• Title/Summary/Keyword: 위험상황 식별

Search Result 80, Processing Time 0.021 seconds

A Basic Study on Establishment of Sea Trial Prohibition Waterway Based on Marine Traffic Survey (해상교통량 조사 기반 시운전금지해역 설정 기초 연구)

  • Park, Young-Soo;Kim, Jin-Kwon;Kim, Jong-Sung;Kim, Jong-Soo;Lee, Yun-Sok;Park, Sang-Won
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.3
    • /
    • pp.318-325
    • /
    • 2015
  • Korea has very strong shipbuilding industry in the world, so many new ships are constructed in Korean shipyards. These built vessels are carrying out sea trial at sea before delivering to shipowner, and sea trial ships cause navigation risk to other passing vessels to accomplish sea trial tests as quick turning, zigzag maneuvering and crash astern etc. in traffic congestion conditions. It occurred more than 1 collision accident related sea trial for recent 5 years. It has been increased about 30% of risk because of navigation of sea trial vessel by marine traffic flow simulation. This paper analyzed marine traffic density surveyed by AIS data for 7 days, and investigated position of marine accidents for 5 years in Korean coastal waterway, it established the sea trial prohibition areas as 10/100 level of total marine traffic volume, which is considered no danger for ship operator. This analyzed maritime safety law for setting of the prohibition waters to propose the basic legal system. It makes contribution to marine pollution prevention by setting of the sea trial prohibition water to improve the ship's navigation safety.

Robust Control Design for Handling Quality Improvement of Iced Full-scale Helicopter (결빙된 전기체 헬리콥터의 비행성 향상을 위한 강인 제어 설계)

  • Ju, Jong-In;Kim, Yoonsoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.2
    • /
    • pp.103-110
    • /
    • 2022
  • Degradation of handling qualities(HQs) due to bad weather or mechanical failure can pose a fatal risk to pilots unfamiliar with such situation. In particular, icing is an important issue to consider as it is a frequent cause of accidents. Most of the previous research works focuses on aerodynamic performance changes due to icing and the corresponding icing modeling or methods to prevent icing, whereas the present work attempts to actively compensate for HQ degradation due to icing on a full-scale helicopter through flight control law design. To this end, the present work first demonstrates HQ degradation due to icing using CONDUIT software, and subsequently presents a robust control design via the RS-LQR(Robust Servomechanism Linear Quadratic Regulation) procedure to compensate for the HQ degradation. Simulation results show that the proposed robust control maintains Level 1 HQ in the presence of icing.

A Study on Obtaining Feedback Function of Disaster Information Management using Information & Communication Technology (ICT기술을 이용한 방재정보 관리의 환류기능 확보에 관한 연구)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2015
  • Due to the cases of recent global warming and unusual weather etc., large-scale natural disasters such as typhoons, floods, snow damage occur frequently across the continents such as Southeast Asia and North America, South America etc. and risks of earthquakes and tsunami are also increasing gradually in Korea which has been regarded as a safe zone and disaster types are also being diversified such as typhoons, floods, heat waves, heavy snow and damage scale is also enlarged. In addition, due to geographical characteristics or lack of infrastructure, disasters tended to occur intensively around a specific region or city in the past but disasters occur throughout the country in recent years so preparation for disaster prevention has emerged as an urgent challenge issue. Therefore, considering that the plan of obtaining the effective feedback function of disaster Information is very important in the proactive and software aspects for disaster reduction, this paper analyzed this three aspects of contents, procedural and contextual aspects and proposed the plan. First, in the content aspect, building disaster prevention information communication Infrastructure, building urban and regional disaster prevention system, obtaining concurrency and sharing of information and second, in the procedural aspect, active utilization of ICT(Information and Communication Technology) of the prevention stage, disaster prevention information collection and analysis reinforcement of the preparation stage, improvement of decision-making structure and field command system of the response stage, recovery system related information promotion of the recovery stage were proposed as alternatives and finally, in the contextual aspect, if disaster prevention information is effectively managed through maintenance of disaster prevention information related systems, obtaining domainality by disaster prevention work, improvement of the ability to judge the situation, obtaining comprehensive and feedback function etc, it is considered to significantly contribute to reducing natural disasters.

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

Design and Implementation of Topology Generator for Sm art Factory Security Endpoint Identification (스마트팩토리 보안 앤드포인트 식별을 위한 토폴로지 제네레이터 설계 및 구현)

  • Yanghoon Kim
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.76-82
    • /
    • 2023
  • Starting from the 4th industrial revolution, core technologies were applied to industries to build various smart environments. Smart factories in the manufacturing industry produce high-quality products by applying IIoT as a core technology that can collect and control a wide range of data for customized production. However, the network environment of the smart factory converted to open through IIoT was exposed to various security risks. In accordance with security breaches, IIoT has shown degradation in the quality of manufactured products and production processes due to network disturbance, use and maintenance of forged IIoT, and can cause reliability problems in business. Accordingly, in this study, a method for safe connection and utilization of IIoT was studied during the initial establishment of a smart factory. Specifically, a study was conducted to check the IIoT connection situation so that the practicality of the IIoT connected to the smart factory could be confirmed and the harmless environment established.

