• Title/Summary/Keyword: External event

Search Result 215, Processing Time 0.02 seconds

The iZone System for Safety Walking of Children (어린이의 안전한 보행을 위한 iZone 시스템)

  • Min, Seonghee;Oh, Yoosoo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.1
    • /
    • pp.62-69
    • /
    • 2019
  • In this paper, we propose iZone system for safe walking of children. The proposed system recognizes the state that a child is down a roadway as a dangerous situation. And then it informs the surrounding adults and guardians of the child in the event of a dangerous situation. The iZone system consists of the iZone device that attaches to a child's bag or clothing, the iZone app for children, the iZone server, and external beacons. The proposed system uses the ultrasonic sensor of the iZone device and the GPS coordinates and external beacons information by the children's smartphone to determine the dangerous situation. The proposed system uses external beacons to calibrate the GPS coordinates. Moreover, it determines whether the child is down the roadway in sidewalk by measuring the height difference between the roadway and the sidewalk using ultrasonic sensor.

Re-examining on Ascending the Throne of King Thibaw and Its Effects

  • Kyi, Aye Mon
    • SUVANNABHUMI
    • /
    • v.5 no.2
    • /
    • pp.1-28
    • /
    • 2013
  • This paper is attempted to clarify the controversial event King Thibaw ascending the throne. Moreover it was presented with the purpose of how important "Trust Building" is in politic. After ascending the throne, King Thibaw faced external threat as well as internal weakness. The Hluttaw ministers and counselors did not support effectively and King Thibaw lost trust his ministers and counselors. Therefore mass killing of royal prince took place after the ascending the throne and it made discredit to King Thibaw. Senior minister like Kinwun Mingyi and Hsinphyumashin secretly contact with Prince Nyaung Yan whom was staying under the protection of British. On the other hand Prince Myingun took refuge under protection of the French and was trying to seize the power with the supporters from lower Myanmar as well as taking the financial help from Hsinphyu Mashin. They were external strength for the British and French. In this way King Thibaw's administration became deteriorated and finally the British anxious about Franco-Myanmar treaty so they exaggerated the Bombay-Burma Teak company's problem. In this way King Thibaw was taken away by the British due to the internal weakness and external strength.

  • PDF

DEVELOPMENT OF AN INTEGRATED RISK ASSESSMENT FRAMEWORK FOR INTERNAL/EXTERNAL EVENTS AND ALL POWER MODES

  • Yang, Joon-Eon
    • Nuclear Engineering and Technology
    • /
    • v.44 no.5
    • /
    • pp.459-470
    • /
    • 2012
  • From the PSA point of view, the Fukushima accident of Japan in 2011 reveals some issues to be re-considered and/or improved in the PSA such as the limited scope of the PSA, site risk, etc. KAERI (Korea Atomic Energy Research Institute) has performed researches on the development of an integrated risk assessment framework related to some issues arisen after the Fukushima accident. This framework can cover the internal PSA model and external PSA models (fire, flooding, and seismic PSA models) in the full power and the low power-shutdown modes. This framework also integrates level 1, 2 and 3 PSA to quantify the risk of nuclear facilities more efficiently and consistently. We expect that this framework will be helpful to resolve the issue regarding the limited scope of PSA and to reduce some inconsistencies that might exist between (1) the internal and external PSA, and (2) full power mode PSA and low power-shutdown PSA models. In addition, KAERI is starting researches related to the extreme external events, the risk assessment of spent fuel pool, and the site risk. These emerging issues will be incorporated into the integrated risk assessment framework. In this paper the integrated risk assessment framework and the research activities on the emerging issues are outlined.

THE ANALYSIS ON SPACE RADIATION ENVIRONMENT AND EFFECT OF THE KOMPSAT-2 SPACECRAFT(II): SINGLE EVENT EFFECT (아리랑 2호의 방사능 환경 및 영향에 관한 분석(II)- SINGLE EVENT 영향 중심으로 -)

  • 백명진;김대영;김학정
    • Journal of Astronomy and Space Sciences
    • /
    • v.18 no.2
    • /
    • pp.163-173
    • /
    • 2001
  • In this paper, space radiation environment and single event effect(SEE) have been analyzed for the KOMPSAT-2 operational orbit. As spacecraft external and internal space environment, trapped proton, SEP(solar energetic particle) and GCR(galactic cosmic ray) high energy Protons and heavy ions spectrums are analyzed. Finally, SEU and SEL rate prediction has been performed for the Intel 80386 microprocessor CPU that is planned to be used in the KOMPSAT-2. As the estimation results, under nominal operational condition, it is predicted that trapped proton and high energetic proton induced SBU effect will not occur. But, it is predicted that heavy ion induced SEU can occur several times during KOMPSAT-2 3-year mission operation. KOMPSAT-2 has been implementing system level design to mitigate SEU occurrence using processor CPU error detection function of the on-board flight software.

