• Title/Summary/Keyword: 위험 식별

Search Result 370, Processing Time 0.028 seconds

A Method to Improve the Risk Assessment in the Defense Quality Assurance Using AHP (AHP를 활용한 국방 품질보증 위험도 평가 개선 방안)

  • Lee, Nack-Hyung;Lee, Sang-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.1
    • /
    • pp.31-42
    • /
    • 2007
  • While Defense Agency fur Technology and Quality(DTaQ) has been utilized a risk assessment method as a quality assurance activity for defense goods since 1999, a risk assessment method is known to be ineffective to identify defective items. The objective of this study is to propose the new evaluation method, that adjusts a relative priority of evaluation elements using AHP(Analytic Hierarchy Process). Newly evaluated scores have been applied to the risk assessment result of 2005 defective items to test a validity of the new evaluation model. The new model is capable to identify more high and medium risk-level items than the current method. The company risk-level gets more scores than the item risk-level in the new model.

함정 음향 시험평가 기술 현황

  • Kim, Jong-Chul;Son, Kwon;Lee, Pil-Ho
    • Journal of KSNVE
    • /
    • v.12 no.6
    • /
    • pp.429-436
    • /
    • 2002
  • 함정에 있어서 수중 표적의 탐지나 식별, 피탐 위험으로부터 회피 등은 함정의 생존성과 직결되는 사항으로 방사소음을 최소화하는 함정 음향 스텔스가 중요한 요소이다. 함정의 음향분야 시험평가 결과는 신조함정의 기준 만족도 평가뿐만 아니라 음향식별 정보추출/DB구축, 소음통제 방안설정 및 피탐지 위험성 평가 등 전반적인 음향작전 능력 향상에 활용되고 있다.(중략)

A Checklist for Assessment of Risks Involved in IT Service Project Contract (IT 서비스 프로젝트 계약서 위험 요인 평가 체크리스트)

  • Jeong, Eun Joo;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.57-65
    • /
    • 2014
  • Risk factors are the reason behind cost overruns and delays in long-term large-scale IT service projects. Major risks originate from the integration of complex IT system components, including software, hardware, and solutions; the competitive bidding process; the turnkey and firm-fixed price nature of contracts; and the project execution environment. We have identified several risk factors such as delay in acceptance, low quality of deliverables, delay in payment, adding and changing requirements and scope, unclear definition of roles and responsibilities of the buyer and supplier, and unclear procedures of change and quality management during the project execution phase. One needs to manage risks proactively before signing the contract. In order to weed out or lower the risk factors well in advance, we need to identify and remove risk factors contained in contract clauses and attached contract documents. We propose a checklist for assessing IT service project contracts. To validate the checklist's utility, we applied it to an IT service project in the finance industry. The results show that the checklist is effective in identifying and removing risk factors pertaining to IT service projects.

Fuzzy FMEA for Rotorcraft Landing System (회전익 항공기 착륙장치에 대한 퍼지 FMEA)

  • Na, Seong-Hyeon;Lee, Gwang-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.751-758
    • /
    • 2021
  • Munitions must be analyzed to identify any risks for quality assurance in development and mass production. Risk identification for parts, compositions, and systems is carried out through failure mode effects analysis (FMEA) as one of the most reliable methods. FMEA is a design tool for the failure mode of risk identification and relies on the RPN (risk priority number). FMEA has disadvantages because its severity, occurrence, and detectability are rated at the same level. Fuzzy FMEA applies fuzzy logic to compensate for the shortcomings of FMEA. The fuzzy logic of Fuzzy FMEA is to express uncertainties about the phenomenon and provides quantitative values. In this paper, Fuzzy FMEA is applied to the failure mode of a rotorcraft landing system. The Fuzzy rule and membership functions were conducted in the Fuzzy model to study the RPN in the failure mode of a landing system. This method was selected to demonstrate crisp values of severity, occurrence, and detectability. In addition, the RPN was obtained. The results of Fuzzy FMEA for the landing system were analyzed for the RPN and ranking by fuzzy logic. Finally, Fuzzy FMEA confirmed that it could use the data in quality assurance activities for rotorcraft.

Security Risk Evaluation Scheme for Effective Threat Management (효과적인 위협관리를 위한 보안 위험도 평가기법)

  • Kang, Pil-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.380-386
    • /
    • 2009
  • It is most important that identifying security threats(or vulnerabilities) of critical IT assets and checking the propriety of related security countermeasures in advance for enhancing security level. In this paper, we present a new security risk evaluation scheme based on critical assets and threats for this. The presented scheme provides the coverage and propriety of the countermeasures(e.g., intrusion detection rules and vulnerability scan rules, etc.), and the quantitative risk level of identified assets and threats. So, it is expected that the presented scheme will be utilized in threat management process efficiently compared to previous works.

