• Title/Summary/Keyword: Specification notice

Search Result 9, Processing Time 0.023 seconds

A Research on Efficient Legislation of the Enforcement Regulation of Management Law of Vehicles focused on Notice Procedure of Specification (국내 자동차관리법 시행규칙상 제원통보 규정의 효율성 제고를 위한 정비방안 연구)

  • Yu, Minsang;Kim, Jaebu;Pyun, Moosong;Ahn, Jounghak
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.1
    • /
    • pp.46-51
    • /
    • 2020
  • Korea is the only country in the world where the regulation of vehicle homologation has been changed from "Type Approval" to "Self-Certification". But there are some regulations that have not been fully changed, so they became double-regulations. In this research, we find out double-regulations in Self-Certification systems focused on "Specification Notice Procedure", and suggest a proposal of amendment to avoid duplication. Through the research, we can reduce unnecessary requirements about homologation, management of vehicle and administrative procedure significantly.

A Consideration of Installation Method of Debris Net and Horizontal Safety Net (낙하물 방지망 및 추락 방호망의 설치방법에 관한 고찰)

  • JI, Suk-Won;Chol, Soo-Kyung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.05a
    • /
    • pp.131-132
    • /
    • 2019
  • In the Public Notice No. 2019-15 of the Ministry of Employment and Labor, the safety net and regulations on them have been deleted. The performance criterion of the debris net, which also functions as a horizontal safety net in the regulations on the criteria of occupational safety and health, is unclear. When installing a debris net that also functions as a horizontal safety net, a net that meets the performance criteria of KS F 8082 must be installed in accordance with KOSHA C-31-2017. The Korean Standard Specification for Construction Works, which specifies debris net and horizontal safety net, should be revised as soon as possible.

  • PDF

Notice of LQ Piping Design for ICHTHYS (ICHTHYS CPF(Central Processing Facility) LQ Piping Design 특이사항(유의사항))

  • Lee, Jaeyoung;Seong, Hyeontaek
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2017.10a
    • /
    • pp.46-53
    • /
    • 2017
  • We work for big offshore project in the Korean shipyards as a EPC contract. There are a lot of risks even though the FEED Engineering was taken in the famous engineering company. In case of ICHTHYS CPF, it worked on the FEED activity for several years. Here is mention that design modification was carried how to modify material and specification according to shipyards human resource and yard practice for your reference. Furthermore, I expect that this paper is used for Korean engineer for their reference.

  • PDF

A Study on Graphical Modeling Methods for Systems Engineering Standard Processes (시스템공학 표준 프로세스에 대한 그래픽 모델화 연구)

  • Lim, Yong-Taek;Lee, Byoung-Gil;Lee, Jae-Chon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.2 no.2
    • /
    • pp.27-32
    • /
    • 2006
  • The emerging standards since 1990's can be classified as 'system standards' (process-oriented standards) and they specify the process of an enterprise and also apply to almost all industries regardless of size, type and products. Notice that the conventional specification-oriented standards present relatively clear criteria even though the structure, performance, and terminology are defined in text-based form. However, the system standards dealing with the processes do not present a coherent guide. Therefore, it is difficult to analyze them with the same viewpoint, thereby resulting in differences in the level of understanding. This study is aimed at graphically modeling the system standards originally described in text-based form. The study has been carried out in the framework of the PMTE (Process, Methods, Tools, and Environment) paradigm. The system standard targeted here is ISO/IEC 15288. Firstly, review of the literature on the systems engineering (SE) standard/process and on the graphic model IDEF0 was done, respectively, for the parts of 'E' and 'M'. Then the SE process of the MIL-STD 499B was applied to ISO/IEC 15288 as 'P'. Finally, the graphical model was generated by AI0Wins as 'T'. As a result, the graphical model-based approach can complement the drawbacks of the text-based form.

  • PDF

A Model of Quality Grading Policy for Location Information (위치정보의 품질 등급화 정책 모델)

  • Lee, Jun-Wook;Nam, Kwang-Woo;Kim, Kwang-Soo
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.3 s.15
    • /
    • pp.13-24
    • /
    • 2005
  • This paper proposes a model for the location information grading policy. Location information grading policy is that government would give a public notice of criterion for location information quality, and location information operators should elucidate the grade of provided location information. As the quality grade of services is provided in the 'terms of use' with the detailed quality specification and quality range, the user can understand the quality of location information, and can select more suitable service for their purposes. Additionally, the qualiy grading policy can enforce the location information operators and location service providers to support more stable and reliable service quality. In this paper, we propose the model of location information grades, the typical classification of quality, and the realitic policy applying model. Recent enacted 'Location Information Law' are expected to activate korean information market. In this situation, proposed location information grading policy take a role in protecting location privacy and improving the reliability of location information services.

