• Title/Summary/Keyword: safety management information system

Search Result 1,620, Processing Time 0.027 seconds

Development of Maintenance Scenario Method for Small and Medium-sized Bridges Using Risk Matrix (리스크매트릭스를 활용한 중소규모 교량의 유지관리 시나리오 기법 개발)

  • Park, Hyun-Chan;Shin, Byoung-Gil;Cho, Choong-Yuen;Kim, Young-Min;Chang, Buhm-Soo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.6
    • /
    • pp.161-168
    • /
    • 2021
  • This paper is a maintenance system for bridge represented by Class 3 and other than by law bridges. Domestic bridge are divided into Class 1 & 2 bridges and Class 3 & other than by law bridges. The number of type 3 and other than by law bridges is very large. But, it is considered to be of relatively low importance compared to Class 1 & 2 Bridge Bridge. So, in this paper is propose a maintenance system and procedure for small & medium-sized bridges. However, because the number of small & medium-sized bridges is large, it is not possible to evaluate the performance of all bridges like Class 1 & 2 bridge. The reason is the lack of manpower and budget. Based on the Risk Matrix method, a maintenance procedure was created to select the bridge for which performance evaluation should be performed first. For this purpose, basic information of the bridge is used. And, the developed maintenance procedures were applied to the bridges in actual use.

A Study on Area-Wide Integrated Termite Management for the Preservation of Wooden Built Heritage (목조건축문화재의 예방 보존을 위한 공간적 통합 흰개미 관리(AW-ITM)의 적용)

  • KIM, Sihyun;CHUNG, Yongjae
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.3
    • /
    • pp.60-72
    • /
    • 2022
  • A number of wooden built heritage remain in Korea, and most have been damaged by various biological factors including termite. Owing to the irreversible damage caused by termites, wooden built heritage are losing their authenticity and structural stability. In this study, Area-Wide Integrated Termite Management(AW-ITM) was proposed to prevent termite damage. First, to understand the locational characteristics of these sites, the distance from adjacent forests and surrounding forest areas was analyzed for 182 national designated wooden built heritage(national treasures, treasures) using the Geographic Information System(GIS). By analyzing existing pest control projects(2003-2020) and the components of the ITM, the characteristics of termite control for cultural heritages were determined. Based on these results, the cultural heritage sites and their surrounding spaces were divided into three areas, and the types of cultural properties were divided into six types according to the location and number of buildings. Along with this, termite control measures were proposed for each area and type. The concept of AW-ITM has been partially applied to the "Comprehensive Control of Termites in wooden built heritages Sites" by the Cultural Heritage Administration. Caution must be taken with regard to the establishment of a cultural heritage management policy; AW-ITM should be applied on a trial basis with the results then being carefully analyzed and reflected in the establishment of policies pertaining to the conservation management of cultural heritage.

Prioritizing Noxious Liquid Substances (NLS) for Preparedness Against Potential Spill Incidents in Korean Coastal Waters (해상 유해액체물질(NLS) 유출사고대비 물질군 선정에 관한 연구)

  • Kim, Young-Ryun;Choi, Jeong-Yun;Son, Min-Ho;Oh, Sangwoo;Lee, Moonjin;Lee, Sangjin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.7
    • /
    • pp.846-853
    • /
    • 2016
  • This study prioritizes Noxious Liquid Substances (NLS) transported by sea via a risk-based database containing 596 chemicals to prepare against NLS incidents. There were 158 chemicals transported in Korean waters during 2014 and 2015, which were prioritized, and then chemicals were grouped into four categories (with rankings of 0-3) based on measures for preparedness against incident. In order to establish an effective preparedness system against NLS spill incidents on a national scale, a compiling process for NLS chemicals ranked 2~3 should be carried out and managed together with an initiative for NLS chemicals ranked 0-1. Also, it is advisable to manage NLS chemicals ranked 0-1 after considering the characteristics of NLS specifically transported through a given port since the types and characteristics of NLS chemicals relevant differ depending on the port. In addition, three designated regions are suggested: 1) the southern sector of the East Sea (Ulsan and Busan); 2) the central sector of the South Sea (Gwangyang and Yeosu); and 3) the northern sector of the West Sea (Pyeongtaek, Daesan and Incheon). These regions should be considered special management sectors, with strengthened surveillance and the equipment, materials and chemicals used for pollution response management schemes prepared in advance at NLS spill incident response facilities. In the near future, the risk database should be supplemented with specific information on chronic toxicity and updated on a regular basis. Furthermore, scientific ecotoxicological data for marine organisms should be collated and expanded in a systematic way. A system allowing for the identification Hazardous and Noxious Substances (HNS) should also be established, noting the relevant volumes transported in Korean waters as soon as possible to allow for better management of HNS spill incidents at sea.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Childcare Teacher's Perception of the Accreditation System Based on Accreditation Experience -Focused on the Second Accreditation Index of Childcare Centers- (보육교사의 평가인증 경험에 따른 평가인증제에 대한 인식비교 -2차 평가인증지표를 중심으로-)

  • Cho, Hyun-Ok;Choi, Inhwa
    • Korean Journal of Childcare and Education
    • /
    • v.7 no.4
    • /
    • pp.301-324
    • /
    • 2011
  • The purpose of this study was to examine the perception of the childcare teachers regarding accreditation procedures and feasibility of the second accreditation index according their past participation in the accreditation process. The objects were 193 childcare teachers working at child care centers that were accredited using the initial accreditation index. The collected data was analyzed using frequency, percentile, $X^2$, and t-test. The major findings are as follows: First, childcare teachers without accreditation experience perceived 'continuing education of child care center directors and teachers' to be the most important for quality maintenance after successful accreditation. In contrast, childcare teachers with accreditation experience placed the most importance on 'childcare teachers' motivation and continuing enrollment'. Second, childcare teachers with accreditation experience perceived higher feasibility in the subcategories of 'art activity materials' in the category of child care environment, 'providing operation policies and information of child care teachers', 'care for children', and 'employment contract' in the operation & management category, 'sanitary management of food, cooking and feeding', 'care of sick or injured child', 'health management of children and childcare teachers', 'snacks for children' in the category of health and nutrition and 'safe procedures for handing over children' in the category of safety. In general, childcare teachers with accreditation experience perceived higher feasibility of the second accreditation index in all categories.

