• Title/Summary/Keyword: 안전규칙

Search Result 562, Processing Time 0.022 seconds

A Three-Tier BGP Backup Routing (3단 BGP 백업 라우팅)

  • Suh, Chang-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.745-752
    • /
    • 2005
  • BGP is a unique routing protocol in broadband internet. It chooses routing paths considering internet hierarchy and local policies. As BGP routers selectively bypass routing information to a subset of neighboring BGP routers, connectivity by way of a series of links between source and destination nodes does not mean reachability of routing information of the two. In emergency when BGP routers or links over wide range are not available, BGP routers have to use links that are not normally used to keep reachability. This paper listed out the requirements for BGP backup routing and proposed a routing solution that hides most demerits in currently published ones. The proposed backup operates in three tiers according to network damage. Under this rule, BGP routers use tier-0 routing paths at normal. If networks are impaired, they choose tier-1 paths. If networks are seriously damaged, tier-2 paths are allowed to use. Also this paper proves that the proposed backup guarantees stability and safeness. As results, the proposed backup is very adaptive to light network damages as well as serious ones and provides strong routing reachability at all times.

A Study on the Improvement Direction of the Building Escape Regulation Considering Inconvenient Movers (이동약자를 고려한 건축물 피난규정 개선 방안에 관한 연구)

  • Hwang, Eun-Kyoung
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.32-38
    • /
    • 2009
  • Owing to increase of the large-scaled, high-raised and complexed building construction, the escape design of the building became very important issue to insure the safety of occupant. Specially, it is demanded to have building escape regulation considering for inconvenient movers such as disables elders pregnant women. However, building regulations for inconvenient movers are divided into "Regulation of Escape and Fire-prevention of Building" and "Act on the Promotion and Guarantee of Access for the Disabled, the Aged and Pregnant Women to Facilities and Information". But, for the escape security of inconvenient movers, the connection of each regulation are necessary. So this study suggested the improvement direction of the building escape regulation considering inconvenient movers through the compared analysis on the "Regulation of Escape and Fire-prevention of Building" and "Act on the Promotion and Guarantee of Access for the Disabled, the Aged and Pregnant Women to Facilities and Information".

A Collision Avoidance System for Intelligent Ship using BK-products and COLREGs (BK곱과 COLREGs에 기반한 지능형 선박의 충돌회피시스템)

  • Kang, Sung-Soo;Lee, Young-Il;Jung, Hee;Kim, Yong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.181-190
    • /
    • 2007
  • This paper presents a collision avoidance system for intelligent ship. Unlike collision avoidance system of other unmanned vehicles, the collision avoidance system for intelligent ship aims at not only deriving a reasonable and safe path to the goal but also keeping COLRECs(International Regulations for Preventing Collisions at Sea). The heuristic search based on the BK-products is adopted to achieve the general purpose of collision avoidance system; deriving a reasonable and safe path. The rule of action to avoid collision is adopted for the other necessary and sufficient condition; keeping the COLREGs. The verification of proposed collision avoidance system is performed with scenarios that represent encounter situations classified in the COLREGs, then it is compared with $A^{\ast}$ search method in view of optimality and safety. The analysis of simulation result revels that the proposed collision avoidance system is practical and effective candidate for real-time collision avoidance system of intelligent ship.

