• Title/Summary/Keyword: 안전대책

Search Result 2,286, Processing Time 0.027 seconds

Disaster Management and Disaster Medical Improvement in Underground Space (서울시 지하공간 재난관리 및 재난의료 개선방안)

  • Bae, Yoonshin;Park, Jihye
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.110-122
    • /
    • 2011
  • In this study, the disaster management and disaster medical improvement was described in underground space(specifically underground shopping center) in case of fire disaster occurred. Firstly, statue and system was discussed concerning building law, safety, fire services, refuge. The underground in Seoul management is classified as to space and form and management agent is different according to the type form. Because the difficulty of emergency rescue arises due to individual management system unified system needs to be established and improvement of facility management agent is necessary. For the patient to be transfer on the ground, corporation between command head quarter and emergency rescue team are essential. And disaster information and emergency medical information are also need to be considered. Therefore, effective countermeasures for emergency saving is urgent considering distribution of medical institution and medical treatment.

Deployment of Network Resources for Enhancement of Disaster Response Capabilities with Deep Learning and Augmented Reality (딥러닝 및 증강현실을 이용한 재난대응 역량 강화를 위한 네트워크 자원 확보 방안)

  • Shin, Younghwan;Yun, Jusik;Seo, Sunho;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.69-77
    • /
    • 2017
  • In this paper, a disaster response scheme based on deep learning and augmented reality technology is proposed and a network resource reservation scheme is presented accordingly. The features of deep learning, augmented reality technology and its relevance to the disaster areas are explained. Deep learning technology can be used to accurately recognize disaster situations and to implement related disaster information as augmented reality, and to enhance disaster response capabilities by providing disaster response On-site disaster response agent, ICS (Incident Command System) and MCS (Multi-agency Coordination Systems). In the case of various disasters, the fire situation is focused on and it is proposed that a plan to strengthen disaster response capability effectively by providing fire situation recognition based on deep learning and augmented reality information. Finally, a scheme to secure network resources to utilize the disaster response method of this paper is proposed.

A Study on the Effect of the Stemming Hole medium to the Blasting Separation Distance of Structure (공내 매질이 구조물의 발파이격거리에 미치는 영향에 관한 연구)

  • Kang, Hee-Seop;Jeong, Jung-Gyu;Bang, Myung-Seok
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.21 no.1
    • /
    • pp.100-108
    • /
    • 2017
  • Because of urbanization, Industrialization and expansion of transportation network, blasting works are recently increasing in construction field. The blasting work influences environmental effects to residents and the safety of facilities around the working place, so the development of blasting technology is needed to reduce the damage to residents. The blasting mechanism in the hole was studied and tested in the blasting sites by the difference of diameter between explosives and drilling hole, which is named by the decoupling effect. This effect was tested by changing the medium between explosives and hole wall in three working sites(railway, highway and industrial complex). The vibration velocity of blasting was recorded and vibration equations were produced by regression analyses. Finally, the structure separation distance was derived using these equations. The testing results show that the specific gravity of medium is larger, the separation distance is smaller and the duration time of blasting is shorter in case of large specific gravity of medium, so the vibration effect stops more fastly in the water compared with the air.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

A Study on CA-VPN Design using Authentication Mechanism (인증 메커니즘을 이용한 CA-VPN 설계에 관한 연구)

  • 김도문;전정훈;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.60-68
    • /
    • 2003
  • Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.

  • PDF

The Present Situation and Preventive Measure of the Fire in the Cattle Shelter -Based on Jeonbuk Province- (축사 화재의 현황과 그 방지 대책 -전라북도를 중심으로-)

  • Jeng, Gi-Sung
    • Fire Science and Engineering
    • /
    • v.21 no.4
    • /
    • pp.81-87
    • /
    • 2007
  • The cattle shelters have been badly damaged by the recently large fires. so the reconstruction of the damaged shelter is very difficult. In the light of the seriousness of the fire like that, the preventive plan for the cattle shed should be thoroughly established. The preventive measure which the fire department performs presently is limited to the stopping the fire before it starts. More than anything else, The men who operate and manage the cattle shelters must know what to do. The written plan will assist them. To begin with, The fire authority should clearly specify how cattle should be protected from any outbreak of fire. Clear access to each fire shed is very important to protect the cattle safely. The manager of the cattle shelter should get ready for the fire defense equipment. Most fires of the cattle shelters are due to electricity faults. These renovations should be performed and checked immediately. Therefore, The manager should be ready assist fire chief or the professional organization to prevent the electricity fire. Fire Safety education should be planned for the owner and staff so all should know what is expected in case of a fire. The Fire Department will check the access road, the equipment available and an announced fire drills should take place every year in the cattle shelter. The Fire Department should check the access road, equipment for preventing fires and staff training each year.

