• 제목/요약/키워드: Effectiveness secure

검색결과 290건 처리시간 0.04초

군 동원제도의 시대적 고찰과 발전방안에 대한 연구 (Army mobilization system for the direction of research and development study period)

  • 정재극
    • 융합보안논문지
    • /
    • 제13권5호
    • /
    • pp.77-87
    • /
    • 2013
  • 동원은 전시 또는 이에 준하는 국가비상사태시에 국가의 모든 인적, 물적 자원을 효율적으로 통제, 관리 운영하는 국가의 권력 작용으로 정의된다. 따라서 동원태서의 완비는 전쟁에서 승리하는 것 뿐만 아니라 전쟁을 억제하고 평시 국가 경제를 발전시키는 원동력이 될 수 있다. 동원제도의 연구방향은 민 관 군의 통합된 계획과 집행에 의해 이루어져야 신속성과 효율성이 증대될 수 있기 때문에 법적, 제도적 정비를 통하여 발전되어야 할 것이다. 통일이 되더라도 동원제도에 대한 관심과 연구는 지속적으로 필요하다.

VR기법을 활용한 엘리베이터 피난 성능평가에 관한 연구 (Study for Using VR Techniques Performance Evaluation of the Elevator Evacuation)

  • 노세호;윤성욱;이동호
    • 한국화재소방학회논문지
    • /
    • 제25권1호
    • /
    • pp.13-18
    • /
    • 2011
  • 방재설계를 하는데 있어서 피난의 주체인 재실자가 화재시 신속하고 안전하게 피난 가능 하도록 피난방법의 최적으로 정립하는 것이 핵심적 사항이다. 건설 기술의 발전으로 많은 초고층 건축물이 세워지고, 초고층 건축물은 다양한 위험을 내포하고 있으며 재해의 정도를 증대시키고 있다. 초고층 건축물의 기본 설계 단계에서, 화재시 재실자가 피난 계단과 엘리베이터를 동시에 시용하여 피난하는 것을 고려 할 수 있으나, 이러한 피난 계단과 엘리베이터를 동시에 이용안 대피 성능 평가는 적립되어 있지 않다. 본 연구에서는 Virtools를 이용한 VR 기법을 사용하여 화재시 재실자가 비상 엘리베이터 및 피난계단을 동시에 이용하여 피난 할 경우에 대한 대피성능평가를 시뮬레이션을 통하여 분석하였다.

Two-Stage Model for Security Network-Constrained Market Auction in Pool-Based Electricity Market

  • Kim, Mun-Kyeom
    • Journal of Electrical Engineering and Technology
    • /
    • 제12권6호
    • /
    • pp.2196-2207
    • /
    • 2017
  • This paper presents a two-stage market auction model in a pool-based electricity market, which explicitly takes into account the system network security. The security network-constrained market auction model considers the use of corrective control to yield economically efficient actions in the post-contingency state, while ensuring a certain security level. Under this framework, the proposed model shows not only for quantifying the correlation between secure system operation and efficient market operation, but also for providing transparent information on the pricing system security for market participants. The two-stage market auction procedure is formulated using Benders decomposition (BD). In the first stage, the market participants bid in the market for maximizing their profit, and the independent system operator (ISO) clears the market based on social welfare maximization. System network constraints incorporating post-contingency control actions are described in the second stage of the market auction procedure. The market solutions, along with the BD, yield nodal spot prices (NSPs) and nodal congestion prices (NCPs) as byproducts of the proposed two-stage market auction model. Two benchmark systems are used to test and demonstrate the effectiveness of the proposed model.