데이터베이스 테이터의 고장진단 및 복구를 위한 전문가 시스팀

  • Lee, Gil-Haeng;U, Wang-Don;Jo, Ju-Hyeon
    • ETRI Journal
    • /
    • v.14 no.4
    • /
    • pp.148-164
    • /
    • 1992
  • 본 논문에서는 TDX-10 데이터베이스 데이터의 고장을 주기적으로 진단하고 복구할 수 있는 고장진단 전문가 시스팀을 제안하고 구현하였다. 실시간 환경 및 분산구조를 갖는 데이터베이스 관리 시스팀에서 데이터베이스의 효과적인 접근을 위해서 필요한 데이터베이스의 데이터 즉, 디렉토리와 딕셔너리는 매우 중요하며 고장이 발생할 경우 데이터베이스 관리시스팀에 미치는 영향은 치명적이다. 따라서, 실시간 환경을 갖는 데이터베이스 관리 시스팀에서 데이터베이스 데이터에 대한 고장 진단 및 복구는 필수적이라고 할 수 있다. 본 논문에서 제안한 고장진단 전문가 시스팀은 데이터베이스 데이터를 운용중 변하는 부분과 변하지 않는 부분으로 분류하고 미리 주어진 고장진단 규칙에 따라 진단하는 방법이다. 데이터베이스 데이터의 고장진단 데이터, 고장진단 규칙, 고장진단 데이터 생성기, 고장진단 데이터 검증기, 그리고 고장진단기로 구성되어 있다. 고장진단 데이터는 고장진단기가 데이터베이스 데이터를 주기적으로 진단하기 위하여 사용하는 마스터 데이터로서 두개가 존재한다. 고장진단 데이터 생성기는 데이터베이스 데이터의 고장진단을 위한 데이터 구조를 생성하고 데이터베이스로부터 데이터베이스를 데이터를 중복하여 읽어들이는 역할을 한다. 이와 같은 과정은 시스팀이 초기에 동작을 시작하거나 운용중 운용자에 의해서 릴레이션의 추가 및 삭제, 그리고 튜플의 추가등과 같은 사건이 발생할 경우에 이루어진다. 데이터베이스 검증기는 고장진단 데이터 생성기가 중복하여 생성한 데이터에 대해서 데이터베이스 데이터의 제작시의 초기 오류를 검증해냄으로써 데이터베이스 관리 시스팀의 안전한 운용을 가능하게 하며 고장진단기가 데이터베이스 데이터를 주기적으로 진단할 데이터를 탄생시킨다. 마지막으로 고장진단기는 주기적으로 데이터베이스 데이터의 고장을 진단하여 고장이 발생한 데이터를 미리 분류한 규칙에 따라 원래의 데이터로 복구하거나 운용자에게 보고함으로써 고장에 대비하도록 한다. 그리고 데이터베이스 상의 운용자에 의한 변경을 감지하여 고장진단 데이터의 재생성을 지시한다. 본 논문에서 제시하고 구현한 데이터베이스 데이터의 고장진단 및 복구를 위한 전문가 시스팀은 실시간 환경과 고장허용 환경, 분산 구조 그리고 빈번한 접근을 갖는 데이터베이스 관리 시스팀에서 아주 중요한 역할을 할 수 있다.

  • PDF

On the Privacy Preserving Mining Association Rules by using Randomization (연관규칙 마이닝에서 랜덤화를 이용한 프라이버시 보호 기법에 관한 연구)

  • Kang, Ju-Sung;Cho, Sung-Hoon;Yi, Ok-Yeon;Hong, Do-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.439-452
    • /
    • 2007
  • We study on the privacy preserving data mining, PPDM for short, by using randomization. The theoretical PPDM based on the secure multi-party computation techniques is not practical for its computational inefficiency. So we concentrate on a practical PPDM, especially randomization technique. We survey various privacy measures and study on the privacy preserving mining of association rules by using randomization. We propose a new randomization operator, binomial selector, for privacy preserving technique of association rule mining. A binomial selector is a special case of a select-a-size operator by Evfimievski et al.[3]. Moreover we present some simulation results of detecting an appropriate parameter for a binomial selector. The randomization by a so-called cut-and-paste method in [3] is not efficient and has high variances on recovered support values for large item-sets. Our randomization by a binomial selector make up for this defects of cut-and-paste method.

A Study on Ship Collision Avoidance Algorithm by COLREG (국제해상충돌예방규칙에 따른 충돌회피 알고리즘에 관한 연구)

  • Kim, Dong-Gyun;Jeong, Jung-Sik;Park, Gyei-Kark
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.3
    • /
    • pp.290-295
    • /
    • 2011
  • On the basis of DCPA(Distance to Closest Point of Approach) and TCPA(Time to CPA), the conventional algorithms for collision avoidances have a drawback that the '72 CORLEGs(International Regulations for Preventing Collisions at Sea, 1972) has not taken into account to prevent collisions between ships. In this paper, the proposed algorithm decides whether the own ship is a give-way vessel or a stand-on vessel by observing the relative bearing of the encountered ship. To determine the ship position and time for collision avoidance, the proposed algorithm utilizes the ellipse model for ship safety domain. The computer simulation is done to represent the process of adversive behavior. Using the proposed method, the past maritime accident is analyzed. The proposed method can be effectively applied to collision avoidance by CORLEGs even when the target ship's navigational lights is invisible in poor weather and/or in the restricted visibility.

