• Title/Summary/Keyword: 위험대응

Search Result 1,446, Processing Time 0.03 seconds

Development of Smart App to Support the Paramedics Activities (구급 활동을 지원하는 스마트 앱 개발)

  • Eum, Sang-Hee;Kim, Gwang-Nyeon;Kim, Gi-Ryon;Nam, Jae-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.49-53
    • /
    • 2018
  • In the recent years, an attempts have been made to convergence medical technology and IT technology to overcome the limitations of temporal, spatial in the medical technology applications. Emergency care is primarily intended to provide primary care and stabilization to the patient, thereby saving the patient's life and minimizing the risk until hospital care. In this study, we developed an application S/W to support emergency services for emergency medical services. Paramedics can easily keep a log of emergency activities and monitor the patient's condition in real time with this application S/W on smart devices. In particular, medical signals and information emergency status of emergency patients can be measured or photographs of affected areas can be taken. In addition, this report can be delivered to remote medical doctors for rapid emergency measures and immediate hospital response.

Security Vulnerability and Countermeasure on 5G Networks: Survey (5G 네트워크의 보안 취약점 및 대응 방안: 서베이)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.197-202
    • /
    • 2019
  • In line with the era of the 4th Industrial Revolution, 5G technology has become common technology, and 5G technology is evaluated as a technology that minimizes the speed and response speed compared to 4G using technologies such as network slicing and ultra-multiple access. 5G NR stands for 5G mobile communication standard, and network slicing cuts the network into parallel connections to optimize the network. In addition, the risk of hacking is increasing as data is processed in the base station unit. In addition, since the number of accessible devices per unit area increases exponentially, there is a possibility of base station attack after hacking a large number of devices in the unit area. To solve this problem, this study proposes the introduction of quantum cryptography and 5G security standardization.

A method to maintain templates in open source-based authoring tool for e-learning assessment items (오픈 소스 기반의 이러닝 평가문항 저작 도구를 위한 템플릿 유지 기법)

  • Han, Sungjae;Choi, Byung-Uk;Cha, Jaehyuk
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.101-112
    • /
    • 2014
  • Existing tools using in the standard e-learning contents authoring were used a method to provide users contents template produced in advance. In order to use resources of the template in a common web-based authoring tool, there is problem to overcome. If the resource of template is inserted within the contents on the authoring tool, the deformation of the template by the user's input that may occur during the edit process cannot be controlled. In this paper, we propose an effective maintenance method to prevent deformation of the resource of template inserted into any WYSIWYG-based HTML authoring tool by user's discretion. We added a template plug-in that can create the IMS-QTI standard resource in tynyMCE the web-based open source editor of representative examples. And the plug-in for tinyMCE was realized as a module of directly respond to the action of limited user input. So, in response to the action of user's input, the structure of the template can be sustained possibly.

A Resilience-based Model for Performance Evaluation of Information Systems (복원탄력성기반 정보시스템 성과평가모델 연구)

  • Kim, Kyung-Ihl;Lee, Seong-Hyo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.3
    • /
    • pp.1-6
    • /
    • 2020
  • Information System is influenced by the innovation of new IT. Therefore, IS should response to external environment's changes quickly. Particularly, resilience should be considered in barriers of IS. This study suggests a new information system evaluation model in which resilience is added to the existing factors of Delone and Mclean. Then the effect of resilience is evaluated through the DEA(Data Envelopment Analysis) based on a survey targeting 115 users of a mid-sized manufacturing company. The results show that the effect of resilience is stronger than any other factors in the previous researches. We, thus, suggest that the resilience should be included as an evaluation factor of the ISO27001 information security standard in order to enhance the absorptive capacity of the information system.

Flood Mitigation Analysis for Abnormal Flood at Namhangang River Basin (이상홍수에 대한 남한강 유역의 홍수취약성 분석 및 방재대책)

