• Title/Summary/Keyword: 감시강화

Search Result 216, Processing Time 0.021 seconds

Development of a deep-learning based tunnel incident detection system on CCTVs (딥러닝 기반 터널 영상유고감지 시스템 개발 연구)

  • Shin, Hyu-Soung;Lee, Kyu-Beom;Yim, Min-Jin;Kim, Dong-Gyou
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.19 no.6
    • /
    • pp.915-936
    • /
    • 2017
  • In this study, current status of Korean hazard mitigation guideline for tunnel operation is summarized. It shows that requirement for CCTV installation has been gradually stricted and needs for tunnel incident detection system in conjunction with the CCTV in tunnels have been highly increased. Despite of this, it is noticed that mathematical algorithm based incident detection system, which are commonly applied in current tunnel operation, show very low detectable rates by less than 50%. The putative major reasons seem to be (1) very weak intensity of illumination (2) dust in tunnel (3) low installation height of CCTV to about 3.5 m, etc. Therefore, an attempt in this study is made to develop an deep-learning based tunnel incident detection system, which is relatively insensitive to very poor visibility conditions. Its theoretical background is given and validating investigation are undertaken focused on the moving vehicles and person out of vehicle in tunnel, which are the official major objects to be detected. Two scenarios are set up: (1) training and prediction in the same tunnel (2) training in a tunnel and prediction in the other tunnel. From the both cases, targeted object detection in prediction mode are achieved to detectable rate to higher than 80% in case of similar time period between training and prediction but it shows a bit low detectable rate to 40% when the prediction times are far from the training time without further training taking place. However, it is believed that the AI based system would be enhanced in its predictability automatically as further training are followed with accumulated CCTV BigData without any revision or calibration of the incident detection system.

A Study on the Spread of Taoist Gwonseonseo in the 19th Century and the Ideological Nature of Jeoseungjeon (19세기 유교의 통속화와 「저승전」의 이념성 - 조선후기 권선서(勸善書)의 유행과 관련하여 -)

  • Kim, Jeong Suk
    • (The)Study of the Eastern Classic
    • /
    • no.69
    • /
    • pp.297-324
    • /
    • 2017
  • Recognizing that the ideological nature of Taoist Gwonseonseo whose publication was concentrated during the reign of King Gojong was connected to that of Jeoseungjeon, a Hangul manuscript novel in the 19th century, this study set out to examine the periodic significance of Taoist Gwonseonseo in the 19th century and check the ideological nature of Jeoseungjeon. Taoist Gwonseonseo puts an emphasis on Confucian ethics including loyalty and filial piety in a didactic aspect and shows that the practice of Confucian ethics brings good fortune, which was prominent in many private Taoist books that were huge hits in the latter part of Joseon, when Chinese Taoist Gwonseonseo was introduced in Joseon, translated and circulated in Korean, and spread widely among the public. Those works offer very specific cases of individuals doing good or evil deeds in this world and suffering the consequences in the next world. Jeoseungjeon presents the Buddhist experiences with the next world as the foundation with the next world depicted around the Great Jade Emperor, who emphasizes Confucian ethics, and the hierarchy of Taoist gods under the ultimate the Great Jade Emperor, thus clearly demonstrating the combination pattern of Confucianism, Buddhism, and Taoism in the latter half of Joseon. The work describes the scenes of judgment and punishment in the next world according to the witness of the main character and thus gives specific ideas of daily goods, which is a feature found in the latter half of Joseon different from the previous pattern of next world experiences. It is Taoist Gwonseonseo widely spread among the people those days that connects the link.

Application of MODIS Aerosol Data for Aerosol Type Classification (에어로졸 종류 구분을 위한 MODIS 에어로졸 자료의 적용)

  • Lee, Dong-Ha;Lee, Kwon-Ho;Kim, Young-Joon
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.6
    • /
    • pp.495-505
    • /
    • 2006
  • In order to classify aerosol type, Aerosol Optical Thickness (AOT) and Fine mode Fraction (FF), which is the optical thickness ratio of small particles$(<1{\mu}m)$ to total particles, data from MODIS (MODerate Imaging Spectraradiometer) aerosol products were analyzed over North-East Asia during one year period of 2005. A study area was in the ocean region of $20^{\circ}N\sim50^{\circ}N$ and $110^{\circ}E\simt50^{\circ}E$. Three main atmospheric aerosols such as dust, sea-salt, and pollution can be classified by using the relationship between AOT and FF. Dust aerosol has frequently observed over the study area with relatively high aerosol loading (AOT>0.3) of large particles (FF<0.65) and its contribution to total AOT in spring was up to 24.0%. Pollution aerosol, which is originated from anthropogenic sources as well as a natural process like biomass burning, has observed in the regime of high FF (>0.65) with wide AOT variation. Average pollution AOT was $0.31{\pm}0.05$ and its contribution to total AOT was 79.8% in summer. Characteristic of sea-salt aerosol was identified with low AOT (<0.3), almost below 0.1, and slightly higher FF than dust and lower FF than pollution. Seasonal analysis results show that maximum AOT $(0.33{\pm}0.11)$ with FF $(0.66{\pm}0.21)$ in spring and minimum AOT $(0.19{\pm}0.05)$, FF $(0.60{\pm}0.14)$ in fall were observed in the study area. Spatial characteristic was that AOT increasing trend is observed as closing to the eastern part of China due to transport of aerosols from China by the prevailing westerlies.

