• Title/Summary/Keyword: 환경관리기술

Search Result 6,992, Processing Time 0.046 seconds

Development and Application of Post-Evaluation Techniques for Stream Project (하천사업 사후 평가기법의 개발 및 적용)

  • Jang, Chorok;Jang, Moon Yup;Song, Juil;Kim, Han Tae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.408-408
    • /
    • 2020
  • 「하천법」제3조는 국가는 하천에 대한 효율적인 보전·관리를 위하여 하천에 관한 종합적인 계획을 수립하고 합리적인 시책을 마련할 책무를 지게 하고 있다. 현재 전국에는 총 5,937개의 하천이 존재하며 국가와 국민의 일상생활에 큰 기여를 한다. 국가하천의 경우 하천의 크기 및 지리적 위치 등의 측면에서 볼 때 지방하천, 소하천보다 주요한 역할을 수행하며, 국토교통부의 예산에서도 큰 비중을 차지하고 있다. 국토교통부의 2020년 예산서를 살펴보았을 때 '국토 및 지역개발' 예산 1조 1666억9600만원 중 76.53%를 차지하는 8928억7300만원이 '국가하천정비지원', '국가하천정비'에 활용된다. 이처럼 국가하천의 정비를 위해 매년 많은 예산을 투자하고 있으며 여러 사업을 수행 중에 있으나 사업종료 후 사업에 관한 적절한 평가는 이뤄지지 않고 있다. 국토부에서는 「하천에 관한 사무처리규정」에 따라 매년 6월 국가하천 제방정비에 관한 평가를 수행 중에 있으나, 이는 제방에 관한 평가만을 수행하며 사업 자체에 관한 평가는 이뤄지지 않고 있는 실정이다. 본 연구에서는 많은 예산과 관심이 집중되는 국가하천사업이 완료되고 난 후 사업에 관한 평가를 통해 각 사업별 비교·분석이 가능한 표준 평가기법을 개발하고자 하였다. 평가지표의 경우 사업이 진행되는 단계인 '기본계획수립 단계', '실시설계 단계', '시공 단계' 세 단계로 나누어 구성하였으며, 총점이 100점이 되도록 구성하였다. 평가기법의 경우 우선 국가하천사업을 중심으로 평가하도록 하였으나 추후 지방하천, 소하천사업에서도 활용될 수 있도록 개발하였다. 평가기법의 활용성을 검증하기 위하여 Test-bed 사업들을 대상으로 평가지표를 적용하였으며, 필요한 수정·보완사항을 도출하였다. 이러한 하천사업 사후 평가기술의 개발로 사업 간의 비교·분석이 가능해질것이며, 각 평가결과를 바탕으로 향후 하천사업의 계획, 설계 시 벤치마킹이 가능할 것으로 기대한다.

  • PDF

Data value extraction through comparison of online big data analysis results and water supply statistics (온라인 빅 데이터 분석 결과와 상수도 통계 비교를 통한 데이터 가치 추출)

  • Hong, Sungjin;Yoo, Do Guen
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.431-431
    • /
    • 2021
  • 4차 산업혁명의 도래로 사회기반시설물의 계획 및 운영관리에 있어 데이터 분석을 통한 가치추출에 대한 관심은 매우 높은 상황이다. 데이터의 가용성과 접근성, 정부 지원 등을 평가하는 공공데이터 개방지수에서 한국은 1점 만점에 0.93점을 획득하여 경제협력개발기구 회원국 중 1위(2019년 기준)를 할 정도로 매우 높은 수준(평균 0.60점)이다. 그러나 공식적으로 발표 및 배포되는 사회기반시설물 관련 정보와 심도 있는 연구 분석이 필요한 정보는 접근이 여전히 제한적이라 할 수 있다. 특히 대표적인 사회기반시설물인 상수도시스템은 대부분 국가중요시설로 지정되어 있어 다양한 정보를 획득하고 분석하는데 제약이 존재하며, 관련 국가통계인 상수도통계에서는 누수사고 등과 같은 비정상적 상황에 대한 사고지점, 원인 등과 같은 세부정보는 제공하고 있지 않다. 본 연구에서는 웹크롤링 및 빅데이터 분석기술을 활용하여 과거 일정기간 발생한 지자체의 상수도 누수사고 관련 뉴스를 전수조사하고 도출된 사고건수를 국가 공인 정보인 상수도통계자료와 비교·분석하였다. 독립적인 누수사고 기사를 추출하기 위해서 중복기사의 제거, 누수 관련 키워드 정립, 상수도분야 이외의 관련기사 제거 등의 절차가 필요하며, 이와 같은 기법은 R프로그래밍을 통해 구현되었다. 추가적으로 뉴스기사의 자연어 처리기반 정보추출기법을 통해 누수사고 건수 뿐만 아니라 사고발생일, 위치, 원인, 피해정도, 그리고 대상 관로의 크기 등을 획득하여 상수도 통계에서 제시하고 있는 정보보다 많은 가치를 추출하여 연계할 수 있는 방안을 제시하였다. 제시된 방법론을 국내 A광역시에 적용하여 누수사고 건수를 비교한 결과 상수도통계에서 제시하고 있는 누수발생건수와 유사한 규모의 사고건수를 뉴스기사분석을 통해 도출할 수 있었다. 제안된 방법론은 추가적인 정보의 추출이 가능하다는 점에서 향후 활용성이 높을 것으로 기대된다.