  • Ahn, Jae-Hwang;Choi, Chang-Won;Yi, Jae-Eung;Shim, Jae-Hyun;Lee, Cheol-Kyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.302-306
    • /
    • 2010
  • 전 세계적으로 진행 중인 지구온난화와 기후변화의 영향으로 우리나라의 강우특성이 변화하고 있다. 이에 기후변화로 인한 재해 발생요인을 감소시키기 위한 다양한 대책을 검토하고 합리적 대책을 제시하여 이상홍수에 대한 대응방안을 수립할 필요가 있다. 본 연구에서는 이상홍수에 대비한 방재대책을 수립하기 위해, 먼저 이상홍수 발생 시 댐과 같은 대규모 수공구조물의 방류로 인해 하류에 위치한 도시에 피해가 미칠 수 있는 유역을 선정하였다. 이후 선정된 시험유역에서의 이상홍수 발생 시나리오를 작성하여 각 시나리오별 이상홍수의 취약성을 평가하고, 마지막으로 시험유역에 다양한 방재대책을 적용해 적용된 방재대책의 재해저감 능력을 분석하여 적절한 방재 개선안을 도출하는 것을 목표로 하였다. 충주댐의 홍수조절 능력을 초과한 홍수발생 시 충주댐 하류에 위치한 주요 도시인 충주 및 여주에 홍수피해 발생 위험이 증가하게 된다. 본 연구에서는 2006년 7월에 발생했던 홍수사상을 분석하고, 2006년 7월의 실측 강우량보다 1.2~1.5배 큰 강우사상과 PMF가 발생할 경우에 대한 모의를 통해 남한강유역의 홍수 취약성을 분석하였다. 분석된 홍수 취약성을 기초로 충주댐 하류지역의 홍수피해를 줄이기 위해 다양한 홍수저감대책을 고려하였다. 홍수저감대책 중 구조적인 방법으로는 댐 상류지역에 홍수조절지를 건설하는 방안, 신규댐을 건설하여 충주댐과의 연계 운영하는 방안, 댐 하류에 강변저류지를 설치하는 방안 및 홍수발생시 파제를 실시하는 방안을 모의하였고 비구조적인 방법으로는 충주댐의 홍수조절능력을 높여주는 가변제한수위 적용방안을 모의하였다. 그 결과 댐 사이의 연계운영이 적절하게 이루어진다면 구조적인 방법 중 하나인 신규댐을 건설하는 방안이 가장 효과적인 홍수저감대책인 것으로 분석되었다.

  • PDF

Flood Damage of North Korea and Prevention Masure (북한의 홍수 피해 현황 및 대응방안)

  • Park, So-Yeon;Lee, Young-Goun;Kim, Se-Won
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.1867-1872
    • /
    • 2010
  • 본 연구에서는 1980년부터 2008년까지의 재해역학조사센터(http://www.emdat.be/)의 자료를 활용하여, 북한지역의 홍수로 인한 피해를 조사하였다. 북한의 홍수 발생 기간 중 약 70%가 주로 7월과 8월에 발생하였으며, 홍수로 인한 총 재산피해는 약 180억 달러에 달한다. 이중 1995년의 홍수는 약 150억 달러로 세계 50대 자연재해로 기록되었다. 또한, 2007년의 홍수는 북한의 자연재해 중 가장 많은 인명피해로 당시 사망자는 600명 이상이 기록되었다. 북한의 홍수 유형별 피해 규모를 분석하기 위하여 홍수 유형을 불특정 홍수, 돌발 홍수, 일반 홍수로 분류하여 분석하였다. 또한, 남북한의 차이를 분석하기 위하여 남한의 홍수 사례를 같은 유형으로 분류하여 함께 비교하였다. 유형별 빈도는 남한의 경우 3가지 유형이 비슷한 빈도로 발생된 반면, 북한의 경우 일반홍수의 빈도가 다른 홍수의 빈도 보다 조금 많이 발생하였다. 유형별 인명피해 부분에서는 남한은 전체 유형에서 돌발홍수가 52%로 가장 많은 부분을 차지했으며, 북한의 경우는 일반홍수가 42%로 가장 많이 차지하였다. 결론적으로 남한은 일반홍수와 돌발홍수의 빈도는 같았으나, 돌발홍수가 인명피해 면에서 2.3배 많이 발생하였으며, 북한의 경우 불특정 홍수와 돌발홍수의 발생 빈도는 같았으나, 돌발홍수로 인한 인명피해가 1.5배 많이 발생하였다. 경제적 피해 부분에서는 남한의 경우 돌발홍수가 약 19억 달러로 가장 많은 피해액을 발생시켰으며, 북한의 경우 일반홍수가 약 153억 달러로 가장 많은 피해액을 발생시켰다. 이는 남한의 약 7배에 해당하는 금액이다. 남북한이 경제적 피해 부분에서 큰 차이를 보이는 것은 1995년의 대홍수의 피해액이 약150억 달러로 기록되었기 때문으로 사료된다. 향후 기후변화로 인하여, 자연재해는 더욱 증가할 것으로 생각된다. 남한의 연구뿐만 아니라 한반도 전체에 대한 연구가 필요하다. 현재, 북한의 경우 기상 현상, 재해정보 등의 연구 자료는 남한 지역의 연구에 비해 상대적으로 많이 부족하며, 매우 제한적이고 단편적인 자료들만 존재하고 있다. 따라서 이에 관한 많은 연구들이 필요한 실정이다. 현재 작성되어 있는 북한의 재해 취약성 지도를 좀 더 연구하여, 한반도 전체의 재해 취약성 지도의 작성이 필요할 것으로 생각된다. 또한, 한반도 지역에서 발생하는 위험기상에 따른 사회경제적 피해를 줄이고 능동적으로 대처하기 위해 남북간 기상협력이 활성화 될 필요가 있을 것으로 생각된다.

