• Title/Summary/Keyword: 취약지 분석

Search Result 1,623, Processing Time 0.028 seconds

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.

Pin Distribute Method of Twist Cable at Military Unmanned Vehicle Wiring Unit Connector (군용 무인 이동체 배선장치 커넥터에서 트위스트 케이블 핀 배치 최적화 방안)

  • Eun, Hee-hyun;Roh, Dong-gyu;Kwak, Gyu-min;Kim, Jae-seung;Lee, Chul
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.4
    • /
    • pp.245-250
    • /
    • 2020
  • Currently, unmanned military vehicles under development in Korea have more devices to carry out various missions, and interface cables between them are also increasing. In addition, due to a small space problem inside the unmanned vehicle, devices are required to be miniaturized and integrated. For two reasons, connectors also need to be selected, which makes them vulnerable to noise due to the closer distance between the pins. In this paper, we analyzed how much the magnetic field produced by noise at the connector pin where cable twist is released affects the surrounding pin and presented the guide for optimal pin placement. First, the effect of magnetic field is greater than the crosstalk between pin and pin. Second, the magnetic field on both sides between + and - is strong when approaching one step with noise source. Third, the magnetic field strength is improved when setting the ground pin as the ground pin between the noise and the original signal when approaching the A noise source and the two steps. Fourth, in the case of a differential mode communication, the optimal placement area of the sensitive signal was presented according to positions Tx± and Rx±.

Evaluating the Efficiency of Chinese Ports from the Perspective of Maritime Silk Road (중국 일대일로 항만의 효율성 평가)

  • Wang, Guan;Ahn, Seung-Bum
    • Journal of Korea Port Economic Association
    • /
    • v.37 no.1
    • /
    • pp.19-30
    • /
    • 2021
  • The 21st Century Maritime Silk Road (MSR) is an important part of Belt and Road Initiative(BRI). As an economic and trade corridor for dozens of countries in Asia, Europe and Africa, and the port as an important link node, the efficiency of port operation directly affects the implementation of BRI's strategy. On the basis of combining BRI and related evaluation methods of port efficiency, this paper uses DEA-BCC model to select port production berth number and production berth length as input index container throughput and cargo throughput as output index to analyze the port efficiency of 14 ports in China. The results show that: (1) The overall efficiency level of the ports along the MSR is relatively low. Most of the ports have not reached the DEA efficiency and there are different degrees of problems in scale investment and technological improvement. However, this situation is accompanied by the implementation of China's maritime cooperation strategy and becoming better year by year. (2) The low operating efficiency of ports along China's MSR is mainly due to the lack of coordination between scale efficiency and technical efficiency, which is caused by insufficient scale investment in the port itself, weak economic linkage between the hinterland and the port, (3) Whether a port has a strong comprehensive strength does not entirely depend on the cargo throughput or scale but also includes the port's operating efficiency.

Knowledge, Attitude and Health Behaviors Related to Cardiovascular Disease Prevention in Postmenopausal Women Workers (폐경기 여성 근로자의 심뇌혈관질환 예방 관련 지식, 태도 및 건강행위에 관한 융합 연구)

  • Choi, Jun Young;Choi, So Young
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.339-347
    • /
    • 2019
  • This study was conducted from November 1, 2017 to November 30, 2017 in 268 women in late postmenopausal period in D and S shipyards located in G city. The subjects were divided into two groups according to the risk factors of cerebrovascular disease according to the presence or absence of risk factors of cerebrovascular disease. The subjects were divided into two groups according to their general characteristics, cerebrovascular disease prevention knowledge, attitude and health behavior. The variables that had statistically significant difference in health group and risk group were age (F=92.239, p<.001), cohabitation type ($x^2=20.056$, p<.001), income level ($x^2=39.023$, p<.001), the number of working hours per week (F=32.217, p<.001), the number of working years (F=12.310, p=.001), family history of cardiovascular disease ($x^2=233.442$, p<.001), subjective health status($x^2=19.058$, p=.001). There was a significant difference between the two groups in the degree of knowledge related to prevention of cardiovascular disease (F=2.679, p=.008) and health behavior fulfillment (F=4.339, p<.001). (r=.348, p<.001), the risk group had a higher knowledge (r=.279, p=.002), and the other group Attitude (r=.194, p=.030) showed a statistically significant correlation. Based on this, it is necessary to develop and apply an intervention program considering the characteristics of vulnerable group of cerebrovascular disease.