The Characteristics and Performances of Manufacturing SMEs that Utilize Public Information Support Infrastructure (공공 정보지원 인프라 활용한 제조 중소기업의 특징과 성과에 관한 연구)

  • Kim, Keun-Hwan;Kwon, Taehoon;Jun, Seung-pyo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-33
    • /
    • 2019
  • The small and medium sized enterprises (hereinafter SMEs) are already at a competitive disadvantaged when compared to large companies with more abundant resources. Manufacturing SMEs not only need a lot of information needed for new product development for sustainable growth and survival, but also seek networking to overcome the limitations of resources, but they are faced with limitations due to their size limitations. In a new era in which connectivity increases the complexity and uncertainty of the business environment, SMEs are increasingly urged to find information and solve networking problems. In order to solve these problems, the government funded research institutes plays an important role and duty to solve the information asymmetry problem of SMEs. The purpose of this study is to identify the differentiating characteristics of SMEs that utilize the public information support infrastructure provided by SMEs to enhance the innovation capacity of SMEs, and how they contribute to corporate performance. We argue that we need an infrastructure for providing information support to SMEs as part of this effort to strengthen of the role of government funded institutions; in this study, we specifically identify the target of such a policy and furthermore empirically demonstrate the effects of such policy-based efforts. Our goal is to help establish the strategies for building the information supporting infrastructure. To achieve this purpose, we first classified the characteristics of SMEs that have been found to utilize the information supporting infrastructure provided by government funded institutions. This allows us to verify whether selection bias appears in the analyzed group, which helps us clarify the interpretative limits of our study results. Next, we performed mediator and moderator effect analysis for multiple variables to analyze the process through which the use of information supporting infrastructure led to an improvement in external networking capabilities and resulted in enhancing product competitiveness. This analysis helps identify the key factors we should focus on when offering indirect support to SMEs through the information supporting infrastructure, which in turn helps us more efficiently manage research related to SME supporting policies implemented by government funded institutions. The results of this study showed the following. First, SMEs that used the information supporting infrastructure were found to have a significant difference in size in comparison to domestic R&D SMEs, but on the other hand, there was no significant difference in the cluster analysis that considered various variables. Based on these findings, we confirmed that SMEs that use the information supporting infrastructure are superior in size, and had a relatively higher distribution of companies that transact to a greater degree with large companies, when compared to the SMEs composing the general group of SMEs. Also, we found that companies that already receive support from the information infrastructure have a high concentration of companies that need collaboration with government funded institution. Secondly, among the SMEs that use the information supporting infrastructure, we found that increasing external networking capabilities contributed to enhancing product competitiveness, and while this was no the effect of direct assistance, we also found that indirect contributions were made by increasing the open marketing capabilities: in other words, this was the result of an indirect-only mediator effect. Also, the number of times the company received additional support in this process through mentoring related to information utilization was found to have a mediated moderator effect on improving external networking capabilities and in turn strengthening product competitiveness. The results of this study provide several insights that will help establish policies. KISTI's information support infrastructure may lead to the conclusion that marketing is already well underway, but it intentionally supports groups that enable to achieve good performance. As a result, the government should provide clear priorities whether to support the companies in the underdevelopment or to aid better performance. Through our research, we have identified how public information infrastructure contributes to product competitiveness. Here, we can draw some policy implications. First, the public information support infrastructure should have the capability to enhance the ability to interact with or to find the expert that provides required information. Second, if the utilization of public information support (online) infrastructure is effective, it is not necessary to continuously provide informational mentoring, which is a parallel offline support. Rather, offline support such as mentoring should be used as an appropriate device for abnormal symptom monitoring. Third, it is required that SMEs should improve their ability to utilize, because the effect of enhancing networking capacity through public information support infrastructure and enhancing product competitiveness through such infrastructure appears in most types of companies rather than in specific SMEs.