  • PDF

Optical Structural Design using Gaussian Optics for Multiscale Gigapixel Camera (상분할 방식의 기가픽셀 카메라를 위한 가우스 광학적인 구조설계)

  • Rim, Cheon-Seog
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.6
    • /
    • pp.311-317
    • /
    • 2013
  • It was reported in Nature and the Wall Street Journal on June 20th, 2012 that scientists at Duke university have developed a gigapixel camera, capable of over 1,000 times the resolution of a normal camera. According to the reports, this super-resolution camera was motivated by the need of US military authorities to surveil ground and sky. We notice the ripple effect of this technology has spread into the area of national defense and industry, so that this research has started to realize the super-resolution camera as a frontier research topic. As a result, we can understand the optical structure of a super-resolution camera's lens system to be composed of a front, monocentric objective of a single lens plus 98 rear, multiscale camera lenses. We can also obtain the numerical ranges of specification factors related to the optical structure, such as the diameter of the aperture, and the focal length.

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.

An Effective Service Sharing Scheme on Distributed OSGi Frameworks (분산되어 있는 OSGi 프레임워크에서 효과적인 서비스 공유 방안)

  • Yun, Ki-Hyun;Kim, Eun-Hoe;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.16A no.4
    • /
    • pp.227-234
    • /
    • 2009
  • OSGi technology has applied to Home Network, but now it is loaded into even heterogeneous devices in various domains. Therefore, it is necessary to cooperate with each other framework for offering effective services in distributed OSGi frameworks. However until now, OSGi specification doesn't provide any methodthat can share the services registered on remote OSGi frameworks. In order to solve this problem, there have been several researches that used existing distributed middleware technologies such as JXTA and Web Services. However these technologies have some weakness, that is, they consume lots of computing resources and need additional process to transform the services. A middleware called R-OSGi uses only OSGi technology for sharing remote OSGi services, but R-OSGi may have a communication bottleneck and SPOF (Single Point of Failure) problem, because it has a central service registry. In this paper we present RSP (Remote Service Provider), which is a P2P-based effective service sharing scheme on distributed OSGi framework. RSP doesn't need to install additional software nor have the additional transformation process of the service representation, because it uses only OSGi technology. In addition it doesn't have any bottleneck problem and improves scalability by providing the service discovery mechanism using P2P. RSP can also access remote services transparently and it can guarantee reliability by sending an immediate notice about changes of the remote services.

A Study on the Identification of Hazardous Factors and Prevention of Accident in Old Boilers (노후보일러 유해인자 발굴 및 사고예방에 관한 연구)

  • Sa, Min-Hyung;Woo, In-Sung
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.4
    • /
    • pp.1-9
    • /
    • 2019
  • Large-scale industrial boilers operating at high temperature and high pressure, have a large amount of water, and a large amount of energy is released at the time of explosion. Currently, most industrial boilers use gas fuel such as LNG and LPG, etc. and fuel exists in the same space as equipment, so there is a high possibility of secondary damage such as fire or explosion in the event of a boiler accident. Both special care and management are required to operate the very dangerous equipment that causes casualty 2.51 per accident. For boilers of a certain size or more, the Korea Energy Agency conducts inspections in accordance with the Energy Usage Rationalization Act, KS, and public notice of the Ministry of Industry, Trade and Resources. In this research, based on the results of the inspection, the hazard factorss are configured, and a questionnaire is conducted to the inspector, the equipment manager, the maintenance person, and the person in charge of the manufacturer. We analyzed the results by using AHP (Analytic Hierarchy Process). As a result of analysis, generally recognized hazard factorss are not good management, measurement failure, specification failure, water leak, leak analysis, but connection, welding, scale, and corrosion, etc. are relatively less important. It is judged that the adverse factors that are recognized to be highly important among all groups and careers are already well managed, but less important and adverse factors should be well managed to ensure that the safe usage of the boiler.