  • PDF

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Language (Meaning) and Cognitive Science (언어(특히 의미)와 인지과학)

  • Lee, Chung-Min
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2005.05a
    • /
    • pp.23-27
    • /
    • 2005
  • Humans perceptually segment events, but models that predict where events will be segmented are limited. Developing a detailed model may be hard because of the overlapping quality of events (i.e., one can smile and walk at the same time, but the endpoint of each event can be different). However, some aspects of events appear to be universally represented in the world's languages. For example, path, the trajectory of an object's movement, is one of the most universally encoded event features. Although it is generally encoded in the prepositions of English (e.g., up), in other languagesit is encoded in the verbs (e.g., descendere). Linguistic universals may represent basic levels of event perception. Here we consider how one of these, path, might be parsed. Because the spatiotemporal projection of paths to an observation point is similar to the spatial projection of objects, we tested the hypothesis that path segmentation and object segmentation would be based on similar image properties, such as discontinuities in orientation.

  • PDF

Sensitivity analysis of failure correlation between structures, systems, and components on system risk

  • Seunghyun Eem ;Shinyoung Kwag ;In-Kil Choi ;Daegi Hahm
    • Nuclear Engineering and Technology
    • /
    • v.55 no.3
    • /
    • pp.981-988
    • /
    • 2023
  • A seismic event caused an accident at the Fukushima Nuclear Power Plant, which further resulted in simultaneous accidents at several units. Consequently, this incident has aroused great interest in the safety of nuclear power plants worldwide. A reasonable safety evaluation of such an external event should appropriately consider the correlation between SSCs (structures, systems, and components) and the probability of failure. However, a probabilistic safety assessment in current nuclear industries is performed conservatively, assuming that the failure correlation between SSCs is independent or completely dependent. This is an extreme assumption; a reasonable risk can be calculated, or risk-based decision-making can be conducted only when the appropriate failure correlation between SSCs is considered. Thus, this study analyzed the effect of the failure correlation of SSCs on the safety of the system to realize rational safety assessment and decision-making. Consequently, the impact on the system differs according to the size of the failure probability of the SSCs and the AND and OR conditions.

On-box Container-based Switch Configuration Automation Technology to Minimize Network Interruption (네트워크 중단 최소화를 위한 On-Box 컨테이너 기반 스위치 설정 자동화 기술)

  • Gyoung-Hwan Yoo;Taehong Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.3
    • /
    • pp.141-149
    • /
    • 2024
  • This paper proposes a configuration automation technique to minimize service interruption time in the event of a corporate network access layer switch failure. The automation is achieved without the need for a separate external system, as the network setting information is stored in a container inside the switch, enabling rapid recovery without requiring separate storage. This approach ensures the continuity of network services and demonstrates the efficiency of configuration automation. The proposed technique improves corporate network stability by providing a quick response in the event of a failure.

A Study on the External Evacuation System for Large-scale Fire of Multi-use Facilities (다중밀집시설 대형화재 외부대피 체계에 관한 연구)

  • Kim, Jung-Gon;Jeong, Min-Su;Jung, Jae-Wook
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.129-145
    • /
    • 2022
  • Purpose: This study aims at preparing an external evacuation system by setting up situation that may occur outside buildings in case of large-scale fire at buildings such as multiuse facilities and presenting appropriate response procedures and action instructions for evacuees and facility managers. Method: Major matters are summarized based on various situations which may occur outside in case of fire and the contents of fire manual. Necessary factors including risk alert standards in the event of fire and the role of building occupants are classified and then important issues are summarized. In addition, the definition of fire-related outside shelters and external evacuation routes are showed, and then the applicability to the shelters and the routes are reviewed for old apartments in Jung-gu among multi-dense facilities. Result: Four stages (attention, caution, alert, serious) for standards of fire risk warning are established with the results of the investigation and analysis, and guidelines for behavior for evacuees, facility owners, residents, managers are summarized and presented. In addition, the concept and role of external shelters are divided into primary to the third shelters, and matters related to the definition of each shelter and the establishment of evacuation routes are presented, and then considered them carefully. Conclusion: This study has highlighted the importance of suggesting a systematic plan to secure the safety for evacuees outside space of buildings with disorder and difficulty to control in the event of fire. Therefore, we are confident that it will be useful in making an integrated manual for inside and outside buildings.

A Study on the induced Current of Electro Explosive Device Bridge Wire under Electromagnetic Field (전자파환경에서 EED에 유기되는 전류에 관한 연구)

  • 김응조
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.5 no.2
    • /
    • pp.116-122
    • /
    • 2002
  • Electro Explosive Devices can be susceptible to electromagnetic interference. When these components are exposed to external electromagnetic fields, it may cause to induce sufficient current to generate enough heat for an inadvertent detonation. It is almost impossible to monitor the event of firing throughout the electromagnetic environment test. The survivability of EED for hazards of electromagnetic radiation is investigated. A fiber optic sensor is installed near the bridge wire after removing explosive material in order to measure the induced current on the bridge wire. The length of lead-wire of the EED fabricated is around 15 cm.