• Title/Summary/Keyword: 능동적인 대응

Search Result 453, Processing Time 0.031 seconds

The Strategies of Busan Port Related to the Opening of Yangsan Port (양산항 개장에 따른 부산항의 대응전략)

  • Lee, Soo-Lyong;Moon, Seong-Cheol;Choi, Chul-Jin;Bae, Byung-Tae
    • Journal of Korea Port Economic Association
    • /
    • v.23 no.2
    • /
    • pp.1-24
    • /
    • 2007
  • With its foreign trade rapidly expanding and with economic growth continuing at a substantial rate, China has become the largest container traffic generating country in the world. And with trend of container ships becoming larger and faster, the environment surrounding ports in North-East Asia are rapidly changing. The Yangsan, offshore port for Shanghai, being developed on the islands of Da Yangsan and Xiao Yangsan, some 30km offshore, and connected to the mainland by the six-lane highway Donghai bridge, opened phase one in late 2005 and phase two in 2006 respectively and will have 29 berths by 2012 and be able to handle 15 million TEU. The Port of Shanghai which passed Busan in terms of container volume further consolidated its position as the world's No. 3 port with an annual volume of 21.7 million TEU in 2006 and is likely to have emerged as the biggest container port in the world. The Port of Busan, the world's fifth largest container port, wants to survive as regional hub port. In this circumstance, the strategies of the Port of Busan should be established.

  • PDF

Deep Learning Based Emergency Response Traffic Signal Control System

  • Jeong-In, Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.121-129
    • /
    • 2023
  • In this paper, we developed a traffic signal control system for emergency situations that can minimize loss of property and life by actively controlling traffic signals in a certain section in response to emergency situations. When the emergency vehicle terminal transmits an emergency signal including identification information and GPS information, the surrounding image is obtained from the camera, and the object is analyzed based on deep learning to output object information having information such as the location, type, and size of the object. After generating information tracking this object and detecting the signal system, the signal system is switched to emergency mode to identify and track the emergency vehicle based on the received GPS information, and to transmit emergency control signals based on the emergency vehicle's traveling route. It is a system that can be transmitted to a signal controller. This system prevents the emergency vehicle from being blocked by an emergency control signal that is applied first according to an emergency signal, thereby minimizing loss of life and property due to traffic obstacles.

A Comparative Study of Textile Printing and Traditional Screen Printing (디지털 텍스타일 프린팅과 재래식 스크린 날염의 비교연구)

  • 정용순
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.363-372
    • /
    • 2004
  • In the new millenium of information and digital age, the vogue cycle has been gelling shorter and shorter and the individualistic and high quality preference of contemporary consumers drive the small quantity production by order. The traditional screen printing system can not hold the competitive edge anymore. In order to actively meet the demand of the fast evolving market, compete with other nations, and produce high value-added products, we need the new production system to meet the individual needs promptly. Mass production using the traditional screen printing system has the economic advantage of the production speed and cost. The digital textile printing system digitalizes the total process from the design to the printing and omits the separation and engraving. It is more suitable to produce the multiple item-small quantity and add more values to its products. It has also the advantage of less pollution problem.

  • PDF

Research on System Architecture and Simulation Environment for Cyber Warrior Training (사이버전사의 훈련을 위한 시스템 구축 방안 연구)

  • Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.533-540
    • /
    • 2016
  • It is important to establish the environment for cyber warrior training, testing support and effectiveness analysis in order to cope with sharply increasing cyber threat. However, those practices cannot be easily performed in real world and are followed with many constraints. In this paper, we propose a live/virtual M&S-based system for training/testing and constructive M&S-based system for effectiveness analysis to provide an environment similar to real world. These can be utilized to strengthen the capability to carry out cyber war and analyze the impact of cyber threat under the large-scale networks.

Development of a Daily Snowmelt Depth Model using Multiple Linear Regression (다중회귀모형을 활용한 일 단위 융설 깊이 예측 모형 개발)

  • Oh, Yeoung Rok;Lee, Gyumin;Shin, Hyungjin;Jun, Kyung Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.374-374
    • /
    • 2021
  • 최근 우리나라에도 대설로 인한 피해가 발생하고 있으며, 피해의 대부분은 강설 발생 이후 남아 있는 적설량이 주된 원인이 되고 있다. 적설량에 대한 예측은 대설피해에 대응하기 위한 중요한 정보이다. 따라서 본 연구에서는 융설량에 영향을 미칠것으로 판단되는 적설량, 기온, 습도, 일사량을 반영하여 일일 융설량을 모의하는 다중회귀모형을 구성하였다. 모형은 2000년부터 2020년까지의 강설 사상을 대상으로 구축하였으며, 2021년에 발생한 광주, 대관령, 목포, 서산, 전주 지역의 강설 사상에 적용하였다. 분석 대상 지역의 평균 적설량은 7.41 cm로 나타났으며, 평균 RMSE는 1.64 cm가 발생하였다. 오차의 원인으로는 적설량이 1 cm 미만 감소했을 경우, 바람이나 승화의 영향이 상대적으로 크게 작용할 수 있으나, 본 연구에 이용된 함수는 바람과 증발산 등이 고려되지 않았다. 또한, 회귀계수 결정에서 급격한 온도 변화를 능동적으로 반영하기 어려워 급상승한 온도나 매우 낮은 온도에 오차가 더 크게 나타난다. 따라서, 본 함수를 통하여 융설 깊이를 예측하기 위해서는 매우 높은 온도나, 매우 낮은 온도에서의 영향을 통제할 수 있는 변수 또는 상수를 추가할 필요가 있는 것으로 판단된다. 또한 초기 강설 당시의 기온과 습도 등에 따라, 눈의 결정이 달라지고, 이에 따라 융설에도 영향을 미칠 수 있다는 점을 이해하여, 초기 적설에 대한 변수도 고려되어야 할 것이다.