농촌 고령자 공동시설지원 시범사업 주민만족도 조사 연구 (A Study on the Inhabitant's Satisfaction of Community Facilities Demonstration Project for Rural Elderly)

  • 김진환;박중신;송서호
    • 한국농촌건축학회논문집
    • /
    • 제17권4호
    • /
    • pp.9-16
    • /
    • 2015
  • This study examined the current conditions of the community facilities constructed by demonstration project for rural elderly that were promoted for the last two years by the ministry of agriculture, food and rural affairs. The type of community facilities are community living home, community food service facility and small bath house. And it was accomplished satisfaction survey for analyzing the effects of demonstration project focused on inhabitants and users of community facilities constructed by demonstration project. The results are as follows. First, The satisfaction index of community facilities was evaluated high level in generally. Second, Inhabitants and users of facilities were presented high level satisfaction in humanity sector, especially. Third, It should be to establish maintenance and management plan such as supporting of linkage program and operation cost for secure the sustainability. Consequently, the implementation of community facilities demonstration project to improve the living conditions of rural elderly is entirely appropriate. The results of this study were considered to promoting demonstration project for improving quality of the facilities and securing effectiveness of the project.

전자정부 소프트웨어의 보안약점 진단도구 평가방법론 (Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software)

  • 방지호;하란
    • 한국통신학회논문지
    • /
    • 제38C권4호
    • /
    • pp.335-343
    • /
    • 2013
  • SW 개발단계에서 사이버침해사고의 주요 원인인 SW 보안약점을 진단하여 제거하면 사이버침해사고를 효과적으로 예방할 수 있다. 국내의 경우, SW 개발보안 적용이 의무화되어 SW 보안약점을 제거하는 것이 필수사항이 되었다. 효과적으로 SW 보안약점을 진단하여 제거하기 위해서는 신뢰된 SW 보안약점 진단도구의 도움이 필요하다. 따라서, 본 논문은 국내환경에 적합한 진단도구 기능 요구사항과 진단도구의 신뢰성을 보증할 수 있는 평가방법론을 제안한다. 그리고, 제안된 평가체계의 효과를 분석하기 위한 시범 적용한 결과 및 절차를 제시한다.

선체 주변에서의 전자자기 컴퍼스의 선수방위 자차변화 (The Varies of Deviation on the Ship's Head up bearing of the electromagnetic Compass around Ship)

  • 조현정;신형일
    • 수산해양기술연구
    • /
    • 제35권1호
    • /
    • pp.11-18
    • /
    • 1999
  • In order to secure accuracy and effectiveness of the electromagnetic compass as information sensor for ship's head up bearing with gyro compass, magnetic compass and electromagnetic compass on the sea and on the dock in land.The results obtained were as follows;1. Between the Northeast and the southsouthwest the deviation on ship's head up bearing on electromagnetic compass got easterly deviation with max. $53^{\cire}$on the East and between the Southwest and the Northnortheast westerly deviation with max. $34^{\cire}$ on the Northwest, of which values were not able to be corrected due to the angle excess of deviation adjustment.2. The varies of deviation seemed to have a tendency to increase easterly deviation on the Northeast and the East, easterly deviation after westerly deviation between the South and the Northwest, small one on the North and the Southeast.3. The varies of deviation of ship were larger than the one of around the dock, were extreme on the bow of forecastle deck and were stable on the ship's center line of compass deck at the dock in land.

  • PDF

BYOD 환경을 고려한 모바일 웹을 위한 세션 관리 개선 방안 연구 (A Study of Improved Session Management for Mobile Web under BYOD environment)

  • 김영훈;박용석
    • 한국정보통신학회논문지
    • /
    • 제19권5호
    • /
    • pp.1117-1124
    • /
    • 2015
  • 본 논문은 BYOD(Bring Your Own Device)를 포함한 모바일 웹 환경을 위한 웹 세션 관리 시스템에 대해서 기술한다. 이 시스템은 보안이 강화된 세션 토큰으로 운영되며, 고유 식별자, time stamp, 암호 알고리즘으로 구성된다. 시스템에서 고유 식발자는 BYOD를 포함한 모바일 환경에서 보안을 위하여 각 단말기를 구분한다. 시스템에서 time stamp는 BYOD를 포함한 모바일 환경에서 보안을 위하여 세션 유효성을 판단한다. 시스템에서 암호 알고리즘은 세션 토큰의 내부 정보를 보호한다. 본 논문은 시뮬레이션 기법을 사용해서 모바일 웹 상에서 세션 관리 시스템의 보안성을 분석한다. 제시된 방법은 기존 방법에 비하여 BYOD 환경의 모바일 웹 보안에 있어서 더 적합하다.

