• Title/Summary/Keyword: 허용된 위험

Search Result 256, Processing Time 0.034 seconds

Strafrechtliche FahI${\square}$ssigkeit und Risiko bei den Piloten des Milit${\square}$rflugzeug (군항공기 조종자의 형사상 과실책임의 제한)

  • Song, Seong-Ryong
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.2
    • /
    • pp.163-177
    • /
    • 2004
  • Wenn man das fahrl${\"{a}}$ssige Begehungsdelikt in Bezug auf ein Niveau eines Risiko der objektiv vorhandenen tatbestandlichen Erfolgsm${\"{o}}$glichkeit und auf die n${\"{o}}$tige Sorgfaltspflicht, die die T${\"{a}}$ter nimmt, um das solches Risiko abzuhalten, berucksichtigt, ergibt sich der spezielle Fall selten bei der Person, mit dem hoch-gefahrlichen Berufszweig besch${\"{a}}$ftigt ist, auf den die bestehende Allgemeine-Theorie ${\"{u}}$ber das gafahrl${\"{a}}$ssige Begehungsdelikt gleichm${\"{a}}$ssig unanwendbar ist. Bez${\"{u}}$glich des Piloten des Milit${\"{a}}$rflugzeug ergibt sich oftmals ein bestmmter Fall, die die KontroIIe des Risiko gesch${\"{a}}$ftlich uber sein eigenes pers${\"{o}}$nliches Ermessen geht, und er nimmt die Pflicht, die notwendige milit${\"{a}}$rische Zielsetzung zuerst vor allem zu ber${\"{u}}$cksichtigen, wenn auch technisch, klimatisch und umstandehalber ein normales Niveau von Risiko ${\"{u}}$bersteigt wird und zugleich ein bedenkliches hoches Risiko mit sich gebracht wird. Aus diesem Anla${\beta}$ kann man folgem, da${\beta}$ der Pilot des Milit${\"{a}}$rflugzeug ein besonderer Fall ist, auf den die Kriterien in Bezug auf das Gebiet der Regel ${\"{u}}$ber das fahrl${\"{a}}$ssige Begehungsdelikt gleichm${\"{a}}$ssig unanwendbar sind. Und weil die Vermehrung der Gefahr des Flugzeug sofort an die Vermehrung der Gefahr seines eigenen Leben angeschlossen wird und daher es eine M${\"{o}}$glichkeit gibt, da${\beta}$ der Pilot dem Resultat eines Gefahr zum ersten Opfer f${\"{a}}$llt, ist die Regelung in der Punkt der Generalpr${\"{a}}$vention gegen das fahrl${\"{a}}$ssige Begehungsdelikt sinnlos. Und auch muB die militarpolitische Punkt, die Piloten des Milit${\"{a}}$rflugzeug gem${\"{a}}$${\beta}$ dem notwendigen Ausma${\beta}$ auszubilden und das Ausma${\beta}$ zu behalten, aktuell berucksichtigt werden.

  • PDF

소형 해상 부유체의 위기허용수준 결정을 위한 최적의 누적확률분포함수 선정에 관한 연구

  • Im, Jeong-Bin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.06a
    • /
    • pp.474-476
    • /
    • 2013
  • 위기허용수준(RAC)은 시스템의 안전성 평가를 위한 확률적인 기준으로, 소형 해상 부유체의 롤, 피치, 히브 등 세 가지 동적운동의 위험수준 평가에 적용할 수 있다. 부유체의 동적운동 값들은 모델을 통해서 획득한 후, 이에 관한 누적확률분포함수를 추론하여 상대적인 위기수준을 결정하게 된다. 이 연구는 모델에서 획득한 세가지 동적운동에 대한 최적의 누적확률분포함수 선정에 관한 것이 목적이다. Exponential, Extreme Value, Gamma, Lognormal, Normal, Poisson 등 6가지 대표적인 누적확률분포함수를 세가지 동적운동에 적용하여 평가한 결과, 롤과 히브 운동의 경우는 Beta 누적분포함수가 최적임을 나타냈고, 피치 운동의 경우는 Gamma 누적분포함수로 대표하는 것이 최적임을 나타냈다. 아울러 향후 본 연구 결과의 적용방법에 대해서도 검토하였다.

