• Title/Summary/Keyword: Physical protection system

Search Result 215, Processing Time 0.037 seconds

Study on the water bursting law and spatial distribution of fractures of mining overlying strata in weakly cemented strata in West China

  • Li, Yangyang;Zhang, Shichuan;Yang, Yingming;Chen, Hairui;Li, Zongkai;Ma, Qiang
    • Geomechanics and Engineering
    • /
    • v.28 no.6
    • /
    • pp.613-624
    • /
    • 2022
  • A study of the evolution of overburden fractures under the solid-fluid coupling state was conducted based on the geological and mining characteristics of the coal seam depth, weak strata cementation, and high-intensity mining in the mining areas of West China. These mining characteristics are key to achieving water conservation during mining or establishing groundwater reservoirs in coal mines. Based on the engineering background of the Daliuta Coal Mine, a non-hydrophilic simulation material suitable for simulating the weakly cemented rock masses in this area was developed, and a physical simulation test was carried out using a water-sand gushing test system. The study explored the spatial distribution and dynamic evolution of the fractured zone in the mining overburden under the coupling of stress and seepage. The experimental results show that the mining overburden can be vertically divided into the overall migration zone, the fracture extension zone and the collapse zone; additionally, in the horizontal direction, the mining overburden can be divided into the primary fracture zone, periodic fracture zone, and stop-fracture zone. The scope of groundwater flow in the overburden gradually expands with the mining of coal seams. When a stable water inrush channel is formed, other areas no longer generate new channels, and the unstable water inrush channels gradually close. Finally, the primary fracture area becomes the main water inrush channel for coal mines. The numerical simulation results indicate that the overlying rock breaking above the middle of the mined-out area allows the formation of the water-conducting channel. The water body will flow into the fracture extension zone with the shortest path, resulting in the occurrence of water bursting accidents in the mining face. The experimental research results provide a theoretical basis for the implementation of water conservation mining or the establishment of groundwater reservoirs in western mining areas, and this theoretical basis has considerable application and promotion value.

A Study on Evaluation Method of IDC in the Wire/Wireless Integrated Environment (유.무선 통합환경에서의 IDC 평가방법에 관한 연구)

  • Lee, Jea-Pyuing;Park, Jin-Seok;Lee, Man-Woo;Kim, Sun-Gohn
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.599-603
    • /
    • 2006
  • Korea Information Security Agency has executed the certification system for the information security management since 2002 and examines the conformance of the IDCs'total management system including the technical and the physical protection measure. However, this certification system has the standard only for the IDC in the wire/wireless segregated and the evaluation method for the wire/wireless integrated has not been suggested yet. This paper is on the basis of "Accumulation Information Communication Facility Secure Principle", guidelines of Wireless LAN security operation, the existing principles and recommendations of the information security and the data on IDC environment. And the paper suggests the IDC network model in the wire/wireless integrated and the IDC evaluation method.

  • PDF

An Satellite Communication Wireless Package System Using Analysis of Channel Interference between ISM band Systems (ISM 대역 시스템간 채널 간섭 분석을 통한 위성 통신 무선 패키지시스템 적용)

  • Ko, Hojeong;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.78-83
    • /
    • 2015
  • In this paper, when WLAN repeater of satellite communication package system as a novel wireless disaster communication network connected to LTE D2D mobile terminal, we analyzed radio channel interference from WLAN and WPAN system of adjacent same ISM band using Monte-Carlo method. In this study, WLAN cell radius was determined using Extended Hata Model considering practical environment, and simulated physical protection distance and density in the dense-mode to minimize interference from WLAN, Bluetooth, and ZigBee. Simulation results, WLAN repeater can be operated with 15 WLAN interferer over 130m distance, 23 Bluetooth interferer over 100m distance, and with 62 ZigBee interferer over 83m distance.

A study on development of CATIA V5 file security system using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae H.C.;Park D.S.;Byun J.H.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.417-418
    • /
    • 2006
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. The best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function, A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

  • PDF

A Study on Development of CATIA V5 File Security System Using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae, Hee-Chang;Park, Doo-Seob;Byun, Jae-Hong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.5
    • /
    • pp.77-81
    • /
    • 2007
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. the best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function. A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

A Hierarchical Solution Approach for Occupational Health and Safety Inspectors' Task Assignment Problem

  • Arikan, Feyzan;Sozen, Songul K.
    • Safety and Health at Work
    • /
    • v.12 no.2
    • /
    • pp.154-166
    • /
    • 2021
  • Background: Occupational health and safety (OHS) is a significant interest of all governments to prevent workplace hazards. Although appropriate legislation and regulations are essentials for the protection of workers, they are solely not enough. Application of them in practice should be secured by an efficient inspection system. Fundamental components of an inspection system are inspectors and their audit tasks. Maintaining the fair balanced task assignment among inspectors strictly enhances the efficiency of the overall system. Methods: This study proposes a two-phased goal programming approach for OHS inspectors' task assignments and presents a case study. Results: The solution approach gives the balanced assignment of inspectors to the workplaces in different cities of the country in the planning period. The obtained schedule takes into account the distances covered by the work places and the number of the workplaces' employees to be audited and pays attention to the human factors by considering the preferences of the inspectors. The comparisons between the obtained optimal schedule and the implemented one that is produced manually show that the approach not only maintains the technical requirements of the problem, but also provides social and physical balance to the task assignment. Conclusion: Both the approach and the application study are expected to offer fruitful inspirations in the area of safety management and policy and they provide a good guide for social policy and organizational aspects in the field of OHS inspectors' task assignment.

An Experimental Study on the Evaluation of Physical Properties of Planting Porous Concrete using Industrial By-products. (산업부산물을 이용한 식생용 포러스콘크리트의 물성평가에 관한 실험적 연구)

  • Park, Seung-Bum;Lee, Taek-Woo;Kwon, Hyuk-Joon;Lee, Bong-Chun;Lee, Jun
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2001.11a
    • /
    • pp.929-934
    • /
    • 2001
  • As the notion of environment protection changes throughout the world, construction engineers, as part of the effort to resolve environmental problems, have been actively doing research on environmental friendly porous concrete using large and non-uniform aggregate. Concrete having a great deal of continuous porosity enable water and air to pass freely through firmly hardened material, allowing necessary nutrients to reach roots of vegetation, thereby sustaining them. It is possible to prevent the exhaustion of natural resources by recycling waste concrete and industrial by-products, to reduce damage caused by the destruction of nature through effective management of natural resources, to preserve the natural environment and vegetation in urban areas by activating the soil, protecting the underground ecology system, and growing garden plants through the application of environmentally friendly concrete.

  • PDF

Needs for Consumer Information on Internet (인터넷소비자정보요구도에 관한 연구)

  • 이수진;이승신
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.12
    • /
    • pp.159-175
    • /
    • 2001
  • The internet which is only opened for special class at the past, diffuse to all classes like junior.senior highschool and woman in general and it boost the internet's popularize. So the consumers can reduce the all physical.time cost, and now the internet settle in the most important method to find the informations. I hope this project can expect the protection the over-carrying of consumer information on internet and consumers can activity acquire the information in consumer's side. Also in the business's side, it promote the developing of fair information offers for lighten the inequality of information. And in the governments side, it's a basic information to plan the legal system for help the consumers to use the safe and correctness internet.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

Case Study of Slope Protection Method using GeoComb (지오콤을 이용한 사면녹화공법의 현장적용 사례)

  • Oh, Young-In;Kim, Sung-Hwan;Yuu, Jung-Jo;Shim, Jin-Seap
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.974-979
    • /
    • 2008
  • The purpose of this study was to evaluate the effect of vegetation on the cutting slope applied by vegetation system in the whole land. The engineering characteristics of slopes were investigated using the face mapping and physical tests. From the statistical methods, a relationship between a geologic stratum and degree of covering was independent. Therefore, the afforestation of slope was affected more by condition of vegetation as direction and opening of joints, and a topsoil state than by conventional classification of layer. It was concluded that the adjustable vegetation on the slope considering condition of geometric shape of slope, joint data and spontaneous type could make useful early afforestation.

  • PDF