• Title/Summary/Keyword: 정책 충돌

Search Result 214, Processing Time 0.021 seconds

Development of Pedestrian Fatality Model using Bayesian-Based Neural Network (베이지안 신경망을 이용한 보행자 사망확률모형 개발)

  • O, Cheol;Gang, Yeon-Su;Kim, Beom-Il
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.2 s.88
    • /
    • pp.139-145
    • /
    • 2006
  • This paper develops pedestrian fatality models capable of producing the probability of pedestrian fatality in collision between vehicles and pedestrians. Probabilistic neural network (PNN) and binary logistic regression (BLR) ave employed in modeling pedestrian fatality pedestrian age, vehicle type, and collision speed obtained from reconstructing collected accidents are used as independent variables in fatality models. One of the nice features of this study is that an iterative sampling technique is used to construct various training and test datasets for the purpose of better performance comparison Statistical comparison considering the variation of model Performances is conducted. The results show that the PNN-based fatality model outperforms the BLR-based model. The models developed in this study that allow us to predict the pedestrian fatality would be useful tools for supporting the derivation of various safety Policies and technologies to enhance Pedestrian safety.

Context Conflicts of Role-Based Access Control in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경의 역할 기반 접근제어에서 발생하는 상황 충돌)

  • Nam Seung-Jwa;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.37-52
    • /
    • 2005
  • Traditional access control models like role-based access control model are insufficient in security needs in ubiquitous computing environment because they take no thought of access control based on user's context or environment condition. In these days, although researches on context-aware access control using user's context or environment conditions based on role-based access control are emerged, they are on the primary stage. We present context definitions md an access control model to provide more flexible and dynamic context-aware access control based on role-based access control. Specially, we describe the conflict problems occurred in the middle of making an access decision. After classifying the conflict problems, we show some resolutions to solve them. In conclusion, we will lay the foundations of the development of security policy and model assuring right user of right object(or resource) and application service through pre-defined context and context classification in ubiquitous computing environments. Beyond the simplicity of access to objects by authorized users, we assure that user can access to the object, resource, or service anywhere and anytime according to right context.

Safety evaluation of the domestic Offset procedure using the unidirectional dual airway collision risk model (단방향 복선 항공로 안전평가모델을 활용한 국내 Offset 절차 안전도 분석)

  • Se-eun Park;Hui-yang Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.356-364
    • /
    • 2023
  • Sophisticated Air Navigation System has contributed to enhancing the capacity of airspace capacity, leading to an efficient airspace environment. However, it has acted as a factor increasing the probability of collision. When an aircraft fails to maintain vertical separation and instead exhibits lateral positional errors, it does not necessarily lead to a collision. However, as the lateral positional accuracy increases, the randomness of aircraft positions decrease, resulting in an elevated probability of collisions. Consequently, The International Civil Aviation Organization has introduced Strategic Lateral Offset Procedures(SLOP), intentionally deviating aircraft from the centerline of airways. Likewise, South Korea also operates Offset procedure. The Y579 was operated using the Offset before its conversion to a dual airway and the analysis of the Offset track revealed that it was being operated similarly to a unidirectional dual airway. This paper develops a safety assessment methodology applicable to unidirectional dual airways, and applies it to perform a safety assessment of the Y579 Offset procedure.

Effectiveness Analysis of NCAP(New Car Assessment Program) on Traffic Safety (자동차 안전도평가제도의 정량적 효과분석)