  • PDF

Insulation Characteristics of Contaminated Polymeric Insulators in the Field Condition (사용자의 쿠키를 이용한 웹 페이지의 암호화)

  • Han, So-Hee;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.1919-1920
    • /
    • 2008
  • 대부분의 인터넷 사용자들은 본인도 모르는 사이에 쿠키의 사용을 허용하고 있으며 이에 따른 각종 해킹과 트랙킹의 위험도 아울러 묵과하고 있는 실정이다. 하지만 역시 대부분의 사용자들은 쿠키의 위험성에도 불구하고 쿠키의 사용을 멈추지 않을 것이다. 쿠키로 인해 향상되는 인터넷 속도의 이점을 포기하지 못하기 때문이다. 쿠키를 비롯 해 해킹과 트랙킹의 위험을 내포하고 있는 또 하나의 인터넷 컨텐츠는 HTML 문서이다. 현재 HTML 문서는 소스보기를 통해 원본의 모든 출처를 노출하고 있다. 따라서 쿠키만큼 해킹과 트랙킹의 기회를 제공하고 있는 셈이다. 본 논문은 이렇게 불가피하게 사용되는 쿠키 필연적인 성격을 이용하여 웹 페이지의 암호화를 제안한다. 특히, 웹 서버와 클라이 언트 환경으로 한정하여 웹 서버가 클라이언트에게 웹 페이지를 전송할 시 쿠키를 키로 한 알고리즘을 사용하여 암호화를 한 후 전송함으로써 해킹이나 트랙킹의 위험을 최대한 낮추고자 한다.

  • PDF

A Basic Study on Safe Mooring Guide for Dangerous Goods Berths in Ul-San Port (울산항 위험물 부두의 안전계류에 관한 기초연구)

  • Kang, Won-Sik;Park, Young-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.1
    • /
    • pp.67-73
    • /
    • 2016
  • This study analyzed the state of the vessels which were using the berth for dangerous goods more than its carrying capacity in the major dangerous cargo handling port of Ulsan in Korea, The result of the analysis showed that a ship which has 3 times more than the maximum berthing capacity was moored at berth. Accordingly, a simulation model for 50,000 DWT berth was built and carried out the mooring safety analysis with 50,000 DWT, 70,000 DWT and 100,000 DWT vessels by mooring assessment program. The evaluation was carried out according to the standard environment presented in OCIMF standards. 50,000 DWT vessel was evaluated to meet the acceptable criteria but, 70,000 DWT and 100,000 DWT vessels exceeded the acceptable limit as per external conditions. Consequently, safe mooring guidelines were suggested and also proposed the building of common 'Mooring safety guideline' for port with assessment of different cases.

A Study on Impersonation Attack of Linux Sudoers Through Shadow File Manipulation (Shadow 파일 조작을 통한 리눅스 Sudoer의 위장공격에 대한 연구)

  • Kim, Sanghun;Cho, Taenam
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.149-156
    • /
    • 2020
  • All operating systems have privileged administrator accounts for efficient management. Dangerous or sensitive tasks or resources should be banned from normal users and should only be accessible by administrators. One example of this privilege is to reset a user's password when the user loses his/her password. In this paper, the privileges of the sudoer group, the administrator group of Linux Ubuntu, and the management system of the sudoer group were analyzed. We show the danger that a sudoer can use the privilege to change the password of other users, including other sudoers, and modify the log, and suggest a countermeasure to prevent the manipulation of shadow files as a solution to this. In addition, the proposed method was implemented and the possibility of practical use was confirmed with excellent performance.

Improvement Plan for Myodo-Strait at Yeosu Port (여수항 묘도수로 개선에 관한 연구)

  • Lee, Chang-Hyun;Lee, Hong-Hoon;Kwon, Yu-Min
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.6
    • /
    • pp.775-782
    • /
    • 2021
  • The Myodo-Strait at Yeosu Port is normally used as a major vessel passage for dangerous cargo carriers that carry regular products of dangerous goods. Currently, the Myodo-Strait allows only single passage, and the speed of passage is also limited to 8 knots. As a result, demurrage at the wharf of hazardous goods are also on the rise. It is expected that the development of a number of dangerous commodity wharf in the future will increase the volume of vessel traffic and increase the number of vessels used in the project area. Therefore, it is urgent to improve the waterway in order to secure the safety of ships using the waterway and improve the demurrage. This study proposed an improvement plan for the waterway through the analysis of the marine environment of the waterway and the process of collecting opinions from users in the sea area. and it was finally proposed to expend the width of the strait to 300m and secure a depth of 9.50m through Guidelines of Port and Harbor Design review and ship handling simulation evaluation. In addition it was evaluated that the vessel traffic congestions at peak-time in the situation of solo passage was greatly improved from 71.01% to 47.3% even when it was allowed to ship's crossing passage, as a result of vessel traffic congestions evaluation. According to the proposed improvement plan, the safety of ships' passage in the project area can be secured, and the issue of demurrage was also considered to be improved.

