• Title/Summary/Keyword: 요소 기반 시뮬레이션

Search Result 645, Processing Time 0.026 seconds

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.

An Analysis on Evacuation Scenario at Metro-stations using Pedestrian Movement-based Simulation Model (보행류 기반 도시철도역사 평가 시뮬레이터를 활용한 대피 시나리오 분석)

  • You, So-young;Jung, Rea-hyuck;Chung, Jin-hyuck
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.36-49
    • /
    • 2016
  • A subway system is one of the major transportation modes at a metropolitan area. When it meets the other lines, the metro station, so-called transferring station, is usually threatened by severe pedestrian congestion and safety issue of transit users including the transportation vulnerable. Although transportation planners forecast travel demand at the beginning, it is not easy to predict pedestrian flows precisely for a long term if land use plans have dramatically changed. Due to expensive costs, structural extension of metro stations is limited. Therefore, it requires efficient and technical improvements as meeting the demand of pedestrian and physical characteristics. In this study, the core mechanism of pedestrian movement-based simulation model was introduced and evacuation scenarios were analyzed with the developed model. As a result, the multiple optimal routes for unexpected events at the solid space of the multiple stories are easily searched through the simulator and in the case of Sadang Station, travel time can be reduced by 60% when the evacuation information and intuitive design are provided.

Development of Information Security Practice Contents for Ransomware Attacks in Digital Twin-Based Smart Factories (디지털트윈 기반의 스마트공장에서 랜섬웨어 공격과 피해 분석을 위한 정보보안 실습콘텐츠 시나리오 개발)

  • Nam, Su Man;Lee, Seung Min;Park, Young Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1001-1010
    • /
    • 2021
  • Smart factories are complex systems which combine latest information technology (IT) with operation technology (OT). A smart factory aims to provide manufacturing capacity improvement, customized production, and resource reduction with these complex technologies. Although the smart factory is able to increase the efficiency through the technologies, the security level of the whole factory is low due to the vulnerability transfer from IT. In addition, the response and restoration of the business continuity plan are insufficient in case of damage due to the absence of factory security experts. The cope with the such problems, we propose an information security practice content for analyzing the damage by generating ransomware attacks in a digital twin-based smart factory similar to the real world. In our information security content, we introduce our conversion technique of physical devices into virtual machines or simulation models to build a practical environment for the digital twin. This content generates two types of the ransomware attacks according to a defined scenario in the digital twin. When the two generated attacks are successfully completed, at least 8 and 5 of the 23 virtual elements are take damage, respectively. Thus, our proposed content directly identifies the damage caused by the generation of two types of ransomware in the virtual world' smart factory.

Resource Clustering Simulator for Desktop Virtualization Based on Intra Cloud (인트라 클라우드 기반 데스크탑 가상화를 위한 리소스 클러스터링 시뮬레이터)

  • Kim, Hyun-Woo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.1
    • /
    • pp.45-50
    • /
    • 2019
  • With the gradual advancement of IT, passive work processes are automated and the overall quality of life has greatly improved. This is made possible by the formation of an organic topology between a wide variety of real-life smart devices. To serve these diverse smart devices, businesses or users are using the cloud. The services in the cloud are divided into Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). SaaS runs on PaaS, and PaaS runs on IaaS. Since IaaS is the basis of all services, an algorithm is required to operate virtualization resources efficiently. Among them, desktop resource virtualization is used for resource high availability of unused state time of existing desktop PC. Clustering of hierarchical structures is important for high availability of these resources. In addition, it is very important to select a suitable algorithm because many clustering algorithms are mainly used depending on the distribution ratio and environment of the desktop PC. If various attempts are made to find an algorithm suitable for desktop resource virtualization in an operating environment, a great deal of power, time, and manpower will be incurred. Therefore, this paper proposes a resource clustering simulator for cluster selection of desktop virtualization. This provides a clustering simulation to properly select clustering algorithms and apply elements in different environments of desktop PCs.

DEM-based numerical study on discharge behavior of EPB-TBM screw conveyor for rock (EPB-TBM 암반굴착시 스크류컨베이어의 배토 거동에 대한 DEM 기반 수치해석적 연구)

  • Lee, Gi-Jun;Kwon, Tae-Hyuk;Kim, Huntae
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.21 no.1
    • /
    • pp.127-136
    • /
    • 2019
  • Tunnel construction by TBMs should be supported by the performance of a screw conveyor in order to obtain the optimum penetration rate, so studies related to the screw conveyor performance have been being conducted. Compared to the study on the performance of the screw conveyor for the soil, however, the research on the performance of the screw conveyor for the rock is insufficient. Considering the domestic tunnel sites with more rock layers than soil layers, simulation of discharge of 6 types of rock chips by the screw conveyor was conducted using DEM. Regardless of the shape and volume of the rock chips, the discharge rates of the rock chips by the parallel placed screw conveyor at a speed of 10 RPM in the same rock mass were about 20% (standard deviation: 1.3%) of the maximum volume of discharge rate by the screw conveyor. It is expected that this study can be used as a reference material for screw conveyor design and operation in TBM excavations in rock masses.

A Study on the Methodology for Combat Experimental Testing of Future Infantry Units using Simulation (시뮬레이션을 활용한 미래 보병부대 전투실험)

  • Lim, Jong-Won;Choi, Bong-Wan;Yim, Dong-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • Owing to the development of science technology, particularly the smart concept and defense policy factors of the 4th industry, military weapon systems are advanced, and the scientific and operational force is reduced dramatically. The aspect of the future war is characterized by the operation of troops with reduced forces from advanced and scientific weapon systems in an operational area that has expanded more than four times compared to the present. Reflecting on these situational factors, it is necessary to improve combat methods based on the changes in the battlefield environment and advanced weapon systems. In this study, to find a more efficient future combat method in a changing war pattern, this study applied the battle experiment methodology using Vision21 war game model, which is an analytical model used by the army. Finally, this study aimed to verify the future combat method and unit structure. Therefore, the scenario composition and experiment method that reflect the change in the ground operational environment and weapon system was first composed. Subsequently, an analysis method based on the combat effectiveness was applied to verify the effective combat performance method and unit structure of future infantry units.