Analysis of the Research Trend and Developmental Direction against the VDS Data (차량검지기 자료 관련 연구동향 분석 및 발전방향)

  • Kim, Han-Soo;Park, Dong-Joo;Shin, Seung-Jin;Beck, Seung-Kirl;NamKoong, Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.1 s.12
    • /
    • pp.13-26
    • /
    • 2007
  • A VDS data in the domestic has been used within limits to real time information such as congestion management, incident management, and route guidance service. On the other hand, a VDS data in the foreign countries had been used to various objectives such as transportation policy assessment, transportation construction evaluation, franc safety improvement, and etc. The scope and method of the study is the VDS data which was installed in the uninterrupted flow such as the freeway and the interrupted flow in a diversion route of the leeway. It has investigated and analyzed the VDS as our subject to study, study objective and study methodology for each study generally classified as 1) data collection 2) data processing 3) data store and 4) data quality section. This study has investigated and analyzed the various literatures in domestic and foreign countries regarding the VDS data. And It drew the development direction of the study which is about VDS data in domestic from now.

  • PDF

Application for Measurement of Curing Temperature of Concrete in a Construction Site using a Wireless Sensor Network (무선센서네트워크에 의한 콘크리트 양생온도 계측에 관한 현장 적용성 연구)

  • Lee, Sung-Bok;Bae, Kee-Sun;Lee, Do-Heon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.11 no.3
    • /
    • pp.283-291
    • /
    • 2011
  • As the construction industry has recently been transformed by the emergence of ubiquitous and intelligent technology, there have been major changes in the management methods employed. Specifically, next-generation construction management systems have been developed that collect and analyze many pieces of information in real time by using various wireless sensors and networks. The purpose of this study is to understand the current status of Ubiquitous Sensor Networks (USN) in the construction sector, and to gain fundamental data for a system of measuring concrete curing temperature in a construction site that employs a USN. By investigating the application status of USN, it was confirmed that USN has mainly been applied to the maintenance of facilities, safety management, and quality control. In addition, a field experiment in which the curing temperature of concrete was measured using a USN was carried out to evaluate two systems with wireless sensor networks, and the applicability of these systems on site was confirmed. However, it is estimated that the embedded wireless sensor type is affected by metal equipment on site, internal battery of sensor and concrete depth, and studies to provide more stable system by USN are thus required.

Consumer Awareness and Attitudes about Genetically Modified Foods - According to Area, Occupation, and Education - (유전자재조합식품에 대한 소비자의 인지도 조사 - 지역과 직업,학력을 중심으로 -)

  • Kim, Hae-Young;Kim, Mee-Jeong
    • Journal of the Korean Society of Food Culture
    • /
    • v.26 no.6
    • /
    • pp.657-672
    • /
    • 2011
  • This study was a survey of consumer awareness and attitudes about genetically modified foods and their labeling regulations. Questionnaires were distributed to 4,620 consumers who lived in different areas of Korea, and 4,076 people responded. The consumers were asked about knowledge, labeling information, and their sources of information about GM foods. Respondents from Seoul, Jeonnam, and Gyeongnam answered mostly "nearly don't know > moderate > never know > know a little." Respondents from Gyeonggi answered "moderate > nearly don't know > never know > know a little." According to occupation, housewives, company employees, consultants, and students answered mostly "nearly don't know > moderate > never know > know a little. "Consumers answered about the intent to buy GM foods differently according to area, occupation, and education. Seoul and Gyeonggi residents said that reinforcing factors to relieve the insecurity of GM foods were "evaluating safety > management of GM foods by the government > GM food regulation system." There were other answers according to area, occupation, and education. About GM-related education methods that they wished to have, residents of the Seoul area said "books/leaflets" most often, but residents of the Gyounggi area said "attending a lecture" most often. Housewives also said "attending a lecture," but teachers and students said "Internetbased education" most often. About the kinds of education that they could join, Seoul residents answered "consumer groups > school parents > public institutions," but Gyeonggi and Chungnam area residents answered "public institutions > consumer groups > school parents." Housewives and students answered "consumer groups" most often, but consultants and private business owners answered "public institutions" most often. We realized that different education methods were necessary for different areas, occupations, and education levels.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

A Study on Improvement of Used-goods Market Platform Using Blockchain (블록체인을 이용한 중고거래 플랫폼 개선방안 연구)

  • Lee, Kyoung-Nam;Jeon, Gyeahyung
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.133-145
    • /
    • 2018
  • This study was investigated the necessity and possibility of using block-chain technology in online used-goods trading platform. Current online used-goods trading platforms operate a safety trading system, but it is difficult to utilize due to relatively high commission rate. As a result, people mainly use the method of meeting and purchasing in person, which is a relatively costly method. This study discusses how to build a platform to solve or mitigate problems such as privacy, information distortion and omission, fraud, etc. In the platform proposed in this study, it is possible to solve the major fraud and personal information protection problems that may occur in the transaction proceeding by appropriately reflecting the types and characteristics of the block-chain technology. In future work, we will discuss legal framework and technology development plan to apply the proposed platform in this study.