  • PDF

Case Study of Electronic Fuel Injection Powertrain System FMEA Using Model-Based Fault Injection technique (모델 기반 결함 주입 기법을 이용한 Electronic Fuel Injection 전장 시스템 FMEA 사례연구)

  • Ye-ju Kim;Ye-won Na;Dong-min Lee;Ju-Young Kim;Jong-whoa Na
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.436-446
    • /
    • 2023
  • In the field of safety-critical systems, analyzing the effects of various failure factors (failure modes) is essential through Failure Mode and Effects Analysis (FMEA). However, with the increasing importance of software in systems, applying FMEA analysis to the design phase has become challenging. This paper proposes the use of Automatic FMEA, which can automatically perform FMEA using model-based design techniques, and presents a case study of FMEA for automotive engines. A comparison is made between the model-based Automatic FMEA analysis tool and existing FMEA tools. The study aims to demonstrate the performance of the Automatic FMEA analysis tool and propose future research plans.

Effects and Limitations of Separating Overlapped Fingerprints Using Fast Fourier Transform (고속 푸리에 변환(fast Fourier transform, FFT)을 이용한 겹친지문 분리의 효과와 한계)

  • Kim, Chaewon;Kim, Chaelin;Lee, Hanna;Yu, Jeseol;Jang, Yunsik
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.377-400
    • /
    • 2019
  • Photography is the most commonly used method of documenting the crime and incident scene as it helps maintaining chain of custody (COC) and prove integrity of the physical evidence. It can also capture phenomena as they are. However, digital images can be manipulated and lose their authenticity as admissible evidence. Thus only limited techniques can be used to enhance images, and one of them is Fourier transform. Fourier transform refers to transformation of images into frequency signals. Fast Fourier transform (FFT) is used in this study. In this experiment, we overlapped fingerprints with graph paper or other fingerprints and separated the fingerprints. Then we evaluated and compared quality of the separated fingerprints to the original fingerprints, and examined whether the two fingerprints can be identified as same fingerprints. In the case of the fingerprints on graph paper and general pattern-overlapping fingerprints, fingerprint ridges are enhanced. On the other hand, in case of separating complicated fingerprints such as core-to-core overlapping and delta-to-delta overlapping fingerprints, quality of fingerprints can be deteriorated. Quality of fingerprints is known to possibly bring negative effects on the credibility of examiners. The result of this study may be applicable to other areas using digital imaging enhancement technology.

Forward Security Protection Protocol of RFID System using New Key Generation Method (새로운 키 생성 방법을 통한 RFID시스템의 전방위보안성 보호 프로토콜)

  • Cho Jung-Hwan;Cho Jung-Sik;Yeo Sang-Soo;Kim Sung kwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.19-21
    • /
    • 2005
  • 현대의 산업화 사회에서는 자동인식을 통해서 사람과 사물을 식별하고자 하는 연구들이 진행되고 있다. 그 대표적인 예로 바코드를 이용한 접촉식 판별기술이 있고, 라디오 주파수를 이용한 RFID(Radio Frequency Identification) 기술을 들 수 있다. RFID의 경우는 무선 주파수를 이용하기 때문에 대량의 사물을 동시에 인식 할 수 있다는 장점이 있다. 하지만. 어떠한 상황에서 리더의 요청에 응답을 하는 리더-태그 시스템이기 때문에 사용자의 프라이버시 침해 문제를 야기 할 수 있다. 사용자의 프라이버시 침해문제를 막기 위해서 많은 연구들이 진행되고 있다. 그 중에서, Miyako Ohkubo의 Hash체인을 이용한 프라이버시 보호 기법은 정보유출, 위치추적공격(Location Tracking Attack), 전방위보안성(Forward Security)과 같은 프라이버시 침해문제들로부터 사용자의 프라이버시를 보호 할 수 있는 프로토콜이다. 그러나 Hash함수를 태그에 구현하는 것은 현재까지는 불가능한 상황이다. 또, Martin Feldhofer의 AES(Advanced Encryption Standard)를 사용한 프로토콜은 실제로 태그에 구현 가능하면서 내부구조가 8bit인 AES를 사용함으로써 암호학적인 강도를 높였으나, 프라이버시 침해 문제에서 단점을 드러냈다. 이러한 단점을 보완한 AES기반에서의 개선된 RFID 프라이버시 보호 프로토콜은 실제적으로 태그에 구현 가능한 AES를 이용한 암호화 체인을 통해서 프라이버시 보호에 우수하면서 실제 사용이 가능한 프로토콜을 제안하였다[1]. 그러나, 이 프로토콜은 생성되는 키 값들이 물리적 공격을 통해서 노출이 되었을 때, 이전의 seed값과 키 값들이 노출 되는 단점이 있다. 본 논문에서는 이러한 문제들을 해결하고자 프라이버시보호에 새로운 키 생성 방법을 통한 강력한 프로토콜을 제안 한다.하였으나 사료효율은 증진시켰으며, 후자(사양, 사료)와의 상호작용은 나타나지 않았다. 이상의 결과는 거세비육돈에서 1) androgen과 estrogen은 공히 자발적인 사료섭취와 등지방 침적을 억제하고 IGF-I 분비를 증가시키며, 2) 성선스테로이드호르몬의 이 같은 성장에 미치는 효과의 일부는 IGF-I을 통해 매개될 수도 있을을 시사한다. 약 $70 {\~} 90\%$의 phenoxyethanol이 유상에 존재하였다. 또한, 미생물에 대한 항균력도 phenoxyethanol이 수상에 많이 존재할수록 증가하는 경향을 나타내었다. 따라서, 제형 내 oil tomposition을 변화시킴으로써 phenoxyethanol의 사용량을 줄일 수 있을 뿐만 아니라, 피부 투과를 감소시켜 보다 피부 자극이 적은 저자극 방부시스템 개발이 가능하리라 보여 진다. 첨가하여 제조한 curd yoghurt는 저장성과 관능적인 면에서 우수한 상품적 가치가 인정되는 새로운 기능성 신제품의 개발에 기여할 수 있을 것으로 사료되었다. 여자의 경우 0.8이상이 되어서 심혈관계 질환의 위험 범위에 속하는 수준이었다. 삼두근의 두겹 두께는 남녀 각각 $20.2\pm8.58cm,\;22.2\pm4.40mm$으로 남녀간에 유의한 차이는 없었다. 조사대상자의 식습관 상태는 전체 대상자의 $84.4\%$가 대부분이 하루 세끼 식사를 규칙적으로 하고 있었으며 식사속도는 허겁지겁 빨리 섭취하는 경우가 남자는 $31.0\%$, 여자는 $21.4\%$로 나타났고 이들을 제외한 나머지 사람들은 보통 속도 혹은 충분한 시간을 가지고 식사를 하였다. 평소 식사량은 조금 적게 혹은 적당하게 섭취하는 사람이 대부분이었으며 남자가 여자보다는 배부르게 먹는 경 향이 유의적으로 높았다(p<0.05). 식사는 혼자 하는 경우가 남자

