• Title/Summary/Keyword: 안전경계영역

Search Result 55, Processing Time 0.03 seconds

Establishment of Navigational Risk Assessment Model Combining Dynamic Ship Domain and Collision Judgement Model (선박동적영역과 충돌위험평가식을 결합한 항해위험성평가모델 전개)

  • Kim, Won-Ouk;Kim, Chang-Je
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.1
    • /
    • pp.36-42
    • /
    • 2018
  • This paper considers the Marine Traffic Risk Assessment for fixed and moving targets, which threaten officers during a voyage. The Collision Risk Assessment Formula was calculated based on a dynamic ship domain considering the length, speed and maneuvering capability of a vessel. In particular, the Navigation Risk Assessment Model that is used to quantitatively index the effect of a ship's size, speed, etc. has been reviewed and improved using a hybrid combination of a vessel's dynamic area and the Collision Risk Assessment Formula. Accordingly, a new type of Marine Traffic Risk Assessment Model has been suggested giving consideration to the Speed Length Ratio, which was not sufficiently reflected in the existing Risk Assessment Model. The larger the Speed Length Ratio (dimensionless speed), the higher the CJ value. That is, the CJ value is presented well by the Speed Length Ratio. When the Speed Length Ratio is large, states ranging from [Caution], [Warning], [Dangerous] or [Very Dangerous] are presented from a greater distance than when the Speed Length Ratio is small. The results of this study, can be used for route and port development, including dangerous route avoidance, optimum route planning, breakwater width, bridge span, etc. as well as the development of costal navigation safety charts. This research is also applicable for the selection of optimum ship routing and the prevention of collisions for smart ships such as autonomous vessels.

Safety Evaluation of Tunnel Fire by CFD Modeling (터널화재의 CFD Modeling에 의한 안전성 평가방법)

  • Lee, Chang Wook;Lee, Keun Soo
    • 한국방재학회:학술대회논문집
    • /
    • 2011.02a
    • /
    • pp.84-84
    • /
    • 2011
  • 터널화재의 위험요소에 대한 해석을 위해서는 실제 상황을 재현한 실대형 실험이 가장 유용하겠지만 현실적으로 시간적, 공간적, 경제적인 제약이 따르기 때문에 CFD Modeling 기술의 이용 및 검증이 필요하고, 실제 상황에 가까운 현상의 재현을 위해서는 시뮬레이션의 정확도에 대한 향상이 필수적이다. 또한, CFD Modeling을 터널화재에 적용할 때 시뮬레이션의 질에 영향을 미칠 수 있는 요소들에 대한 결정이 선행되어야 한다. 우선, 터널의 기하학적 구조와 경계조건의 확립이 필요한데 필요한 정보를 얻기 위해서 어느정도 길이의 터널이 적절한지에 대해 생각할 필요가 있으며, 단면변화에 대한 결정을 통해 모델링을 수행하여야 한다. 모델링 작업이 선행된 후에 화재의 위치, 성장률, 최대 크기, 환기시스템 사항 등의 고려가 필요한데 이러한 조건들은 CFD Modeling의 결과에 직접적인 영향을 주기 때문에 충분한 사전조사가 이루어져야 하고, 각 사항들의 변수를 고려하여 다양한 화재시나리오의 도출이 가능할 수 있다. 마지막으로, 화재에서 발생된 열중 약 30%가 복사에 의해 주위 벽으로 전달될 수 있고 열은 연기가 가득찬 영역내에서 재분배될 수 있는데, 열전달 및 연기의 유동 등에 관한 자료를 기초로 화재현상에 대한 분석이 가능하다. 이러한 과정들을 통해 실제 상황에 가까운 설계화재 시나리오를 예측할 수 있다. 본 연구에서는 우리나라 최장대터널인 죽령터널에 대해 합리적인 가정을 통한 설계화재 시나리오를 기초로 화재시뮬레이션은 FDS(Fire Dynamics Simulator) 프로그램을 사용하여 화재 및 연기의 이동 양상을 분석하고, 피난시뮬레이션은 SIMULEX 프로그램을 사용하여 피난시간을 예측 함으로써 터널화재의 CFD Modeling에 의한 피난안전성을 검토하고자 한다.