  • Cho, Han-Seon;Shim, Jae-Ick;Sung, Nak-Moon
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.2
    • /
    • pp.7-15
    • /
    • 2008
  • New Car Assessment Program(NCAP) provides consumers with vehicle safety information, primarily front and side crash rating results, and more recently rollover ratings, to aid consumers in their vehicle purchase decisions. NCAP is a system to improve driver and passenger safety by providing market incentives for vehicle manufacturers to voluntarily design their vehicles to better protect drivers and passengers in a crash and be less susceptible to rollover, rather than by regulatory directives. NCAP have been performed since 1999 in Korea by the government in order to reduce fatalities and injuries caused by traffic accidents. Although as the number of vehicles models increases, more vehicle models are required to be test and NCAP is evaluated as a valuable system for vehicle safety, the expansion of the system is slow. It looks like that the benefit of NCAP quantitatively was not verified. In this study, based on the idea that the benefit of the NCAP is defined as the decrease of traffic accident severity by improving vehicle safety, a methodology to analyze the effectiveness of NCAP quantitatively in terms of traffic safety was developed. According to the developed methodology, the reduced numbers of fatalities and injuries were 1.51 and 466 in 2005.

Empirical Analysis on the Apportionment System of Causation Ratio in the Ship Collision (선박충돌사고 원인제공비율 산정제도에 대한 실증적 고찰)

  • Kim, Tae-Goun;Hong, Sung-Hwa
    • Journal of Navigation and Port Research
    • /
    • v.37 no.6
    • /
    • pp.603-609
    • /
    • 2013
  • In December 1998, Act on the investigation and inquiry into marine accidents was amended by inserting new Paragraph (2) of Article 4, which states "Where two or more persons are related to the occurrence of a marine accident when the Maritime Safety Tribunal(hereinafter referred to as the "MST") examines the causes of a marine accident as provides for under Paragraph (1), the MST may disclose the extent to which each responsible person is related to the cause of the marine accident". Based on this new Paragraph, the apportionment system of causation ratio in the ship collision was introduced in February 1999. However the apportionment system is adopted 12 years ago, public debate has continued about the positive and negative aspects of the system. Thus some groups advocate the system for the advantages, but other groups argue that this system should be abolished. Therefore, at first, this study analyzes the adopting background and the main reasons of the pros and cons discussion on the apportionment system of causation ratio in the ship collision. Then we conduct a survey analysis to investigate stakeholder's satisfaction of this new system in the ship collision cases. Finally this study suggests the policy proposal to improve the apportionment system of causation ratio in the ship collision.

A Study on Generalization of Security Policies for Enterprise Security Management System (통합보안관리시스템을 위한 보안정책 일반화에 관한 연구)

  • Choi, Hyun-H.;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.823-830
    • /
    • 2002
  • Enterprise security management system proposed to properly manage heterogeneous security products is the security management infrastructure designed to avoid needless duplications of management tasks and inter-operate those security products effectively. In this paper, we propose the model of generalized security policies. It is designed to help security management build invulnerable security policies that can unify various existing management infrastructures of security policies. Its goal is not only to improve security strength and increase the management efficiency and convenience but also to make it possible to include different security management infrastructures while building security policies. In the generalization process of security policies. we first diagnose the security status of monitored networks by analyzing security goals, requirements, and security-related information that security agents collect. Next, we decide the security mechanisms and objects for security policies, and then evaluate the properness of them on the basis of security goals, requirements and a policy list. With the generalization process, it is possible to integrate heterogeneous security policies and guarantee the integrity of them by avoiding conflicts or duplications among security policies. And further, it provides convenience to manage many security products existing in large networks.

A Study on Social Media Sentiment Analysis for Exploring Public Opinions Related to Education Policies (교육정책관련 여론탐색을 위한 소셜미디어 감정분석 연구)

  • Chung, Jin-Myeong;Yoo, Ki-Young;Koo, Chan-Dong
    • Informatization Policy
    • /
    • v.24 no.4
    • /
    • pp.3-16
    • /
    • 2017
  • With the development of social media services in the era of Web 2.0, the public opinion formation site has been partially shifted from the traditional mass media to social media. This phenomenon is continuing to expand, and public opinions on government polices created and shared on social media are attracting more attention. It is particularly important to grasp public opinions in policy formulation because setting up educational policies involves a variety of stakeholders and conflicts. The purpose of this study is to explore public opinions about education-related policies through an empirical analysis of social media documents on education policies using opinion mining techniques. For this purpose, we collected the education policy-related documents by keyword, which were produced by users through the social media service, tokenized and extracted sentimental qualities of the documents, and scored the qualities using sentiment dictionaries to find out public preferences for specific education policies. As a result, a lot of negative public opinions were found regarding the smart education policies that use the keywords of digital textbooks and e-learning; while the software education policies using coding education and computer thinking as the keywords had more positive opinions. In addition, the general policies having the keywords of free school terms and creative personality education showed more negative public opinions. As much as 20% of the documents were unable to extract sentiments from, signifying that there are still a certain share of blog posts or tweets that do not reflect the writers' opinions.

