• 제목/요약/키워드: damaging event

검색결과 15건 처리시간 0.022초

침도 침술시 부작용과 예방법에 관한 연구 (Clinical Characteristics of Poor Responders to Acupotomy and Safety Pretreatment Management)

  • 김성철
    • Journal of Acupuncture Research
    • /
    • 제25권4호
    • /
    • pp.117-125
    • /
    • 2008
  • Objectives : Analyze according to types of event causing the adverse outcome due to acupotomy, and discuss problems and safety reqirements to using this therapy in Korea. Methods : Based upon the indication, contraindication, treatment procedures, clinical obsevations, acupotomy-related adverse outcome case reports, the factors of damaging event were classified. Results : The main factors of adverse outcome by acupotomy were anatomical ignorance, contamination of device or hospital staff, failure to notice preexisting disease(cardiovascular disease, hypertension, renal failure, hemophilia, chronic Liver Disease, etc.), unskilled treatment procedures(massive bleeding) and techniques(nerve injury, hepatic and splenic injury, Pneumothorax). Conclusions : It is mandatory to prepare adequate sterilie aseptic technique. The clinician should ensure understand genernal health state of patient and anatomical direction.

  • PDF

예측홍수의 방류량 결정방안에 관한 연구 (A Study on Releases Determination Scheme for a Forecasted Flood)

  • 권오익;심명필
    • 한국수자원학회논문집
    • /
    • 제30권3호
    • /
    • pp.257-268
    • /
    • 1997
  • 홍수시 최적의 방류량을 목표로 하는 댐 운영자의 경우 방류량을 결정하는데 있어 댐의 안전과 저수지의 운영효율을 고려한 이해할 만한 근거를 제시할 필요가 있다. 본 연구에서는 예측된 홍수수문곡선을 댐 규정에 명시된 무피해방류량을 기준으로 분할하여 무피해방류량으로 조절되는 부분과 홍수조절용량을 이용하여 조절되는 부분으로 구분하였다. 홍수조절용량을 이용하는 경우 예측홍수를 판단하는 기준을 마련하여 저수지 운영의 안전과 효율을 고려한 홍수조절계획을 수립하는 방안 ("저수지 홍수변환법")을 강구하였다. 본 연구에서는 연구범위를 단일 댐의 홍수시 저수지 운영 방안으로 제한하여 대청 다목적 댐을 적용하고 그 결과를 분석하였다.

  • PDF

침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션 (Security Simulation with Collaboration of Intrusion Detection System and Firewall)

  • 서희석;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제10권1호
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Surface measurements of the 5 June 2013 damaging thunderstorm wind event near Pep, Texas

  • Gunter, W. Scott;Schroeder, John L.;Weiss, Christopher C.;Bruning, Eric C.
    • Wind and Structures
    • /
    • 제24권2호
    • /
    • pp.185-204
    • /
    • 2017
  • High-resolution wind measurements at 2.25 m in height were used to investigate the mean and turbulence properties of an extreme thunderstorm wind event in West Texas. These data were combined with single Doppler scans from the Texas Tech University Ka-band mobile Doppler radars systems (TTUKa) to provide meteorological context over the surface measurement stations for portions of the outflow. Several features characteristic of a severe wind event were noted in the radar data, including a bowing portion of the thunderstorm complex and a small circulation on the leading edge. These features were reflected in the surface wind time histories and provided natural separation between various regions of the outflow. These features also contributed to the peak 1-s gust at all measurement stations. The turbulence characteristics of each outflow region were also investigated and compared. Reduced values of running turbulence intensity and elevated values of longitudinal integral scales were noted during the period of peak wind speed. Larger scales of turbulence within the outflow were also suggested via spectral analysis.

FTA를 이용한 수변전설비의 최소절단집합 도출 (Minimal Cut Set of Electric Power Installations using Fault Tree Analysis)

  • 박영호;김두현;김성철
    • 한국안전학회지
    • /
    • 제32권1호
    • /
    • pp.41-46
    • /
    • 2017
  • In this paper, from making an electrical fire which is thought to be the most damaging among potential dangers as a top event, minimal cut sets (MCS) about it were analyzed. For this, components of a power substation were classified into 15 items. Failure rates and modes were extracted based on Korea Electrical Safety Corporation, IEEE Gold Book, and RAC. To analyze the top event (an electrical fire), main events were assorted into "safety devices for overcurrent" and "ampere meter of detecter". Failure of components was divided into failure of VCB, COS, and MCCB. A fault tree was composed of 3 AND gate, 5 OR gates and 17 basic events. Overlapped events among the basic events are things which occur from relevant components. They were attached to the tree by distinguishing identifiers. In case of FT, two minimal cut sets of "IO_METER", "MF_METER", "DO_MCCB" and "IO_METER", "MF_METER", "DO_VCB" take 46% of electrical fires. Therefore, about basic events which are included in the top two minimum cut sets, strict control is necessary.

