• Title/Summary/Keyword: 환경감시

Search Result 1,607, Processing Time 0.027 seconds

Model-Based Approach to Flight Test System Development to Cope with Demand for Simultaneous Guided Missile Flight Tests (동시다발적인 유도무기 비행시험 수요에 대응하기 위한 모델기반 비행시험 시스템 개발)

  • Park, Woong;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.1
    • /
    • pp.268-277
    • /
    • 2019
  • Flight test systems should monitor various conditions in real time during flight tests and take safety measures in an emergency. The importance of ensuring test safety increases in more complicated and wider test environments. Also, due to the transition of wartime operational authority, many guided missile systems must be developed simultaneously. Early deployment and budget reduction by shortening the development and T&E periods are also necessary. Consequently, the risk of flight tests under the circumstance of inefficient test resources is increasing. To address this deficiency, a flight test system model using SysML was proposed in this study. The method of designing and verifying the test system is based on the agile shift left testing methodology of advanced T&E labs and utilizing a system reference model in the aerospace field. Through modeling and simulation analysis, early identification and correction of faults resulting from inconsistent test requirements can mitigate the risk of delays during the T&E phase of flight tests. Also, because the flight test system model was constructed using SysML, it can be applied to test various guided missile systems.

DC Resistivity Survey Design for Deep Magma in Mt. Baekdu Using Distributed Acquisition System (백두산 심부 마그마 탐사를 위한 분산계측 시스템을 이용한 전기비저항탐사 설계)

  • Lee, Hyosun;Jung, Hyun-Key;Cho, Sung-Ho;Kim, Yesol;Lee, Youn Soo;Min, Dong-Joo
    • Journal of the Korean earth science society
    • /
    • v.40 no.2
    • /
    • pp.177-187
    • /
    • 2019
  • Several volcanic activities have continued in Mt. Baekdu since the Millennium eruption, and these phenomena have increased the need for volcanic activity surveillance. Various geophysical approaches are needed to obtain the depth and size of magma chamber that lie several kilometers below the surface. We examined the applicability of direct-current resistivity survey in this study. In order to explore the deep magma chamber of Mt. Baekdu, which has a spatial limitation due to the borderline, a large-scale survey with a length of tens of kilometers should be conducted. This type of survey requires a distributed measurement system and optimized exploration designs. Therefore, we propose survey designs taking advantage of our developed distributed acquisition system and analyze the applicability using numerical simulation. We confirmed that our designs that use single survey line with offline transmitting points show comparable results to the conventional 3D survey. It is expected that our research result can contribute to the deep geophysical exploration in Mt. Baekdu.

Triple Junction GAGET2-ID2 Solar Cell Degradation by Solar Proton Events (태양 양성자 이벤트에 의한 삼중 접합 GAGET2-ID2 태양전지 열화)

  • Koo, Ja-Chun;Park, Jung-Eon;Moon, Gun-Woo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.12
    • /
    • pp.1019-1025
    • /
    • 2021
  • In nearly all space environments, the solar cell degradation is dominated by protons[1]. Even through a GEO orbit lines in the electron radiation belts, the protons emitted from any solar event will still dominate the degradation[1]. Since COMS launch on June 26 2010, the proton events with the fluence of more than approximately 30 times the average level of perennial observations were observed between January 23 - 29 2012 and March 07 - 14 2012[16]. This paper studies the solar cell degradation by solar proton events in January and March 2012 for the open circuit voltage(Voc) of a witness cell and the short circuit current(Isc) of a section connected to a shunt switch. To evaluate the performance of solar cell, the flight data of voltage and current are corrected to the temperature, the Earth-Sun distance and the Sun angle and then compare with the solar cell characteristics at BOL. The Voc voltage dropped about 23.6mV compare after the March 2012 proton events to before the January 2012 proton events. The Voc voltage dropped less than 1% at BOL, which is 2575mV. The Isc current decreased negligible, as expected, in the March 2012 proton events.

