• Title/Summary/Keyword: Securing

Search Result 2,941, Processing Time 0.03 seconds

A Study on the Possibility of Securing Alternative Aggregates to Solve the Problem of Supply and Demand of Fine Aggregate in Southeast Region (동남권 잔골재수급 부족 문제를 해결할 대체골재 확보 가능성에 관한 연구)

  • Kim, Ha-Seog;Lee, Do-Heon;Kim, Jin-Man
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2018.05a
    • /
    • pp.328-329
    • /
    • 2018
  • The problem of imbalance between supply and demand of fine aggregates in the southeastern region due to the decrease in collection of EEZ(Exclusive Economic Zone) sea sand has been raised. In this paper, the possibility of securing alternative aggregate as a means to solve the problem of fine aggregate shortage in the southeast region was analyzed. As a result of the analysis, the alternative aggregate is easy to manufacture and its quality can be secured. And, it is suitable to use as an aggregate with less environmental burden. In addition, institutional improvement measures are needed for effective utilization and recycling of alternative aggregates.

  • PDF

Studies of Case on Hazard Analysis Applying Top-Down Modelling Technique (하향식 모델링 기법을 적용한 위험 분석 사례 연구)

  • Hong, Seon-Ho;Hong, Sun-Hum
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1289-1293
    • /
    • 2008
  • A technology for inevitable integration as well as an ability of development of technology according to professional fields is needed and supported for securing technology in the era of international competition. In other words, advanced business technique and technology applied for streamlining of management are required and the relations between operations and systems could be clarified. This paper reviews the course for development of process used in the systems engineering and business administration and tries to seek the way of training professionals in a variety of fields for elevating domestic technologies in different fields to the international level. Particularly, it tries to get the way of overcome the present technical restriction that depends on imports through matching a hazard analysis method with the method above mentioned. Especially, it tries to present the way of contributing to securing software safety on the basis of the importance of development of process model that takes the life cycle into consideration.

  • PDF

A Study of Durability Design in the Subway Concrete Box Structure (지하철 콘크리트 BOX구조물의 내구성설계에 대한 연구)

  • Kwon Young-Chan;Kim Eun-Kyum
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.940-956
    • /
    • 2004
  • In the course of studying the design of securing the 100-year-long durability of 100 years the subway structure according to the requested service by the Seoul Metropolitan Subway Construction Headquarters, we analyzed 14 construction sites adopting the durability design in subway line No. 9 and concluded as follows: 1. When comparing with 158, the environment index presented for securing 100-year-long durability of subway structure in subway line No. 9, the index of durability was verified as 159.7$\~$179.8 2. When examining the increase value of durability index, we verified that the constructors didn't make various choices in method but they employed the uniformly selected system. 3. Under consideration of the bid form, the construction under bid contract in bulk gave the impacts on the construction cost with attention to selection of the durability index, while the construction under alternative contract in bid adopted uniformly the standard presented by the ordering party.

  • PDF

Necessity to Install Integrated Control Tower for Overseas Energy Resources Acquisition and Securing Funds (해외에너지자원획득과 소요자금 확보를 위한 통합 컨트롤 타워 설치 필요성에 관한 연구)

  • Kang, Ji-Kwang;Lee, Jae-Heon
    • Plant Journal
    • /
    • v.6 no.3
    • /
    • pp.40-45
    • /
    • 2010
  • Necessity to install control towers has been studied to acquire overseas energy resources and to secure funds. At present, domestic energy companies do business independently. Institutions which support plant EPC companies as partners of package deal are separated. This causes the low records at package deal for overseas resources acquisition. Except UK and USA, nations which have major companies developed overseas energy resources early by promoting a large national company. Consequently, they currently have good records. This study suggests the necessities to install integrated control tower for overseas energy resources acquisition and securing funds and the following are the ways ; 1) promote a large national company by consolidation of separate energy companies, 2) install plant EPC promotion department which support private plant EPC companies, 3) make a integrated control tower in high level government office to connect between a large national company and plant EPC promotion department.

  • PDF

ETRI AI Strategy #1: Proactively Securing AI Core Technologies (ETRI AI 실행전략 1: 인공지능 핵심기술 선제적 확보)

  • Kim, S.M.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.3-12
    • /
    • 2020
  • In this paper, we introduce ETRI AI Strategy #1, "Proactively Securing AI Core Technologies." The first goal of this strategy is to innovate artificial intelligence (AI) service technology to overcome the current limitations of AI technologies. Even though we saw a big jump in AI technology development recently due to the rise of deep learning (DL), DL still has technical limitations and problems. This paper introduces the four major parts of the advanced AI technologies that ETRI will secure to overcome the problems of DL and harmonize AI with the human world: post DL technology, human-AI collaboration technology, intelligence for autonomous things, and big data platform technology.

