• Title/Summary/Keyword: 위험대응

Search Result 1,446, Processing Time 0.031 seconds

Performance-based Fire Protection Design of Domestic Super High-rise Buildings - Evaluation by ASET and RSET -

  • Roh, Hyeong-Ki
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.11 no.2
    • /
    • pp.9-13
    • /
    • 2011
  • The Performance-based fire protection design required to construct super high-rise building is the active measure for the evaluation of fire risks and the establishment of fire protection systems on the basis of engineering analysis, which is more efficient and proper than existing prescriptive-based design. This study applied time-line analysis of RSET is required safe egress time and ASET is available safe egress time with the fire and evacuation simulation to analyze. The result of this study showed the sprinkler system increased ASET and fire detection and alarm system reduced RSET efficiently. Reduced evacuation time influences to secure the life safety. Also it is essential to maintain the fire suppression system and fire detection & alarm system properly. Database of fire movement and evacuation action program are useful for the performance-based design.

Evaluation Standard for Safety of Autonomous Cars: UL 4600 (자율주행자동차를 위한 안전성 평가 표준: UL 4600)

  • Lee, Seongsoo;Ihm, Sahng-Hyeog
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.565-570
    • /
    • 2021
  • This paper describes UL 4600, a new international safety standard to ensure safety of autonomous cars. Conventional vehicular safety standards such as ISO 26262 and ISO/PAS 21448 suffer from large limitations to be applied to autonomous cars, but UL 4600 exploits new approaches to be applied to autonomous cars. Conventional standards define various technological aspects to ensure safety and require manufacturers to certify these aspects. On the contrary, UL 4600 requires manufacturer to explain and prove why autonomous cars are safe. In UL 4600, (1) under specific environments where the system is designed to operate with, (2) claims should be defined to guarantee given safety, and (3) arguments should be suggested to satisfy given goals, and (3) evidences should be presented to prove given arguments. UL 4600 is technology-neutral since it does not require specific designs nor technologies. So UL 4600 only requires manufacturers to prove given safety goals regardless of methods and technologies. Also UL 4600 admits various cases of autonomous car field operations into the standard via feedback loop. So UL 4600 effectively maneuvers various dangers unknown at the time of standard establishment.

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

A Study on the Development of Calculation Tables and Formulas for Determining Separation Distance in Case of Cl2・HF Tank-lorry Leakage (염소・불화수소 탱크로리 누출사고 시 이격거리 산정을 위한 산정표 및 산정식 개발 연구)

  • Jeon, Byeong-Han;Kim, Hyun-Sub;Lim, Sang-Min;Lee, Joo-Chan;Lee, Gang-San
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.212-219
    • /
    • 2021
  • Chemical accidents caused by transport vehicles account for 20% of all chemical accidents every year, but there are difficulties in the accident-response process due to repeated situations where the impact assessment information is unknown. In this study, we developed a calculation table and formula for predicting the range of damage for chlorine and hydrogen fluoride, which have a high domestic usage, high risk of accidents, and high accident frequency in the last 7 years. The calculation table is based on the leakage rate, wind speed, and temperature, and the calculation formula was derived using R software for special situations where it is difficult to apply the calculation table. The calculation table and formula could be used on site by related organizations to obtain important information for decision making, which could help in minimizing damage from chemical accidents, setting separation distances, and deciding to evacuate residents.

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

Comparing Water Management Categories of Green Building Rating Systems for Development of Evaluation Criteria of Watersheds (유역 평가 기준 개발을 위한 그린빌딩 평가 시스템의 물관리 관련 항목 비교 연구)

  • Idrees, Muhammad Bilal;Lee, Jin-Young;Ahn, Jae-Hyun;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.6
    • /
    • pp.1013-1020
    • /
    • 2018
  • With the rapid industrialization and increase in population, more and more people are moving to live in cities. This urbanization trend is resulting in increased construction and development activities which associates with escalation of impervious surface. This in turn causes problems like groundwater depletion, higher flood peaks, and increased rate of soil loss from the watershed. Watershed management projects are being implemented around the globe concerning with the application of soil and water resources conservation practices. It is desirable that an entire watershed be evaluated based on soil and water conservation practices applied. In this study, water management categories of green building rating systems (GBRS) of South Korea, Taiwan, and the Philippines were discussed. The water management practices rating criteria of G-SEED (South Korea), BERDE (Philippines), and EEWH (Taiwan) were explored and compared. The insights of this study are expected to be projected to establish a comprehensive rating system for the evaluation of watersheds. The quantification of watershed management practices will help future planners to identify areas of potential water-related risks and counter the hazards more effectively.

