• Title/Summary/Keyword: 시나리오 가속화

Search Result 37, Processing Time 0.058 seconds

A Study on the Sensitivity Analysis of Ship Mooring Evaluation Factors According to Sea Level Rise in Mokpo Port (목포항 해수면 상승에 따른 선박 계류평가요소의 민감도 분석 연구)

  • Seungyeon Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.5
    • /
    • pp.445-455
    • /
    • 2023
  • Sea level rise due to global warming is accelerating. According to the IPCC survey, the expected sea level rise in 2100 was analyzed to be 47cm in the low-carbon scenario (SSP 1-2.6) and 82cm in the high-carbon scenario (SSP 5-8.5). Sea level rise can cause serious damage to port infrastructure and reduce the safety of ships docked inside ports. In this study, Mokpo Port, which frequently suffers from flooding during high tide, was selected and the sensitivity of mooring evaluation factors was analyzed for actual berthing ships according to sea level rise scenarios. From the analysis, we found that the tension of mooring line, the load of bollard, vertical angle of mooring line, and ship's motion of 6-DOF, which are evaluation factors, generally increased when the sea level increased. The most sensitive evaluation factor was sway motion of 6-DOF. Also, we analyzed that the value of mooring evaluation factors decreased when the crown height was raised. This was beneficial in improving ship and pier safety. The results of this study can be used as basic data to secure measures to improve port and ship safety according to sea level rise in Mokpo Port.

Automatic Collection of Production Performance Data Based on Multi-Object Tracking Algorithms (다중 객체 추적 알고리즘을 이용한 가공품 흐름 정보 기반 생산 실적 데이터 자동 수집)

  • Lim, Hyuna;Oh, Seojeong;Son, Hyeongjun;Oh, Yosep
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.205-218
    • /
    • 2022
  • Recently, digital transformation in manufacturing has been accelerating. It results in that the data collection technologies from the shop-floor is becoming important. These approaches focus primarily on obtaining specific manufacturing data using various sensors and communication technologies. In order to expand the channel of field data collection, this study proposes a method to automatically collect manufacturing data based on vision-based artificial intelligence. This is to analyze real-time image information with the object detection and tracking technologies and to obtain manufacturing data. The research team collects object motion information for each frame by applying YOLO (You Only Look Once) and DeepSORT as object detection and tracking algorithms. Thereafter, the motion information is converted into two pieces of manufacturing data (production performance and time) through post-processing. A dynamically moving factory model is created to obtain training data for deep learning. In addition, operating scenarios are proposed to reproduce the shop-floor situation in the real world. The operating scenario assumes a flow-shop consisting of six facilities. As a result of collecting manufacturing data according to the operating scenarios, the accuracy was 96.3%.

Estimation of Leg Collision Strength for Large Wind Turbine Installation Vessel (WTIV) (대형 해상풍력발전기 설치 선박(WTIV) Leg구조의 충돌 강도평가)

  • Park, Joo-Shin;Ma, Kuk-Yeol;Seo, Jung-Kwan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.5
    • /
    • pp.551-560
    • /
    • 2020
  • Recently, the offshore wind power generator market is expected to grow significantly because of increased energy demand, reduced dependence on fossil fuel-based power generation, and environmental regulations. Consequently, wind power generation is increasing worldwide, and several attempts have been made to utilize offshore wind power. Norway's Petroleum Safety Authority (PSA) requires a leg-structure design with a collision energy of 35 MJ owing to the event of a collision under operation conditions. In this study, the results of the numerical analysis of a wind turbine installation vessel subjected to ship collision were set such that the maximum collision energy that the leg could sustain was calculated and compared with the PSA requirements. The current leg design plan does not satisfy the required value of 35 MJ, and it is necessary to increase the section modulus by more than 200 % to satisfy the regulations, which is unfeasible in realistic leg design. Therefore, a collision energy standard based on a reasonable collision scenario should be established.

A Feasibility Study to Adopt BIM-based Infrastructure Management System (BIM기반 사회기반 시설물 유지관리 도입을 위한 경제적 타당성 분석)

  • Kim, Jeonghwan;Ji, Seung-Gu;Jeong, Taehyung;Seo, Jongwon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.1
    • /
    • pp.285-292
    • /
    • 2014
  • BIM (Building Information Modeling) is a new paradigm that includes construction life-cycle, and BIM has become mandatory regulation according to the Public Procurement Service since 2016, which accelerates its application. BIM is now expand from architectural field to infrastructure industry. Through pilot projects, BIM has been challenged with verification process. This trend has affected to maintenance and operation (M&O) phase of construction life-cycle. Advanced country has already published their research and result with feasibility study and guidelines. In this paper, we conduct the feasibility study to adopt BIM-based infrastructure management system. Bridges and tunnels were selected as application target, and benefit/cost ratio were used. The result shows that BIM-based infrastructure management system is feasible when the level of detail is more than "Medium" in bridge, and "High" in tunnel.

Construction of Multi-agent-based Distributed Framework for Application Services of u-Hospital Information Systems (u-병원 정보 시스템의 응용 서비스를 위한 멀티에이전트 기반 분산 프레임워크 구축)

  • Jeong, Chang-Won;Shin, Chang-Sun;Joo, Su-Chong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.861-865
    • /
    • 2009
  • As the hospital environment has been increasingly changed into a ubiquitous environment, the application services for the hospital environment are also faced with new requirements. In particular, the emergence of various mobile devices and the introduction of a wireless sensor network technology have accelerated the realization of the u-healthcare. The multi-agent paradigm has been introduced for satisfying both the integration of information and the various application scenarios established from various environments. This paper describes the software structure and u-applications for u-hospital information system based on ubiquitous environments. And it suggested the construction of a multi agent based distributed framework for supporting u-hospital information system. The suggested framework includes the JADE and distributed object group framework. And it implemented u-application services for supporting doctors and nurses, which provides the patient's health information and ward environment information. Especially, it is using a dynamic security mechanism on the security situation, which has not been emphasized in existing researches, and this paper shows the results for each user through the GUI.