Analysis of Train Delay in Daejeon Metro (대전도시철도의 열차 지연운행 분석연구)

  • Kwon, Young-Seok;Lee, Jin-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.50-57
    • /
    • 2017
  • This study investigated the causes and problems of train operation impediments through the statistics analysis of 8 years'internal data of Daejeon Metropolitan Express Transit. By evaluating the risks regarding the system, equipment, and parts of high risk group, this study measured the Risk Index Severity, and applied the $5{\times}5$ Risk Assessment Matrix which is a method of risk management to calculate the scale of risk to analyze the safety level and allowance range. As a result, the car sector, the most serious risk, followed by machinery and equipment sector showed that the inherent risk. In particular, the door broken and the door rail signaling and control devices due to defects of the vehicle is high, but also the severity, and frequency are showing very frequent additional potential accidents. PSD also had defects in the machinery sector appeared to be the most dangerous of the PSD poor safety gates, it was found that the glass also involve the risk of mishandling and breakage of the PSD. This study intended to contribute to the transportation benefits through the safety and stable operation of Metropolitan Express Transit.

A Study on the dangerous for street righting underground line (가로등 지중전선로의 위험성 연구)

  • Baek, Dong-Hyun;Lee, Jong-Eon;Chun, Ji-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.2156_2157
    • /
    • 2009
  • 가로등 누전으로인한 많은 인명피해 발생에따른 가로등 지중전선로의 위험성을 실측한 것으로 지역별 접지저항값은 많은 차이가 있었으며 지락지점으로부터 떨어지면 전위차는 현저히 감소하였다. 실제 대지로 빗물의 유입이 많은 장마철에서도 인접 철구조물로 가상되는 Pipe의 대지전위 상승값은 우려 할 만큼 위험한 수치에 이르지 않았다. 또한 IEC의 안전전압규정은 인체가 완전히 젖어 있는 상태에서 25[V]이하로 규정하고 있는바 이를 확인하였다. 지락지점에서 일정한 거리를 두고 측정한 접지극이나 구조물에 대한 누설전류의 값은 매우 미미하였으며, 지중전선의 지락전류는 220[V]에서 200[mA]까지 허용되어도 가능한 것으로 확인되었다.

  • PDF

Quality Assurance of Volumetric Modulated Arc Therapy Using the Dynalog Files (다이나로그 파일을 이용한 부피세기조절회전치료의 정도관리)

  • Kang, Dong-Jin;Jung, Jae-Yong;Shin, Young-Joo;Min, Jung-Whan;Kim, Yon-Lae;Yang, Hyung-jin
    • Journal of radiological science and technology
    • /
    • v.39 no.4
    • /
    • pp.577-585
    • /
    • 2016
  • The purpose of this study is to evaluate the accuracy of beam delivery QA software using the MLC dynalog file, about the VMAT plan with AAPM TG-119 protocol. The Clinac iX with a built-in 120 MLC was used to acquire the MLC dynalog file be imported in MobiusFx(MFX). To establish VMAT plan, Oncentra RTP system was used target and organ structures were contoured in Im'RT phantom. For evaluation of dose distribution was evaluated by using gamma index, and the point dose was evaluated by using the CC13 ion chamber in Im'RT phantom. For the evaluation of point dose, the mean of relative error between measured and calculated value was $1.41{\pm}0.92%$(Target) and $0.89{\pm}0.86%$(OAR), the confidence limit were 3.21(96.79%, Target) and 2.58(97.42%, OAR). For the evaluation of dose distribution, in case of $Delta^{4PT}$, the average percentage of passing rate were $99.78{\pm}0.2%$(3%/3 mm), $96.86{\pm}1.76%$(2%/2 mm). In case of MFX, the average percentage of passing rate were $99.90{\pm}0.14%$(3%/3 mm), $97.98{\pm}1.97%$(2%/2 mm), the confidence limits(CL) were in case of $Delta^{4PT}$ 0.62(99.38%, 3%/3 mm), 6.6(93.4%, 2%/2 mm), in case of MFX, 0.38(99.62%, 3%/3 mm), 5.88(94.12%, 2%/2 mm). In this study, we performed VMAT QA method using dynamic MLC log file compare to binary diode array chamber. All analyzed results were satisfied with acceptance criteria based on TG-119 protocol.

Effective Risk Level Assessment Using Three-Dimensional Vector Visualization (3차원 벡터 시각화를 활용한 효과적인 위험 수준 평가)

  • Lee, Ju-young;Cho, In-hyun;Lee, Jae-hee;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1595-1606
    • /
    • 2015
  • Risk analysis is utilized in devising measures to manage information security risk to an acceptable level. In this risk management decision-making, the visualization of risk is important. However, the pre-existing risk visualization method is limited in visualizing risk factors three-dimensionally. In this paper, we propose an improved risk visualization method which can facilitate the identification of risk from the perspective of confidentiality, integrity, and availability respectively or synthetically. The proposed method is applied to an enterprise's risk analysis in order to verify how effective it is. We argue that through the proposed method risk levels can be expressed three-dimensionally, which can be used effectively for information security decision-making process for internal controls.