• Title/Summary/Keyword: 안전대책

Search Result 2,286, Processing Time 0.027 seconds

An Analysis on the Design for Safety Work Performance of Owner and Designer and Its Improvement Measures (발주자 및 설계자의 DFS 업무수행능력 분석 및 향상방안)

  • Shin, WonSang;Son, ChangBaek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.5
    • /
    • pp.95-103
    • /
    • 2019
  • While the Design for Safety (DFS) system has been introduced to Korea, the ordering parties and designers who are implementing this system still have a very low awareness of it. Most ordering parties and designers have a negative view of this system due to a variety of reasons, including the additional workload and their lack of professional manpower. The purpose of this study is to suggest measures to improve the DFS work performance by standardizing the DFS work process and analyzing the level of work performance in each business carried out by ordering parties and designers in order to ensure the efficient execution of DFS business. In conclusion, to improve the DFS work performance of ordering parties and designers, the development of a business support system is suggested, which supports key works such as the identification of risk factors, the provision of measures to reduce such factors, and risk assessment, and provides relevant information to allow ordering parties and designers to prepare the DFS report smoothly.

Security Threat and Policy Analysis to Secure the Safety and Reliability of the Smart Grid (지능형 전력망의 안전성과 신뢰성 확보를 위한 보안위협과 정책 분석)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1381-1390
    • /
    • 2021
  • Smart grid is a representative convergence new technology in the era of the 4th industry revolution that deals with three broad security areas consisting of control system, the power grid, and the consumer. As it is a convergence new technology of the 4th industrial society, it is true that it can have a positive effect on the country's technological development, growth engine, and economic feasibility in the future. However, since the smart grid is expected to cause enormous damage in the event of a security accident, energy-related organizations must prepare various security measures to predict and respond to the latest security incidents. In this paper, the current status of domestic and foreign smart grids, trends in security standards, vulnerabilities and threats, and prospects for smart grid security technologies are to be considered.

Stability Evaluation of Anchors Using Lift-off Field Test (리프트오프 현장시험을 이용한 앵커의 안정성 평가)

  • Choi, Tae Sic;Yun, Jung Mann;Kim, Yong Seong;You, Seung Kyong;Lee, Kang Il
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.128-142
    • /
    • 2021
  • Purpose: This study examines the safety management of anchors that have already been constructed and evaluates the results of lift-off tests conducted at the site. The purpose of the project is to study countermeasures if necessary. Method: Compare the residual load gained after the lift-off test at 36 points behind the site with the preemptive load, allowable load, and design load. We also analyze stability through this and evaluate the stability of anchors. Results and Conclusion: The residual tension at 26 points remained stable. However, the residual load at 10 points was analyzed to be greater than the designed load and less than the allowable load, and it was evaluated as an instability that could cause fracture problems. Therefore, anchors with unstable conditions at 10 points should be monitored and monitored through periodic measurements and quality tests, and the anchor should be observed at the surrounding points as well as the relevant points to maintain stability.

Application of Grouting for Liquefaction Resistance Using Automatic Grouting System (그라우팅자동관리시스템을 이용한 액상화 방지 그라우팅의 적용)

  • Kong, Jinyoung;Kang, JunO;Cho, Hyunsoo;Kim, Jinchun;Chun, Byungsik
    • Journal of the Korean GEO-environmental Society
    • /
    • v.12 no.9
    • /
    • pp.79-87
    • /
    • 2011
  • This study conducted the research on the method of grouting quality management and the improvement effect by applying grouting construction's quality management technology to automatic injection management equipment through measure of liquefaction based on the case of reinforcement applying grouting at the region where liquefaction happened at section 12 site of highway construction. The pressure(p), speed(q), grouting penetration radius(R) value from injection pressure, injection speed, characteristics of grain size, and characteristics of viscosity through p-q-t chart analysis was applied to the automatic grouting system which could improve the quality management of grouting. Standard penetration test results after injection showed that N values represented 5-20 and the prevention of liquefaction became possible.

An Implementation of Database Security Using Steganography in the Web (웹 상에서 스테가노그라피 기법을 이용한 안전한 데이터베이스 보안 구현)

  • Moon, Bong-Keun;Ryoo, Du-Gyu;Ko, Myung-Sun;Eom, Ki-Won;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.3-11
    • /
    • 2005
  • As the usage of Internet grows, we share many informations among the others and use more database systems for a various type of data. However, secure database system, which prevents the unauthorized users from modification, deletion, and access, is urgently required for sharing data in Internet. Conventional technologies of a data security are passive methods which depend on several steps with an access control, and these methods are vulnerable against the illegal attack because attacker can see the plain text that is private message. To prevent private data item for the special security from the malicious attack in web database, this paper is devoted to implement database system using steganography method, so we can protect the data item completely because attacker cannot know the secure message although he get the content of database.