  • PDF

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

Cooperative Plans for Information Resource Sharing of Cultural Heritage Institutions (정보자원 공유를 위한 문화유산기관 협력 방안)

  • Cho, Yoon-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.19 no.2
    • /
    • pp.5-21
    • /
    • 2008
  • Cultural heritage institutions need to construct a cooperative network beyond an organization and a region based on products that cultural experiences and _expressions of human beings. They should serve as primary social agencies which need to create various information services of cultural heritage through integrated system management that social members are accessible to cultural contents such as _document resources of holding libraries, rich inheritance of museums, and works of art museums. This study indicated acts and considerable facts that have clauses the cooperative background of cultural heritage institutions which are libraries, museums, art museums and archives, and also intro! duced the cases of cooperative networks as an integrated system of libraries, museums, and art museums in North America and EU. Based on the analysis, this study suggested cooperative plans of cultural heritage institutions for political and systemic aspects, technical aspects, and human resource aspects.

Durability Analysis and Development of Probability-Based Carbonation Prediction Model in Concrete Structure (콘크리트 구조물의 확률론적 탄산화 예측 모델 개발 및 내구성 해석)

  • Jung, Hyunjun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.4A
    • /
    • pp.343-352
    • /
    • 2010
  • Recently, many researchers have been carried out to estimate more controlled service life and long-term performance of carbonated concrete structures. Durability analysis and design based on probability have been induced to new concrete structures for design. This paper provides a carbonation prediction model based on the Fick's 1st law of diffusion using statistic data of carbonated concrete structures and the probabilistic analysis of the durability performance has been carried out by using a Bayes' theorem. The influence of concerned design parameters such as $CO_2$ diffusion coefficient, atmospheric $CO_2$ concentration, absorption quantity of $CO_2$ and the degree of hydration was investigated. Using a monitoring data, this model which was based on probabilistic approach was predicted a carbonation depth and a remaining service life at a variety of environmental concrete structures. Form the result, the application method using a realistic carbonation prediction model can be to estimate erosion-open-time, controlled durability and to determine a making decision for suitable repair and maintenance of carbonated concrete structures.

A Study of Static Behavior of FRP Bridge Deck Concerning Connection Condition (FRP바닥판의 연결조건에 따른 정적거동 분석)

  • Yong, Hwan Sun;Hwang, Yoon Koog;Kyung, Kab Su;Park, Yong Chan
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4A
    • /
    • pp.597-604
    • /
    • 2006
  • Fiber Reinforced Polymer (FRP) is a relatively new material in the bridge construction. With high strength to weight ratios, excellent durability, and low life-cycle costs of FRP, FRP bridge decks can offer a low dead load, reduced maintenance, and long service life. Due to the lightweight of FRP, if existing concrete decks can be replaced with the FRP decks, the load carrying capacity of superstructure can be increased without strengthening of girders. In this study, we have conducted an experiment on 7 cases of connection conditions with steel girder by using bolts considering a rational and economical method of connection and compared with the results of FEM analysis. From the experimental result, if the bolts are strong enough to resist shear force between the FRP bridge deck and the steel girder, it will be structurally secure to use the zigzag method.