A Proposed Heuristic Methodology for Searching Reloading Pattern (핵연료 재장전모형의 탐색을 위한 경험적 방법론의 제안)

  • Choi, K.Y.;Yoon, Y.K.
    • Nuclear Engineering and Technology
    • /
    • v.25 no.2
    • /
    • pp.193-203
    • /
    • 1993
  • A new heuristic method for loading pattern search has been developed to overcome short-comings of the algorithmic approach. To reduce the size of vast solution space, general shuffling rules, a regionwise shuffling method, and a pattern grouping method were introduced. The entropy theory was applied to classify possible loading patterns into groups with similarity between them. The pattern search program was implemented with use of the PROLOG language. A two-group nodal code MEDIUM-2D was used for analysis of power distribution in the core. The above mentioned methodology has been tested to show effectiveness in reducing of solution space down to a few hundred pattern groups. Burnable poison rods were then arranged in each pattern group in accordance with burnable poison distribution rules, which led to further reduction of the solution space to several scores of acceptable pattern groups. The method of maximizing cycle length(MCL) and minimizing power-peaking factor(MPF) were applied to search for specific useful loading patterns from the acceptable pattern groups. Thus, several specific loading patterns that have low power-peaking factor and large cycle length were successfully searched from the selected pattern groups.

  • PDF

Collision Risk Decistion System for Collision Avoidance (충돌회피를 위한 충돌위험도 결정 시스템)

  • 김은경;강일권;김용기
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.6
    • /
    • pp.524-527
    • /
    • 2001
  • In this paper we propose a collision risk decision system for collision avoidance system A collision avoidance system carries out collision avoidance based on collision risk of unknown obstacle. In the traditional researches, using DCPA and TCPA for calculating the collision risk has problem that they produce a same collision risk for ship which located in the given distance. The solves the problem we use DCPA, TCPA, and VCD for calculating collision risk. A proposed system has two advantages that is produce more detailed collision risk and reflects the international Regulations for Preventing Collision at Sea.

  • PDF

Implementation of Context-Aware Android Application for Automatic Task Setting (상황 인지 기반의 자동 태스크 설정을 위한 안드로이드 어플리케이션 구현)

  • Bak, Na-Yeon;Chung, Da-hae;Chang, Byeong-Mo;Choi, Kwanghoon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.434-443
    • /
    • 2016
  • Users can set manually Android phone to do particular tasks on some situations. This type of setting is inconvenient, and also provide with unnecessary services, which don't consider users' situation. In this research, we design and implement a context-aware automatic task setting application. Users can get context-aware service by setting desired tasks based on contexts using this system. We design a language for describing context-action rules, and statically check validity of context-action rules by performing syntax and semantic check.

Analysis of Wave Fields over Submerged Breakwaters (잠제 주변의 파랑장 해석)

    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.11 no.2
    • /
    • pp.95-106
    • /
    • 1999
  • A numerical model is represented to calculate the wave fields such as the reflected waves, the transmitted waves and the depth-averaged velocities over submerged breakwaters for the normally incident wave trains of nonlinear mono-chromatic wave and solitary wave. The finite amplitude shallow water equations with the effects of bottom friction are solved numerically in time domain using an explicit dissipative Lax-Wendroff finite difference method. The numerical model is verified by comparisons with the other numerical results and the measured data. It is found that the submerged breakwater may be more useful for protecting the energies of monochromatic waves rather than solitary waves. Finally, the armor stability on submerged breakwater is indirectly analyzed using the hydrodynamic characteristics of flow fields.

  • PDF