Separate Networks and an Authentication Framework in AMI for Secure Smart Grid (스마트그리드 보호를 위한 AMI 망 분리 및 인증 프레임워크)

  • Choi, Jae-Duck;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.525-536
    • /
    • 2012
  • This paper proposes methods of securing Smart Grid system against various types of cyber threats by separating AMI networks from the public network, the Internet, and providing an AMI specific authentication framework. Due to the fact that thousands and millions of AMI devices to be deployed would be directly or indirectly connected to the public network without any authentication procedures for access control, currently being developed AMI architectures could be widely exposed to considerable number of penetrating attacks. Furthermore, there have not been a sufficient number of researches on authentication frameworks with basis on the specific circumstances of AMI networking that should support varied authentication protocols among security associations and AMI linking devices. This work makes a proposal of isolating smart meters from HAN devices and the Internet and integrating network/application level authentication frameworks with an EAP-based authentication architecture. These approaches are beneficial to deploy AMI with security and efficiency.

National Institution's Information Security Management on the Smart phone use environment (스마트폰 이용 환경에서 국가기관 정보보호 관리방안)

  • Kim, Ji-Sook;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.83-96
    • /
    • 2010
  • The rapid spread of smart phone in recent years changes not only personal life but also work environment of organizations. Moreover, smart phone provoke service combination between industries and transit the digital paradigm in our society because of the character that anyone can develop or use the application of smart phone. Under these circumstances, the government hastens the construction of mobile-government in order to improve national services and communication with people. However, since security threats on smart phone become more critical recently, we should hurry the counter measures against mobile threats or we will face obstacles to the activation of mobile-government. On this article, we suggest the methods of information security and the Mobile-government Information Security Management System(M-ISMS) on the smart phone use environment for building up the secure and convenient mobile system in the national institution.

Case Study on Location of Possible Tension Crack in Rock Slope (암반 비탈면의 인장균열 위치 선정에 관한 사례 연구)

  • Jeon, Byung-Gon;Kim, Jiseong;Kang, Gichun
    • Journal of the Korean Geotechnical Society
    • /
    • v.37 no.3
    • /
    • pp.5-17
    • /
    • 2021
  • This study aims to investigate the causes and countermeasures for the occurrence of tension cracks in the slope of the rock mass of heavy equipment for road construction. Electric resistivity survey was performed to investigate the expandable tensile crack range. As a result of examining the distribution of soft zones in the rock mass, a low specific resistance zone was found at the bottom of the access road where tensile cracks occurred. It was confirmed that a low resistivity zone was distributed near the top of the excavation slope. Therefore, reinforcements was performed by determining the location of the possible tensile crack as the top of the excavation slope. Two rows of reinforced piles and anchors were proposed as a reinforcement method, and the slope stability analysis showed that the allowable safety factor was satisfied after reinforcements.

A Study on the Current Status and Responses System of Child Abuse

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.109-114
    • /
    • 2022
  • Recently, child abuse cases such as the "16-month death of adopted children" have occurred one after another in our society and have emerged as a serious social problem. Child abuse not only significantly violates children's human rights, but also leaves scars on the child's body and sometimes threatens their lives. As a result, laws related to child abuse have been revised several times and related systems have been reorganized to protect the affected children safely and grow healthy, but child abuse cases continue to occur. Therefore, it is urgent to come up with effective measures to prevent child abuse crimes and protect affected children. Therefore, this study examines the concept and related laws of child abuse, the current status of child abuse, and suggests countermeasures to effectively respond to child abuse compared to the US child abuse legislation and child protection system.

Exploring the Issue Structure of Drone Crime in Newspaper Articles: Focusing on Language Network Analysis (신문 기사에서의 드론 범죄 관련 이슈구조 탐색: 언어 네트워크 분석을 중심으로)

  • Park, Hee-Young;Lee, Soo-Bum
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.20-29
    • /
    • 2021
  • This study aims to explore the issue of drones and crime in newspaper articles. BIG KINDS, an online news archive of the Korea Press Foundation, collected 1,213 newspaper articles that met the terms of "drone" and "crime" in 11 central and 28 regional comprehensive newspapers between January 1, 1990 and May 1, 2021. Among them, we perform keyword frequency, centrality analysis, network structure construction, CONCOR analysis, and density matrix analysis on 117 key keywords. According to the analysis, the main issues were classified into eight, and the report analysis on drones and crimes in newspaper articles showed that the government's policy-making and social problems on protecting people's privacy, preventing illegal filming, securing navigation safety, social security and resolution. This study attempts to expand the field of humanities and social studies related to drones and crime, and specifically suggests the current status and counterplan against drone-related crimes as policy implications and media implications.