• Title/Summary/Keyword: 노출평가 툴

Search Result 9, Processing Time 0.023 seconds

Technical Review on Methodology of Generating Exposure Scenario in eSDS of EU REACH (유럽 신화학물질관리제도의 eSDS에 첨부되는 노출시나리오 작성법 개발 동향)

  • Choe, Eun-Kyung;Kim, Jong-Woon;Kim, Sang-Hun;Byun, Sung-Won
    • Clean Technology
    • /
    • v.17 no.4
    • /
    • pp.285-299
    • /
    • 2011
  • As one of the REACH obligations, the extended safety data sheet (eSDS) should be communicated within the supply chain under the REACH Regulation. Based on technical guidance documents published on the ECHAs website and survey of EU's recent REACH-related informations, this paper includes a study on details of how to develop exposure scenarios (ES) such as structure of ES, process of ES develpoment, standard workflows and key input data to develop ES with an introduction of eSDS concept. This paper also contains an overview on operational conditions (OCs) and risk management measures (RMMs) that are what to consider when building an ES. The structure of Chesar (Chemical Safety Assessment and Report tool) developed by European Chemicals Agency (ECHA) is studied with a review of the available exposure estimation tools for workers, environment and consumers. Case example of generic exposure scenario (GES) for organic solvent is presented. To guide Korean EU-exporting companies, their participating roles in three steps of preparing ES are addressed.

Development of Privacy Impact Assessment Tool (개인정보 영향평가 툴 개발)

  • Heo, Jin-Man;Woo, Chang-Woo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.75-81
    • /
    • 2012
  • As the number of web users is increasing, the leakage of personal information is increasing. If some personal information is leaked, the victim can suffer from material damage or mental damage at the same time. Most of the leakages are result from the people who works for the personal information by accident or design. Hence, the Ministry of Public Administration and Security proposeed the measuring index and enumerates the details. The index is used in a system to check protection of a personal information. However, because this system is used to evaluate after the leakage, it cannot be used to construct some security system or programming a security system. To solve this problem, it needs to express the diversity of items and be able to count what assessors want to count. Thus, a summary sheet which displays the result of the tool will be presented in a radial form graph. Details will be presented as a bar graph. Therefore, it will be proposed that the tool can grasp the weak point and propose the direction of security.

  • PDF

Implementation of Web-based Visual Cognition Experiment System (웹기반 시각인지실험환경 구현)

  • Seo, Su-Ung;Park, Gyu-Won
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2009.05a
    • /
    • pp.91-94
    • /
    • 2009
  • 기업의 경쟁력 제고를 위한 브랜드 커뮤니케이션의 중요성이 높아지고 있는 가운데, 판매-소비 인터페이스의 최전선에 있는 패키지 디자인의 역할과 비중이 커지면서 패키지가 곧 브랜드라는 인식이 생기고 있다. 소비자가 패키지를 통해 느끼는 감성은 시각적 경험이 발생하는 시점과 환경에 따라 달라질 수 있다. 특히, FMCG의 경우, 광고를 통해 축적된 제품에 대한 긍정적 이미지는 실제 매장에서 여러 제품과 동시에 노출되었을 때 제품에 대한 느낌이 상쇄될 수 있다. 본 연구에서는 감성경험조건의 차이 즉, 패키지의 노출조건에 따라 감성의 차이가 발생한다는 가설을 세우고, 이를 검증하기 위한 온라인 실험환경을 구축하였다. 실험시나리오를 바탕으로 플래시 툴을 활용하여 인터랙티브한 실험컨텐츠를 제작하고, 평가값은 PHP 를 통해 DB 에 저장하였다. 저장된 데이터는 SPSS로 통계분석을 시도하였다. 본 실험을 통해 독립 노출과 군집노출에 따라 감성의 차이가 발생하며, 감성차이에 영향을 주는 요인으로서 컬러와 타이포그래피가 주된 요인이 된다는 점을 알 수 있었다.

  • PDF

Cumulative Impact Assessment Using Environmental Health Screening Tool in Seoul (환경보건 스크리닝 툴을 이용한 서울시 누적영향 평가)

  • Lim, Yu-ra;Bae, Hyun-joo
    • Journal of the Korean association of regional geographers
    • /
    • v.20 no.4
    • /
    • pp.444-453
    • /
    • 2014
  • Inequality of environmental impact is forecast to deepen due to the damage of environmental risk by the interaction between environmental and social inequalities causing more harms to environmentally vulnerable population. This study assessed the integrated cumulative impact of Seoul using Environmental Health Screening Tool developed by Environmental Protection Agency of California. In order to screen vulnerable area to environmental health, 10 indexes have been selected according to the environmental burden of exposure to environment and public health effects, population characteristics of sensitive populations and socio-economic factors. As a result of assessment conducted on cumulative impact of Seoul for years 2009~2011 through Environmental Health Screening Tool, risk factor for districts of Gangseo and Gangnam of Seoul showed high - Gangseo area indicated high risk factor both in environmental burden and population characteristics, while Gangnam area appeared high in environmental burden. The result of survey will be able to suggest scientific basis to push through fair and effective environmental policy in consideration of environment vulnerable population.

