• Title/Summary/Keyword: overhead door

Search Result 7, Processing Time 0.024 seconds

Safety of Industrial Overhead Doors : A Review of Maintenance and Parallel Safety Devices (산업용 오버헤드 도어의 사고 예방 : 유지관리 및 병렬구조 안전장치를 중심으로)

  • Bok Ki Kim;Jaewook Jeong
    • Journal of the Korean Society of Safety
    • /
    • v.39 no.1
    • /
    • pp.33-40
    • /
    • 2024
  • This study analyzes the impact of regular preventive maintenance (PM) on reducing the failure rate and occurrence of falling accidents of industrial overhead doors. A reliable safety device model with an additional safety device, which is installed to replace a defective one, is proposed. The research methodology involves collecting breakdown and falling accident records, comparing and analyzing data before and after regular PM implementation, and experimenting with two types of retrofittable safety devices. Key findings are as follows. 1. Regular PM implementation significantly reduces the failure rate of old overhead doors. 2. A parallel structured model with two alternative safety devices can minimize falling accident risks. The study's contributions include the following. 1. The positive impact of PM on extending overhead door lifespan is quantified. 2. A general safety device model that can be retrofitted and used as replacement with a fail-safe function is proposed.

RCM Activities for Improvement of Availability of AREX Railway System (공항철도의 운영가용도 향상을 위한 RCM 활동)

  • Lee, Chang-Hwan;Lim, Sung-Soo;Song, Mi-Ok
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.742-747
    • /
    • 2008
  • This paper is described the systematic activities of RCM to improve the availability for AREX railway system. The purpose of these activities are to maintain and enhance the reliability, availability, maintainability and safety, and to implement the effective maintenance for electrical and mechanical system including rolling stock, signalling, telecommunication, power supply, overhead catenary and platform screen door with impact to train operation.. The main activities consist of systematic failure and repair recording by integral information system, analysis and corresponding countermeasure. As applying these activities in opeartion and maintenance works, the availability of AREX railway system is going on improvement gradually, and maintenacne works are improved with these results.

  • PDF

Risk Analysis using Failure Data in Railway E&M System

  • Lee, Chang-Hwan;Song, Mi-Ok;Lim, Sung-Soo
    • International Journal of Railway
    • /
    • v.3 no.1
    • /
    • pp.34-37
    • /
    • 2010
  • In recent, the railway system consists of subsystems as rolling stock and infrastructures as signaling, telecommunication, power supply, overhead contact and platform screen door, etc. Furthermore, each subsystem has complicated interface so as not to understand these relationship. Consequently, to operate the railway system continuously with required safety and availability, the failure data should be corrected and analyzed systematically during operation. To achieve this object effectively, this paper presents the method which is evaluating the operational risk quantitatively using failure data, and selecting the critical equipment. Following this analysis, the improvement plan is established and applied to reduce the operational risk on system or equipment. From this study, the critical equipments of system could be determined and prioritized by risk analysis. Also, the effective maintenance to prevent critical failure could be implanted by this suggested methodology.

  • PDF

Implementation and Evaluation of Multi-level Secure Linux (다중등급 보안 리눅스 구현 및 시험평가)

  • 손형길;박태규;이금석
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.311-321
    • /
    • 2003
  • A current firewall or IDS (intrusion detection system) of the network level suffers from many vulnerabilities in internal computing servers. For a secure Linux implementation using system call hooking, this paper defines two requirements such as the multi-level security function of TCSEC B1 and a prevention of hacking attacks. This paper evaluates the secure Linux implemented in terms of the mandatory access control, anti-hacking and performance overhead, and thus shows the security, stability and availability of the multi-level secure Linux. At the kernel level this system protects various hacking attacks such as using Setuid programs, inserting back-door and via-attacks. The performance degradation is an average 1.18% less than other secure OS product.

Analysis on the Falling Risk of Building Electric Shutter and Reduction Measures (건축물 전동셔터 추락 리스크 분석 및 저감 방안)

  • Jung, Young-Min;Bang, Hong-Soon;Kim, Ok-Kyue
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.05a
    • /
    • pp.295-296
    • /
    • 2021
  • With the recent diversification and complication of buildings, the functions of building are also developing. As much as the development of buildings, the machine or equipment used for them is also developing. Thus, all sorts of domestic/foreign industrial facilities and fire stations in the whole nation are using the electric shutter that could meet the insulation just like the exterior wall of general buildings, for bringing-in/storage and crime prevention/fire prevention. Currently, various types of electric shutters are used. Such wrong operation and poor management are causing many panel-falling accidents. This study researched the reduction of electric shutter panel-falling risk by reviewing the domestic/foreign laws and standards, and researching the new safety equipment. First, the causes for falling and accident types were drawn by analyzing the cases of electric shutter accidents. After that, a checklist as the measures for reducing the falling of electric shutter in building was suggested by analyzing the items for the inspection of electric shutter.

  • PDF

Suggestion of a Check List to Prevent Fall Incidents Through Case Analysis of Electric Shutters in Buildings (건축물 전동셔터 사례 분석을 통한 추락방지 체크리스트 제안)

  • Jung, Young-Min;Bang, Hong-Soon;Kim, Ok-Kyue
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.3
    • /
    • pp.259-268
    • /
    • 2022
  • Electric shutters for buildings are being developed in Korea and abroad on a regular basis and can be used in different types of buildings such as company buildings and fire stations, etc. However, the fall risk factors induced by a variety of functions of building electric shutters require safety control. We reviewed the technological trends and legal standards in Korea and abroad, analyzed incident cases, and identified fall risk factors requiring control. We inspected all the building electric shutters in Korea based on the fall risk factors. As a result, we identified 91 noncompliance cases, in 69 percent of all 132 locations. In this study, backed by the inspection results, we suggest a check list to prevent the fall of building electric shutters to ensure safety and conduct verification using a focus group interview.

An Authentication Protocol Supporting User Device Mobility in CAS-Based IPTV Environments (CAS 시스템 기반의 IPTV 환경에서 사용자 단말 이동성 지원을 위한 인증 프로토콜)

  • Roh, Hyo-Sun;Jung, Seo-Hyun;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.302-312
    • /
    • 2010
  • Internet Protocol Television (IPTV) service is the convergence service of the telecommunication and broadcasting that provides various bidirectional multimedia contents by IPTV service subscribe's request through the high-speed internet. However, the proposed technologies current do not guarantee the security such as authentication between Set-Top-Box (STB) and the user mobile devices available IPTV service at home domain, and authentication of mobile user device at out of door. This paper proposes the authentication protocol for distributing content securely from STB to the users' mobile devices at home domain and authentication for network access and IPTV service access when the user's mobile device is moved out of the house. The proposed scheme using the proxy signature enables to distribute and protect securely the contents protected through an underlying Conditional Access System (CAS) without re-encrypting then that the existing scheme should employ. Then this protocol supports the authentication scheme to get service access authentication based on network access authentication using the signature, which the STB issued on behalf of the trust authority of IPTV service provider. Also the proposed authentication protocol reduces the total communication overhead and computation time comparing to the other authentication protocol.