  • PDF

A Study on the Realities of Sexual Violence and the Measure for Social Welfare (성폭력 실태와 사회복지적 대책 방안에 관한 연구)

  • Bae, Na-Rae;So, Kwon-Seob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.251-258
    • /
    • 2020
  • This study aims to address the current situation and damage from sexual violence, to arouse public opinion, help broader awareness, and further lead to community social efforts to cope actively with the situation. In Korean society, discourse on sex is often conducted in a double structure. Sexual violence is not just a personal misfortune; it is a problem for women as a whole. Furthermore, it is a challenge that society needs to address. Therefore, the government should evolve its response to sexual violence into a collective, not individual, movement of men and women toward social and cultural movements together. Although the visible reality of sexual violence is important, damaging their mental health by passing on a distorted cultural environment to future generations should be seen as a type of historical crime.

ATM Network Resource Mangement and Control via Virtual Path Reconfiguration (가상 경로 재구성을 통한 ATM망 자원 관리 및 제어)

  • 임재진;김종권
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.11
    • /
    • pp.2199-2214
    • /
    • 1994
  • In order to sufficiently utilize the potential effectiveness of ATM networks, systematic and effective network management and control systems must be employed. In addition to network design, planning, and call routing techniques used in traditional circuit-switched networks. ATM networks can provide logical VP(Virtual Path) reconfiguration capabilities which can adapt to changes in the network environment. With a proper application of the VP reconfiguration technique, ATM networks can reduce the overhead of frequent network redesign and the overhead of call routing processing. However, ATM VP reconfiguration is a very complex and difficult problem which consists of many facets of optimization subproblems such as VP routing. VP sizing, VP terminating point location and VC routing. Most previous research on the ATM logical network reconfiguration problem dealt with the subset of the problem. This paper mathematically formulates the ATM network reconfiguration problem completely considering all subproblems. Since it is very difficult to derive the optimal solution of the formulated problem, we develop a heuristic method based on a Max min bandwidth allocation principle. We show the feasibility of the proposed heuristic method with a simple example.

  • PDF

Design and Implementation of Internet Throats and Vulnerabilities Auto Collector for Cyber Threats Management (사이버위협 관리를 위한 인터넷 위협 및 취약점 정보 수집기 설계 및 구현)

  • Lee, Eun-Young;Paek, Seung-Hyun;Park, In-Sung;Yun, Joo-Beom;Oh, Hung-Geun;Lee, Do-Hoon
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2006
  • Beginning flag security it was limited in Firewall but currently many information security solutions like Anti-virus, IDS, Firewall are come to be many. For efficiently managing different kinds of information security products ESM (Enterprise Security management) are developed and operated. Recently over the integrated security management system, TMS (Threat Management System) is rising in new area of interest. It follows in change of like this information security product and also collection information is being turning out diversification. For managing cyber threats, we have to analysis qualitative information (like vulnerabilities and malware codes, security news) as well as the quantity event logs which are from information security products of past. Information Threats and Vulnerability Auto Collector raises the accuracy of cyber threat judgement and can be utilized to respond the cyber threat which does not occur still by gathering qualitative information as well as quantity information.

  • PDF

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

A Study on Innovation of Construction Industry & Project Operation System (건설산업과 조직(생산시스템의 개혁을 위한 원론적 고찰))

  • Lee Jea-Sauk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.19-26
    • /
    • 2002
  • The Circumstance of Construction Industry is speedily changing. For example, the stock of building, housing etc , will be measure up in KOREA soon. And. Variety and Complexity of Construction Purpose are increasing. So that Clearness and Frankness of Project Process are inquired more than ever. We need to approach by Fundamentally, Radically, and Dramatically. The purpose of this study is Qualitative Prosperity by Reconsideration of Principles of System and Positive Action to Changing Condition on Construction Industry. In the other words, when all Stakeholders are participates in construction project, Creative Genius, Liability and Responsibility are important. Construction System need to Competitive Sense and Organic Integration as Social Open System. In this paper, Project Process, Stakeholder, Organizing Process and Total Project Operation System are considered.

  • PDF