• Title/Summary/Keyword: Disaster Communication

Search Result 611, Processing Time 0.025 seconds

The Study on the Analysis of Stormwater Runoff Using RMS (Remote Monitoring System) (원격수위계측기를 이용한 강우유출 분석에 관한 연구)

  • Ham, Kwang-Jun;Kim, Joon-Hyun;Yi, Geon-Ho;Choi, Ji-Yong;Jeong, Ui-Ho
    • Journal of Environmental Impact Assessment
    • /
    • v.13 no.6
    • /
    • pp.285-294
    • /
    • 2004
  • The purpose of this study is to understand the quantitative change of water resources using RMS(Remote Monitoring System) which takes real time data with high reliability. Also, the characteristic of stormwater runoff was understood by the application of the above system for three streams (Jiam, Yulmun, and Gongji stream) in Chuncheon City. The detailed results of these studies are as follows; RMS(Remote Monitoring System) was constructed by the combination of the automatic water-level meter, which measures water-level of streams at all times, and the wireless communication system sending real-time data from the meter. This system is used to evaluate the stormwater runoff in watersheds and the quantitative changes of streams. It is possible to overcome the limit of field investigations needed, which takes a lot of manpower and time, and it is very efficient to provide the reliable flowrate data. Also, it can be applied to the disaster prevention system for flood because the change of flowrate in stream is monitored at real-time. For 3 streams with different watershed characteristics, correlation equations induced from the relation analysis results. In terms of the relation between water-level and flowrate, flowrate was increased rapidly as the water-level rises in case of small watershed and steep slope. The application results of the proposed system for 3 streams (Jiam, Yulmun, Gongji) in Chuncheon city are as follows; The remote monitoring system was very useful for acquisition of the flow rate in stream that are basic data to understand pollutants runoff in watershed. In case of no-rainy day, the runoff ratio for pollutant loading rate was the highest level in Yulmun stream(BOD:2.3%, TN:20.2%, TP:1.2%). So, it shows the management of pollution source is needed such as rehabilitation of sewer line. Runoff ratio of total phosphorus by rainfall in Gongji watershed was increased about 19 times than no-rainy day, which is estimated as the influence of sewer overflow.

Comparison and Analysis of Techniques for Achieving Azimuth Resolution of Imaging Radar (영상레이다의 방위 해상도 구현기법 비교 분석)

  • Hong, In-Pyo;kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.2
    • /
    • pp.185-196
    • /
    • 1997
  • By considering the definition and application of resolution as well as the concept and theory of SAR, the essential contents of the SAR design and analysis are described. This paper is to compare and analyze the resolution performance capability of three techniques for achieving azimuth resolution such as the real aperture, the unfocused and the focused techniques, through the simulation. Simulation is performed to make the restricted conditions for the unfocused technique that can be implemented by the less commputing load of signal processingand the lower cost. Through the mission analysis, the use of SAR image can be applied for estimation of whole situation at the regional area in the field of military demands for tactical purpose as well as civilian demands for the damage of disaster. RPV and sall or medium aircraft are selected to carry the SAR for these purposes and the proper resolution turns ou 5~15 m. The trade-off study of variables through the simulations results in the proper conditions such that range is less 3, 000 m, Wavelength is 1~10 m, and the raw signals and results processed by three techniques for two point targets are exhibited undr such conditions. Therefore, at some points, the result of this paper si proposed for useful applications of unforcused technique in the restricted conditions except the identification of the small target at a long range re- quired for high resolution.

  • PDF

A Study on the Combination of the Existing Monitoring System with the Safety Management Network System (기구축 계측시스템의 안전관리 네트워크 시스템 연계 방안에 관한 연구)

  • Lee, Chin-Hyung;Park, Ki-Tae;You, Young-Jun;Joo, Bong-Chul;Hwang, Yoon-Koog;Bae, In-Hwan
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.3
    • /
    • pp.47-53
    • /
    • 2009
  • This study performed the construction of test bed for the combination of the health monitoring system In Yongjong grand bridge with the safety management network system in order to explore the feasibility of combining the existing monitoring system with the safety management network system. For this purpose, connection program which consists of DAQ sender server program and DAQ receiver server program has been developed. DAQ sender server program installed in the connection server, which is located on the DMZ zone of the existing monitoring system, plays the role of communicating with the monitoring system. On the other hand, DAQ receiver server program installed in the connection server, which is located on the integrated operation center of the safety management network system, plays the part of gathering real time and tim history data of the existing monitoring system and storing them in the integrated operation server through the communication with the DAQ sender. Test bed demonstrated the feasibility of combining the existing monitoring system with the safety management network system.