Design and Implementation of App Control System for Improving the Security of the Mobile Application (모바일 애플리케이션의 보안성 향상을 위한 App 제어 시스템 설계 및 구현)

  • Lee, Yu-Jun;Jang, Young-Hwan;Park, Seok-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.243-250
    • /
    • 2016
  • Recently, with the rise of the mobile device, from mobile devices the user who owns the security, speed up the implementation of the guarantee management environment as businesses and individual equipment for the effcient management of the existing system, but the introduction of the MDM MDM App management features administrators to register the App until you can't prvent the security threat. Therefore, this paper addresses these issues in order to improve the security of your application for the control system. The proposed system is a function of the MDM authentication technology to design analysis, and system architecture to help prevent information disclosure within the design and implementation of Mobile-based application control system. Implementation of the control system to assess the security of the international common criteria security evaluation complete the test scenarios on the basis of the test items. An average of 40% of the test results to verify the results of this enhanced security.

Development of the Web-based Participation IoT Service Brokering Platform (웹 기반 참여형 IoT 서비스 브로커링 플랫폼 개발)

  • Lee, Jun-Young;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.40-57
    • /
    • 2015
  • IoT is the foundation technology that the things share the information through connected with Internet to provide service based on these information. It is applied to various fields such as personal, public and industry. Therefore, the service development is required to meet the requirement of the various service environments. The IoT service environment will be developed as the participation IoT service environment which increase the value and efficiency such as the Broadcasting and web services changed from the service provider environment to the user participation service. The user can directly reflect their requirements using the user participation IoT service environment. So, the types of IoT services will diverse and accelerate the spread of IoT service. In this paper, we derive the IoT service element through the analysis of various service scenarios, and propose the participation IoT service model and modeling mechanism. It provides the sequential service model and the relation based service model according to the service modeling proficiency of user. The proposed environment provides the web-based user interface that is implemented by the participation IoT service brokering platform.

Analysis of Gaze Related to Cooperation, Competition and Focus Levels (협력, 경쟁, 집중 수준에 따른 시선 분석)

  • Cho, Ji Eun;Lee, Dong Won;Park, MinJi;Whang, Min-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.9
    • /
    • pp.281-291
    • /
    • 2017
  • Emotional interaction in virtual reality is necessary of social communication. However, social emotion has been tried to be less recognized quantitatively. This study was to determined social gaze of emotion in business domain. 417 emotion words were collected and 16 emotion words were selected to Goodness of Fit. Emotion word were mapped into 2 dimensional space through multidimensional scaling analysis. Then, X axis defined dimensions of cooperation, competition, and Y axis of low focus and high focus through the FGD. 52 subjects were presented to stimuli for emotion and gaze movement data were collected. Independent t-test results showed that the gaze factor increased in the face, eye, and nose areas at cooperation, and the gaze factor increased in the right face and nose areas at the low focus. It is expected that this will be used as a basic research to evaluate emotions needed in business environment in virtual space.

Design of Security Framework for Next Generation IPTV Services (차세대 IPTV 서비스를 위한 보안 프레임워크 설계)

  • Lee, Seung-Min;Nah, Jae-Hoon;Seo, Dong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.33-42
    • /
    • 2010
  • With the emergence of increasingly complex networks and diverse user terminals, demand for the next generation IPTV service is rapidly growing. It enables any content to seamlessly be reused on the diverse terminals as well as be broadcasted in real-time through the complex networks. In this paper, a novel security framework is proposed for the real-time and reusable IPTV services. The proposed framework is advantageous over the conventional content protection techniques in easily producing the scalable content with lightweight, perceptual, transcodable, and adjustable security features. It does not only ensure end-to-end security over the entire service range based on a single security mechanism, but also can control a level of security while dynamically transcoding the original content. This approach basically performs selective encryption during and after the compression using scalable video coding. The suitability of the proposed approach is demonstrated through experiments with a practical service scenario. Therefore, it is expected that security technology alone could practically contribute to creating new business opportunities for IPTV services.

Metaverse Artifact Analysis through the Roblox Platform Forensics (메타버스 플랫폼 Roblox 포렌식을 통한 아티팩트 분석)

  • Yiseul Choi;Jeongeun Cho;Eunbeen Lee;Hakkyong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.37-47
    • /
    • 2023
  • The growth of the metaverse has been accelerated by the increased demand for non-face-to-face interactions due to COVID-19 and advancements in technologies such as blockchain and NFTs. However, with the emergence of various metaverse platforms and the corresponding rise in users, criminal cases such as ransomware attacks, copyright infringements, and sexual offenses have occurred within the metaverse. Consequently, the need for artifacts that can be utilized as digital evidence within metaverse systems has increased. However, there is a lack of information about artifacts that can be used as digital evidence. Furthermore, metaverse security evaluation and forensic analysis are also insufficient, and the absence of attack scenarios and related guidelines makes forensics challenging. To address these issues, this paper presents artifacts that can be used for user behavior analysis and timeline analysis through dynamic analysis of Roblox, a representative metaverse gaming solution. Based on analyzing interrelationship between identified artifacts through memory forensics and log file analysis, this paper suggests the potential usability of artifacts in metaverse crime scenarios. Moreover, it proposes improvements by analyzing the current legal and regulatory aspects to address institutional deficiencies.