• Title/Summary/Keyword: 설계 변경

Search Result 2,455, Processing Time 0.03 seconds

A Study on the Management of Construction Project for Preventing Accidents of Reclamation : basic on the collapse of Sangdo Kindergarten (도심지 소규모 재개발·재건축공사시 흙막이가시설 사고예방을 위한 건설사업관리 방안 연구 : 상도유치원 붕괴사고 중심으로)

  • Oh, Se-kil;Park, Joo-Moon
    • Journal of Urban Science
    • /
    • v.8 no.1
    • /
    • pp.33-44
    • /
    • 2019
  • The purpose of this study is to investigate the cause of repeated accidents through the investigation and analysis of the collapse cases of domestic earthquakes in order to prevent the earthquake disaster in the urban redevelopment and reconstruction. It is designed and constructed to draw out various problem factors and to find solutions to these problems. And the contents related to various laws and systems of the construction project management stage. Especially. In the management of the construction management centered on the safety management and quality control of the technical aspect design, supervision, construction phase through the cause of the accident and improvement measures based on the investigation report of the collapse of the construction site near Sangdo Kindergarten in Seoul. Supervisor. And constructors should be settled on the responsibility and responsibility of God. In order to achieve the purpose of the project, a system is established to link worker-centered occupational safety and health management with technology-based safety construction management, and analysis of how the quality control of the earthquake prevention affects safety construction management The purpose of this study is to prepare the optimum management plan of construction business.As a result of this study, it is aimed to accomplish the purpose of small scale redevelopment and reconstruction construction project by providing optimization method in the stage of construction project management in order to prevent collapse caused by differences in design,Is expected.

Optimal Ship Route Planning in Coastal Sea Considering Safety and Efficiency (안전과 효율을 고려한 연안 내 선박의 최적 항로 계획)

  • Lee, Won-Hee;Choi, Gwang-Hyeok;Ham, Seung-Ho;Kim, Tae-wan
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.38-39
    • /
    • 2019
  • Optimal route planning is the route planning to minimize voyage time or fuel consumption in a given ocean environment. Unlike the previous studies on weather routing, this study proposes an optimization method for the route planning to avoid the grounding risk in the coast. The route way-points were searched using Dijkstra algorithm, and then the optimization was performed to minimize fuel consumption by setting the optimization design parameter to the engine rpm. To set the engine rpm, a method to use the fixed rpm from the departure point to the destination point, and a method to use the rpm for each section by dividing the route were used. The ocean environmental factors considered for route planning were wind, wave, and current, and the depth information was utilized to compute grounding risk. The proposed method was applied to the ship passing between Mokpo and Jeju, and then it was confirmed that fuel consumption was reduced by comparing the optimum route and the past navigated route.

  • PDF

The Efficient Clutter Simulation Method for Airborne Radars (항공기용 레이다를 위한 효율적인 클러터 모의 방법)

  • Lee, Jonggil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1123-1130
    • /
    • 2019
  • Simulation of the strong clutter occurring from the airborne radar is essential in the efficient development and performance evaluation of the aircraft radar system. If the efficient simulation of the clutter can be successful, algorithms can be proved and analyzed and also the performance evaluation is possible in the laboratory environment. Therefore, development and implementation of the airborne radar system can be achieved very economically in the effective way. However, the clutter simulation procedure is very difficult and tedious since the clutter environment changes in numerous ways as it depends on the flight path, direction of antenna beam, reflectivity of the surface, etc.. Thus, in this paper, the general Doppler spectrum model is suggested for efficient simulation of the various clutter environment. Also, it is shown that the various type of clutter in time domain can be generated easily by changing and adjustment of parameters in the general Doppler spectrum model.

A Study of Document Creation and Management in Braille Libraries (점자도서관의 문서 생산과 관리에 관한 연구)

  • Seok, Jeong Eun
    • The Korean Journal of Archival Studies
    • /
    • no.40
    • /
    • pp.181-223
    • /
    • 2014
  • This study aims to present a Braille Library document creation and management status, and to identify ways to improve. This research field surveys and interviews were conducted three institutions, the quality requirements of the ISO 15489 standards. As a result, the Braille Library document management improvement plan is as follows. First, the policy and regulatory maintenance is needed. Copy of the regulations on the creation and management, access rights and related document management policies should be developed. Second, the document creation process needs to be improved. Electronic approval system responsible for the creation of persons who are visually impaired, visually impaired people can read documents created during document creation, and introduced measures and braille labels on the files attached to will have to be prepared. Third, the document management process needs to be improved. Changes in the creation copy of the records, and preserved along with the preservation of the original and the copy to have the same period, appointed to manage one set of all copies of the authentic copy of the plan is also required. Finally, for document management system should be introduced. Systematic document management system that can be introduced is required. This system will be designed to be accessible to the visually impaired, the search.