A Study on the Research Security System of the Researcher-Centric (연구자 중심의 연구보안 체계 개선방안 연구)

  • Lee, Jeakyun;Na, Onechul;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.65-84
    • /
    • 2018
  • The government is continuously expanding its national R&D investment to actively respond to the advent of the $4^{th}$ industrial revolution era and to develop the national economy. The R&D structure is likely to be liberalized as the paradigm shifts from the pursuit type R&D to the leading type R&D, and R&D capacity enhancement that focuses on researchers' creativity is emphasized. Such changes in R&D environment will increase the risk of security accidents such as leakage of research information. In addition, security policy for protection of research result should be the Researcher-Centric Security and security policy should be changed. This study explored transforming the research security system into the Researcher-Centric Security system so that researchers can voluntarily implement necessary security measures in the course of conducting research.

Analysis of Korean Gamers' Personality Patterns with respect to the Victim/Attacker of the Misogyny and the Misandry in Game Playing (게임 내 이성 혐오 가해자와 피해자의 성격 패턴 분석)

  • Song, Doo Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1481-1488
    • /
    • 2018
  • As female gamers are rapidly increasing, the misogyny and the misandry in game playing situation are also increasing. Recent #Gamergate and GodGunbae incident exhibit that such discriminative/hate behaviour in game playing can be developed into real physical threat or crime. In this paper, we investigate and analyze young Korean game players on how the attackers group, victims group, and gender-issue-indifferent group behave differently in game playing through survey. We found that male gamers had high hostile sexism against female gamers especially on females' game attitude and streotyped hatred with respect to the gender ${\times}$ group interaction. In big-5 personality test, however, it is not clear if attackers and victims had a noticeable different personality patterns. In result, we verify that there exist gender stereotype and high hostile sexism among young Korean gamers. Active gender-equality education on their adolescent period is necessary to avoid such destructive hatred in game playing.

A Study on the Evaluation Method for Penetration Test Method and Procedures (모의 침투 테스트 방법 및 절차의 평가 방법에 관한 연구)

  • Kang, Yong-Suk;Choe, Guk-Hyeon;Shin, Yong-Tae;Kim, Jong-Hee;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.230-233
    • /
    • 2014
  • Latest Inforamtion security threats and risks change very rapidly, and there to strengthen the security level of the major companies and organizations are diversified attack to respond to a penetration test conducted. Penetration test(PenTest) is safer for the purpose of looking for vulnerabilities in computer systems by taking advantage of vulnerabilities discovered in the same way as a hacker attack. How to make a security vulnerability could be exploited by attempting to attack show. On the other hand, many security companies are testing in a variety of ways to be penetrated. However, penetration testing to evaluate the strength and reliability has not performed yet. Therefore, in this study, Penetration testing to validate and present a reliable method of evaluation. In this study, penetration testing, assessment information to provide the evaluation results are more reliable. And, as a result, efficient penetration test is expected to be possible.

  • PDF

A Study on the Records Management for Dissolved Agencies (폐지기관 기록물관리제도 현황과 개선방안에 관한 연구)

  • Kim, Song-yi;Lee, Young-hak
    • The Korean Journal of Archival Studies
    • /
    • no.51
    • /
    • pp.5-44
    • /
    • 2017
  • The institution, which was temporarily run, has not registered and has neglected records due to its temporality. In this regard, many related experts have pointed out their risk of loss. Therefore, the objective of this study is to analyze the problems of the temporary institution's records management system by investigating the current situation, and to suggest solutions, thereby arousing the necessity of managing the records produced by dissolved agencies. To specifically review this, first, this paper analyzes the records management system of abolished institutions, focusing on the working environment, related laws, and guidelines. Moreover, it indicates the problem with regard to the effectiveness of legal systems, the lack of professionalism and infrastructure for records management services in temporary agencies, and National Archives of Korea's passive response. With regard to these problems, there are some solutions presented such as the complementation of related laws and guidelines, the strengthening of professionalism in relevant agencies in relation to managing records properly, and the establishment of cooperative networks between related institutions.