Smoking Adolescents' Acquisition of Cigarettes and Status of Proof of Age (흡연을 하는 청소년의 담배 구입 경로 및 신분 확인의 유무)

  • Kim, Hee Ra;Kim, Ji Young;Lee, Gee Hyung;Choung, Ji Tae;Park, Sang Hee
    • Clinical and Experimental Pediatrics
    • /
    • v.48 no.4
    • /
    • pp.363-368
    • /
    • 2005
  • Purpose : The aim of this study is to identify where and how adolescents acquire cigarettes and how many were asked for identification while purchasing cigarettes. Methods : This study was conducted in 2003; participants were 2,200 students in middle and high schools, aged from 13 to 18 years old(males 1,098; females 1,102) in Ansan, Korea. The questionnaire assured them of anonymity, and self-administered in school. The data was analyzed with chisquare test for trends. Results : The prevalence of smoking was about 20 percent among respondents, was higher in males than in females, and in older students than in younger students(P<0.001). The most frequent source of cigarettes was purchased from a store(36.3 percent). About 29.2 percent of the students borrowed from friends or family members. By sex, the main sources of cigarettes were purchase from a store and borrowing. Younger students were borrowed more cigarettes; older students purchased more cigarettes from stores. Only 48.8 percent were asked for proof of age during their purchase. Of those asked for proof of age, about 73.3 percent answered that this made it difficult to buy cigarettes(P<0.001), and they thought that it was more difficult when asked for a photo ID than simply being asked their age(P=0.019). Conclusion : So far, there has been no systemic prevention of adolescents' smoking. It is difficult for minors to purchase cigarettes if asked for proof of age, but most minors go to stores to purchase cigarettes. Therefore, prevention efforts should include educating retailers not to sell cigarettes to minors and enforcing existing laws requiring youth to provide proof of age when attempting to buy cigarettes.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Characteristics of Methicillin-resistant Staphylococcus aureus Nasal Colonization Among Neonatal Unit Staff and Infection Control Measures (일개 병원 신생아실 근무 의료인에서 시행한 비강 내 MRSA 집락의 특성 및 전파예방에 관한 보고)

  • Kim, Dong Hwan;Kim, Sun Mi;Park, Ji Young;Cho, Eun Young;Choi, Chang Hee
    • Pediatric Infection and Vaccine
    • /
    • v.16 no.2
    • /
    • pp.131-141
    • /
    • 2009
  • Purpose : In February 2007, an outbreak of methicillin-resistant Staphylococcus aureus (MRSA) skin and soft tissue infections occurred in two newborns in the neonatal unit of Sahmyook Seoul Hospital. We performed this study to investigate the characteristics of MRSA nasal carriage among neonatal unit staffs and the effective infection control measures. Methods : Nasal swab specimens were obtained from the neonatal unit staff for the presence of MRSA. MRSA-colonized staffs were offered decolonization therapy with oral trimethoprim-sulfamethoxazole or 2% mupirocin ointment. Every 2-4months after decolonizaton, repeat nasal swab specimens were obtained. Also, samples from the neonatal unit environment and room air were collected. Results : Successful decolonization was achieved in 92% of the cases in 2 weeks after decolonization therapy, but most of the staffs were recolonized after several months. The nature of antibiotic susceptibility was changed from multi-drugsusceptible to multi-drug-resistant. The most frequently contaminated objects were dressing carts, computer keyboards, bassinets and washbowls. In environmental cultures using the settle microbe count method, the colony counts were decreased significantly at the last study period compared with the first study period in the neonatal room, breastfeeding room, service room, and dressing room (P <0.05). Conclusion : Effective control of sustained MRSA transmission within an institution may require prompt identification, treatment, and monitoring of colonized and/or infected staffs. However, nasal decolonization therapy may induce multi-drugresistant MRSA infection and had no effect on decreasing the MRSA nasal carriage rate in our study. Other factors might be more important, such as improving staff education, increasing hand hygiene practices, and environmental sterilization for controlling MRSA infections.