Implementation of an Arduino Compatible Modular Kit for Educational Purpose (모듈 기반 교육용 아두이노 호환 키트 제작)

  • Heo, Gyeongyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.547-554
    • /
    • 2019
  • With the curriculum revision in 2015, informatics for secondary high schools was designated as mandatory. As a result, there is an increasing interest in programming in elementary and junior high schools as well as in universities. Arduino is one of the famous tools for programming education, and the usefulness of it has been proven through various case studies. However, existing Arduino-based kits have hardware-dependent drawbacks such as complicated wiring, poor scalability, etc. To overcome these problems, we proposed a kit design, which has a module-based structure, can be extended through one common interface, and can be used for learning at various levels. In this paper, we describe the implementation details of FRUTO kit and a software to use it, which satisfies the proposed design criteria. FRUTO kit has been determined in its current form through several design changes, and is under pre-test before launching.

Establishment of Real-time HILS Environment for Small UAV Using 6 D.O.F Motion Table (6자유도 모션테이블을 이용한 소형 무인항공기용 실시간 HILS 환경 구축)

  • Cha, Hyungkyu;Jeong, Jinseok;Shi, Hayoung;Yoon, Junseok;Kang, Beomsoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.47 no.5
    • /
    • pp.326-334
    • /
    • 2019
  • Development of Small UAV using HILS (Hardware In the Loop Simulation) can be effectively used to improve the reliability of UAV (Unmanned Aerial Vehicle) while reducing cost and time. It is also possible to reduce the damage to people or property by simulating the malfunction of the Flight Control Computer (FCC) that may occur during the actual flight. For applying such HILS, a real-time simulation environment capable of providing an environment similar to an actual flight condition is required. In this paper, we constructed a real - time HILS environment for Small UAV using 6 D.O.F motion table. In order to link the 6 D.O.F motion table developed in the previous research with the HILS environment in real time, the motion algorithm was changed from the position control method to the velocity control method. Also, we implemented modeling of inverse kinematics model for command transmission in Matlab $Simulink^{(R)}$ and verified the action of motion table according to the simulation model.

A Research on the improvement of domestic IoT security certification system (국내 IoT 보안인증 제도 개선 연구)

  • Lee, Yongpil;Suh, YungJin;Lee, SangGeol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.79-92
    • /
    • 2021
  • In a society where ICT technology is converged, the use of various network-connected devices such as IoT is spreading. Network-connected devices are inevitably exposed to the threat of hacking such as information leakage, and countermeasures need to be prepared to respond. Security certification system for IoT devices has been introduced to promote security of IoT products, and for this purpose, legalization and standardization of certification standards and methods are in progress. In line with this, in Korea, as the Information and Communication Network Act was revised in 2020, ICT convergence devices connected to the network were newly defined as "information and communication network connected devices," and the basis for the security certification system is being established. We summarized related domestic and foreign trends and suggest specific considerations for implementing the security certification system for IoT devices in South Korea.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

The Modified IPv6 NDP Mechanism for Preventing IP Spoofing (IP 스푸핑 방지를 위한 수정된 IPv6 NDP 메커니즘)

  • Kim Ji-Hong;Nah Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.95-103
    • /
    • 2006
  • IPv6 is a new version of the Internet protocol, designed as the successor to IPv4. Among the changes from IPv4 to IPv6, we focused on the stateless address auto-configuration mechanism. The address auto-configuration mechanism is used by nodes in an IPv6 network to learn the local topology. The current specifications suggest that IPsec AH may be used to secure the mechanism, but there is no security association during address auto-configuration process because it has no initial IP address. As there are so many suity threats, SEND protocol was designed to counter these threats. In this paper we analyzed the security problems in NDP and SEND protocol. So we proposed the Modified NDP mechanism using PKC and AC in order to solve these problems.

Design and Implementation of an Android Application for Protecting the Personal Information on Smart Phones (스마트폰의 개인 정보 보호를 위한 안드로이드용 어플리케이션 설계 및 구현)

  • Lim, Hun-Jin;Choi, Do-Jin;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.266-277
    • /
    • 2020
  • As users' convenience increases, the issue of personal information leakage about smartphones is also becoming serious. Since all of the user's personal information needed to provide functions such as electronic banking services and personal file storage is stored in the smartphone, the user's important personal information may be exposed if the smartphone is lost or stolen. In order to protect this privacy, governments and telecommunications companies offer smartphone locking or initialization services, but there are many loopholes and problems. In this paper, we design and implement applications that prevent malicious use of a user's personal information stored on a smartphone when a smartphone is lost or stolen, and that automatically initializes the smartphone used after removing or altering the USIM chip and destroys the user's personal information stored within the phone. The proposed application prevents users from maliciously using their personal information when a smartphone is lost or stolen.