Vibration control in wind turbines for performance enhancement: A comparative study

  • Rezaee, Milad;Aly, Aly Mousaad
    • Wind and Structures
    • /
    • 제22권1호
    • /
    • pp.107-131
    • /
    • 2016
  • The need for a more affordable, reliable, clean and secure energy has led to explorations in non-traditional sources, particularly renewable energies. Wind is one of the cleanest energy sources that plays a significant role in augmenting sustainability. Wind turbines, as energy convertors, are usually tall and slender structures, and depending on their location (inland or offshore), they can be subject to high wind and/or strong wave loadings. These loads can cause severe vibrations with detrimental effects on energy production, structural lifecycle and initial cost. A dissipativity analysis study was carried out to know whether wind turbine towers require damping enhancement or rigidity modifications for vibration suppression. The results suggest that wind turbines are lightly damped structures and damping enhancement is a potential solution for vibration lessening. Accordingly, the paper investigates different damping enhancement techniques for vibration mitigation. The efficacy of tuned mass damper (TMD), tuned liquid column damper (TLCD), tuned sloshing damper (TSD), and viscous damper (VD) to reduce vibrations is investigated. A comparison among these devices, in terms of robustness and effectiveness, is conducted. The VD can reduce both displacement and acceleration responses of the tower, better than other types of dampers, for the same control effort, followed by TMD, TSD, and finally TLCD. Nevertheless, the use of VDs raises concerns about where they should be located in the structure, and their application may require additional design considerations.

정보은닉기법을 적용한 함정 전투체계 소나 영상의 정보관리 방안 연구 (Study of Information Hiding Methods for SONAR Images in the Naval Combat System)

  • 이준호;신상호;정기현;유기영
    • 한국군사과학기술학회지
    • /
    • 제18권6호
    • /
    • pp.779-788
    • /
    • 2015
  • The SONAR waterfall image(SWI) is used typically to target detection in SONAR operation and is managed with additional data linked in the naval combat system. The SWI and additional data are very important to classify a kind of target. Although additional data of the SWI is essential and must be kept together with the SWI, it was stored separately in the current system. In this paper, we propose an improved information management method in the naval combat system, where additional data can be contained in the SWI together by using information hiding techniques. The experimental results show that the effectiveness of information hiding techniques in the naval combat system. It is demonstrated that the information hiding techniques can be applied to the SWI that can make the naval combat system to be robust and secure.

Efficient Energy and Position Aware Routing Protocol for Wireless Sensor Networks

  • Shivalingagowda, Chaya;Jayasree, P.V.Y;Sah, Dinesh.K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.1929-1950
    • /
    • 2020
  • Reliable and secure data transmission in the application environment assisted by the wireless sensor network is one of the major challenges. Problem like blind forwarding and data inaccessibility affect the efficiency of overall infrastructure performance. This paper proposes routing protocol for forwarding and error recovery during packet loss. The same is achieved by energy and hops distance-based formulation of the routing mechanism. The reachability of the intermediate node to the source node is the major factor that helps in improving the lifetime of the network. On the other hand, intelligent hop selection increases the reliability over continuous data transmission. The number of hop count is factor of hop weight and available energy of the node. The comparison over the previous state of the art using QualNet-7.4 network simulator shows the effectiveness of proposed work in terms of overall energy conservation of network and reliable data delivery. The simulation results also show the elimination of blind forwarding and data inaccessibility.