• Title/Summary/Keyword: Accident response system

Search Result 300, Processing Time 0.023 seconds

Reduced Order Luenberger State Observer Design for the Jackknifing Phenomenon Prevention of Articulated Vehicles using GPS (위성항법시스템을 이용한 연결식 차량의 잭나이핑 현상 예방을 위한 축소차수 상태관측기 설계)

  • Lee, Byung-Seok;Heo, Moon-Beom
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.7
    • /
    • pp.688-698
    • /
    • 2012
  • This paper deals with ROLSO (Reduced Order Luenberger State Observer) design to prevent jackknifing phenomenon of articulated vehicles consisting of the tractor and semi-trailer by using GPS. In addition, by applying the regulator system using ROLSO feedback system, simulation's result presents that articulated vehicle's states are stabilized than the human's PR time (Preception Response time) rapidly. This simulation verifies that the automatic control of articulated vehicle's can be applied for the accident prevention for the time that the driver is unable to manage with the sudden accident. For this simulation, by using the equation of planar motion, the modeling of the articulated vehicle was performed. This modeling was expressed in the state space model. And FOLSO (Full Order Luenberger State Observer), ROLSO were designed by using the state space model of an articulated vehicle's dynamics.

A Study on Development of Open-Phase Protector Having Leakage Current Generation and Incapable Operation Prevention at Open-Phase Accident (결상 시 누전전류 발생과 오동작 방지 기능을 갖는 결상보호기 개발에 관한 연구)

  • Kwak, Dong-Kurl
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.1
    • /
    • pp.182-187
    • /
    • 2015
  • In the three-phase power system, when any one-phase or two-phases is open-phase, the unbalanced current flows and the single-phase power supplies to three-phase loads. Specially, motor coil and transformer coil receive over-current. As a result, great damage as well as electrical fire can occur to the power system. In order to improve these problems, this paper proposes that an open-phase detection device is designed by a new algorithm using electric potential difference between the resultant voltage of neutral point and ground, and a control circuit topology of open-phase protector is composed of highly efficient semiconductor devices. It improves response speed and reliability. The control algorithm circuit also operates the cut-off of a conventional residual current protective device (RCD) which flows an enforced leakage current to ground wire at open-phase accident. Furthermore, time delay circuit is added to prevent the incapable operation of open-phase protector about instantaneous open-phase not open-phase fault. The time delay circuit improves more reliability.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

A Study on the Monitoring Criteria of Disaster Signs for Early-warning System based on Multiple Hazardous Gas Sensor (복합 유해 가스 센서 기반의 조기 경보 시스템을 위한 재난 전조 감시 기준에 관한 연구)

  • Han, Kyusang;Park, Sosoon;Yoon, En Sup
    • Journal of the Korean Institute of Gas
    • /
    • v.17 no.2
    • /
    • pp.28-35
    • /
    • 2013
  • The number of large and complex buildings is growing and they are usually concentrated in metropolitan cities. There is a possibility in such buildings that a small accident can expand to a massive disaster since their scale and complexity. To deal with this issue, a research on gas sensors which can detect multiple gases and early-warning systems has been conducted. Proper criteria or standards are necessary for effective application and operation of such sensor-based disaster monitoring system. In this study, we have proposed the alarm criteria of concentration of hazardous gases for the detection and the alarm release. For each alarm level, systematic disaster response plans consist of responsive actions and information delivery have been prepared. These disaster monitoring criteria can help the detection of hazardous gas-related disaster in the early stage of accident and the provision of appropriate emergency responses.

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

The Study on Local Government's Disaster Safety Governance using Big Data (빅데이터를 활용한 지방정부 재난안전 거버넌스 -서울시를 중심으로-)

  • Kim, Young-mi
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • In order to establish and operate a rapid and effective disaster safety management system in an emergency situation that threatens the safety of citizens, such as disaster, accident or terrorism, appropriate responses are necessary. An integrated task execution system for rapid response and restoration should be implemented not only by the central ministries related to disaster management and response, but also by local governments, NGO, and individuals, under clear role sharing. In the case of Seoul city, it is urgent to establish an effective disaster management system for preventing and responding to disasters, because of the increasing possibility of natural disasters due to climate change, the threat of terrorism, urban decay and the industrial accidents. From the perspective of governance, this study tried to seek out countermeasures such as disaster response system and command system at disaster site centering on Seoul city government interdepartmental organization system, implementation process and systematization of response procedures.