A Study on the Citizen Advocates' Perception of Their Role for People with Developmental Disabilities (시민옹호인의 역할인식에 관한 연구 - 발달장애인 옹호경험을 중심으로 -)

  • Jeon, Ji-Hye;Lee, Se-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.112-119
    • /
    • 2019
  • This study examined the role of citizen advocates in advocating for people with developmental disabilities. Citizen advocacy refers to activities that advocate and represent citizens on behalf of those who are socially vulnerable. The purpose of this study is to analyze the role concept of citizen advocates by conducting focus group interviews and dividing the 13 citizen advocates with developmental disabilities into 4 groups. It is divided into four main subjects and nine sub-themes. The main theme are 'Self-transformation of the parties', 'Restoring the rights of the parties', 'Being with the parties', and 'Expanding the world of the parties'. Sub-themes are 'Recognizing and solving the problem of self', 'Granting role to speak', 'Recovering the initiative of service use', 'Restoring the rights of existing (family and neighbor), "Preventing money harm" "Speaking instead", "Encouraging and petting people", "Promoting change in the community", and "Expanding the size of the world a little bit". Based on this, we discussed the importance of citizen advocacy as a preventive advocacy system, the relationship between citizen advocacy and professional advocacy system, the difference between volunteer and personal assistants and citizen advocacy, and considerations for citizen advocacy.

Alcohol Volume Consumed and Dependancy According to Venue and Multiple Drinking Rounds (음주차수 증가에 따른 장소별 음주량과 알코올 의존)

  • Lee, Geum-Seon;Yun, Mi-Eun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.215-226
    • /
    • 2021
  • The purpose of this study was to analyze the alcohol volume consumed and alcohol dependancy according to multiple rounds of drinking. Sectional data collected in 2012 as part of an International Alcohol Control Study were used, and 855 of 1,789 drinker aged 19 to 64 were conducted. The proportion of multiple rounds drinking were significantly higher in males(χ²=37.607, p<.001), students(χ²=52.466, p<.001), single(χ²=34.205, p<.001), smoking experience and stressed(χ²=40,09, p<.001; χ²=21.66, p<.001) among drinkers. In particular, the alcohol volume consumed of unmarried people, smokers, and stress groups were significantly higher than married people, non-smokers and no-stress group. The highest alcohol intake in the first, 2nd and third rounds was found in bars in the liquor trade (F=67.8g, p<0.001). The total alcohol intake increased as the number of rounds increased (F=209.993, p=0.001) and the number of drinkers who tested positive for alcohol dependency increased, using the tests RAPS4 and DSM-IV(F=129.836, p<0.001; F=94.669, p<0.001). The OR of alcohol dependancy in males was 2.3(95% CI: 1.745-3.057), unemployed was 3.2(95% CI: 1.053-9.838), smokers was 3.9(95% CI: 1.230-12.292), and stress group was 2.1(95% CI: 1.561-2.768) compared to females, employed, non-smokers, and no-stress group respectively. In conclusion, it suggests that those consuming multiple rounds drinking can become more vulnerable to alcohol harms due to its relation to smoking, stress and increased dependence on alcohol.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Competitive Strategy and Resource Sharing: Moderating Effects of Strategic Contexts (경쟁전략이 자원공유에 미치는 영향: 전략적 상황의 조절효과를 중심으로)

  • Hwang, Jaewon;Park, Kyoungmi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.138-148
    • /
    • 2021
  • This study explores the factors that moderate the impact of competitive strategy on resource sharing in order to explain why existing empirical research has not shown statistically significant results. We test the hypothesis that competitive strategy pursuing low-cost rather than differentiation increases resource sharing and analyze how the relationship between competitive strategy and resource sharing changes when diversification, interconnectedness, centralization of authority, and resource level are entered into the equation as moderating variables. According to the results, competitive strategy doesn't affect resource sharing alone, but it has significant effects on resource sharing when it is combined with interconnectedness, centralization of authority, and resource level, except for diversification. This means that low-cost strategy increases resource sharing under the conditions of high interconnectedness, more centralized authority, and low resource level. The prior discussions have focused on the willingness or intentions of resource sharing without considering the abilities or possibilities. Our findings indicate that resource sharing could be better predicted by using moderating variables reflecting the abilities or possibilities. The contribution of the study is that we discover and complement the vulnerability in the logic of resource sharing.