• Title/Summary/Keyword: Container Security

Search Result 111, Processing Time 0.026 seconds

A Study on Risk Assessment of Container Terminals and Application of Industrial Safety AI Chatbot Technology (컨테이너 터미널의 위험성평가 및 산업안전 AI 챗봇기술 적용방안 연구)

  • Hwi Jin Kang;Sang Jun Han
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.57-69
    • /
    • 2022
  • During the 10 years from 2011 to 2021, a whopping 2,800 people were killed or injured during port work. Among them, the frequency of occurrence at the port loading and unloading business is high. Container terminal operators must conduct risk assessments and establish reasonable safety measures in accordance with laws and regulations. As a research method, the contents of risk assessment presented in the Industrial Safety and Health Act, the Serious Accident Punishment Act, and the Special Act on Port Safety are presented through literature analysis. In this study, previous studies were analyzed to examine the risk assessment method and risk factors of container terminals. The purpose is to present 'industrial safety AI chatbot technology' that can improve the risk of safety accidents.

An Exploratory Study on the Determinants of Manpower Utilization of Container Terminals in the Busan Port and Gwangyang Port (컨테이너 터미널 인력운영 변화요인의 탐색적 연구 -부산항과 광양항을 중심으로-)

  • Kang, Hye-Won;Sim, Min-Seop;Kim, Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.37 no.1
    • /
    • pp.121-142
    • /
    • 2021
  • The purpose of this study is to identify environmental factors affecting manpower utilization of container terminals. 300 questionnaires were distributed to employees working in terminal operators in Busan and Gwangyang port. Based on the results of multiple regression analysis, first, it is proved that technology development, organizational culture and social·external environment have a significant impact on manpower utilization of container terminals. Second, this study found that technology development and social·external environment have a significant impact on manpower utilization of container terminals system. Third, it is found that technology development, social·external environment, safety and security change the composition of the workforce between office and field employees. Forth, the number of workforce is expected to gradually decrease due to technology development. Finally, it is found that technology development, organizational culture, social·external environment and terminal operation have a impact on specialization and training system of human resoures.

A Study on Activation Characteristics Generated by 9 MeV Electron Linear Accelerator for Container Security Inspection (컨테이너 보안 검색용 9 MeV 전자 선형가속기에서 발생한 방사화 특성평가에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-Hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.5
    • /
    • pp.563-575
    • /
    • 2020
  • The purpose of this study is to evaluate the activation characteristics that occur in a linear accelerator for container security inspection. In the computer simulation design, first, the targets consisted of a tungsten (Z=74) single material target and a tungsten (Z=74) and copper (Z=29) composite target. Second, the fan beam collimator was composed of a single material of lead (Z=82) and a composite material of tungsten (Z-74) and lead (Z=82) depending on the material. Final, the concrete in the room where the linear accelerator was located contained magnetite type and impurities. In the research method, first, the optical neutron flux was calculated using the MCNP6 code as a F4 Tally for the linear accelerator and structure. Second, the photoneutron flux calculated from the MCNP6 code was applied to FISPACT-II to evaluate the activation product. Final, the decommissioning evaluation was conducted through the specific activity of the activation product. As a result, first, it was the most common in photoneutron targets, followed by a collimator and a concrete 10 cm deep. Second, activation products were produced as by-products of W-181 in tungsten targets and collimator, and Co-60, Ni-63, Cs-134, Eu-152, Eu-154 nuclides in impurity-containing concrete. Final, it was found that the tungsten target satisfies the permissible concentration for self-disposal after 90 days upon decommissioning. These results could be confirmed that the photoneutron yield and degree of activation at 9 MeV energy were insignificant. However, it is thought that W-181 generated from the tungsten target and collimator of the linear accelerator may affect the exposure when disassembled for repair. Therefore, this study presents basic data on the management of activated parts of a linear accelerator for container security inspection. In addition, When decommissioning the linear accelerator for container security inspection, it is expected that it can be used to prove the standard that permissible concentration of self-disposal.

A Study on Evaluation Criteria and Procedures for Measuring Radiation Leakage of Aviation Security Equipment (항공보안장비 방사선 누출량 측정을 위한 평가 기준 및 절차에 관한 연구)

  • Kihyun Kim;Ye-Eun Jeong;Ye-Jun Kim;Yong Soo Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.3
    • /
    • pp.435-444
    • /
    • 2023
  • Purpose: To attain advanced performance certification, safety aspects along with functionality and performance are essential. Hence, this study suggests radiation leakage assessment methods for aviation security equipment during its performance certification. Methods: Detection technology guided the choice of radiation leakage assessment targets. We then detailed measurement and evaluation methods based on equipment type and operation mode. Equipment was categorized as container or box types for establishing measurement procedures. Results: We've developed specific radiation leakage assessment procedures for different types of aviation security equipment, crucial for ensuring airport safety. Using these procedures allows efficient evaluation of compliance with radiation leakage standards. Conclusion: The suggested radiation leakage assessment method aims to enhance aviation security and reliability. Future research will focus on identifying risks in novel aviation security equipment detection technologies and establishing safety standards.

Random Vibration Analysis of Portable Power Supply Container for Radar With U.S. Military Standards (미 군사규격을 적용한 레이더 전력공급용 이동식 컨테이너의 Random Vibration 해석)

  • Do, Jae-Seok;Hur, Jang-Wook
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.21 no.9
    • /
    • pp.71-77
    • /
    • 2022
  • In times of war or emergencies, weapon systems, such as radars, must receive stable power. This can be achieved using improved onboard portable power systems made of steel containers. However, a breakdown can occur in the event of random vibration during transportation via a vehicle or train. Electrical-power shortages or restrictions pose a significant threat to security. In this study, Composite Wheeled Vehicle(CWV) data and rail cargo data with Acceleration Spectral Density(ASD), specified in MIL-STD-810H METHOD 514.8, were interpreted as input data of the three-axis random vibration method using ANSYS 19.2. Modal analysis was performed up to 500 Hz, and deformations in modes 1 to 117 were calculated to utilize all ASD data. The maximum equivalent stress in the three-axis direction was obtained using a random vibration analysis. Similarly, the margin of safety was calculated using the derived equivalent stress and material properties. Overall, the analysis verified that the portable container designed for the power supply system satisfied the required vibration demands.