Development and Validation of a Practical Instrument for Injury Prevention: The Occupational Safety and Health Monitoring and Assessment Tool (OSH-MAT)

  • Sun, Yi;Arning, Martin;Bochmann, Frank;Borger, Jutta;Heitmann, Thomas
    • Safety and Health at Work
    • /
    • v.9 no.2
    • /
    • pp.140-143
    • /
    • 2018
  • Background: The Occupational Safety and Health Monitoring and Assessment Tool (OSH-MAT) is a practical instrument that is currently used in the German woodworking and metalworking industries to monitor safety conditions at workplaces. The 12-item scoring system has three subscales rating technical, organizational, and personnel-related conditions in a company. Each item has a rating value ranging from 1 to 9, with higher values indicating higher standard of safety conditions. Methods: The reliability of this instrument was evaluated in a cross-sectional survey among 128 companies and its validity among 30,514 companies. The inter-rater reliability of the instrument was examined independently and simultaneously by two well-trained safety engineers. Agreement between the double ratings was quantified by the intraclass correlation coefficient and absolute agreement of the rating values. The content validity of the OSH-MAT was evaluated by quantifying the association between OSH-MAT values and 5-year average injury rates by Poisson regression analysis adjusted for the size of the companies and industrial sectors. The construct validity of OSH-MAT was examined by principle component factor analysis. Results: Our analysis indicated good to very good inter-rater reliability (intraclass correlation coefficient = 0.64-0.74) of OSH-MAT values with an absolute agreement of between 72% and 81%. Factor analysis identified three component subscales that met exactly the structure theory of this instrument. The Poisson regression analysis demonstrated a statistically significant exposure-response relationship between OSH-MAT values and the 5-year average injury rates. Conclusion: These analyses indicate that OSH-MAT is a valid and reliable instrument that can be used effectively to monitor safety conditions at workplaces.

Oil spill accident and prevention system of marine pollution (유류오염사고와 해양오염 방제시스템)

  • Gang, Yeong-Seung
    • Journal of the Korean Professional Engineers Association
    • /
    • v.41 no.2
    • /
    • pp.64-67
    • /
    • 2008
  • According to grow maritime activities in coastal zone, a threat increase to the marine environment from oil spill. The success or failure of initial effort depends on the adequacy of the plan and the ability of immediate execution. Successful response to oil spills requires critical information in real time topics, including spill data, environmental conditions, ecological factors. Diverse simulation provides tactical decision-makers with the information on the movement of pollutant.

  • PDF

Analysis of articles on water quality accidents in the water distribution networks using big data topic modelling and sentiment analysis (빅데이터 토픽모델링과 감성분석을 활용한 물공급과정에서의 수질사고 기사 분석)

  • Hong, Sung-Jin;Yoo, Do-Guen
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.spc1
    • /
    • pp.1235-1249
    • /
    • 2022
  • This study applied the web crawling technique for extracting big data news on water quality accidents in the water supply system and presented the algorithm in a procedural way to obtain accurate water quality accident news. In addition, in the case of a large-scale water quality accident, development patterns such as accident recognition, accident spread, accident response, and accident resolution appear according to the occurrence of an accident. That is, the analysis of the development of water quality accidents through key keywords and sentiment analysis for each stage was carried out in detail based on case studies, and the meanings were analyzed and derived. The proposed methodology was applied to the larval accident period of Incheon Metropolitan City in 2020 and analyzed. As a result, in a situation where the disclosure of information that directly affects consumers, such as water quality accidents, is restricted, the tone of news articles and media reports about water quality accidents with long-term damage in the event of an accident and the degree of consumer pride clearly change over time. could check This suggests the need to prepare consumer-centered policies to increase consumer positivity, although rapid restoration of facilities is very important for the development of water quality accidents from the supplier's point of view.