KOMPSAT Image Processing and Application (다목적실용위성 영상처리 및 활용)

  • Lee, Kwang-Jae;Kim, Ye-Seul;Chae, Sung-Ho;Oh, Kwan-Young;Lee, Sun-Gu
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_4
    • /
    • pp.1871-1877
    • /
    • 2022
  • In the past, satellite development required enormous budget and time, so only some developed countries possessed satellites. However, with the recent emergence of low-budget satellites such as micro-satellites, many countries around the world are participating in satellite development. Low-orbit and geostationary-orbit satellites are used in various fields such as environment and weather monitoring, precise change detection, and disasters. Recently, it has been actively used for monitoring through deep learning-based object-of-interest detection. Until now, Korea has developed satellites for national demand according to the space development plan, and the satellite image obtained through this is used for various purpose in the public and private sectors. Interest in satellite image is continuously increasing in Korea, and various contests are being held to discover ideas for satellite image application and promote technology development. In this special issue, we would like to introduce the topics that participated in the recently held 2022 Satellite Information Application Contest and research on the processing and utilization of KOMPSAT image data.

Evaluation of the Input Status of Exposure-related Information of Working Environment Monitoring Database and Special Health Examination Database for the Construction of a National Exposure Surveillance System (국가노출감시체계 구축을 위한 작업환경측정과 특수건강진단 자료의 노출 정보 입력 실태 평가)

  • Choi, Sangjun;Koh, Dong-Hee;Park, Ju-Hyun;Park, Donguk;Kim, Hwan-Cheol;Lim, Dae Sung;Sung, Yeji;Ko, Kyoung Yoon;Lim, Ji Seon;Seo, Hoekyeong
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.3
    • /
    • pp.231-241
    • /
    • 2022
  • Objectives: The purpose of this study is to evaluate the input status of exposure-related information in the working environment monitoring database (WEMD) and special health examination database (SHED) for the construction of a national exposure surveillance system. Methods: The industrial and process code input status of WEMD and SHED for 21 carcinogens from 2014 to 2016 was compared. Data from workers who performed both work environment monitoring and special health examinations in 2019 and 2020 were extracted and the actual status of input of industrial and process codes was analyzed. We also investigated the cause of input errors through a focus group interview with 12 data input specialists. Results: As a result of analyzing WMED and SHED for 21 carcinogens, the five-digit industrial code matching rate was low at 53.5% and the process code matching rate was 19% or less. Among the data that simultaneously conducted work environment monitoring and special health examination in 2019 and 2020, the process code matching rate was very low at 18.1% and 5.2%, respectively. The main causes of exposure-related data input errors were the difference between the WEMD and SHED process code input systems from 2020, the number of standard process and job codes being too large, and the inefficiency of the standard code search system. Conclusions: In order to use WEMD and SHED as a national surveillance system, it is necessary to simplify the number of standard code input codes and improve the search system efficiency.

A Study on Stock Assessment of Japanese Flying Squid (Todarodes pacificus) in Korea·China·Japan Waters (한·중·일 해역의 살오징어(Todarodes pacificus) 자원평가 연구)

  • Sungsu Lim;Do-Hoon Kim;Jae-Beum Hong
    • Environmental and Resource Economics Review
    • /
    • v.31 no.4
    • /
    • pp.451-480
    • /
    • 2022
  • The Japanese Flying Squid (Todarodes pacificus) is a commercially important species in South Korea and the most popular species among consumers. However commercial catches of Japanese Flying Squid have been declining since 2000. In this study, we conducted a stock assessment to identify stock status. This study differed from previous studies in two aspects: a greater amount of available fishing effort data was used, and data from China, Japan, and Korea were included. A CMSY (catch-maximum sustainable yield) model was used to estimate MSY, biomass and exploitation with Bayesian state-space implementation of the Schaefer (BSS) model for the method of stock assessment, and evaluated the species by dividing into two groups, 'Korea' and ' Korea·China·Japan'. In all cases, Japanese flying squid biomass showed a general decreasing trend. Additionally, the biomass estimated for 2020 was lower than the biomass necessary to achieve the maximum sustainable yield. To manage Japanese Flying Squid effectively, it is necessary to strengthen the resource management strategies of individual countries and prepare a cooperative plan among countries.

