• Title/Summary/Keyword: 위험대응

Search Result 1,446, Processing Time 0.031 seconds

An Ergonomic Study on Carpal Tunnel Syndrome (손목관증후군에 관한 인간공학적 연구)

  • 김철홍
    • Proceedings of the ESK Conference
    • /
    • 1993.10a
    • /
    • pp.3-14
    • /
    • 1993
  • 손목관증후군(CTS)이란 장기간에 걸쳐 여러가지 의학적, 생리학적, 직업적 요인들에 기인 하여 발생하는 누적외상병(Cumulative Trauma Disorders: CTD)의 대표적인 한 형태이다. 이 증 후근은 1960년에 국제노동기구(ILO)에 의해 직업병으로 인정되었으며 미국을 비롯한 구미각국에 서는 산업체에서 발생하는 작업손실시간및 산업재해보상으로 인한 경비손실에 중요한 요인의 하 나로 규정되어 이에 대한 예방책의 연구가 정부기관, 대학, 연구소, 그리고 산업체를 중심으로 활 발히 이루어지고 있으나, 우리나라에서는 아직 이에 대한 인식및 예방책에 관한 연구가 미흡한 실정이다. 본 논문에서는 직업적 요인을 중심으로 손목관증후군(CTS)의 발병가능성이 높은 직업 및 그 작업조건들을 고찰하고 이의 예방을 위한 연구방안을 다음과 같이 모색하였다. 첫째, 손목 관증후군에 관련된 문헌조사를 통하여 어떠한 직업들이 보다 높은 발병위험에 직면하고 있으며 어 떤 작업조건및 환경적 요인들이 손목관증후군(CTS)을 발병시킬수 있는가에 대하여 고찰하였다. 둘째, 미국등의 대학및 연구소에서 여러가지 작업조건들을 통제한 실험을 통하여 얻어진 이 증후군 의 발병율을 감소시키기 위한 여러가지 안전한 작업기준들을 검토하고 정부기관(NIOSH, OSHA)의 정책방향을 검토하였다. 세째, 미국의 연구소및 경영자문회사등에서 산업체를 대상으로 시행하고 종합적인 누적외상병(CTD)의 예방프로그램을 검토하였다. 마지막으로, 현재 우리나라의 손목관증 후군(CTS)을 중심으로한 누적외상병의 현실을 검토하고 앞으로의 예방을 위한 연구방향및 방법과 정책적 대응방안등에 대하여 연구검토하였다. 결론을 제시하고자 한다.기서 사용된 아이콘에 대해서만 타당한 것으로 이것을 모든 아이콘에 대해 일반화시키기는 어려우나 이후에 행해질 Icon-based User Interface 분야의 많은 연구들의 기초가 될 것이다. 더불어 아이콘과 관련된 많은 요인들(문화적 영향, 아이콘 색깔, 크기, 아이콘의 위치등이 인식에 미치는 영향)에 대해서도 연구가 행해져야 할 것이다. 확인하고 각각의 기능을 분명히 했다.가 수월하게 하였고 메모리를 동적으로 관리할 수 있게 하였다. 또한 기존의 smpl에 디버깅용 함수 및 설비(facility) 제어용 함수를 추가하여 시뮬레이션 프로그램 작성을 용이하게 하였다. 예를 들면 who_server(), who_queue(), pop_Q(), push_Q(), pop_server(), push_server(), we(), wf(), printfct() 같은 함수들이다. 또한 동시에 발생되는 사건들의 순서를 조종하기 위해, 동시에 발생할 수 있는 각각의 사건에 우선순위를 두어 이 우선 순위에 의하여 사건 리스트(event list)에서 자동적으로 사건들의 순서가 결정되도록 확장하였으며, 설비 제어방식에 있어서도 FIFO, LIFO, 우선 순위 방식등을 선택할 수 있도록 확장하였다. SIMPLE는 자료구조 및 프로그램이 공개되어 있으므로 프로그래머가 원하는 기능을 쉽게 추가할 수 있는 장점도 있다. 아울러 SMPLE에서 새로이 추가된 자료구조와 함수 및 설비제어 방식등을 활용하여 실제 중형급 시스템에 대한 시뮬레이션 구현과 시스템 분석의 예를 보인다._3$", chain segment, with the activation ener

  • PDF

A Study on the Effects of Absorptive Capacity in SMEs on Product Competitiveness: Considering the Moderating Effect of CEO's Entrepreneurship (중소기업의 흡수역량이 제품경쟁력에 미치는 영향 및 중소기업 CEO 기업가정신의 조절효과에 관한 연구)