  • PDF

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

Energy and Delay-Efficient Multipath Routing Protocol for Supporting Mobile Sink in Wireless Sensor Networks (무선 센서 네트워크에서 이동 싱크를 지원하기 위한 다중 경로 라우팅 프로토콜)

  • Lee, Hyun Kyu;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.447-454
    • /
    • 2016
  • The research on multipath routing has been studied to solve the problem of frequent path breakages due to node and link failures and to enhance data delivery reliability in wireless sensor networks. In the multipath routing, mobile sinks such as soldiers in battle fields and rescuers in disaster areas bring about new challenge for handling their mobility. The sink mobility requests new multipath construction from sources to mobile sinks according to their movement path. Since mobile sinks have continuous mobility, the existing multipath can be exploited to efficiently reconstruct to new positions of mobile sinks. However, the previous protocols do not address this issue. Thus, we proposed an efficient multipath reconstruction protocol called LGMR for mobile sinks in wireless sensor networks. The LGMR address three multipath reconstruction methods based on movement types of mobile sinks: a single hop movement-based local multipath reconstruction, a multiple hop movement-based local multipath reconstruction, and a multiple hop movement-based global multipath reconstruction. Simulation results showed that the LGMR has better performance than the previous protocol in terms of energy consumption and data delivery delay.

Deployment Strategies of Cloud Computing System for Defense Infrastructure Enhanced with High Availability (고가용성 보장형 국방 클라우드 시스템 도입 전략)

  • Kang, Ki-Wan;Park, Jun-Gyu;Lee, Sang-Hoon;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.3
    • /
    • pp.7-15
    • /
    • 2019
  • Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.

A Study on the Measurement and Comparison(IEC 60079-32-2) of Flammable Liquid Conductivity (인화성 액체 도전율에 관한 측정 및 비교(IEC 60079-32-2) 연구)

  • Lee, Dong Hoon;Byeon, Junghwan
    • Journal of the Korean Society of Safety
    • /
    • v.34 no.4
    • /
    • pp.22-31
    • /
    • 2019
  • The flammable liquid conductivity is an important factor in determining the generation of electrostatic in fire and explosion hazardous areas, so it is necessary to study the physical properties of flammable liquids. In particular, the relevant liquid conductivity in the process of handling flammable liquids in relation to the risk assessment and risk control in fire and explosion hazard areas, such as chemical plants, is classified as a main evaluation item according to the IEC standard, and it is necessary to have flammable liquid conductivity measuring devices and related data are required depending on the handling conditions of the material, such as temperature and mixing ratio for preventing the fire and explosion related to electrostatic. In addition, IEC 60079-32-2 [Explosive Atmospheres-Part 32-2 (Electrostatic hazards-Tests)] refers to the measuring device standard and the conductivity of a single substance. It was concluded that there is no measurement data according to the handling conditions such as mixing ratio of flammable liquid and temperature together with the use and measurement examples. We have developed the measurement reliability by improving the structure, material and measurement method of measuring device by referring to the IEC standard. We have developed a measurement device that is developed and manufactured by itself. The test results of flammable liquid conductivity measurement and the data of the NFPA 77 (Recommended Practice on Static Electricity) Annex B Table B.2 Static Electric Characteristic of Liquids were compared and verified by conducting the conductivity measurement of the flammable liquid handled in the fire and explosion hazardous place by using Measuring / Data Acquisition / Processing / PC Communication. It will contribute to the prevention of static electricity related disaster by taking preliminary measures for fire and explosion prevention by providing technical guidance for static electricity risk assessment and risk control through flammable liquid conductivity measurement experiment. In addition, based on the experimental results, it is possible to create a big data base by constructing electrostatic physical characteristic data of flammable liquids by process and material. Also, it is analyzed that it will contribute to the foundation composition for adding the specific information of conductivity of flammable liquid to the physical and chemical characteristics of MSDS.