  • PDF

Relationship between Maritime Pilot Injury and Nearmiss (항만 도선사 상해사고와 준사고의 관계)

  • Sangwon Park;Byoung Jae Yoon;So-Ra Kim;Young-soo Park
    • Journal of Navigation and Port Research
    • /
    • v.47 no.3
    • /
    • pp.120-127
    • /
    • 2023
  • Maritime pilots are always exposed to unpredictable risks present in the marine environment because they are boarding ships through pilot ladders or accommodation ladders at sea. Since the pilot plays an important role in securing the safety of a ship entering or departing from a port, an injury to the pilot substantially affects the overall safety of the ship. The purpose of this study is to analyze pilot injuries and predict accidents. For this purpose, pilot injury cases are analyzed and potential situations are identified through a survey. Pilot injuries are also predicted. The survey was analyzed using the IPA (Importance-Performance Analysis) methodology, and the binomial distribution and Poisson distribution were used to predict injury trends. As a result of the study, 316.8 nearmiss occurred per pilot injury, and if the current accident management system is maintained, the probability of pilot injury occurring within 3 months is 64.4%. Based on the research results, the need for a management system to prevent pilot injuries and reinforcement of maintenance and installation for pilot ladders was suggested.

Assessment of water supply reliability under climate stress scenarios (기후 스트레스 시나리오에 따른 국내 다목적댐 이수안전도 평가)

  • Jo, Jihyeon;Woo, Dong Kook
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.6
    • /
    • pp.409-419
    • /
    • 2024
  • Climate change is already impacting sustainable water resource management. The influence of climate change on water supply from reservoirs has been generally assessed using climate change scenarios generated based on global climate models. However, inherent uncertainties exist due to the limitations of estimating climate change by assuming IPCC carbon emission scenarios. The decision scaling approach was applied to mitigate these issues in this study focusing on four reservoir watersheds: Chungju, Yongdam, Hapcheon, and Seomjingang reservoirs. The reservoir water supply reliablity was analyzed by combining the rainfall-runoff model (IHACRES) and the reservoir operation model based on HEC-ResSim. Water supply reliability analysis was aimed at ensuring the stable operation of dams, and its results ccould be utilized to develop either structural or non-structural water supply plans. Therefore, in this study, we aimed to assess potential risks that might arise during the operation of reserviors under various climate conditions. Using observed precipitation and temperature from 1995 to 2014, 49 climate stress scenarios were developed (7 precipitation scenarios based on quantiles and 7 temperature scenarios ranging from 0℃ to 6℃ at 1℃ intervals). Our study demonstrated that despite an increase in flood season precipitation leading to an increase in reservoir discharge, it had a greater impact on sustainable water management compared to the increase in non-flood season precipitation. Furthermore, in scenarios combining rainfall and temperature, the reliability of reservoir water supply showed greater variations than the sum of individual reliability changes in rainfall and temperature scenarios. This difference was attributed to the opposing effects of decreased and increased precipitation, each causing limitations in water and energy-limited evapotranspiration. These results were expected to enhance the efficiency of reservoir operation.