• Title/Summary/Keyword: 위협요소

Search Result 752, Processing Time 0.029 seconds

A Study on the Estimation of Ecological Footprint in Gyeongsangbuk-do for Comparison of Environmental Capacity of Each Local Government (자치단체별 환경용량 비교를 위한 경상북도지역 생태발자국 추정연구)

  • Kang, Kee-Rae;Kim, Hee-Chae;Kim, Dong-Pil;Oh, Hyun-Kyung;Cho, Kwang-Jin;Shin, Young-Ho
    • Korean Journal of Environment and Ecology
    • /
    • v.28 no.6
    • /
    • pp.769-778
    • /
    • 2014
  • The rapid urbanization and increase in population due to industrialization have led to the extension of cities and the reduction in naturality as a necessity. Now, it is the biggest threat to virtuous circle of ecosystem. With the expansion of common recognition that this ecological crisis would be accompanied by the crisis of mankind, many countries all around the world are conducting researches to indicate the optimum consumption level of individual as an index in addition to cross-national environmental indicators such as ESI, EPI and SDI, by measuring environmental consumption of state, local government or individual, and comparing each region. Based on this background, this research was carried out to estimate the environmental capacity of 23 local government in Gyeongsangbuk-do. The result of EF estimation showed that EF value necessary for life per head in Gyeongsangbuk-do was 0.9534, and it showed an ecological deficit of 25.3 percent when analyzing it in consideration of the ecological capacity. Also, among the local governments in Gyeongsangbuk-do, Youngduk-gun displayed the highest EF, and Ulleung-gun displayed the lowest EF. But when analyzing the ecological deficit in consideration of the ecological capacity of each region, Gumi-city showed the greatest ecological deficit, and Youngyang-gun showed the biggest ecological capacity. The environmental capacity estimated in this study is to digitize the ecological capacity and ecological deficit of each local government in Gyeongsangbuk-do. The estimated optimum environmental capacity of each local government suggests the scale of environmental preservation and proper development and furthermore, could be used as fundamental data for persuading members of each local government when selecting a location of development facility or preservation area.

A Study for Vulnerability Analysis and Guideline about Social Personal Broadcasting Service based on Smart-Phone Environment (focus on SNS or U-Health) (스마트폰 환경 하에서 소셜 개인방송 서비스의 취약점 분석과 가이드라인에 관한 연구 (SNS 및 U-Health를 중심으로))

  • Kang, Jang-Mook;Lee, Woo-Jin;Song, You-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.161-167
    • /
    • 2010
  • Social individualized broadcasting increases rapidly in an environment that combines communication and broadcasting. Real-time individualized broadcasting is a service that is provided by multiple individuals to many and unspecified persons. In contrast, newly introduced individualized broadcasting service is a service that has not been experienced socially and culturally and therefore many problems are expected. The newly emerging real-time individualized broadcasting service may bring about various dysfunctions as well as desirable functions. Establishment of guideline and its implementation based in vulnerability analysis are necessary to prevent the expected dysfunctions and reinforce the desirable functions. Therefore, the purpose of this paper is to examine dysfunctions of the information-oriented society which threaten cyber-norms, cyber-morality, cyber-dangers, cyber-democracy, etc. at the level of social individualized broadcasting service and to propose appropriate guidelines. Through this paper, first, future changes of dysfunctions of the information-oriented society due to individualized broadcasting service can be forecast, and countermeasures and policy directions can be proposed. Second, Dysfunctions of ICT-based service that may emerge in individualized broadcasting service can be forecast and correct guideline can be prepared to reduce potential dangers and increase desirable functions of the service. This paper will analyze in various aspects the characteristics of a new media with the focus on individualized broadcasting service among the new ICT-integrated services, and forecast the appearance and aggravation of the dysfunctions and then draw the guideline.

The Dynamic Evolution of the Cambridge Cluster and the Entrepreneurial University (클러스터의 동태적 진화와 대학의 역할 - 케임브리지 클러스터를 사례로 -)

  • Lee, Jong-Ho;Lee, Chulwoo
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.3
    • /
    • pp.489-502
    • /
    • 2015
  • Sometimes called the Silicon Fen, the Cambridge cluster is well known as the most innovative hi-tech cluster in the world. This paper attempts to explore the evolutionary dynamics of the Cambridge cluster, drawing upon the triple-helix approach. To understand the evolutionary dynamics of the Cambridge cluster, it is important to examine the role and impact of the University of Cambridge, which is conceived as one of the best higher educational institutions in the world. The Cambridge cluster has been evolved on the basis of a strong university-industry relationship. University spin-outs have a long tradition in Cambridge with the history of more than a century, and they have played a critical role in making the cluster more innovative. Business networks and social capital molded for a long time in the region become a foundation for active local spin-out activities. However, since 2000 the central government started steadily to require British universities to be an entrepreneurial university, with the purpose of the reduction of university subsidies. As a result of this, spin-out activities in the Cambridge cluster show a sharp decline, which is a factor of threatening the dynamic evolution of the cluster.