Analysis of the Information in the COVID-19 Emergency Alert : Focusing on Essential Information Factors and Privacy Invasion Information Factors (코로나19 안전안내문자 정보 속성 분석 : 필수 정보 요인과 프라이버시 침해 정보 요인을 중심으로)

  • Kim, Minjin;Kim, Miyea;Kim, Beomsoo
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.227-246
    • /
    • 2021
  • In the context of the global pandemic caused by COVID-19, emergency alert text messages can violate the privacy of confirmed corona positive cases. This study used conjoint analysis to identify the essential information factors and the privacy invasion information factors of local government initiated safety notices. As a result of this study, we found eight essential information factors, including all routes of the confirmed case and ten privacy invasion factors of safety notices. In addition, we found that there is a similarity between the combinations of information perceived to be the most essential and perceived as the most significant privacy invasion; both combinations include the confirmed case's personal and route information. This study ultimately tried to suggest a way to lower the concern about privacy invasion of the confirmed cases without damaging the emergency alert text messages' essential information. We expect that this study will provide researchers and policymakers interested in disaster communication with valuable theoretical and practical implications.

A Study on the Improvement of the Effectiveness of Safety and Health Education for Supervisors (관리감독자 대상 안전보건교육의 실효성 증진 방안 연구)

  • Lee, Myeong-Gu;Jeong, Myeong-Jin;Kim, Chang-Wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.361-366
    • /
    • 2022
  • Although safety and health education is reported to be very effective in reducing the industrial accident rate, the demand for improvement in safety and health education is also very high. The purpose of this study is to present measures to enhance effectiveness by investigating the effectiveness and demand for safety and health education for supervisors among the safety and health education systems. As a result of the study, it was found that the satisfaction and effectiveness of safety and health education were low. As the most important competency required for supervisors, it was investigated that job competency was the ability to discover harmful risk factors and formulate disaster prevention measures in the work process and work environment, and base competency was communication ability. In addition to designated safety and health education institutions, there was a high demand for recognition as education completion time even when professional education by job was completed by other professional education institutions. Therefore, in safety and health education for supervisors, it is necessary to focus on major items to improve supervisors' job competency and base competency, and to recognize that they have completed education at a wide range of educational institutions. We believe that it can increase the supervisor's capacity for safety management and improve the effectiveness of safety and health education.

A Study on Flood Susceptibility of Heritage Sites by Heritage Type Depending on Locational Characteristics (입지특성에 따른 문화재 유형별 홍수 민감성 기초연구)

  • Kim, Ji-Soo
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.40 no.3
    • /
    • pp.46-56
    • /
    • 2022
  • This study aimed to analyze the locational characteristics of heritage sites in Seoul in order to identify flood susceptibility by type. As for the location factors related to flood susceptibility, elevation, slope, distance to streams, and topographic location were analyzed. Literature review was supplemented for the historical and humanistic environments of heritage sites. The results of the study are as follows. First, heritage sites in Seoul are distributed throughout the city, and are especially highly dense in the Hanyangdoseong fortress. It was also confirmed that heritage sites were concentrated around Jung-gu, Jongno-gu, Jingwan-dong, and Ui-dong in the quantitative spatial analyses. Second, types of heritage sites at the circumstance susceptible to flood damage were related to commerce and distribution, traffic, modern traffic and communication, geological monument, residence, government office, and palace. Third, heritage types with locational characteristics that showed low flood susceptibility were found to be natural scenic spots, telecommunication, ceramics, Buddhism, tombs, and tomb sculptural heritage assets. In a time when risk factors that can damage the value of heritage are gradually increasing due to anthropogenic influences along with changes in the natural environment, this study provides basic data for vulnerability analysis that reflects the unique characteristics of heritage assets. The results can contribute to more comprehensive and comprehensive insights for the management and protection of heritage by including the humanities and social science data together with natural factors in the analysis.