A Comparative Study on the Vietnam and the Philippine's Responses to the Chinese Threat in the South China Sea (베트남과 필리핀의 대중국 전략 비교연구: 남중국해 해양 분쟁에 대한 대응을 중심으로)

  • JUN, Sanghyun;LEE, Jeongwoo
    • The Southeast Asian review
    • /
    • v.28 no.4
    • /
    • pp.31-76
    • /
    • 2018
  • This article explores why the two Southeast Asian countries, Vietnam and the Philippines, choose different strategies to cope with the Chinese threat. Despite the evident Chinese threat in the South China Sea, Vietnam has not meaningfully expanded the military cooperation with the United States, whereas the Philippines, ironically, has distanced itself with its ally, the United States. Existing studies on the topic does not offer a satisfactory explanation. We assign that two cases are examples of "underbalancing" - the failure of balancing even though there is an evident threat. Furthermore, we demonstrate the difference between cases of the Philippines and Vietnam by arguing that the number of veto players affects the outcome of foreign policy, underbalancing of two countries. The Philippines has only one veto player, the president, hence its response to external threats is incoherent. On the other hand, the number of veto players in Vietnam is more than one and those players demand negotiation among them on the matter of foreign policy. Upon analyses on two cases we argue that the former is the case of underbalancing caused by a lack of policy stability, while the latter is the case of underbalancing caused by a lack of policy responsiveness.

Multi-Programmed Simulation of a Shared Memory Multiprocessor System (공유메모리 다중프로세서 시스템의 다중 프로그래밍 모의실험 기법)

  • 최효진;전주식
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.3_4
    • /
    • pp.194-204
    • /
    • 2003
  • The performance of a shared memory multiprocessor system is dependent on the system software such as scheduling policy as well as hardware system. Most of existing simulators, however, do not support simulation for multi-programmed environment because they can execute only a single benchmark application at a time. We propose a multi-programmed simulation method on a program-driven simulator, which enables the concurrent executions of multiple parallel workloads contending for limited system resources. Using the proposed method, system developers can measure and analyze detailed effects of resource conflicts among the concurrent applications as well as the effects of scheduling policies on a program-driven simulator. As a result, the proposed multi-programmed simulation provides more accurate and realistic performance projection to design a multiprocessor system.

A Study on Korea's Countermeasures Through the Analysis of Cyberattack Cases in the Russia-Ukraine War (러시아-우크라이나 전쟁에서의 사이버공격 사례 분석을 통한 한국의 대응 방안에 관한 연구)

  • Lee, Hyungdong;Yoon, Joonhee;Lee, Doeggyu;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.353-362
    • /
    • 2022
  • The Russian-Ukraine war is accompanied by a military armed conflict and cyberattacks are in progress. As Russia designated Korea as an unfriendly country, there is an urgent need to prepare countermeasures as the risk of cyberattacks on Korea has also increased. Accordingly, impact of 19 cyberattack cases were analyzed by their type, and characteristics and implications were derived by examining them from five perspectives, including resource mobilization and technological progress. Through this, a total of seven measures were suggested as countermeasures for the Korean government, including strengthening multilateral cooperation with value-sharing countries, securing cyberattack capabilities and strengthening defense systems, and preparing plans to connect with foreign security companies. The results of this study can be used to establish the Korean government's cybersecurity policy.