  • PDF

Overview of Real-time Visibility System for Food (Livestock Products) Transportation Systems on HACCP Application and Systematization (축산물 유통단계의 HACCP 적용과 체계화를 위한 실시간 관제시스템에 대한 현황)

  • Kim, Hyoun-Wook;Lee, Joo-Yeon;Hong, Wan-Soo;Hwang, Sun-Min;Lee, Victor;Rhim, Seong-Ryul;Paik, Hyun-Dong
    • Food Science of Animal Resources
    • /
    • v.30 no.6
    • /
    • pp.896-904
    • /
    • 2010
  • HACCP is a scientific and systematic program that identifies specific hazards and gives measurements in order to control them and ensure the safety of foods. Transportation of livestock and its products is one of the vulnerable sectors regarding food safety in Korea, as meats are transported by truck in the form of a carcass or packaged meat in a box. HACCP application and its acceleration of distribution, in particular transportation, are regarded as important to providing consumers with ultimately safe livestock products. To achieve this goal, practical tools for HACCP application should be developed. Supply chain management (SCM) is a holistic and strategic approach to demand, operations, procurement, and logistics process management. SCM has been beneficially applied to several industries, notably in vehicle manufacture and the retail trade. HACCP-based real-time visibility system using wireless application (WAP) of the livestock distribution is centralized management system that enables control of temperature and HACCP management in real-time for livestock transportation. Therefore, the application of HACCP to livestock distribution (transportation, storage, and sale) can be activated. Using this system, HACCP management can be made easier, and distribution of safe livestock products can be achieved.

Prioritizing Noxious Liquid Substances (NLS) for Preparedness Against Potential Spill Incidents in Korean Coastal Waters (해상 유해액체물질(NLS) 유출사고대비 물질군 선정에 관한 연구)

  • Kim, Young-Ryun;Choi, Jeong-Yun;Son, Min-Ho;Oh, Sangwoo;Lee, Moonjin;Lee, Sangjin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.7
    • /
    • pp.846-853
    • /
    • 2016
  • This study prioritizes Noxious Liquid Substances (NLS) transported by sea via a risk-based database containing 596 chemicals to prepare against NLS incidents. There were 158 chemicals transported in Korean waters during 2014 and 2015, which were prioritized, and then chemicals were grouped into four categories (with rankings of 0-3) based on measures for preparedness against incident. In order to establish an effective preparedness system against NLS spill incidents on a national scale, a compiling process for NLS chemicals ranked 2~3 should be carried out and managed together with an initiative for NLS chemicals ranked 0-1. Also, it is advisable to manage NLS chemicals ranked 0-1 after considering the characteristics of NLS specifically transported through a given port since the types and characteristics of NLS chemicals relevant differ depending on the port. In addition, three designated regions are suggested: 1) the southern sector of the East Sea (Ulsan and Busan); 2) the central sector of the South Sea (Gwangyang and Yeosu); and 3) the northern sector of the West Sea (Pyeongtaek, Daesan and Incheon). These regions should be considered special management sectors, with strengthened surveillance and the equipment, materials and chemicals used for pollution response management schemes prepared in advance at NLS spill incident response facilities. In the near future, the risk database should be supplemented with specific information on chronic toxicity and updated on a regular basis. Furthermore, scientific ecotoxicological data for marine organisms should be collated and expanded in a systematic way. A system allowing for the identification Hazardous and Noxious Substances (HNS) should also be established, noting the relevant volumes transported in Korean waters as soon as possible to allow for better management of HNS spill incidents at sea.

Characteristics of Biological Agent and relavent case study (생물무기 특성과 사례연구)

  • Park, Minwoo;Kim, Hwami;Choi, Yeonhwa;Kim, Jusim
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.442-454
    • /
    • 2017
  • Biological weapon is manipulated and produced from microorganisms such as bacteria, virus, rickettsia, fungi etc. It is classified as one of the Weapons of Mass Destruction (WMD) along with chemical weapon and radiological weapon. Biological weapon has a number of operational advantages over the other WMDs including ease of development and production, low cost and possibility of covert dissemination. In this study we analyze the history of biological weapon's development and the existing biological threats. Then, we predict the social impact of biological attack based on the physical properties of biological agent and infection mechanisms. By analyzing the recognition, dispersion pattern of agents, characteristics of the diseases in the biological weapon related historical events such as Sverdlovsk anthrax accident, 2001 anthrax attack, we found out some of the facts that biological attack would not likely to be recognized rapidly, produce large number of the exposed, increase number of paients who suffed from severe respiratory illness. It would lead the public health and medical service providers to be struggled with hugh burden. Base on the facts that we found from this case study, we suggested the main capabilities of public health required to respond to bioterrorism event efficiently. Syndromic surveillance and other reporting system need to be operated effeciently so that any suspicious event should be detected promptly. the pathogen which suspected to be used should be identified through laboratory diagnostic system. It is critical for the public health agency to define potentially exposed population under close cooperation with law enforcement agencies. Lastly, massive prophylaxis should be provided rapidly to the people at need by operating human and material resources effeciently. If those capacities of public health are consistantly fortified we would be able to deal with threat of bioterrorism successfully.