  • PDF

Chemical/Biological/Radiological Protective Facility Entering Time Estimation Simulation with Procedure Analysis (화생방 방호시설의 행동 절차 분석을 통한 진입 소요시간 예측 시뮬레이션)

  • Park, Sun Ho;Lee, Hyun-Soo;Park, Moonseo;Kim, Sooyoung
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.5
    • /
    • pp.40-48
    • /
    • 2014
  • As CBR(Chemical, Biological, and Radiological) attack increases, the importance of CBR protective facilities is being emphasized. When CBR warfare emerges, a task force team, who exist outside of CBR protective facility, should enter the CBR protective facility through neutralizing process in CCA(Contamination Control Area) and TFA(Toxic Free Area). If a bottleneck occurs in the process or zones, the task force team cannot enter the CBR protective facility efficiently and may cause inefficiency in its operation performance or result in casualties. The current design criteria of the CBR protective facility is only limited to ventilation system and it does not consider how much time it takes to enter the facility. Therefore, this research aims to propose the entering time estimation model with discrete event simulation. To make the simulation model, the procedure performed through CCA and TFA is defined and segmented. The actual time of the procedure are measured and adapted for the simulation model. After running the simulation model, variables effecting the entering time are selected for alternatives with adjustments. This entering time estimation model for CBR protective facility is expected to help take time into consideration during the designing phase of CBR protective facility and help CBR protective facility managers to plan facility operation in a more realistic approach.

Development of Reconfigurable Tactical Operation Display Framework by Battery and Battalion (포대/대대 별 재구성 가능한 전술작전화면 프레임워크 개발)

  • Lee, Sangtae;Lee, Seungyoung;Wi, SoungHyouk;Cho, Kyutae
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.476-485
    • /
    • 2017
  • The tactical operation centers of future anti-aircraft missile systems provide the environment for the research on future air threats, tactical information, integrated battlefield environment creation and management, engagement control and command and control algorithms. To develop the key functional elements of integrated battlefield situation creation and processing and tactical operation automation processing operations, battery/battalion tactical operation control and reconfiguration design software are required. Therefore, the algorithm software of each function and the tactical operation display software and link software for interworking between equipment were developed as reconfigurable through a data-centric design. In this paper, a tactical operation display framework that can be reconfigured on the operation display of the tactical operations according to the battery/battalion is introduced. This tactical operation display framework was used to develop a common data model design for the reconfigurable structure of multi-role tactical operations with battery / battalion and mission views, and a display configuration tool that provides a tactical operation display framework for view development was also developed using the MVC pattern. If the tactical operation display framework is used, it will be possible to reuse the view design through the common base structure, and a view that can be reconfigured easily and quickly will also be developed.

Analysis of Hibernating Habitat of Asiatic Black Bear(Ursus thibetanus ussuricus ) based on the Presence-Only Model using MaxEnt and Geographic Information System: A Comparative Study of Habitat for Non-Hibernating Period (MaxEnt와 GIS를 활용한 반달가슴곰 동면장소 분석: 비동면 기간 동안의 서식지 비교 연구)

  • JUNG, Dae-Ho;KAHNG, Byung-Seon;CHO, Chae-Un;KIM, Seok-Beom;KIM, Jeong-Jin
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.3
    • /
    • pp.102-113
    • /
    • 2016
  • This study analyzes the geographic information system (GIS) and machine learning models to understand the relationship between the appearance of hibernation sites and habitats in order to systematically manage the habitat of Asiatic Black Bear(Ursus thibetanus ussuricus) inhabiting Jirisan National Park, South Korea. The most important environmental factors influencing the hibernation sites was found to be the inclination(41.4%), followed by altitude(20.4%), distance from the trail(10.9%), and age group(7.7%) in the order of their contribution. A comparison between the hibernation habitat and the normal habitat of Asiatic Black Bear indicated that the average altitude of the hibernation sites was 63m, whereas the average altitude of the normal habitat was approximately 400m. The average inclination was found to be $7^{\circ}$, and a preference for the steeper inclination of $12-43^{\circ}$ was also observed. The average distance of the hibernation site from the road was approximately 300m; the range of separation distance was found to be 1,300-2,400m. This was thought to be the result of a safer selection of winter hibernation site by preventing human contact and outside invasion. This study analyzes the habitat environmental factors for the selection of hibernation sites that prevent severe cold and other threats during the hibernation period in order to provide fundamental data for hibernation ecology and habitat management of Asiatic Black Bear.