Slope Navigation based on the Cut Slope Data Management System (내비게이션 기반 절토사면 데이터 관리시스템)

  • Bae, Sang-Woo;Kim, Seung-Hyun;Lee, Jong-Hyun;Koo, Ho-Bon;Lee, Yun-Rae
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.4
    • /
    • pp.71-77
    • /
    • 2010
  • Cut Slope Management System(CSMS) is a systematic maintenance and management system designed to prevent the collapse of cut slopes located along national roads. In order to implement safe road operation system, KICT has started the inventory of cut slopes and developed a cut slope database since 2006. Cut slope database management system using GIS technology and navigation system was developed as a Information Technology application. Through the Cut Slope Navigation System(SLOPE-Navi.), the previously developed database was checked and verified. The converted cut slope inventory data and field investigation data of 28,707 cut slopes were loaded on the navigation map. We consider that the Cut Slope Navigation Management System can be useful as in-situ system, which can be systematic and effective DB management and operation to prevent cut slope collapses and establish a remedial countermeasure as mitigation concerning disasters.

An Attack Scheme with a T-DMB TPEG Update based Vulnerability (T-DMB 기반의 TPEG 업데이트 취약점을 이용한 공격 기법)

  • Kim, Jung-Hoon;Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.1-5
    • /
    • 2014
  • The development of communication method for a variety of intelligent automobiles are delivering comfortable and safe information. However the development of such communication method must also think about security. Even the update of navigation to be used for intelligent automobiles uses the wireless updating methods but the updating methods currently being used has no reliable security measures. The navigation communications used in the intelligent automobiles are being provided with TTI(Traffic and Travel Information) service using a variety of methods by the countries. In the case of Korea, most are based on T-DMB using the TPEG method for transmitting the information. By identifying the characteristics on the navigation wireless update, a security solution is proposed for delivering the reliable update information after creating the attack scenario.

A Study of Security Requirement in Wireless Charging (무선충전에서 보안요구사항에 관한 연구)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.23-27
    • /
    • 2014
  • In recent times, there is an increasing interest in wireless charge of smartphones and devices, and many companies are developing wireless charges. The range of application of wireless charge would be expanded to almost all electronics, including not only mobile devices, but also notebook computers and vacuum cleaners. On-line electric vehicles are to be launched in the market this year in a massive scale. As such wireless charge-related markets are inexhaustible. Wireless charge is included in the world's top 10 promising technologies, and its rapid growth is expected to have annual growth by more than 100%. However, there's a need to establish a safe environment, by analyzing security threats to technical limitations and harmfulness to human body, and arrange institutional compliments. The development of communication method for a variety of wireless charging are delivering comfortable and safe information. This paper aims to examine the factors to threaten electric vehicle, which are usually intruded through network system and analyzes security threats to and security requirements for magnetic resonance mode-based wireless charge in mobile devices, and suggests security requirements.

Reliability Assessment of Concrete Beams Reinforced with GFRP Bars (FRP 보강근을 사용한 콘크리트 보의 신뢰성 해석)

  • Nam, Ho-Yun;Seo, Dae-Won;Han, Byum-Seok;Shin, Sung-Woo
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2008.04a
    • /
    • pp.185-188
    • /
    • 2008
  • Fiber reinforced polymer(FRP) bars are proving to be a valuable solution in the corrosion problem of steel reinforced concrete structures. As such, a number of guidelines for their use have been developed. These guidelines are primarily based on modifications to existing codes of practice for steel reinforced concrete structures. These guidelines are also similar in that though the design equations are presented in the partial factor formats that are often used in probability based design, they are not true probabilistic codes. Instead, they typically make use of already existing design factors for loads and resistances. Thus, when concrete structures reinforced FRP bars are designed, the structural reliability levels are not known. This paper investigates uncertainties of concrete beams reinforced with GFRP bars. Also, the structural reliability levels are evaluated for the flexural failure mode.

  • PDF