• Title/Summary/Keyword: User safety

Search Result 1,243, Processing Time 0.024 seconds

Suitability Analysis of Numerical Models Related to Seepage through a Levee (제방 침투 수치해석 모형의 적합성 분석)

  • Im, Dong-Kyun;Yeo, Hong-Koo;Kim, Kyu-Ho;Kang, Jun-Gu
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.3 s.164
    • /
    • pp.241-252
    • /
    • 2006
  • Numerical models for seepage analysis are useful tools to analyze problems and design protection techniques that are related to seepage through a levee. Though every model may have its own limitations and shortcomings, there were no generalized verifications or calibrations for the commercial models. It means that users can run the model and get the result without understanding nor taking any enough training. This paper Investigates applicability and suitability of some seepage numerical models by comparing analytical solutions with experiments in the user's viewpoint. The results showed that it is more desirable to use analyses with unsaturated-unsteady condition rather than those with saturated-steady conditions, since seepage phenomenon of real levees are changed according to water level and soil property. This study also compared the calculated unsteady solutions with the calculated steady solutions for the levee at Koa of the Nakdong River The comparison revealed that as the result, the safety factor of $2.0{\sim}3.5$ has the same effects for seepage protection techniques when they are designed on the basis of steady-state analysis.

A Study on Low-Floor Bus Routes Selection - Focused on the Case of Jeollabuk-Do - (저상버스 노선선정 방안에 관한 연구 -전라북도 사례를 중심으로-)

  • Lee, Chang-Hyun;Kim, Sang-Youp;Kim, Jai-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.4
    • /
    • pp.73-85
    • /
    • 2014
  • Approaching to aging society with increasing transportation vulnerable, most developed countries has positively promote low-floor bus. Such circumstance in Korea has plan to introduce low-floor bus to intra-city bus system which accounted for 30 percent of total number of buses however there is no specific operating plan for this matter. According to the revealed preference study on bus service, the study shows that the efficiency of low-floor is relatively low than that of other buses, therefore, it is necessary to establish feasible plan for bus route selection. Thus, this study is to conduct research on analyzing trip characteristics of transportation vulnerable and establish bus route selection measures for low-floor bus. The result from the survey in Jeollabuk-do Province reveals that the trip purpose of transportation vulnerable is mainly for welfare and medical service, which was made less than 6 times a week. Futhermore, 37.6 percent of transportation vulnerable use buses, thus, it is essential to improve its service quality for enhancing user's convenience and safety. In that transportation vulnerable O-D needs to be established and forecasts future demand for selecting optimal bus route. According to the estimation, route passing through densely populated areas with transportation vulnerable should take the first priority, city circular and other route would be next. Moreover, it is economically efficient that areas populated more than 200,000 with fixed route and less than 200,000 with limited route responsive to demands would be feasible plans. This study will have greater an impact on transportation planning and further research on transportation vulnerable.

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

Performance Analysis of Docker Container Migration Using Secure Copy in Mobile Edge Computing (모바일 엣지 컴퓨팅 환경에서 안전 복사를 활용한 도커 컨테이너 마이그레이션 성능 분석)

  • Byeon, Wonjun;Lim, Han-wool;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.901-909
    • /
    • 2021
  • Since mobile devices have limited computational resources, it tends to use the cloud to compute or store data. As real-time becomes more important due to 5G, many studies have been conducted on edge clouds that computes at locations closer to users than central clouds. The farther the user's physical distance from the edge cloud connected to base station is, the slower the network transmits. So applications should be migrated and re-run to nearby edge cloud for smooth service use. We run applications in docker containers, which is independent of the host operating system and has a relatively light images size compared to the virtual machine. Existing migration studies have been experimented by using network simulators. It uses fixed values, so it is different from the results in the real-world environment. In addition, the method of migrating images through shared storage was used, which poses a risk of packet content exposure. In this paper, Containers are migrated with Secure CoPy(SCP) method, a data encryption transmission, by establishing an edge computing environment in a real-world environment. It compares migration time with Network File System, one of the shared storage methods, and analyzes network packets to verify safety.

Key Determinants of Dissatisfaction on COVID-19 Contact Tracing and Exposure Notification Apps (COVID-19 접촉추적과 노출알림 앱사용자의 항의 및 불만요인 탐색)

  • Leem, Byung-hak;Hong, Han-Kook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.176-183
    • /
    • 2021
  • Digital medical technology is very effective and at the same time faces the challenge of protecting privacy. However, for contact tracking and exposure notification apps in COVID-19 environment, there is always a trade-off between privacy measures and the effectiveness of the app's use. Today, many countries have developed and used contact tracking and exposure notification apps in various forms to prevent the spread of COVID-19, but the suspicion of digital surveillance (digital panopticon) is unavoidable. Therefore, this study aims to identify the factors of personal information infringement and dissatisfaction through text mining analysis by extracting user reviews of "Self-Quarantine Safety Protection" in Korea. As a result of the text mining analysis, we derived four groups, 'Address recognition error', 'Exit warning error', 'Access error', and 'App. program error'. Since 'Address recognition error' and 'Exit warning error' can give the app users a strong perception that they are keeping under surveillanc by the app, transparent management of personal information protection and consent procedures related to personal information collection are required. In addition, if the other two groups are not corrected immediately due to an error in an app function or a program bug, the complaints of users can be maximized and a protest against the monitor can be raised.