  • Sohn, In Bae;Huh, Chul Moo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.4
    • /
    • pp.61-72
    • /
    • 2017
  • Although small and medium-size enterprises are facing the significant trends in the Fourth Industrial Revolution and Open Innovation which are increasingly in need, the subjects of absorptive capacity and entrepreneurship has not been studied sufficiently in order to enhance the competitiveness of SMEs' products and cope with the current trend. The purpose of this study is to investigate the effects of absorptive capacity of SMEs on product competitiveness and the moderating role of CEO's entrepreneurship between the absorptive capacity and the product competitiveness. The data were collected from 313 employees of 22 SMEs in the Seoul metropolitan area, Kyunggi-do and Chung-cheong province, and analyzed using hierarchical regression analysis. As a result of the hypothesis test, both the absorptive capacity of SMEs and CEO's entrepreneurship had a positive effect on the product competitiveness. In addition, also found out the innovativeness and the proactivness out of the three entrepreneurship had the moderate roles between the potential absorptive capacity out of the absorptive capacity and the product competitiveness. On the other hand, the risk-taking out of the three entrepreneurship had the moderate roles between the realized absorptive capacity out of the two absorptive capacity and the product competitiveness. These results suggest that open innovation and technological entrepreneurship are needed to help SMEs learn external resources and information to create performance. After discussing this conclusions and implications of the study, the direction for future study was presented.

  • PDF

Thermal Analysis of Vegetable Insulation Oil for Hermetically Sealed Wind Turbine Transformer (풍력발전기용 밀폐형 변압기의 식물성 절연유에 대한 열적특성 연구)

  • Lee, Sung-Won;Lee, Joon-Yeob;Kim, Jun-Su;Woo, Jae-Hi;Kim, Dong-Hae
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.1
    • /
    • pp.97-102
    • /
    • 2012
  • A hermetically sealed oil transformer is designed by applying expanding function of the tank due to the volume changes of the insulation oil according to the temperature rises. When the insulation oil expands, an increase in the volume of the corrugated fin prevents a pressure rise of the transformer. For a wind turbine transformer, a vegetable-oil-immersed transformer has the advantages of excellent biodegradation and fire-resistant properties like an exceptionally high fire point. When vegetable oil is substituted for mineral oil, however, the maximum winding temperature rises because of the decrease in the internal circulation flow rate resulting from the variations of the oil's physical characteristics, such as density and viscosity. The purpose of this study is to develop a hermetically sealed vegetable oil transformer that can be applied in a wind turbine and to analyze the thermal stability of the active part of the transformer to deal with pressure variations due to the temperature changes. In addition, thermal tests for the vegetable oil transformer have been performed, and the measured values are compared with the analysis results.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

The Introduction and the Application of PMSCs System on Counter-terrorism (대테러활동에 있어서 민간군사보안업(PMSCs) 제도의 도입과 활용방안)

  • Kim, Sang-Jin;Kim, Jong-Kul
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.89-98
    • /
    • 2011
  • The counter-terrorism in Korea should be approached practically divided both internally and externally. However, in reality it is impossible for the military and the police to control all the counter-terrorism. So there is a need of precaution using the partnership with private companies. But the military and the police have stressed the conservative and closed operation. Furthermore, the focus of counter-terrorism in Korea is more on expose facto treatment than prevention, so they are almost the defenseless. In order to solve this problem, we should form the private subcontractors of the counter-terrorism experts. That is the introduction and the application of PMSCs system. First, the military and the police need to change its mind set for the partnership with private companies to prepare appropriateness. Second, it should be built up infrastructure to let the hands-up workers on counter-terrorism out place. Third, it should be set up the institutions of learning to train regularly to applicate PMSCs system and to specialize. Fourth, the training of counter-terrorism should be made it mandatory about exit passengers to danger zone. Fifth, the selection of PMSCs suitable for counter-terrorism should be strict.

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

A Study on the Safety Measure for Mega Container Ships Calling at Busan New Port from the Perspective of Pilotage (도선 관점에서 본 초대형 컨테이너 선박의 부산신항 내 안전대책 연구)

  • Kim, Chong-hwan;Park, Young-soo;Kim, Dae-won
    • Journal of Navigation and Port Research
    • /
    • v.44 no.3
    • /
    • pp.174-180
    • /
    • 2020
  • With the removal of underwater obstacles in the Busan New Port, the water depth of the pier has been secured up to 17m, and the port authority is constantly responding to the trend of container vessels becoming larger. Also, in 2020, 24,000TEU class container ships are entering to the port, and it is planned to secure the depth in the port to 23 m later in line with this trend. Mega container ships must check in advance the factors to be considered depending on the situation at the time, and for this, it is judged that information sharing among stakeholders is necessary. In this paper, to understand the effect of the corresponding route because of the mega container ships, a transit safety evaluation was conducted based on statistical data on ship entry and departure and maneuver characteristics of corresponding ships. The result showed that the transit of the mega container ships has increased up to 8.4% comparing to the risk of 4,000TEU class container ships. Additionally, safety measures such as minimum safety depth and tug operation plans were presented by gathering opinions on operational characteristics from the perspective of pilotage for safe transit in the Busan New Port area. Through this, it is considered that it will be possible to contribute to the prevention of accidents when entering and leaving the Busan New Port.

