• Title/Summary/Keyword: 위험요인사전

Search Result 179, Processing Time 0.026 seconds

Model for Predicting Accidents at a Unsignailzed Intersections in a Community Road (생활도로내 비신호교차로 사고예측 모형 개발)

  • Chang, Iljoon;Kim, Jang Wook;Lee, Hyeong Rok;Lee, Soo Beom
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.3D
    • /
    • pp.343-353
    • /
    • 2011
  • The unsignalized intersections in a community road in the city of Seoul have 3,753 traffic accidents(9%) of total 41,702 cases in 2008, not high in the occurrence rate of traffic accidents, but seem to have a quite high potential of accidents due to the unreasonable and insufficient operation of systems and facilities in the part of traffic foundations. In particular, the un-signalized intersections in a community road have an insufficient measure for safety as compared to the crossroads with signals, and there are few analysis of traffic accidents and domestic researches on the model of affecting factors. Our country also has no concept of passing priority in operating a crossroad without signals, differently from foreign countries, so the researches and safety measures for improving the safety of a crossroad without signals in a community road are urgent. Therefore, This study set out to analyze the road conditions, traffic conditions, and traffic environment conditions on unsignalized intersection, to identify the elements that would impose obstructions in safety, and develop a traffic accident prediction model to evaluate the safety of an unsignalized intersection using the correlation between the elements and an accident. In addition, the focus was made on suggesting appropriate traffic safety policies by dealing with the danger elements in advance and on enhancing the safety on intersection in developing a traffic accident prediction model for an unsignalized intersection.

Development of a Traffic Accident Prediction Model for Urban Signalized Intersections (도시부 신호교차로 안전성 향상을 위한 사고예측모형 개발)

  • Park, Jun-Tae;Lee, Soo-Beom;Kim, Jang-Wook;Lee, Dong-Min
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.99-110
    • /
    • 2008
  • It is commonly estimated that there is a much higher potential for accidents at a crossroads than along a single road due to its plethora of conflicting points. According to the 2006 figures by the National Police Agency, the number of traffic accidents at crossroads is greatly increasing compared to that along single roads. Among others, crossroads installed with traffic signals have more varied influential factors for traffic accidents and leave much more room for improvement than ones without traffic signals; thus, it is expected that a noticeable effect could be achieved in safety if proper counter-measures against the hazards at a crossroads were taken together with an estimate of causes for accidents This research managed to develop models for accident forecasts and accident intensity by applying data on accident history and site inspection of crossroads, targeting four selected downtown crossroads installed with traffic signals. The research was done by roughly dividing the process into four stages: first, analyze the accident model examined before; second, select variables affecting traffic accidents; third, develop a model for traffic accident forecasting by using a statistics-based methodology; and fourth, carry out the verification process of the models.

A GIS-Based Seismic Vulnerability Mapping and Assessment Using AHP: A Case Study of Gyeongju, Korea (GIS 기반 AHP를 이용한 지진 취약성 지도제작 및 평가: 경주시를 중심으로)

  • Han, Jihye;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.2
    • /
    • pp.217-228
    • /
    • 2019
  • In this study, a seismic vulnerability map of Gyeongju city, where the 9.12 Gyeongju earthquake occurred, was produced and evaluated using analytic hierarchy process(AHP) and geographic information system (GIS). Geotechnical, physical, social, structural, and capacity factors were selected as the main indicators and 18 sub-indicators to construct a spatial database. Weights derived using the AHP were applied to the 18 sub-indicators, which generated a vulnerability map of the five main indicators. After weighting the five generated maps, we created seismic vulnerability maps by overlaying each of the five maps. The seismic vulnerability map was classified into five zones, i.e., very high, high, moderate, low, and safe. For seismic vulnerability, the results indicated that 3% of Gyeongju area is characterized as having very high vulnerability, while 19% was characterized as safe. Based on district standards, Jungbu-dong, Hwangoh-dong, Hwangseong-dong, Seonggeon-dong, and Dongcheon-dong were high-risk areas, and Bodeok-dong, Gangdong-myeon, Yangbuk-myeon, Yangnam-myeon, and Oedong-eup were characterized as safe areas. The seismic vulnerability map produced in this study could possibly be used to minimize damage caused by earthquakes and could be used as a reference when establishing policies.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Survey on the Perception of Food Sanitation Officers Toward the Genetically Modified Foods (유전자재조합식품에 대한 관련 식품위생공무원의 인지도 조사)

  • Oh Kyeung Nam;Lee Soon Ho;Lee Woo Young;Park Hye Kyung;Park Sun Hee
    • Journal of Food Hygiene and Safety
    • /
    • v.20 no.1
    • /
    • pp.22-35
    • /
    • 2005
  • A survey was conducted to investigate the perception of food sanitation officers toward the Genetically Modified Foods. They were mainly from Regional Agencies of KFDA, City/Province office, and National quarantine station. Some of them were professors of university and researchers of research institute. Most of respondents had experiences of hearing or reading GM foods (over $95\%$) and over $90\%$ of respondents much needed the label of GM foods. Although some of officers of city/province office and national quarantine station showed less knowledge than other respondent groups, most of respondents had basic knowledge about biology. The frequency of respondents worked over 20 years and worked in the general administration was higher than that of other groups in the question of unsafe of GM foods. The answer frequency of careless treatment of foods was highest in the question of risk factor, and the frequency of GM foods was lowest ($4.4\%$). It was concluded that food sanitation officers had positive opinion about GM foods, but there were some differences in the knowledge among agencies. Therefore, it is necessary more educations and informations are needed for food sanitation officers.