  • PDF

Development of Complementary Mild-slope Equation for Stream Function Over Permeable Bed (투수층에 적용 가능한 흐름함수방식의 확장형 완경사방정식의 개발)

  • Kim, Gunwoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.6
    • /
    • pp.758-765
    • /
    • 2016
  • In this study, wave damping due to a permeable bed of finite depth was modelled using a complementary mild-slope equation for stream function. The energy dissipating term in the mild-slope equation was presented in terms of stream function. In order to prevent re-reflection of reflected waves along the outer boundary, a delta-function-shaped source function was derived to generate a wave in a computational domain. Numerical experiments were conducted to measure the reflection coefficient of waves over a planar slope for various incident wave periods. The numerical result of the proposed model was compared with that of an integral equation method, showing good agreement in general. However, the proposed model showed relatively higher transmission rate for the larger permeability and the longer wavelength.

A Camera Based Traffic Signal Generating Algorithm for Safety Entrance of the Vehicle into the Joining Road (차량의 안전한 합류도로 진입을 위한 단일 카메라 기반 교통신호 발생 알고리즘)

  • Jeong Jun-Ik;Rho Do-Hwan
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.66-73
    • /
    • 2006
  • Safety is the most important for all traffic management and control technology. This paper focuses on developing a flexible, reliable and real-time processing algorithm which is able to generate signal for the entering vehicle at the joining road through a camera and image processing technique. The images obtained from the camera located beside and upon the road can be used for traffic surveillance, the vehicle's travel speed measurement, predicted arriving time in joining area between main road and joining road. And the proposed algorithm displays the confluence safety signal with red, blue and yellow color sign. The three methods are used to detect the vehicle which is driving in setted detecting area. The first method is the gray scale normalized correlation algorithm, and the second is the edge magnitude ratio changing algorithm, and the third is the average intensity changing algorithm The real-time prototype confluence safety signal generation algorithm is implemented on stored digital image sequences of real traffic state and a program with good experimental results.

Vertical Upward Air-Water Two-Phase Flow Regime Identification (수직상향류 공기-물 이상유동영역 판별)

  • Lee, Ba-Ro;Jang, Young-Jun;Ko, Min-Seok;Lee, Bo-An;Lee, Yeon-Gun;Kim, Sin
    • Journal of Energy Engineering
    • /
    • v.22 no.4
    • /
    • pp.362-369
    • /
    • 2013
  • Two-phase flow is frequently observed in many industries such as nuclear power plants and oil transportation. Two-phase flow regime depends on the flow rates, the fluid properties and the structure of flow channels. Since the identification of the flow regime is of great importance in the system design and the safety analysis, a number of theoretical and experimental investigations have been performed. This paper presents a basic research on the characteristics of each flow regime and transition boundary in the two-phase flows. The flow regime of the upward air-water flow in the vertical tube, 30 mm in the inner diameter, is distinguished by using the high-speed camera and the Wire-mesh sensor(WMS). The identified experimental data are compared with the flow regime maps proposed by Taitel et al, Mishima and Ishii. Even though there is slight difference in the transition boundary, the experimental data show general agreement with these flow regime maps.

Lane Detection System Development based on Android using Optimized Accumulator Cells (Accumulator cells를 최적화한 안드로이드 기반의 차선 검출 시스템 개발)

  • Tsogtbaatar, Erdenetuya;Jang, Young-Min;Cho, Jae-Hyun;Cho, Sang-Bock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.126-136
    • /
    • 2014
  • In the Advanced Driver Assistance Systems (ADAS) of smart vehicle and Intelligent Transportation System (ITS) for to detect the boundary of lane is being studied a lot of Hough Transform. This method detects correctly recognition the lane. But recognition rate can fall due to detecting straight lines outside of the lane. In order to solve this problems, this paper proposed an algorithm to recognize the lane boundaries and the accumulator cells in Hough space. Based on proposed algorithm, we develop application for Android was developed by H/W verification. Users of smart phone devices could use lane detection and lane departure warning systems for driver's safety whenever and wherever. Software verification using the OpenCV showed efficiency recognition correct rate of 93.8% and hardware real-time verification for an application development in the Android phone showed recognition correct rate of 70%.

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

The Necessity of A Cognitive-scientific Analysis on A Security threat Act - The Foundation for A Establishment of The Scientific Preventive Social-security Countermeasure - (경호위해행위에 대한 인지과학적 분석의 필요성 고찰 - 과학적 예방적 사회안전 대책 수립을 위한 기초 -)