Relationship between smoking experience and internet addiction in adolescence (우리나라 청소년의 흡연 경험과 인터넷 중독과의 관련성)

  • Kim, Dong-Soon;Kim, Yu-Suk;Kim, So-Hui;Jang, Young-Hee;Jang, Mi-Sun;Park, Jong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.937-944
    • /
    • 2012
  • Smoking in adolescence can cause other health risks such as drinking and abusing drugs. Besides, it goes on adulthood so it can threaten their health all days. This study want to know the relationship between smoking and internet addiction in mid- and highschool students in Korea. It conducted for 38,409 middle school students and 36,657 highschool student in Korea. Smoking and internet addiction was investigated by chi-squared test and the relation between them was done by a Logistic Regression Analysis. The statistical significance is under 0.05. The percentage of smoking is 34.2% in male student and 19.7% in female student. The percentage of internet addiction is 17.6% in male student and 11.4% in female student and it is higher in students who smoked by 1.06 times for male student and 1.62 times for female student. This result shows that smoking which is non-healthy habit is related with internet addiction significantly. Smoking can cause high stress and this stress is shown to be developed in internet addiction. In conclusion, smoking and internet addiction in adolescence are bad habits and they are affect each other. Therefore we have to consider a measure by looking as smoking, stress and internet addiction are complex health risks rather than trying to prevent and treat them individually.

Evaluation of Nondestructive Evaluation Size Measurement for Integrity Assessment of Axial Outside Diameter Stress Corrosion Cracking in Steam Generator Tubes (증기발생기 전열관 외면 축균열 건전성 평가를 위한 비파괴검사 크기 측정 평가)

  • Joo, Kyung-Mun;Hong, Jun-Hee
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.35 no.1
    • /
    • pp.61-67
    • /
    • 2015
  • Recently, the initiation of outside diameter stress corrosion cracking (ODSCC) at the tube support plate region of domestic steam generators (SG) with Alloy600 HTMA tubes has been increasing. As a result, SGs with Alloy600 HTMA tubes must be replaced early or are scheduled to be replaced prior to their designed lifetime. ODSCC is one of the biggest threats to the integrity of SG tubes. Therefore, the accurate evaluation of tube integrity to determine ODSCC is needed. Eddy current testing (ECT) is conducted periodically, and its results could be input as parameters for evaluating the integrity of SG tubes. The reliability of an ECT inspection system depends on the performance of the inspection technique and abilty of the analyst. The detection probability and ECT sizing error of degradation are considered to be the performance indices of a nondestructive evaluation (NDE) system. This paper introduces an optimized evaluation method for ECT, as well as the sizing error, including the analyst performance. This study was based on the results of a round robin program in which 10 inspection analysts from 5 different companies participated. The analysis of ECT sizing results was performed using a linear regression model relating the true defect size data to the measured ECT size data.

Security Measures for Casino Facilities (카지노 시설경비 안전대책 방안)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.243-272
    • /
    • 2005
  • All measures related to the safety of the casino facilities guarantee safety of facilities that are targets of security guards, protect lives and properties, minimize risks of artificial and natural disaster and crimes. In summary, plan for responding to safety and accidents should be developed not only for the casino facilities but also for the facilities of annexed buildings, and lives and properties of customers and employees. Determine areas in the casino facilities that are prone to accidents and set around-the-clock guard in the areas or maintain surveillance with CCTV and prevent accidents through continuous patrol. These are the most basic and the most important requirements in safety. In addition, casinos which prompt gambling are causing economic and psychological treats to families. To resolve these social issues, casinos have adopted limited entrance system. To support this system, new forms of machine security systems such as video automatic recognition system of fingerprint pattern recognition system should be adopted too. In addition, security guards in casino facilities need to instill themselves with a sense of ownership as well as a strong sense of mission to do the best for customer security and to protect the company assets and employees and manage accidents that could occur without notice. Security guards should do their best to enable manage accidents that could occur without notice. Security guards should do their best to enable tourists who are on the rise due to increase in advanced country-style tourism and leisurely activities to get the utmost satisfaction from the casinos, and as a leader of private security company, establish the foundation for security based on the characteristics of security in Korea.

  • PDF

Design of Splunk Platform based Big Data Analysis System for Objectionable Information Detection (Splunk 플랫폼을 활용한 유해 정보 탐지를 위한 빅데이터 분석 시스템 설계)

  • Lee, Hyeop-Geon;Kim, Young-Woon;Kim, Ki-Young;Choi, Jong-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.76-81
    • /
    • 2018
  • The Internet of Things (IoT), which is emerging as a future economic growth engine, has been actively introduced in areas close to our daily lives. However, there are still IoT security threats that need to be resolved. In particular, with the spread of smart homes and smart cities, an explosive amount of closed-circuit televisions (CCTVs) have been installed. The Internet protocol (IP) information and even port numbers assigned to CCTVs are open to the public via search engines of web portals or on social media platforms, such as Facebook and Twitter; even with simple tools these pieces of information can be easily hacked. For this reason, a big-data analytics system is needed, capable of supporting quick responses against data, that can potentially contain risk factors to security or illegal websites that may cause social problems, by assisting in analyzing data collected by search engines and social media platforms, frequently utilized by Internet users, as well as data on illegal websites.