  • PDF

A Comparison Study on Fire Water Supply Duration and Capacity of Water Based Fire Suppression System of the United States, Japan, China and Korea (우리나라, 중국, 일본, 미국 수계소화설비 소화수 공급시간 및 소화수원에 대한 비교 연구)

  • Min, Se-Hong;Nam, Yu-Hyun
    • Fire Science and Engineering
    • /
    • v.27 no.4
    • /
    • pp.13-20
    • /
    • 2013
  • Buildings in Korea have been getting higher recently and been being changed environmentally since the Korean fire standard was released in 1968. It should be established to make a appropriate correspondence of fire fighting against the those environmental changes. Most of all, fire water capacity which is basis of fire fighting service is a very significant factor. In this paper, the Korean fire water capacity and fire water duration were compared with China, Japan and the United states. Furthermore, fire water capacity, fire water duration, flow rate were compared by hazard classification, occupant use, number of floor and area with water based fire suppression system. This study has been surveyed to show what are difference, similarity, advantage and disadvantage on fire water capacity in the Korean standard comparing with neighboring countries like China, Japan as well as the United states. This study could be found what level the Korean fire water capacity is. So it suggests about more developed standard on fire water capacity with the result of analysis and comparison.

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF

Weight Evaluation of Risk Factors for Early Construction Stage (초기 건설공사 리스크인자의 중요도 산정)

  • Hwang Ji-Sun;Lee Chan-Sik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.2 s.18
    • /
    • pp.115-122
    • /
    • 2004
  • This study identifies various risk factors associated with activities of early construction stage, then establishes the Risk Breakdown Structure(RBS) by classifying the risks into the three groups; Common risks, risks for Earth works, and risks for Foundation works. The Common risks are identified and classified by considering various aspects of the early construction stage such as financial, political, constructional aspects, etc. The risks for Earth works and Foundation works are identified in detail by surveying technical specifications, relevant claim cases and interviewing with experts. These risks are classified based on the Wok Breakdown Structure(WBS) of the early construction stage. The WBS presented in this study classifies the works of early construction stage into four categories; excavation, sheeting works, foundation works, footing works. This study suggests a risk analysis method using fuzzy theory for construction projects. Construction risks are generally evaluated as vague linguistic value by subjective decision making. Fuzzy theory is a proper method to quantify vague conditions of construction activities. Therefore, this study utilizes fuzzy theory to analyse construction risks. The weight of risks is estimated by reflecting the interrelationship among risk factors from absolute weights obtained by fuzzy measure into the relative weights by Analytical Hierarchy Process(AHP). The interrelationship is estimated by Sugeno-fuzzy measure.

A design and implementation of Intelligent object recognition system in urban railway (도시철도내 지능형 객체인식 시스템 구성 및 설계)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.209-214
    • /
    • 2018
  • The subway, which is an urban railway, is the core of public transportation. Urban railways are always exposed to serious problems such as theft, crime and terrorism, as many passengers use them. Especially, due to the nature of urban railway environment, the scope of surveillance is widely dispersed and the range of surveillance target is rapidly increasing. Therefore, it is difficult to perform comprehensive management by passive surveillance like existing CCTV. In this paper, we propose the implementation, design method and object recognition algorithm for intelligent object recognition system in urban railway. The object recognition system that we propose is to analyze the camera images in the history and to recognize the situations where there are objects in the landing area and the waiting area that are not moving for more than a certain time. The proposed algorithm proved its effectiveness by showing detection rate of 100% for Selected area detection, 82% for detection in neglected object, and 94% for motionless object detection, compared with 84.62% object recognition rate using existing Kalman filter.