• Title/Summary/Keyword: Checklists

Search Result 293, Processing Time 0.028 seconds

Development of an Improved Inspection System for Slopes adjacent to Educational Facilities (개선된 교육시설 인접 사면 점검체계 구축)

  • Ko, Jun-Young;Lee, Joon-Kyu;Park, Ku-Byoung;Lee, Byoung-Ho;Kim, Jae-Young
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.28 no.4
    • /
    • pp.3-10
    • /
    • 2021
  • This study presents an improved inspection system for slopes adjacent to educational facilities. For this, field investigations for 5 schools and 3 universities were performed to analyze the engineering stability of infrastructures, which ensure the safety of students and educational officers. Educational laws and the relevant enforcement are reviewed to understand the problems of current laws and enforcement. The results reveal that the engineering measures and reinforcement are required for the slopes of 36%. Also, the improvement of social awareness and regular inspection is needed to maintain the educational infrastructures. The suggested inspection system includes the fundamental and detailed checklists and guidance for non-engineering specialists.

A Study on Improvement of the Quality Management for Fire Doors (방화문의 현장품질관리 개선방안에 관한 연구)

  • Choi, Dong-ho
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.05a
    • /
    • pp.93-94
    • /
    • 2019
  • When the fire door is recently installed in the field, there are frequent cases where the fire door is manufactured with fire door having low quality or different structure compared to the performance that the fire door producer has confirmed in the performance test or the construction specification. In order to improve the on-site quality management of the fire door, we comprehensively classify the quality management items of the fire door according to the management subject and the step by stage and set the field quality management procedure, the field quality management inspection item, regulations and standardized checklists were presented.

  • PDF

韓國産 地下性 動物의 檢討와 目錄: I. 無脊椎動物(昆類 제외) 및 哺乳類

  • Lee, Byung-Hoon
    • The Korean Journal of Zoology
    • /
    • v.21 no.3
    • /
    • pp.103-125
    • /
    • 1978
  • The present papers (I and UU) deal with the total records of Korean subterranean animals reported during the last forty years since its first one in 1938 through 1978. They have been published in 33 different articles by 29 authors from 7 different countries. They enlist 109 species in 53 families in 7 classes belonging to 3 different phyla collected from 45 caves and 9 wells around the country. Predominant are arthropods enumerating 101 species (92.7%), of which insects are represented by 37 species. The number of species reported exclusively from subterranean habitats, presumably troglobionts, amount to 60 (55%). Discussions regarding the systematic situation of each taxa in question are made and the rate of occurrences of totally subterranean animals is determined and compared by respective taxa in a few different geographic regions. Also checklists are prepared and given in systematic order, which are followed by general analysis. Some attempts are also made to give suggestions, hopefully, for the prograess and improvement of korean biospeleology. the present article, Part I, will be completed by Part II dealing with insects which sppears in the Korean Journal of Entomology Vol. 8, No. 2 of the 1978 edition.

  • PDF

DEVELOPMENT OF MOBILE APPLICATION BASED RFID AND BIM FOR DEFECT MANAGEMENT ON CONSTRUCTION FIELD

  • Oh-Seong Kwon;Hwi-Gyoung Ko;Hee-Taek Park;Chan-Sik Park
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.7-13
    • /
    • 2013
  • Recently, defect management have been considered as one of the major issues for more large-sized and complicated in domestic construction industry. However, the defect management have not been performed systematically because of special manpower, excessive amount of documents, 2D based inspection work, unclear traditional checklists, complicated work process and difficulty in communicating construction information. Therefore, the construction field manager could not performed the quality inspection and defect management work on time as well as the reliability of recorded quality and defect factors was decreased. The primary objective of this study is develop a Construction Defect Management Application CDMA) using a mobile (smartphone). The application can be sharing a huge information and communication technology based on RFID (Radio-Frequency Identification), BIM (Building Information Modeling) which enables field mangers to efficiently gather the information of defection in construction on-site.

  • PDF

A Basic Study on the Safety Management and Quantification of Vulnerability Factors in Small-size Old Buildings (소규모 노후 건축물 안전관리 및 취약성 요소 정량화 기본연구)

  • Goh, Wolsan;Oh, Gyuho;Ahn, Sungjin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2023.11a
    • /
    • pp.249-250
    • /
    • 2023
  • The vulnerability factor analysis and risk quantification model for aging buildings presented in this study can be utilized by governmental agencies such as the Facility Safety Foundation, the Ministry of Land, Infrastructure and Transport, and various local governments. Policymakers can use this to supplement inadequacies in existing checklists, and it is expected that they can proactively prevent risks by evaluating dangers based on specific aging characteristics of buildings.