Challenges of Groundwater as Resources in the Near Future

  • Lee, Jin-Yong
    • Journal of Soil and Groundwater Environment
    • /
    • v.20 no.2
    • /
    • pp.1-9
    • /
    • 2015
  • Groundwater has been a very precious resource for human life and economic development in the world. With increasing population and food demand, the groundwater use especially for agriculture is largely elevated worldwide. The very much large groundwater use results in depletion of major aquifers, land subsidences in many large cities, anthropogenic groundwater contamination, seawater intrusion in coastal areas and accompanying severe conflicts for water security. Furthermore, with the advent of changing climate, securing freshwater supply including groundwater becomes a pressing and critical issue for sustainable societal development in every country because prediction of precipitation is more difficult, its uneven distribution is aggravating, weather extremes are more frequent, and rising sea level is also threatening the freshwater resource. Under these difficulties, can groundwater be sustaining its role as essential element for human and society in the near future? We have to focus our efforts and wisdom on answering the question. Korean government should increase its investment in securing groundwater resources for changing climate.

ROSS: Low-Cost Self-Securing VoIP Communication Framework

  • Syafalni, Alfin;Samsudin, Azman;Jaafar, Yazid;Omar, Mohd. Adib
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3366-3383
    • /
    • 2012
  • Reliance on the Internet has introduced Voice over Internet Protocol (VoIP) to various security threats. A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort. Accordingly, a security framework for known participants in VoIP communication is proposed in this paper. The framework is known as Randomness-Optimized Self-Securing (ROSS), which performs authentication automatically throughout the session by optimizing the uniqueness and randomness of the communication itself. Elliptic Curve Diffie-Hellman (ECDH) key exchange and Salsa20 stream cipher are utilized in the framework correspondingly to secure the key agreement and the communication with low computational cost. Human intelligence supports ROSS authentication process to ensure participant authenticity and communication regularity. The results show that with marginal overhead, the proposed framework is able to secure VoIP communication by performing reliable authentication.

Blind Intubation Using Fiberoptic Bronchoscope in Epistaxis (비출혈 환자에서 굴곡성 기관지를 이용한 맹목적 기관내 삽관)

  • Lee, Seung-Hyun;Yoon, Ji-Young;Kim, Cheul-Hong
    • Journal of The Korean Dental Society of Anesthesiology
    • /
    • v.12 no.2
    • /
    • pp.121-123
    • /
    • 2012
  • Nasotracheal intubation is an essential procedure during general anesthesia for dental treatment. Fiberoptic intubation is best accomplished by those who perform it as part of their daily practice. But nasal approach of fiberoptic intubation has some complications such as epistaxis and laryngeal injury. Especially, epistaxis is common and it make fiberoptic intubation because of limited view. When the epistaxis obstruct the field of vision we have to withdraw the fiberoptic bronchoscope and consider the other method for securing the airway. We succeeded in securing the airway of patient who had epistaxis during the fiberoptic nasotracheal intubation without withdrawing the fiberoptic bronchoscope. We used blind intubation guided by light source placed the tip of fiberoptic bronchscope applied to lightwand intubation.

A Study on the Stabilization of Bit Rate and LTE for the TV DMNG Broadcasting

  • Jeong, Gyoung Youl
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.266-274
    • /
    • 2018
  • Securing field screens through LTE broadcasting is a very valuable technology in news production because of its locality and concurrency. TV has the advantage of being able to deliver news faster than newspapers and make live coverage on the scene of events and events. To maximize this, not only middle-end broadcasters but also existing broadcasting stations are taking an active role in broadcasting using LTE. However LTE broadcasting has yet to secure any conflicting values of broadcasting stability and securing high-definition. The key to solving this difficulty is the transmission rate of Bit Rate. This paper compares the Bit Rate transmission method, which is variable and fixed, to provide more on-site screens through LTE, and presents the Bit Rate adjustment method as a method of screen stabilization through experiment. Consequently, the most stable broadcast screen can be obtained when transmitting and connecting it to broadcasting in a variable 5M method.

Analysis of Facility Standard for Elderly Welfare Facility by Universal Design Principle and Guideline: Focusing on Legal Regulations (유니버설 디자인의 원리와 지침에 의한 노인복지시설 기준 분석: 법률 규정을 중심으로)

  • Kim, Soo-Jung
    • Journal of Industrial Convergence
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2017
  • The purpose of this study is to analyze the facility standards of the elderly welfare facilities applying the seven principles of the universal design. The facility standards of the elderly welfare facilities were limited to the provisions of the "Enforcement Regulation of the Elderly Welfare Act". There are few legal regulations applying the universal design in the construction of the elderly welfare facilities. The facility standards are set only with the minimum requirements such as securing the safety of the user, securing the space area, functional convenience, and risk prevention. However, the contents of the regulations are limited to the minimum standards for functional convenience and safety required for living. In conclusion, in the elderly welfare facilities, the notion of universal design, which considers not only the elderly, but also service providers, employees, and general visitors, should be considered.

  • PDF