The Mitigation of Information Security Role Stress: The Role of Information Security Policy Goal Setting and Regulatory Focus (정보보안 업무 스트레스의 완화: 정보보안 정책 목표 설정 및 조절초점의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1177-1188
    • /
    • 2023
  • Socially, organizations are required to maintain strict management of their information resources and invest in the adoption of information security (IS) technologies and policies. However, the ongoing threat of information exposure by employees persists within the organization. This study aims to identify the role stress that employees may experience due to strict IS policies and propose methods for reducing its negative impact. Specifically, our study suggests a mechanism for mitigating role stress by incorporating factors related to IS policy goal setting and work regulatory focus. We conducted a survey among workers in the financial industry, where IS policies are rigorously enforced, and tested our research hypotheses using a sample of 309 participants. The results indicate that increasing the difficulty and specificity of IS policy goals reduces role stress (conflict and ambiguity) and positively influences employees' intention to comply with IS policies. Furthermore, individual work promotion focus moderated the relationship between role stress and IS compliance intention. These findings have important implications for organizations seeking to strengthen their IS compliance among employees and inform the development of effective IS strategies.

A Delphi study on how to vitalize the blockchain-based NFT

  • Sang-yub Han;Ho-kyoung Ryu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.77-87
    • /
    • 2024
  • In this paper, we propose a study applying the Delphi technique to domestic blockchain experts to determine urgent and pivotal conditions for NFT proliferation. We examine these conditions from a PEST (Political, Economic, Social, and Technological Analysis of the Macro Environment) perspective, as well as the functions of digital assets (measurement, storage, and exchange). Through two rounds of expert surveys on the seven NFT perspectives, we identify 6 activating factors that can help guide future policy-making for the NFT market. These factors have broad implications for the development of new industries using blockchain technology and tokens. The Delphi method employed in this study is a group discussion technique that gathers opinions from experts anonymously through two rounds and to address drawbacks related to expert selection bias and opinion alignment, additional opinion collection and review of projections were conducted in each round.

A Study on the Effectiveness of Virtual and Real Experience Type Safety Education at Construction Sites (건설현장에 접목한 가상체험·실물체험 안전교육의 효과성 연구)

  • Cho Choonhwan
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.6 no.1
    • /
    • pp.1-6
    • /
    • 2024
  • Existing safety education delivered to construction workers has limitations in concentration and immersion, so delivery power and interest are low. In order to improve the unstable behavior of construction workers and prevent safety accidents through education, a paradigm shift to hands-on education is necessary. Experiential safety education aims to contribute to the prevention of safety accidents and induce safe behavior by construction workers to recognize risks faster, select safe working methods suitable for the working environment, and improve emergency response and proactive response. Experiential education facilities have a follow-up learning effect in case of danger. The experience facility, which consists of the same working environment as the actual construction site, is designed to experience falls, equipment contraction, fire, and electric shock. In order to achieve the results of safety education that has invested a lot of time, construction workers must have motivation to participate, and "experiential safety education" through playful, deviant, and aesthetic experiences reduces serious accidents.

Study of the corrosion effect of CO2 stream with SO2 and NO2 on a phosphate coated steel tube (SO2 및 NO2 포함 고압 CO2 스트림이 인산염 코팅 CO2 수송관 부식에 미치는 영향)

  • Cho, Meang-Ik;Kang, Seong-Gil;Huh, Cheol;Baek, Jong-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.6973-6979
    • /
    • 2014
  • To mitigate global warming and climate change, many countries are investing massively on the development of CCS technology, which is assumed to be the key technology to reduce $CO_2$ emissions. CCS technology is comprised of the capture, transport, and storage processes. During the capture process, impurities other than $CO_2$ are inevitably flowed into the $CO_2$ stream. In the present study, corrosion characteristics of a phosphate coated tube for $CO_2$ transportation was investigated with a $CO_2$ stream composed of $CO_2$, $H_2O$, $SO_2$, and $NO_2$. The test specimen was a phosphate coated steel tube, which was filled with $CO_2$ stream with the impurities mentioned above. SEM-EDS analysis is conducted to investigate the corrosion behavior. The results showed that although the H2O concentration did not exceed the solubility limit, corrosion occurred in the specimen, which has an inflow of $SO_2$ or $NO_2$. This suggests that the $SO_2$, $NO_2$ and $H_2O$ concentration should be strictly controlled. These results suggest that the $SO_2$ and $NO_2$ concentration should be controlled below 175ppm and 65ppm, respectively.