Relationships of Changing Social Atmosphere, Lifestyle and Bone Mineral Density in College Students (대학생의 골밀도와 사회분위기 및 생활습관과의 관계)

  • Lee, In-Ja;Ko, Yo-Han;Kim, Chung-Kyung;Kim, Hee-Sol;Park, Da-Jeong;Yoon, Hyeo-Min;Jeong, Yu-Jin
    • Journal of radiological science and technology
    • /
    • v.36 no.4
    • /
    • pp.263-271
    • /
    • 2013
  • The decrease of bone mineral density gives rise to the outbreak of osteopenia and makes the possibility of a bone fracture. It makes health problems in society. It's very important to prevent osteopenia in advance. Also it's critical to prevent and take care of it in adolescent because it's the most developing period comparing to middle ages because that bone mineral density decreases. There are genetic, physical and enviromental factors that affect bone mineral density. Recently, a lifestyle and eating habits are also changing as the society atmosphere is gradually doing. This study have shown that 134 women and 75 men was chosen and responded to the survey of measuring bone mineral density and investigating a lifestyle. The measure of bone mineral density is to use Dual energy X-ray absorptiometry(DEXA) and check femoral neck and lumbar spine. Also questionaries was required to pre-made survey about their lifestyles. Analysis of data was done with SPSS program. Multiple regression analysis was used for the relation of bone mineral density, the heigths and BMI. The sample of Groups are checked for drinking, smoking or excercising about differences by t-test. The results of the experiments were; first, there is statistically significant differences in the comparisons between BMD and BMD. But there isn't any special correlation between drinking, smoking and BMD. Secondly, bone mineral density becomes low related to an intake of caffeine. Particularly, this is statically significant on women. Also there is statically significant correlation between femoral neck and quantity of motion for both men and women. Third, there is significant relation between eating habits and bone mineral density on women's lumbar spine. However, there is no significant relation between men's lumbar spine and women's one. Therefore, to prevent osteopenia, it's good to abstain from intaking caffeine within an hour after a meal. In addition, it's helpful to walk or run regularly and have a balanced meal.

Strengthening International Collaboration for Counter-Piracy Efforts - Focusing on Counter-Piracy Operations Off the Coast of Somalia - (해적퇴치를 위한 국제공조 확대 방안 - 소말리아 해적퇴치 방안을 중심으로 -)

