehicle trajectories were extracted, and the exposure values by link and zone were derived quantitatively. This study highlights the need for prior monitoring of livestock transport vehicles and the establishment of post-disaster prevention policies.

Experience Design Guideline for Smart Car Interface (스마트카의 인터페이스를 위한 경험 디자인 가이드라인)

  • Yoo, Hoon Sik;Ju, Da Young
    • Design Convergence Study
    • /
    • v.15 no.1
    • /
    • pp.135-150
    • /
    • 2016
  • Due to the development of communication technology and expansion of Intelligent Transport System (ITS), the car is changing from a simple mechanical device to second living space which has comprehensive convenience function and is evolved into the platform which is playing as an interface for this role. As the interface area to provide various information to the passenger is being expanded, the research importance about smart car based user experience is rising. This study has a research objective to propose the guidelines regarding the smart car user experience elements. In order to conduct this study, smart car user experience elements were defined as function, interaction, and surface and through the discussions of UX/UI experts, 8 representative techniques, 14 representative techniques, and 8 locations of the glass windows were specified for each element. Following, the smart car users' priorities of the experience elements, which were defined through targeting 100 drivers, were analyzed in the form of questionnaire survey. The analysis showed that the users' priorities in applying the main techniques were in the order of safety, distance, and sensibility. The priorities of the production method were in the order of voice recognition, touch, gesture, physical button, and eye tracking. Furthermore, regarding the glass window locations, users prioritized the front of the driver's seat to the back. According to the demographic analysis on gender, there were no significant differences except for two functions. Therefore this showed that the guidelines of male and female can be commonly applied. Through user requirement analysis about individual elements, this study provides the guides about the requirement in each element to be applied to commercialized product with priority.

A Study on the Incentive Method for Inducing Safe Driving (안전운전 유도를 위한 인센티브 제공 방안 연구)

  • Lee, Insik;Jang, Jeong Ah;Lee, Won Woo;Song, Jaeyong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.4
    • /
    • pp.485-492
    • /
    • 2023
  • Among the methods to improve traffic congestion by providing real-time traffic information and solving problems like traffic congestion and traffic crashes, private enterprise is implementing policies to lower insurance premiums like compensation for drivers' driving safety scores. Despite the emergence of various incentive policies, a study on the level of incentive payment for safe/eco-friendly driving is insufficient. The research analyzed the satisfactory factors that affect the scale of incentives through questionnaires and the applicable scale of incentives that enable safe/eco-friendly driving using a binary logistic regression model. As a result of analyzing the incentive scale of the appropriate payment amount for each driving score increase, 0.4% of the toll fee was derived when the driving score increased by 20 points, and 0.5% of the toll fee was derived when the driving score increased by 30 points. This study on calculating the appropriate incentive payment scale for driver information sharing and driving score increase will help optimize incentives and prepare system implementation plans.

Assessing Risks and Categorizing Root Causes of Demolition Construction using the QFD-FMEA Approach (QFD-FMEA를 이용한 해체공사의 위험평가와 근본원인의 분류 방법)

  • Yoo, Donguk;Lim, Nam-Gi;Chun, Jae-Youl;Cho, Jaeho
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.4
    • /
    • pp.417-428
    • /
    • 2023
  • The demolition of domestic infrastructures mirrors other significant construction initiatives in presenting a markedly high accident rate. A comprehensive investigation into the origins of such accidents is crucial for the prevention of future incidents. Upon detailed inspection, the causes of demolition construction accidents are multifarious, encompassing unsafe worker behavior, hazardous conditions, psychological and physical states, and site management deficiencies. While statistics relating to demolition construction accidents are consistently collated and reported, there exists an exigent need for a more foundational cause categorization system based on accident type. Drawing from Heinrich's Domino Theory, this study classifies the origins of accidents(unsafe behavior, unsafe conditions) and human errors(human factors) as per the type of accidents experienced during demolition construction. In this study, a three-step model of QFD-FMEA(Quality Function Deployment - Failure Mode Effect Analysis) is employed to systematically categorize accident causes according to the types of accidents that occur during demolition construction. The QFD-FMEA method offers a technique for cause classification at each stage of the demolition process, including direct causes(unsafe behavior, unsafe environment), and human errors(human factors) through a tri-stage process. The results of this accident cause classification can serve as safety knowledge and reference checklists for accident prevention efforts.