  • Kim, Doo-Hyun;Son, Ji-Young
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.33-51
    • /
    • 2008
  • According to dictionary, the meaning of protection is "guard and protect" that means protecting the Protectee's safety in case of sudden attack or various accident and Security means all protecting activity including Protectee and place where he is in or will be as comprehensively meaning of safe. As you see in the definition, Protection and security is the act to protect or will to protect from a security-threat act. A security-threat act can be discussed in the range of the concept of a criminal act in Criminal Law. A security-threat act is based on criminal act in Criminal Law, we are going to review such a security-threat act in a point of view in a sphere of learning in today's remarkable a brain-neuro science and cognitive science based on cognitive psychology, and to use an analysis on such a security-threat act to make a foundation for a establishment of the scientific preventive social security countermeasure. To do so, First of all we are going to review a security-threat act based on criminal act in Criminal Law in a point of protection police logic view. Next, we are going to introduce how cognitive science understand about act of man before we analyse a threat act as one of an act of man in cognitive science point of view. Finally, we are going to discuss the need of cognitive scientific analyse in order to establish the Scientific Preventive Social-security Countermeasure at the same time we are going to analyse a threat act in a cognitive scientific view.

  • PDF

A Study on Visible Light Communication Indoor location of iGS Robot (가시광통신을 이용한 실내형 자율 주행 로봇의 위치 추정에 관한 연구)

  • Park, Ki-Hyun;Jo, Kyung-Hwa;Lee, Jang-Woo;Lee, Seung-Yup;Kim, Eung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.377-378
    • /
    • 2015
  • 실내형 자율 주행 로봇에서의 가장 중요한 기술력은 IGS(indoor GPS System)라 할 수 있다. 재난로봇이나 정찰로봇, 경계로봇등 새로운 로봇의 영역이 늘어남에 따라 실내에서 로봇을 안전하게 구동시키는 연구가 활발히 진행되고 있다. 기존 GPS를 사용할 수 없는 실내에서, LED 조명으로 통신이 가능한 가시광통신은 실내위치 정보를 정밀히 파악하기에 적합하다. 이에 가시광통신을 이용하여 LED 조명별 기준위치를 파악하는 서로 다른 16진수의 데이터를 전송하고, 그 위치를 파악하여 LED 조명의 위치를 식별할 수 있음을 확인한다. 이러한 실험결과를 통하여 가시광통신을 이용해 실내형 자율 주행 로봇의 실내 위치 추정 시스템을 제안한다.

Application of Two-Dimensional Flow Analysis Model for Flood Risk Assessment in Flood Plain (둔치에서의 홍수위험도 평가를 위한 2차원 흐름해석모형의 적용)

  • Ku, Young Hun;Song, Chang Geun;Kim, Young Do
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.40-40
    • /
    • 2015
  • 최근 기후변화로 인해 홍수의 발생빈도와 홍수량이 증가하고 있으며, 여름철 집중호우 및 태풍에 의해 하천의 둔치가 침수됨으로써 다양한 침수피해를 야기한다. 대하천 사업 이후 하천의 둔치를 활용한 체육시설, 자전거도로 및 생태공원과 같은 친수시설들이 조성되었으며 태풍으로 인한 하천의 홍수위 상승은 이러한 친수시설에 대한 직접적인 피해를 가져올 수 있다. 따라서 이와 같은 침수피해를 예측하기 위해서는 둔치를 포함한 복단면에서의 흐름해석을 통한 수리학적 영향을 분석해야하며, 둔치에서의 흐름양상은 주수로에 비해 수심이 얕고 흐름에 대한 저항이 크기 때문에 2차원 수리해석이 바람직한 것으로 제안되고 있다. 2차원 수리해석에 있어 하천의 홍수위 상승과 하강으로 인해 발생하는 둔치구간에서의 마름과 젖음 현상은 수치해의 발산을 야기하며, 이러한 문제를 해결하기 위해 다양한 마름/젖음 해석 기법에 대한 연구들이 진행되어 왔으며 일반적으로 마름/젖음에 대한 문제를 해결하는 방법은 마름/젖음에 상관없이 모든 부분에서 방정식을 푸는 박막기법과 해석영역으로부터 마름 부분을 제거하는 이동경계법으로 나눌 수 있다. 본 연구에서는 단기간에 수위가 급변하는 태풍사상에 대한 둔치에서의 홍수위험도를 평가하기 위해 마름/젖음 해석이 가능한 2차원 유한차분모형인 Nays2D 모형을 이용하여 마름/젖음에 대한 과거 선행연구들의 결과와 적용된 모형의 결과를 비교하여 모형의 적용성을 검증하였고, 검증된 모형을 강정-고령보에서부터 달성보 사이 구간에 적용하여 수리학적 영향을 분석하였다. 또한, 모형의 결과를 이용하여 홍수위험지수를 산정하였으며, 이를 통해 둔치구간에서의 홍수위험도 평가를 실시하였다.

  • PDF