Development of Global Fishing Application to Build Big Data on Fish Resources (어자원 빅데이터 구축을 위한 글로벌 낚시 앱 개발)

  • Pi, Su-Young;Lee, Jung-A;Yang, Jae-Hyuck
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.333-341
    • /
    • 2022
  • Despite rapidly increasing demand for fishing, there is a lack of studies and information related to fishing, and there is a limit to obtaining the data on the global distribution of fish resources. Since the existing method of investigating fish resource distribution is designed to collect the fish resource information by visiting the investigation area using a throwing net, it is almost impossible to collect nation-wide data, such as streams, rivers, and seas. In addition, the existing method of measuring the length of fish used a tape measure, but in this study, a FishingTAG's smart measure was developed. When recording a picture using a FishingTAG's smart measure, the length of the fish and the environmental data when the fish was caught are automatically collected, and there is no need to carry a tape measure, so the user's convenience can be increased. With the development of a global fishing application using a FishingTAG's smart measure, first, it is possible to collect fish resource samples in a wide area around the world continuously on a real time basis. Second, it is possible to reduce the enormous cost for collecting fish resource data and to monitor the distribution and expansion of the alien fish species disturbing the ecosystem. Third, by visualizing global fish resource information through the Google Maps, users can obtain the information on fish resources according to their location. Since it provides the fish resource data collected on a real time basis, it is expected to of great help to various studies and the establishment of policies.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Exploration on Risk and Protective Factors of Adolescent Runaway (청소년 가출의 위험요인과 보호요인 탐색)

  • Sang-chul Han
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1_spc
    • /
    • pp.273-298
    • /
    • 2008
  • The purpose of this study is to explore a risk and a protective factors of adolescent runaway based on the previous researches. Runaway of adolescents is increasing, and it is longer and more habit gradually than past. The prevailance methods of runaway is no longer effects on the decrease of adolescent runaway. Now there is to accept adolescent runaway, and has to support the difficult life conditions and the emotional distress of adolescent post-runaway. This means that must be identify and treatment the protective factors having an buffering effect as well as the risk factors influencing on runaway. Although the worse factors related family are the highest risk factors of runaway, others factors including negative peer relation, a academic stress also an have significant influence on runaway. And the protective factors mediating the negative influence of risk factors are an monitoring and controlling of parent as authoritative rearing attitude, a social support, a positive coping strategies, a self-esteem, and a conventional peer group. Protective factors prevent from runaway behavior, as well as improve a resilience of adolescents in the poor environment. The tasks of follow study are to investigate empirically the mediating effects of the protective factors on the problem behavior of post-runaway and resilience of runaway adolescents based on the systematic research design.

  • PDF

A Study on the case of Application of Women's Personnel in the Australian Defence Force (호주군 여성인력의 활용과 우리군에 주는 시사점)

  • In-Chan Kim;Jong-Hoon Kim;Jun-Hak Sim;Kang-Hee Lee;Sang-Keun Cho;Sang-Hyuk Park;Myung-Sook Hong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.269-273
    • /
    • 2023
  • After participating in the Second Boer War in 1899, the Australian Army participated in world wars such as World War I, World War II, the Korean War, and the Vietnam War. To overcome the decline in the social recognition of soldiers and the continuous shortage of troops caused by the protracted war, the status and role of female personnel were expanded. The use of female manpower, which started as medical support during the Second Boer War, expanded to combat support missions such as communications, maintenance, driving, secret document management, and radar surveillance during World War II. After the Vietnam War, the Chiefs of Staff of the Australian Army, Navy and Air Force established a committee to expand women's participation in the military, improved service conditions for female personnel and supplemented regulations so that they were treated as soldiers, not women, and reached a turning point in expanding the role of female personnel in the Australian military. As a result, all combat positions, including special forces, were opened to women in 2014, and a plan was established to increase the proportion of women in each service by 2030. As a result, all combat positions, including special forces, were opened to women in 2014, and the Australian Armed Forces set a plan to increase the proportion of women by 2030. Like the Australian military, South Korea is also experiencing a demographic cliff and shortage of troops due to the continuing low birthrate problem. Through the history and current state of the use of female personnel in the Australian military, we would like to draw implications for the direction our military should go.