  • PDF

Developing the Test Module of LSAM for $Hipass^{PLUS}$ Card System (하이패스플러스카드 시스템을 위한 LSAM시험 및 모듈 개발)

  • Lee Ki-Han;Yoon Hyun-Tak;Kim Jae-Uoong;Lee Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.1 s.4
    • /
    • pp.1-12
    • /
    • 2004
  • Recently, the Korea Highway Company is replacing their prepaid plastic cards with a smart card, called $Hipass^{PLUS}$ Card. In order to use $Hipass^{PLUS}$Card in the prepaid payment system, LSAM, which is to store the value into $Hipass^{PLUS}$ Card is needed. LSAM is also responsible to store or retrieve the value from PPSAM. For the safety of Korea Highway electronic payment system, the functionality and security of LSAM should be faultless. This paper developed a test module including the test method, the test checklist, and the test procedure. The test module examines the functionality and security of loading the value from PPSAM to LSAM, retrieving the value from LSAM to PPSAM, and loading the value from LSAM to $Hipass^{PLUS}$ Card. The test module contains the method and the procedure to test the standard items by the test checklists. The test items and test checklists of LSAM was selected under the provision of the specification of Korea Highway Company and ISO standard. The test module evaluates the functionality, the security and the compatibility of LSAM. After the evaluation test of LSAM using the test module, LSAM satisfied the characteristics of the functionality, security, and compatibility.

  • PDF

Developing the Test Module of PSAM for $Hipass^{PLUS}$ Card System (하이패스플러스카드 시스템을 위한 PSAM 시험 모듈 개발)

  • Lee Ki-Han;Suh Hyun Kyo;Yoo Chang Hee;Lee Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.73-84
    • /
    • 2003
  • Due to the problems of existing prepaid plastic card issued by Korea Highway Company, the prepaid electronic payment system using a smart card, called HipassPLUS Card, was developed to overcome the Problems. PSAM is one of the main component of the systea which can retrieve the value from HipassPLUS card, transmit the transaction data to CSAM, and store the accumulated account lists. For the safety of the elecoonic payment system, the functions of PSAM should be faultless. This paper developed a test module including the test method, the test checklist, and the test procedure. The test module examines the functionality and security of the payment mechanism to insure that the value stored in HipassPLUS card can be raid to PSAM by the merchants and the standardized SAM. The test module also inspects the transmission mechanism to send and store the transaction data kom PShM to CSAM correctly and safely. Ihe module is designed to test the standard items using the test checklists for PSAM. The test items and the test checklists of PShM was selected under the provision of the specification of Korea Highway Company and ISO standard. Ihe evaluation on PSAM using the test module indicates that PSAM satisfies the evaluation criteria on the quality characteristics of the functionality, security, and compatibility.

  • PDF

A Study on the Methodology of Manufacturing Readiness Levels(MRLs) 8 of Manufacturing Readiness Assessment(MRA) (제조성숙도평가 MRL8 평가 방법론에 관한 연구)

  • Lee, Ji Hyeog;Jung, Yeong Tak;Lim, Jae Seong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.609-619
    • /
    • 2017
  • A Manufacturing Readiness Assessment (MRA) was adapted to prevent the probable ascending expense, poor quality, and delay from the development to production phase and assess the level of manufacturing readiness in 2012. Consequently, there are positive effects on improving the quality to identify the manufacturing risks during the production of military supplies and manage the issues in advance. On the other hand, because the appraisee is becoming accustomed to preparing for MRA checklists tailoring, it was found to intensify the MRA points more than before, which damages the goal of the MRA. This paper proposes the quantitative MRA methodology using MWV (Manufacturing Readiness Level 8 Weighted Value) to define and measure the HOM8, DOM8, ICOM8, and M8RA to reflect the history of MRA, the difficulties of MRA checklists, the intrinsic cruciallity and risk assessment of program, which can overcome the problems mentioned before. This paper shows the MWV of four weapon system programs to be carried out and an analysis of the proposed MRL 8 methodology.

A Study on the Classification of OVAL Definitions for the Application of SCAP to the Korea Security Evaluation System (국내 보안평가체제에 SCAP을 활용하기 위한 OVAL 정의 분류 연구)

  • Kim, Se-Eun;Park, Hyun-Kyung;Ahn, Hyo-Beom
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.54-61
    • /
    • 2022
  • With the increase in the types of information systems managed by public institutions and companies, a security certification system is being implemented in Korea to quickly respond to vulnerabilities that may arise due to insufficient security checks. The korea security evaluation system, such as ISMS-P, performs a systematic security evaluation for each category by dividing the categories for technical inspection items. NIST in the United States has developed SCAP that can create security checklists and automate vulnerability checks, and the security checklists used for SCAP can be written in OVAL. Each manufacturer prepares a security check list and shares it through the SCAP community, but it's difficult to use it in Korea because it is not categorized according to the korea security evaluation system. Therefore, in this paper, we present a mechanism to categorize the OVAL definition, which is an inspection item written in OVAL, to apply SCAP to the korea security evaluation system. It was shown that 189 out of 230 items of the Red Hat 8 STIG file could be applied to the korea security evaluation system, and the statistics of the categorized Redhat definition file could be analyzed to confirm the trend of system vulnerabilities by category.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.