A Study on Continuous Monitoring Reinforcement for Sales Audit Using Process Mining Under Big Data Environment (빅데이터 환경에서 프로세스 마이닝을 이용한 영업감사 상시 모니터링 강화에 대한 연구)

  • Yoo, Young-Seok;Park, Han-Gyu;Back, Seung-Hoon;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.123-131
    • /
    • 2016
  • Process mining in big data environment utilize a number of data were generated from the business process. It generates lots of knowledge and insights regarding implementation and improvement of the process through the event log of the company's enterprise resource planning (ERP) system. In recent years, various research activities engaged with the audit work of company organizations are trying actively by using the maximum strength of the mining process. However, domestic studies on applicable sales auditing system for the process mining are insufficient under big data environment. Therefore, we propose process-mining methods that can be optimally applied to online and traditional auditing system. In advance, we propose continuous monitoring information system that can early detect and prevent the risk under the big data environment by monitoring risk factors in the organizations of enterprise. The scope of the research of this paper is to design a pre-verification system for risk factor via practical examples in sales auditing. Furthermore, realizations of preventive audit, continuous monitoring for high risk, reduction of fraud, and timely action for violation of rules are enhanced by proposed sales auditing system. According to the simulation results, avoidance of financial risks, reduction of audit period, and improvement of audit quality are represented.

An Empirical Study on the Influence of Entrepreneurship of Franchisor's CEO on Franchisor's Performance (프랜차이즈 가맹본부 CEO의 기업가정신이 기업성과에 미치는 영향에 관한 실증연구)

  • Kang, Byung-Oh;Kim, Jin-Soo;Ahn, Sung-Sik
    • Journal of Distribution Research
    • /
    • v.15 no.4
    • /
    • pp.87-117
    • /
    • 2010
  • 'Entrepreneurship' which means spirit or activity seeking new value by challenging boldly the uncertainty is one of the most important concept in 21st century business environment. Franchise Industry taking a relationship with distribution industry also needs entrepreneurship. As franchise industry consists of small and medium enterprises, the entrepreneurship of franchisor's CEO is important for the franchisor's growth. The purpose of this study is to analyze the factors influencing on the entrepreneurship of franchisor's CEO, and the effect of the CEO's entrepreneurship on franchisor's performance. For this purpose, this study set CEO's psychological characteristics, market characteristics, and social-institutional characteristics as independent variables, CEO's entrepreneurship as parameter variables, and franchisor's performance as dependent variables. And to analyze this study model, this study collected questionnaires from 152 franchisors' CEOs, and uses SEM(Structural Equation Modeling). As the result, 'CEO's Entrepreneurship' influenced on both 'Franchisor's Financial Performance' and 'Franchisor's Non Financial Performance'. The results of this study provide some guides for franchisor's CEO and government policies.

  • PDF

A Study on the Implementation Level and Improvement of Incheon Strategy of Korea (한국의 인천전략 이행수준과 개선방안 연구)

  • Na, Woon Hwan
    • 재활복지
    • /
    • v.21 no.2
    • /
    • pp.1-27
    • /
    • 2017
  • The purpose of this study is to evaluate the level of implementation of the Incheon Strategy and to develop measures for effective implementation. This research method used literature review and monitoring method. The results of the study are summarized as follows: First, 9 key indicators and 7 supplementary indicators, which are classified into implementation and non-implementation, 3 key indicators have been implemented, one indicator has been partially implemented, 5 indicators have not yet been implemented, Also, In the case of supplementary indicators, five were implemented and two were not. Second, the ten target areas are lacking in implementation, but the objective of 7 is to ensure the comprehensive disaster risk reduction and management, the ratification and implementation of the Convention on the Rights of Persons with Disabilities and the harmonization of the Convention with the domestic law, Also, it is analyzed that the level of implementation is in the order of improving the reliability and comparability of the data of goal 8, ensuring gender equality of goal 6 and strengthening the capacity of women. Based on these results, we propose an improvement plan for implementation. First, it is necessary to formulate policy issues and implement measures for the implementation of Incheon Strategy. Second, it is necessary to establish a system to implement and monitor for Incheon strategy. Third, Korean standards for goals and targets, key indicators and supplementary indicators are needed. Fourth, it is necessary to prioritize the target implementation and to take preemptive action. Lastly, it is necessary to educate and publicize for the Incheon strategy.