Navigational Supporting System by using Ships' Collision Risk (선박 충돌위험도를 이용한 안전운항지원 시스템 검증 연구)

  • Son, Nam-Sun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.10a
    • /
    • pp.185-186
    • /
    • 2014
  • 전자해도 및 레이더와 같은 첨단운항시스템이 도입되고 있으나, 선박간의 충돌사고는 줄어들고 있지 않고 있으며 전체 사고의 30%를 차지하는 선박충돌사고의 80% 이상이 운항자의 실수에 의해 발생되고 있어, 이를 방지할 수 있는 지능적인 운항지원 시스템이 필요하다. 이를 위하여, 본 연구에서는 선박 충돌위험도 식별 정보를 활용하여 운항자에게 안전운항정보를 지원할 수 있는 시스템을 개발하였다. 기존에 항해레이더에서는 운항자가 특정 선박을 지정하여야만 선박충돌여유거리 및 선박충돌여유시간 등의 충돌예방정보를 얻을 수 있으나, 신규로 개발된 시스템에서는 선박들 중에 충돌위험이 높은 선박들을 자동으로 식별하여 충돌예상선박들의 정보를 실시간으로 제공받을 수 있어, 충돌 전에 미리 사고를 예방하고 신속히 대처할 수 있다. 개발된 시스템은 선박에 탑재하여, 실해역 성능시험을 실시하였다. 본 논문에서는 선박 충돌 위험도 기반의 안전운항 지원 시스템의 특징과 실해역 시험결과에 대해 소개한다.

  • PDF

A New Scheme for Risk Assessment Based on Data Context for De-Identification of Personal Information (개인정보 비식별 조치를 위한 데이터 상황 기반의 위험도 측정에 관한 새로운 방법)

  • Kim, Dong-hyun;Kim, Soon-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.719-734
    • /
    • 2020
  • This paper proposes a new measurement scheme for estimating the processing level according to risk when performing de-identification in the use of personal information by practitioners in the organization in line with the recently revised Data 3 Act. Our proposed methods considered the surrounding circumstances surrounding the data, not just the data, for risk measurement, and divided the data situation into three categories more systematically so that it can be applied in all areas in a general-purpose environment, the data utilization environment, and the data (self) so that it can be calculated quantitatively based on each context risk according to the presented classification. The proposed method is designed to calculate the risk of existing de-identifiable information in a quantitative manner so that personal information controller in general organizations can use it in practice, not just in the qualitative judgment of experts.

Various IoT Sensor based Laboratory Safety Management System (다중 IoT 센서 기반 실험실 관리 시스템)

  • Lee, Jongwon;Jeong, Daejin;Kang, Inshik;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.309-310
    • /
    • 2018
  • Recently, the systems for managing the labs provide services that can be managed in real time by using various sensors based on IoT. The system collects sensor data and transmits it to the server, identifies the dangerous situation, and sends operation commands to the devices. These systems have a centralized structure that slows data processing when managing multiple laboratories. To solve this problem, this paper proposes a system that manages laboratories in distributed processing environment to identify and manage risk situations. The sensor module is used to control the laboratory and to automatically identify and respond to the dangerous situation.

  • PDF

자율운항선박 IMO 동향 및 정부 대응 방안

  • Kim, Chang-Gyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.215-217
    • /
    • 2019
  • 해양산업의 디지털라이제이션은 자율운항선박이라는 새로운 형식의 선박이 출현하게 하였다. 현재의 규정은 새로운 기술을 적용하는 유연성을 제한하고 있어 새로운 규정개발을 통해 새로운 기술을 적용을 장려하고 그 기술에 대한 위험요소를 줄일 필요가 있다. 국제해사기구(IMO)에서는 자율운항선박운항을 방해하는 규정을 식별하는 규정식별작업을 착수하여 새로운 규정개발의 시작을 알렸다. 이 연구에서는 자율운항선박의 국내외 기술개발과 규정개발 동향을 분석하고 우리가 대응해야할 방안을 제시한다.

  • PDF

Hazardous Area Identification Model using Automated Data Collection(ADC) based on BIM (BIM기반 자동화 데이터 수집기술을 활용한 위험지역 식별 모델)

  • Kim, Hyun-Soo;Lee, Hyun-Soo;Park, Moon-Seo;Lee, Kwang-Pyo;Pyeon, Jae-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.6
    • /
    • pp.14-23
    • /
    • 2010
  • A considerable number of construction disasters occurs on pathway. A safety management in construction sites is usually performed to prevent accidents in activity areas. This means that safety management level of hazards on pathway is relatively minified. Many researchers have introduced that a hazard identification is fundamental of safety management. Thus, algorithms for helping safety managers' hazardous area identification is developed using automated data collection technology. These algorithms primarily search potential hazardous area by comparing workers' location logs based on real-time locating system and optimal routes based on BIM. And potential hazardous areas is filtered by identified hazardous areas and activity areas. After that, safety managers are provided with information about potential hazardous areas and can establish proper safety countermeasures. This can help improving safety in construction sites.