Development of Test Software Program and Digital Signal Processing Board for Array Module Signal Processing System (Array 검출 모듈 신호처리 시스템의 테스트 소프트웨어 프로그램 개발 및 디지털 신호처리 보드 개발)

  • Park, Geo;Kim, Young-kil;Lee, Jean
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.499-505
    • /
    • 2018
  • Shipping and logistics safety, security system is strengthening worldwide, the development of shipping and logistics safety security core technology for national security logistics system construction has been carried out. In addition, it is necessary to localize the Array Detection System, which is a core component of the container search machine, to cope with the 100% pre-inspection of the container scheduled for 2018 in the United States. In this research, we propose a test software program developed by using TI-RTOS (Texas Instruments - Real Time Operating System) with a test digital signal processing board which is developed self development. We have developed a program that can test GPIO, SRAM, TCP/IP, and SDcard using M4 MCU. Also we propose a study on a self-developed Digital Signal Processing Board among the array detection systems that replace foreign products. We have developed a test board that can test M4 MCU and developed an X-Ray Detector Digital Signal Processing Board that combines MCU and FPGA.

A study on Cloud Security based on Network Virtualization (네트워크 가상화 기반 클라우드 보안 구성에 관한 연구)

  • Sang-Beom Hong;Sung-Cheol Kim;Mi-Hwa Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • In the cloud computing environment, servers and applications can be set up within minutes, and recovery in case of fail ures has also become easier. Particularly, using virtual servers in the cloud is not only convenient but also cost-effective compared to the traditional approach of setting up physical servers just for temporary services. However, most of the und erlying networks and security systems that serve as the foundation for such servers and applications are primarily hardwa re-based, posing challenges when it comes to implementing cloud virtualization. Even within the cloud, there is a growing need for virtualization-based security and protection measures for elements like networks and security infrastructure. This paper discusses research on enhancing the security of cloud networks using network virtualization technology. I configured a secure network by leveraging virtualization technology, creating virtual servers and networks to provide various security benefits. Link virtualization and router virtualization were implemented to enhance security, utilizing the capabilities of virt ualization technology. The application of virtual firewall functionality to the configured network allowed for the isolation of the network. It is expected that based on these results, there will be a contribution towards overcoming security vulnerabil ities in the virtualized environment and proposing a management strategy for establishing a secure network.

Analysis of Technology for Secure Container with RFID (RFID를 활용한 컨테이너 보안기술의 현황분석)

  • Byeon, Eui-Seok;Byeon, Ji-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.11-16
    • /
    • 2011
  • Information of freight tracking and tracing is one of core elements in logistics point of view. We can monitor the vehicle or vessel where freights are loaded and get the in-transit data via GPS. However, security problem exists after the shipments are unloaded. RFID is well utilized for securing the container which products are stuffed into. International standard organization sets relevant specification and e-seal appears to be at issue. The paper investigates current status of corresponding technology and proposes the policy for development of logistics industry.

Analysis of the Customs Procedures Modification to facilitate the Movements of Goods (물류촉진형 통관제도 구축방안)

  • Baek, Seung-Rae;Yu, Song-Jin
    • Journal of Navigation and Port Research
    • /
    • v.32 no.8
    • /
    • pp.659-665
    • /
    • 2008
  • This thesis describes the key elements for efficient customs clearance system which can facilitate flow of maritime container cargo in the pier area of Busan port, on the basis of considering great changes on international trade environment, development of customs clearance system, variation of commercial container traffic, and diverse views originated from field experience in the distribution industry. To facilitate the flow of maritime containers, reform plan of bonded-transportation and import declaration is proposed to relieve the customs restriction during the days from discharging cargos to taking them into bonded warehouse. Also, various plans to strengthen maritime security, such as customs exam of high-risk export cargos in loading port, pre-declaration of transit container replacement, container tracing system, are proposed to improve Busan port's competitiveness in safety.

A Border Line-Based Pruning Scheme for Shortest Path Computations

  • Park, Jin-Kyu;Moon, Dae-Jin;Hwang, Een-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.939-955
    • /
    • 2010
  • With the progress of IT and mobile positioning technologies, various types of location-based services (LBS) have been proposed and implemented. Finding a shortest path between two nodes is one of the most fundamental tasks in many LBS related applications. So far, there have been many research efforts on the shortest path finding problem. For instance, $A^*$ algorithm estimates neighboring nodes using a heuristic function and selects minimum cost node as the closest one to the destination. Pruning method, which is known to outperform the A* algorithm, improves its routing performance by avoiding unnecessary exploration in the search space. For pruning, shortest paths for all node pairs in a map need to be pre-computed, from which a shortest path container is generated for each edge. The container for an edge consists of all the destination nodes whose shortest path passes through the edge and possibly some unnecessary nodes. These containers are used during routing to prune unnecessary node visits. However, this method shows poor performance as the number of unnecessary nodes included in the container increases. In this paper, we focus on this problem and propose a new border line-based pruning scheme for path routing which can reduce the number of unnecessary node visits significantly. Through extensive experiments on randomly-generated, various complexity of maps, we empirically find out optimal number of border lines for clipping containers and compare its performance with other methods.