Analysis of Causes and Impact of Change Orders in the U.S. Military Construction Projects (미군 시설공사 설계변경 요인과 영향에 대한 연구)

  • Park, Insung;Kim, Harim;Lee, Hak-Ju;Kim, Do-Hyung;Min, Yoon-Gi;Cho, Hunhee
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.3
    • /
    • pp.213-219
    • /
    • 2021
  • Change orders that occur frequently during the construction phase, af ect the construction performance in terms of cost, time, quality, safety and environment, and place a huge burden for stakeholders of given projects. This study analyzed the causes of change orders and their impact on the basis of 721 cases and a questionnaire of 164 domestic U.S. military construction participants in a total of 24 U.S. military projects. Important factors for change orders in the US military construction projects were engineering change due to design errors (348 cases, 48.3%), user requests change(86 cases, 11.9%), and different site conditions (69 cases, 9.6%). In addition, due to the change orders, construction cost increased by 6.56% on average and construction period was extended by 21.1% compared to the original schedule. As a result, it is anticipated that domestic construction companies can obtain a better understanding of change orders and construction performance, which may be difficult due to accessibility and limitations to military facilities. Also, it is proposed a successor study that guides in the right direction for the U.S. Military Construction.

Implementation of Spatial Augmented Reality Using Fog Screen (포그 스크린을 이용한 공간증강현실(SAR) 구현)

  • Park, Yoenyong;Jung, Moonryul
    • Journal of the Korea Computer Graphics Society
    • /
    • v.25 no.3
    • /
    • pp.43-54
    • /
    • 2019
  • In this paper, we review the applicability of fog screen to implement 'Spatial Augmented Reality' which displays the image on the whole space of real space or in real space by separating display equipment and user, in contrast to the traditional Augmented Reality. Through three exhibitions and one performance, we confirmed t hat the fog screen, which can be passed through, is a suitable material for implementing the Spatial Augment ed Reality. We found that the hologram production was easier than before because of fog screen. Through the questionnaire survey conducted on performers along with the exhibition, we found that only about half of people know what a fog screen is, and about 10% of the total respondents saw the fog screen. In order to investigate the effect of fog screen on the surrounding space, we conducted an experiment to observe the change of humidity according to the time and distance in the Children's Culture Center of the Asian Culture Center. We found that the humidity within a radius of 5m around the fog screen could increase by 2~3%($6,400m^3$ standard). Thus we provided some safety requirement with fog screen when works made of materials vulnerable to moisture such as paint, paper, and wood are exhibited at the same time with fog screen in the exhibition hall.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.

Effectiveness Analysis of Installation of Turbo Roundabouts (터보형 회전교차로 설치 효과분석)

  • Lim, Chang-Sik;Choi, Yang-Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.6
    • /
    • pp.925-932
    • /
    • 2018
  • This study deals with Turbo-Roundabout of Special-Roundabouts. Recently, many rotary intersections are being constructed in Korea, but the effect of the rotary intersection depends on the total entrance traffic volume and the area of the paper. The purpose of this study is to analyze the operation and accident reduction effect of turning traffic signal intersection with small traffic volume into turbo - type turning intersection. The main results are as follows. First, when the traffic volume of the main road is high, the traffic volume of the subway is less than 10 ~ 15%, or when the left turn ratio is less than 30%, it is improved when switching to the turbo type turn intersection instead of the first turn type and second turn type turn intersection Was analyzed. Second, it is considered that turbo type rotary intersection is more effective than first - type rotary intersection, and it is more effective in increasing road capacity because the area of paper is smaller than that of second - order rotary intersection. Third, the number of traffic accidents decreased by 45.9% and the number of injured persons decreased by 76.5% after the conversion of the turnover type turnover to turbo type. 100%), the number of car accidents was 0.3, and the number of casualties was 0 (100%). Finally, the positive evaluation of the user satisfaction survey showed that the improvement in safety, accessibility, and convenience was improved by 60.4%, which was improved by 16.4% to 76.8% after the conversion to the turbo type turnover.

Development of Street Crossing Assistive Embedded System for the Visually-Impaired Using Machine Learning Algorithm (머신러닝을 이용한 시각장애인 도로 횡단 보조 임베디드 시스템 개발)

  • Oh, SeonTaek;Jeong, Kidong;Kim, Homin;Kim, Young-Keun
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.41-47
    • /
    • 2019
  • In this study, a smart assistive device is designed to recognize pedestrian signal and to provide audio instructions for visually impaired people in crossing streets safely. Walking alone is one of the biggest challenges to the visually impaired and it deteriorates their life quality. The proposed device has a camera attached on a pair of glasses which can detect traffic lights, recognize pedestrian signals in real-time using a machine learning algorithm on GPU board and provide audio instructions to the user. For the portability, the dimension of the device is designed to be compact and light but with sufficient battery life. The embedded processor of device is wired to the small camera which is attached on a pair of glasses. Also, on inner part of the leg of the glasses, a bone-conduction speaker is installed which can give audio instructions without blocking external sounds for safety reason. The performance of the proposed device was validated with experiments and it showed 87.0% recall and 100% precision for detecting pedestrian green light, and 94.4% recall and 97.1% precision for detecting pedestrian red light.