  • Kim, Duk-Ki
    • Strategy21
    • /
    • s.31
    • /
    • pp.251-293
    • /
    • 2013
  • 해적은 공해상 해상안전을 위협 한다는 점에서 '인류공동의 적'으로 규정되어 모든 국가가 이를 규제할 수 있는 보편적 관할권이 행사되는 범죄이다. 한국을 포함한 아시아 지역 국가들은 말라카해협 통항에 관해 깊은 이해관계를 갖고 있어 해적 소탕에 대한 의지가 강한 편이다. 이러한 의지는 2006년 '아시아해적퇴치정보공유센터(ReCAAP ISO)'의 창설에 밑거름이 되었으며, 아시아 지역에서 해적이 출현하면 동 센터를 통해 17개국 회원국으로 즉시 통보되고, 주변국의 해경과 해군이 유기적인 작전을 통해 해적을 효율적으로 퇴치하고 있는 모범사례다. 그러나 2009년 소말리아 내란에 따른 무정부 상태가 지속되면서 소말리아 및 아덴만에서의 해적활동이 극성을 부리기 시작했으며, 선박납치 행위가 급증하자 세계 각국에서 함정과 항공기를 파견하여 해적퇴치 활동을 전개하고 있으나 근절되지 않을 뿐만 아니라 해적의 활동해역이 확대되고 있다. 이러한 배경 하에 시작된 본 연구는 연구결과를 중심으로 다음과 같은 대응 방안을 제시한다. 첫째, 소말리아 해적의 근본원인은 국가의 붕괴에서 비롯된 치안부재와 열악한 경제사정 등 내부적인 요인이 크기 때문에 다국적 해군 활동으로 인한 근본적인 해적퇴치에는 한계가 있다. 따라서 국제적인 차원에서 '지역협력협정'체결은 물론, 소말리아 국가재건을 위한 노력이 함께 이루어지는 종합적인 대책이 필요하다. 그러나 보다 더 근본적인 해결책은 유엔차원에서 빠른 시간 내에 소말리아가 정치적 안정을 유지할 수 있도록 정치적 차원에서의 지원이 필요하며, 해적과 테러리스트가 연계됨으로써 국제문제로 확대되지 않도록 하는 노력도 병행되어야 한다. 둘째, 해적문제는 특정국가에만 해당되는 것이 아니라 초국가적인 문제임을 감안하여 유엔안전보장이사회 결의 제1851호에서 '지역 센터' 설립을 권고하고 있는 것처럼 2006년 아시아 국가들이 설치한 ReCAAP ISO와 같은 형태의 지역국가 간 협력기구 또는 유엔 차원의 해적 전담기구를 설치하여 국제사회 공조 하에 해적에 대처하는 방안을 추진하는 것이 필요하다. 셋째, 최근 발생하고 있는 해적행위는 주로 항구 등 내수, 영해 등 연안국의 관할권이 행사되는 지역에서 발생하고 있어 유엔해양법상의 규정은 이러한 '해적' 퇴치에 더 이상 효율적이지 못하다. 국제사회는 이러한 문제점을 인식하여 국제해사기구 (IMO) 등 국제기구를 통해 영해내의 해적 처벌을 위해 최선의 노력을 기울이고 있다. 향후 궁극적으로는 유엔해양법협약의 개정을 통해 법적인 문제점이 개선되어야 한다. 넷째, 전술적인 측면에서도 지상에 기지를 두고 있는 해적들의 지도부가 그 동안 쌓아 놓은 네트워크를 이용하여 다국적 해군에 대한 정보를 수집하고 대응방안을 강구함으로써 나름대로의 생존전략을 구사할 것으로 예상된다. 특히, 선박을 납치한 후 소말리아 연안으로 이동하면서 해군함정과 대치하는 과정에서 해적들이 살상을 당하는 사례가 증가함에 따라 지금까지는 피랍된 선박의 선원을 단순히 해적활동에 참여시키거나, 항해지원을 위한 목적 등으로만 활용했는데, 앞으로는 해적들의 인명피해를 최소화하기 위해서라도 선원들을 방패막이로 활용할 가능성이 더욱 높아질 것으로 예상된다. 따라서 참가하는 해군함정 또는 부대간 해적들의 활동 관련 정보를 공유하는 등 사전에 정보를 획득하기 위한 협력을 강화해야 한다. 다섯째, 한국군함이 삼호주얼리호를 납치했던 소말리아 해적을 한국까지 대리고 와서 처벌하는 것은 불합리하고, 많은 문제점을 야기할 수 있기 때문에 향후 해적처벌을 위한 국제사법기구의 설치가 요구된다. 회원국 분담금으로 운영되는 유엔에 산하기관을 설치하여 소말리아 인접국에서 해결하도록 적극적인 노력을 경주할 필요가 있다. 마지막으로, 선박회사에서도 자국 선박이 위험구역으로 지정된 해역을 항해할 경우를 대비해서 선박자동식별 시스템 구축을 확대하고, 해적이 선박에 승선했을 경우를 대비해서 안전구역(citadel)을 설치하여 선원의 안전을 확보하는 등의 대책이 필요하다. 본 연구를 통해 해양안보는 어느 특정국가에게만 주어진 것이 아니며, 해적행위도 특정 국가의 선박을 대상으로 하는 것이 아니므로 각국 정부간 공동의 협력과 국제사회의 공조가 반드시 실현될 때 해적의 위협으로부터 선박의 안전과 국제사회의 평화가 실현될 수 있다는 것을 강조하고자 한다.

  • PDF

Software Reliability Growth Modeling in the Testing Phase with an Outlier Stage (하나의 이상구간을 가지는 테스팅 단계에서의 소프트웨어 신뢰도 성장 모형화)

  • Park, Man-Gon;Jung, Eun-Yi
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2575-2583
    • /
    • 1998
  • The productionof the highly relible softwae systems and theirs performance evaluation hae become important interests in the software industry. The software evaluation has been mainly carried out in ternns of both reliability and performance of software system. Software reliability is the probability that no software error occurs for a fixed time interval during software testing phase. These theoretical software reliability models are sometimes unsuitable for the practical testing phase in which a software error at a certain testing stage occurs by causes of the imperfect debugging, abnornal software correction, and so on. Such a certatin software testing stage needs to be considered as an outlying stage. And we can assume that the software reliability does not improve by means of muisance factor in this outlying testing stage. In this paper, we discuss Bavesian software reliability growth modeling and estimation procedure in the presence of an imidentitied outlying software testing stage by the modification of Jehnski Moranda. Also we derive the Bayes estimaters of the software reliability panmeters by the assumption of prior information under the squared error los function. In addition, we evaluate the proposed software reliability growth model with an unidentified outlying stage in an exchangeable model according to the values of nuisance paramether using the accuracy, bias, trend, noise metries as the quantilative evaluation criteria through the compater simulation.

  • PDF

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF