• Title/Summary/Keyword: Protection measure

Search Result 598, Processing Time 0.032 seconds

A Study on Securing Safety of Evacuation through Smoke Control in Case of Fire at the Central Corridor Type Intelligent Buildings (중복도형 인텔리전트빌딩 화재시 연기제어를 통한 피난안전성 확보에 관한 연구)

  • Min, Se Hong;Lee, Jae Moon;Bae, Yeon Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.2
    • /
    • pp.117-127
    • /
    • 2015
  • This study investigated the smoke blocking and control systems for the safety of residents evacuation and for the prevention of smoke spread through the central corridor in the event of central corridor type of intelligent building fire. We offered additional ways of utilizing smoke ventilators and intake ventilation equipment and utilized CFD-based fire simulation program(FDS Ver.5.5.3) in order to analyze the effect. As a result, many differences in the smoke block effect, depending on the application of smoke ventilator and location of installation, was found. In addition, the result was found that larger effect was showed not in the case of application of smoke ventilator in central corridor only but application in fire room. The reason is that the smoke leakage is blocked primarily as air is flowed in the fire room through open door by operation of intake smoke ventilator in the public corridor and secondarily, the smoke leakage to the public corridor could be blocked as fire and smoke were released to the opened smoke ventilator continuously. Especially, the effect was maximized through complex interactions by applying smoke ventilator and intake ventilation equipment in corridor together rather than applying smoke ventilator and intake ventilation equipment independently. The proposed measure through this study shall be considered from architectural plan as one of ways for blocking from smoke spread to the central corridor in the central corridor type of intelligent building. In addition, flaws on regulation shall be established and supplemented.

A Study on the Substantial impact of US high rate tariff policy on the Korean companies -Based on analysis of Article 301 of the US Trade Law -

  • Nam, Seon Mo
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.63-68
    • /
    • 2019
  • Recently, the United States and China have declared a 25% retaliatory tariff for the partner country products of 50 billion dollar scale. "Trade war" is getting full swing. Such conflicts between economic powers may spread to Japan like the domino phenomenon following the EU (European Union) and become bigger in the global trade war. As a result, Korea has an economic system with a high degree of external dependence, and there is an expert's analysis that it will become the largest victim of the global trade war. If the WTO Dispute Settlement Authority approves this US 301 retaliation measure in the same way as the past case (US-EU hormone-treated beef imports), the United States will not import any Chinese imported products Chinese products) can be imposed. If the US launches a special 301 or super 301, which is stronger than the regular 301, then China is very likely to enforce US retaliation against it, and the trade war between the two countries could become a reality. This phenomenon is likely to have a negative impact on Korean companies. In particular, Korea, which is highly reliant on intermediate goods exports to China, is expected to suffer a great deal of damage. Therefore, Korea needs flexible response at home and abroad, it is necessary to enhance the autonomy of companies and protect export industries. Adjusting corporate tax rate as well as domestic industry height will be one way. The long-term (21 months) trade war between the United States and China has resulted in economic uncertainty. The resulting damage must be compensated. It is necessary to prepare the compensation through the economic council between countries. In the future, the punitive damage compensation system should be introduced.

A Study and Design on security ticket based CERT system for quantified incident management (정량적 침해사고 관리를 위한 Security Ticket 기반의 침해사고 관리시스템(CERT) 설계 및 관리방안 연구)

  • Kim, Sun-Tae;Jun, Moon-Seog;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.141-150
    • /
    • 2007
  • There's been a difficulty for general corporate to adopt recent incident response study because those studies focus on nation wide CERT Coordination Center or large organization aspect. This study is focus on study and design on security ticket based CERT system through analysis Security management's threat element, attack element. response element and it also help general corporate establish incident response process that is adjusted on IT operation. Confirmed CERT model's effectiveness and effect of quantitative Security incident management wav that propose executing Security incident response experiment on the basis of this way. This study which Provides general corporate oriented CERT model can be used to improve corporate's capability of responding incident by quantified management technique and select incident response SLA indicator. Already, formation which operate CERT can heighten corporation's information protection level by measure Security incident response result as metrical and analyze and improve problem continuously.

  • PDF

Performance Analysis of Low-level Radiation Shielding Sheet with Diamagnetic Nanoparticles

  • Cho, Jae-Hwan;Kim, Myung-Sam
    • Journal of Magnetics
    • /
    • v.20 no.2
    • /
    • pp.103-109
    • /
    • 2015
  • In this study, the authors attempted to produce a medical radiation shielding fiber that can be produced at a nanosize scale and that is, unlike lead, harmless to the human body. The performance of the proposed medical radiation shielding fiber was then evaluated. First, diamagnetic bismuth oxide, an element which, among elements that have a high atomic number and density, is harmless to the human body, was selected as the shielding material. Next, 10-100 nm sized nanoparticles in powder form were prepared by ball milling the bismuth oxide ($Bi_2O_3$), the average particle size of which is $1-500{\mu}m$, for approximately 10 minutes. The manufactured bismuth oxide was formed into a colloidal solution, and the radiation shielding fabric was fabricated by curing after coating the solution on one side or both sides of the fabric. The thicknesses of the shielding sheets prepared with bismuth oxide were 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, and 1.0 mm. An experimental method was used to measure the absorbed dose and irradiation dose by using the lead equivalent test method of X-ray protection goods presented by Korean Industrial Standards; the resultant shielding rate was then calculated. From the results of this study, the X-ray shielding effect of the shielding sheet with 0.1 mm thickness was about 55.37% against 50 keV X-ray, and the X-ray shielding effect in the case of 1.0 mm thickness showed shielding characteristics of about 99.36% against 50 keV X-ray. In conclusion, it is considered that nanosized-bismuth radiation shielding fiber developed in this research will contribute to reducing the effects of primary X-ray and secondary X-ray such as when using a scattering beam at a low level exposure.

Analysis of Personal Information Data Flow Structure based on Network Theory (네트워크 이론을 적용한 개인정보 유통구조 분석)

  • Lee, Jae-Geun;Kim, Hyun Jin;YOUM, Heung Youl;Kang, Sang-ug
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.17-34
    • /
    • 2014
  • The study on the structure of personal information flows is very important because government can measure and respond the risks caused by companies which collect personal information from other personal data users to operate their business. Recently, as the value of personal information is increasing, number of companies which intend to process a large scale of personal information is increasing too. Accordingly, the issue on the structure of personal data flow has become important for the leading personal information processors which receive far more personal information from others to comply the personal information protection laws. However, research on this issue has rarely performed so far. Therefore, this study proposes a framework for personal information data flow structure based on network theory. Theoretically, the results of the study may contribute to extending the application areas of the network theory to personal information area. Practically, the study may contribute to assisting regulatory authorities to find and monitor personal information processors.

A Study on the Estimation of User′s Psychological Carrying Capacity in Mt. Chi-ak National Park Campsite (치악산국립공원 야영장의 이용자의 심리적 수용능력 추정에 관한 연구)

  • 권영선;이경재;송근준
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.16 no.1
    • /
    • pp.1-12
    • /
    • 1988
  • ^x This study was executed to measure the user's psychological carrying capacity in the National Park Campsite in the district of Temple Ku- Ryong as a model of analysis, which is made socio - psychological approach. The results are as follows ; 1. Since this Place hart a beautiful scenery and some cultural assets prosperties and lies near the metroplitan area, 67.5% of the user come from the district, such as Seoul, Inchon, Kyong - Ki Do, and the purpose of camping is to appease their stress and to promote friendly relationship one another. 2. Since most of the campers(86%) didn't recognize the injury of the natural environment, the enlightment movement and the public information for the protection of natural environment are urgent. And they thought that the good campsite is located near the stream(43.6%) or a quiet place(33.4%). 3. As the space per a man increase, the degree of their satisfactions showed the tendency to increase. The user's satisfaction were analyzed by three statistic methods, correlation, multiple regression and factor analysis. Affecting factors to the user's psychology by the varimax varimax rotated factor analysis were classified physical arts ecological satisfaction. 4. The carrying capacity of the campsite by the degree of psychological satisfaction of the user was measured. The result was that the proper space for one user campsite was 35m$^2$ 5. The 58% of the informants said that they root disturbed by the overcrowding in the campsite. But most of the users thought that it was not good to control the number of the users. And the 67.3% of the respondents answered that the best method was that we control the number of the users by order of arrival if we have to control it.

  • PDF

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

Vulnerability Analysis of Network Communication Device by Intentional Electromagnetic Interference Radiation (IEMI 복사에 의한 네트워크 통신 장비의 취약성 분석)

  • Seo, Chang-Su;Huh, Chang-Su;Lee, Sung-Woo;Jin, In-Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.1
    • /
    • pp.44-49
    • /
    • 2018
  • This study analyzed the Vulnerability of Network Communication devices when IEMI is coupled with the Network System. An Ultra Wide Band Generator (180 kV, 700 MHz) was used as the IEMI source. The EUTs are the Switch Hub and Workstation, which are used to configure the network system. The network system was monitored through the LAN system configuration, to confirm a malfunction of the network device. The results of the experiment indicate that a malfunction of the network occurs as the electric field increases. The data loss rate increases proportionally with increasing radiating time. In the case of the Switch Hub, the threshold electric field value was 10 kV/m for all conditions used in this experiment. The threshold point causing malfunction was influenced only by the electric field value. The correlation between the threshold point and pulse repetition rate was not found. However, in case of the Workstation, it was found that as the pulse repetition rate increases, the equipment responds weakly and the threshold value decreases. To verify the electrical coupling of the EUT by IEMI, current sensors were used to measure the PCB line inside the EUT and network line coupling current. As a result of the measurement, it can be inferred that when the coupling current due to IEMI exceeds the threshold value, it flows through the internal equipment line, causing a malfunction and subsequent failure. The results of this study can be applied to basic data for equipment protection, and effect analysis of intentional electromagnetic interference.

Increased Cytokine and Nitric Oxide Levels in Serum of Dogs Experimentally Infected with Rangelia vitalii

  • Paim, Francine C.;Da Silvaz, Aleksandro S.;Paim, Carlos Breno V.;Franca, Raqueli T.;Costa, Marcio M.;Duarte, Marta M.M.F.;Sangoi, Manuela B.;Moresco, Rafael N.;Monteiro, Silvia G.;Lopes, Sonia Terezinha A.
    • Parasites, Hosts and Diseases
    • /
    • v.51 no.1
    • /
    • pp.133-137
    • /
    • 2013
  • This study aimed to measure the levels of interferon-gamma (IFN-${\gamma}$), tumor necrosis factor-alpha (TNF-${\alpha}$), interleukin 1 (IL-1), interleukin 6 (IL-6), and nitrite/nitrate ($NO_x$) in serum of dogs experimentally infected with Rangelia vitalii. Twelve female mongrel dogs were divided into 2 groups; group A (uninfected controls) composed by healthy dogs (n=5) and group B consisting of dogs inoculated with R. vitalii (n=7). Animals were monitored by blood smear examinations, which showed intraerythrocytic forms of the parasite on day 5 post-infection (PI). Blood samples were collected through the jugular vein on days 0, 10, and 20 PI to determine the serum levels of IFN-${\gamma}$, TNF-${\alpha}$, IL-1, IL-6, and $NO_x$. Cytokines were assessed by ELISA quantitative sandwich technique, and $NO_x$ was measured by the modified Griess method. Cytokine levels (IFN-${\gamma}$, TNF-${\alpha}$, IL-1, and IL-6) were increased (P<0.01) in serum of infected animals. Serum levels of $NO_x$ were also increased on days 10 PI (P<0.01) and 20 PI (P<0.05) in infected animals. Therefore, the infection with R. vitalii causes an increase in proinflammatory cytokines and nitric oxide content. These alterations may be associated with host immune protection against the parasite.

Digital Image Watermarking Scheme in the Singular Vector Domain (특이 벡터 영역에서 디지털 영상 워터마킹 방법)

  • Lee, Juck Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.122-128
    • /
    • 2015
  • As multimedia information is spread over cyber networks, problems such as protection of legal rights and original proof of an information owner raise recently. Various image transformations of DCT, DFT and DWT have been used to embed a watermark as a token of ownership. Recently, SVD being used in the field of numerical analysis is additionally applied to the watermarking methods. A watermarking method is proposed in this paper using Gabor cosine and sine transform as well as SVD for embedding and extraction of watermarks for digital images. After delivering attacks such as noise addition, space transformation, filtering and compression on watermarked images, watermark extraction algorithm is performed using the proposed GCST-SVD method. Normalized correlation values are calculated to measure the similarity between embedded watermark and extracted one as the index of watermark performance. Also visual inspection for the extracted watermark images has been done. Watermark images are inserted into the lowest vertical ac frequency band. From the experimental results, the proposed watermarking method using the singular vectors of SVD shows large correlation values of 0.9 or more and visual features of an embedded watermark for various attacks.