A Study on the Risk Analysis and Fail-safe Verification of Autonomous Vehicles Using V2X Based on Intersection Scenarios (교차로 시나리오 기반 V2X를 활용한 자율주행차량의 위험성 분석 및 고장안전성 검증 연구)

  • Baek, Yunseok;Shin, Seong-Geun;Park, Jong-ki;Lee, Hyuck-Kee;Eom, Sung-wook;Cho, Seong-woo;Shin, Jae-kon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.299-312
    • /
    • 2021
  • Autonomous vehicles using V2X can drive safely information on areas outside the sensor coverage of autonomous vehicles conventional autonomous vehicles. As V2X technology has emerged as a key component of autonomous vehicles, research on V2X security is actively underway research on risk analysis due to failure of V2X communication is insufficient. In this paper, the service scenario and function of autonomous driving system V2X were derived by presenting the intersection scenario of the autonomous vehicle, the malfunction was defined by analyzing the hazard of V2X. he ISO26262 Part3 process was used to analyze the risk of malfunction of autonomous vehicle V2X. In addition, a fault injection scenario was presented to verify the fail-safe of the simulation-based intersection scenario.

Descent Dataset Generation and Landmark Extraction for Terrain Relative Navigation on Mars (화성 지형상대항법을 위한 하강 데이터셋 생성과 랜드마크 추출 방법)

  • Kim, Jae-In
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_1
    • /
    • pp.1015-1023
    • /
    • 2022
  • The Entry-Descent-Landing process of a lander involves many environmental and technical challenges. To solve these problems, recently, terrestrial relative navigation (TRN) technology has been essential for landers. TRN is a technology for estimating the position and attitude of a lander by comparing Inertial Measurement Unit (IMU) data and image data collected from a descending lander with pre-built reference data. In this paper, we present a method for generating descent dataset and extracting landmarks, which are key elements for developing TRN technologies to be used on Mars. The proposed method generates IMU data of a descending lander using a simulated Mars landing trajectory and generates descent images from high-resolution ortho-map and digital elevation map through a ray tracing technique. Landmark extraction is performed by an area-based extraction method due to the low-textured surfaces on Mars. In addition, search area reduction is carried out to improve matching accuracy and speed. The performance evaluation result for the descent dataset generation method showed that the proposed method can generate images that satisfy the imaging geometry. The performance evaluation result for the landmark extraction method showed that the proposed method ensures several meters of positioning accuracy while ensuring processing speed as fast as the feature-based methods.

A Study on the Safety Improvement of Vessel Traffic in the Busan New Port Entrance (부산신항 진출입 항로 내 선박 통항 안전성 향상에 관한 연구)

  • Choi, Bong-kwon;Park, Young-soo;Kim, Nieun;Kim, Sora;Park, Hyungoo;Shin, Dongsu
    • Journal of Navigation and Port Research
    • /
    • v.46 no.4
    • /
    • pp.321-330
    • /
    • 2022
  • Busan New Port manages the largest volume of traffic among Korean ports, and accounts for 68.5% of the total volume of the Busan port. Due to this increase in volume, ultra large container ships call at Busan New Port. When the additional south container terminal as well as ongoing construction project of the west container terminal are completed, various encounters may occur at the Busan New Port entrance, which may cause collision risk.s Thus, the purpose of this study was to provide a plan to improve the safety of vessel traffic, in the in/out bound fairway of Busan New Port. For this purpose, the status of arrivals and departures of vessels in Busan New Port, was examined through maritime traffic flow analysis. Additionally, risk factors and safety measures were identified, by AHP analysis with ship operators of the study area. Also, based on the derived safety measures, scenarios were set using the Environmental Stress model (ES model), and the traffic risk level of each safety measure was identified through simulation. As a result, it is expected that setting the no entry area for one-way traffic would have a significant effect on mitigating risks at the Busan New Port entrance. This study can serve as a basis for preparing safety measures, to improve the navigation of vessels using Busan New Port. If safety measures are prepared in the future, it is necessary to verify the safety by using the traffic volume and flow changes according to the newly-opened berths.

Management of Infrastructure(Road) Based On Asset Value (자산가치 기반의 교통인프라 유지관리)

  • Dong-Joo Kim;Woo-Seok Kim;Yong-Kang Lee;Hoon Yoo
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.28 no.3
    • /
    • pp.100-107
    • /
    • 2024
  • Currently, in Korea, due to the rapid aging and deterioration of facilities, the minimum Maintenance Level and Performance Level' of facilities are required by the 'Facility Safety Act' or 'Infrastructure Management Act'. Since infrastructure assets have a long lifespan and the pattern of deterioration over time is complex, it is very difficult to maintain infrastructure as 'minimum maintenance state' or 'minimum performance state' by the current way of management. 'Asset Management' shall be performed not only by a technical perspective, but also by an accounting perspective such as cost and asset value. However, due to lack of awareness of 'asset management' among stakeholder, only technical perspective management is being carried out in practice. In order to effectively manage infrastructure assets, complex consideration of various asset value factors such as budget and service as well as safety and durability are required. In this paper, we presented a theory to evaluate and quantify the road network value for efficient asset management of the road network. We also presented a method of simulation to apply the theory presented in this paper. Through simulation and the results derived from this study, it is possible to specify the budget for the future national asset management, and to optimize the strategy for the management of old road facilities.