Integrity evaluation of rock bolts in the field by using hammer-impact reflection method (해머 타격 반사법을 이용한 현장 록볼트 건전도 평가)

  • Yu, Jung-Doung;Bae, Myeong-Ho;Lee, Yong-Jun;Min, Bok-Ki;Lee, In-Mo;Lee, Jong-Sub
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.11 no.1
    • /
    • pp.47-56
    • /
    • 2009
  • Rock bolts and shotcrete play a crucial role as a main support system in the underground space. Thus, the safety of the underground space may be affected by the defect of rock bolts. In order to evaluate the rock bolt integrity by using non-destructive technique, the transmission method of the guided ultrasonic waves, which are generated by using the piezo disk elements has been successfully performed. The energy generated by the piezo disk elements, however, is not enough for the rock bolts in the field. In addition, the piezo disk elements should be installed at the end of the steel bar during construction of the rock bolts. The purpose of this study is the devolvement of the reflection method, which may generate enough energy, and the application in the field rock bolts. Both laboratory and field tests are carried out. The guided ultrasonic waves with high energy are generated by the hammer impact with the center punch, and the AE sensor is used to measure the reflected guided waves. The received guided waves are analyzed by the wavelet transform. The peak value of the wavelet transform produces the energy velocity, which is used for the evaluation of the rock bolt integrity. The energy velocity increases with an increase in the defect ratio in both laboratory and field rock bolts. This study demonstrates that the hammer-impact reflection method may be a suitable method for the evaluation of the rock bolt in the field.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Review of change and response strategies for ESG management (ESG 경영을 위한 변화 및 대응 전략 검토)

  • Choe Yoowha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.75-79
    • /
    • 2023
  • ESG management means to thoroughly consider the investor's perspective when evaluating corporate value, and environmental, social, and governance issues are continuous and strategic monitoring issues in identifying risk and opportunity factors related to corporate management activities. In other words, the perspective of value creation is reflected in business relationships. The fundamental purpose of ESG management is continuous business value creation and thorough management of investment risks and business transactions in contractual relationships. It is also a requirement of linked investors. The field that Korean companies are currently experiencing the most is the recognition that 'ESG information collection is necessary and maintenance must be prioritized' in investor IR and global sales and marketing departments, and the primary need for this is emerging. In addition, as the legal affairs office, environmental safety department, and human resources department, which conduct compliance management, carry out related tasks, clarity at the organizational level must precede in order to properly establish an information integration and management system. It covers the scope of securing new market opportunities such as management, disclosure and communication. Therefore, in regard to the newly emerging ESG management and response methods, it is necessary to review and implement it repeatedly so that sustainable exchange profits can be created by simultaneously managing non-financial risks as well as efforts to enhance corporate value for financial returns.

Life History of the Socially Isolated Male Elderly Living Alone (남성 독거노인의 생애사를 통해 본 사회적고립)

  • Lim, Seung Ja
    • 한국노년학
    • /
    • v.39 no.2
    • /
    • pp.325-345
    • /
    • 2019
  • The purpose of this study is a exploratory study for understanding the process of the social isolation of the socially isolated elderly through the approach to their life history. The research was analyzed by one of the methods of qualitative research on life history, the conceptual framework of 'Dimensions, turning, and adaptation' of Mandelbaum(1973). According to the results of this study, the socially isolated elderly people were found to be socially isolated by experiencing complex difficulties such as family disconnection, poverty, poor job and health deterioration. Specifically, in the area of life, there was experience of poor relationship with parent, absence of family, poverty of family and unfavorable relationship with surrounding people in life with original family before isolation. They had bad jobs in the labor market, such as hard labor, delivery, business, and chores. In the area of turning point, we experienced family break due to the separation of the original family and the spouse due to various reasons such as financial crisis, parental divorce and death, spouse affair, economic difficulty. In a transitional stage in the life, many reasons such as the financial crisis, the death of parents, the extramarital affair and economic difficulties led to the disconnection from their original family and their spouses. In an adaptive phase, participants accepted the changed life at each turning point in their lives, carrying out their roles, compromising and trying to adapt properly. He said that their current life, which has entered the social safety net system of the people's basic recipients, has led him to live a more stable life and is adapting to personal hobbies and vicarious satisfaction through networks. This result is somewhat different from previous studies in which isolated elderly people were severely exposed to the risk of depression and loneliness. However, we should also consider the characteristics of this study that interviewed elderly people with relatively low isolation. Based on the results of this research, he presented various practical policy implications.