  • PDF

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

The Quantification of Flood Damage Using K-FRM (K-FRM을 이용한 홍수피해액 정량화)

  • Yeong Uk Yu;In Gyu Hwang;Yeon Jeong Seong;Young Hun Jung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.405-405
    • /
    • 2023
  • 최근 기후변화로 인한 극심한 홍수와 가뭄, 폭염 등 이상 기온 및 기후에 따른 피해가 급격히 증가하는 추세이다. 특히, 집중호우로 인해 도심지에서 발생한 홍수피해는 재산피해뿐만 아닌 수 많은 인명피해가 발생하고 있다. 국내에서는 수재해로부터 인명과 재산을 보호하기 위해 용수공급과 체계적인 치수 사업이 행한 바 있다. 이러한 치수 사업에서 경제성 분석은 사업 전·후 의 편익추정이 완벽히 검증되기 쉽지 않으며, 기존의 치수 계획은 유역 전반에 걸쳐 다양한 홍수 방어시설의 종합적인 고려 없이 제방 중심으로만 수립되어 홍수 발생 시 하천에 과도한 부담을 줄 뿐만 아니라, 사업의 경제성이 낮게 평가되고 있다. 이렇게 국내에서 행해진 하천설계기준에서 제안되었던 경제성 분석 방법은 여러 가지 문제점들을 내포하고 있으며 지속적인 홍수피해가 발생하였다. 이와 같은 문제점들을 개선하고자 개발된 K-FRM(Forean-Flood-Risk Model)은 능동형 하천정보 운영을 통한 다차원 하천관리체계 구축 및 활용을 위한 정량적 위험도 평가 툴로 위험지역에 노출된 자산의 정보(인벤토리), 평가기준, 손상함수, 계량화 원단위 등 홍수피해를 추정하는데 활용이 가능하며, 손실 또는 피해액으로 표현되는 재해손실은 경제적인 관점에서의 위험이며 금전적인 형태로 표현된다. 본 연구에서는 홍수피해액 정량화 모델인 K-FRM을 활용하여 굴포천 유역과 영강 유역을 대상으로 항목별 피해액 산정 후, 정량적 피해액 산정 방법인 EAD(Expected Annual Damage) 분석을 통해 홍수피해위험지도를 작성하여 표준유역별, 행정구역별 홍수피해액을 산정하는 것을 목적으로 한다.

  • PDF

A Cross-check based Vulnerability Analysis Method using Static and Dynamic Analysis (정적 및 동적 분석을 이용한 크로스 체크기반 취약점 분석 기법)

  • Song, Jun-Ho;Kim, Kwang-Jik;Ko, Yong-Sun;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.863-871
    • /
    • 2018
  • Existing vulnerability analysis tools are prone to missed detections, incorrect detections, and over-detection, which reduces accuracy. In this paper, cross-checking based on a vulnerability detection method using static and dynamic analysis is proposed, which develops and manages safe applications and can resolve and analyze these problems. Risks due to vulnerabilities are computed, and an intelligent vulnerability detection technique is used to improve accuracy and evaluate risks under the final version of the application. This helps the development and execution of safe applications. Through incorporation of tools that use static analysis and dynamic analysis techniques, our proposed technique overcomes weak points at each stage, and improves the accuracy of vulnerability detection. Existing vulnerability risk-evaluation systems only evaluate self-risks, whereas our proposed vulnerability risk-evaluation system reflects the vulnerability of self-risk and the detection accuracy in a complex fashion to evaluate relative. Our proposed technique compares and analyzes existing analysis tools, such as lists for detections and detection accuracy based on the top 10 items of SANS at CWE. Quantitative evaluation systems for existing vulnerability risks and the proposed application's vulnerability risks are compared and analyzed. We developed a prototype analysis tool using our technique to test the application's vulnerability detection ability, and to show that our proposed technique is superior to existing ones.

Fabric Mapping and Placement of Field Programmable Stateful Logic Array (Field Programmable Stateful Logic Array 패브릭 매핑 및 배치)

  • Kim, Kyosun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.209-218
    • /
    • 2012
  • Recently, the Field Programmable Stateful Logic Array (FPSLA) was proposed as one of the most promising system integration technologies which will extend the life of the Moore's law. This work is the first proposal of the FPSLA design automation flow, and the approaches to logic synthesis, synchronization, physical mapping, and automatic placement of the FPSLA designs. The synchronization at each gate for pipelining determines the x-coordinates of cells, and reduces the placement to 1-dimensional problems. The objective function and its gradients for the non-linear optimization of the net length and placement density have been remodeled for the reduced global placement problem. Also, a recursive algorithm has been proposed to legalize the placement by relaxing the density overflow of bipartite bin groups in a top-down hierarchical fashion. The proposed model and algorithm are implemented, and validated by applying them to the ACM/SIGDA benchmark designs. The output state of a gate in an FPSLA needs to be duplicated so that each fanout gate can be connected to a dedicated copy. This property has been taken into account by merging the duplicated nets into a hyperedge, and then, splitting the hyperedge into edges as the optimization progresses. This yields additional 18.4% of the cell count reduction in the most dense logic stage. The practicality of the FPSLA can be further enhanced primarily by incorporating into the logic synthesis the constraint to avoid the concentrated fains of gates on some logic stages. In addition, an efficient algorithm needs to be devised for the routing problem which is based on a complicated graph. The graph models the nanowire crossbar which is trimmed to be embedded into the FPSLA fabric, and therefore, asymmetric. These CAD tools can be used to evaluate the fabric efficiency during the architecture enhancement as well as automate the design.