봄철 황사탐지를 위한 정지궤도위성 적외선 채널의 배경경계값 적용 가능성 연구 (Possibility of Applying Infrared Background Threshold Values for Detecting Asian dust in Spring from Geostationary Satellite)

  • 홍성재;김재환;하종성
    • 대한원격탐사학회지
    • /
    • 제26권4호
    • /
    • pp.387-394
    • /
    • 2010
  • 최근 황사에 의한 피해가 증가하고 있는데, 정지궤도 위성에 탑재된 적외 채널은 주야간의 연속적인 관측을 가능하게 하여 황사 예보와 이로 인해 발생할 수 있는 피해를 미리 예방하는데 큰 도움을 준다. 그러나 적외 채널을 이용한 황사 측정 방법에는 많은 문제점들이 있다는 것이 알려져 있다. 이런 문제점들을 해결하기 위해 본 연구에서는 적외 채널의 배경경계값과 황사지수 개념을 도입하여 이를 정지궤도 위성에 적용한다면 황사 측정 결과를 크게 개선할 수 있음을 밝혀냈다. 본 연구는 이러한 개념을 정지궤도 위성인 MTSAT-1R에 적용하여 개선된 황사 측정 방법에 대해 연구하였다.

Vibration based damage localization using MEMS on a suspension bridge model

  • Domaneschi, Marco;Limongelli, Maria Pina;Martinelli, Luca
    • Smart Structures and Systems
    • /
    • 제12권6호
    • /
    • pp.679-694
    • /
    • 2013
  • In this paper the application of the Interpolation Damage Detection Method to the numerical model of a suspension bridge instrumented with a network of Micro-Electro-Mechanical System sensors is presented. The method, which, in its present formulation, belongs to Level II damage identification method, can identify the presence and the location of damage from responses recorded on the structure before and after a seismic damaging event. The application of the method does not require knowledge of the modal properties of the structure nor a numerical model of it. Emphasis is placed herein on the influence of recorded signals noise on the reliability of the results given by the Interpolation Damage Detection Method. The response of a suspension bridge to seismic excitation is computed from a numerical model and artificially corrupted with random noise characteristic of two families of Micro-Electro-Mechanical System accelerometers. The reliability of the results is checked for different damage scenarios.

경취재료에 있어 압자압입시의 균열진전에 관한 연구 (Micro Cracking and Elastic/Plastic Transition Radii Associated with Indenting on Ceramics by Diamond Indenter)

  • Park, G.H.
    • 한국정밀공학회지
    • /
    • 제13권5호
    • /
    • pp.164-172
    • /
    • 1996
  • In hard and brittle materials as advanced ceramics indented by a hard indenter, the indenter's transition radius, was defined as critical radius which distinguishes the occurrence of the first plastic deformation from the elastic cracking as the first damaging event, is analytically and experimentally investigated. The analytical result is shown that the critical load, which not enlarge pre-existing cracks as the form of median crack beneath a indenter, is constant, and is determined by the order of $k_{IC}$$^{4}$ $P_{Y}$$^{3}$(where, $K_{IC}$ , $P_{Y}$are the fracture toughness of materials and the applied pressure by indenting, respectively). And the size of transiton radii were experimentally obtained with the similar values to the analytical results.lts..

  • PDF

Some recent extreme wind events in New Zealand

  • Turner, R.;Revell, M.;Reese, S.;Moore, S.;Reid, S.
    • Wind and Structures
    • /
    • 제15권2호
    • /
    • pp.163-176
    • /
    • 2012
  • Damaging winds, associated with a variety of weather phenomena, are frequently experienced in New Zealand. Observations and modelling of two recent extreme wind events; the Taranaki tornado outbreak of July 2007, and the Greymouth down-slope easterly wind storm of July 2008 are described in detail here. Post-event engineering damage surveys, rare for New Zealand, were done for these storms and the results are summarized here. Finally, the issue of sampling extreme wind events is raised and the need to include detailed numerical modelling analysis to understand wind gust climatologies at observing sites and extending these to wider regions is discussed.

분산 침입 탐지를 위한 계약망 프로토콜의 적용 (An Application of Contract Net Protocol for The Distributed Intrusion Detection)

  • 서희석;김희완
    • 한국콘텐츠학회논문지
    • /
    • 제3권4호
    • /
    • pp.38-47
    • /
    • 2003
  • 분산 문제 해결 방법은 문제 해결 능력을 갖는 knowledge-sources(KS'S)들이 분산되지만 느슨한 연결을 유지하며 서로 협력하여 문제를 해결하는 수단을 제공한다. 계약망 프로토콜(Contract Net Protocol)은 이러한 분산 문제 해결 분야에서 KS 간의 통신과 제어를 위해 제안된 방법이다. 역할의 분담은 협상 과정에 의해서 결정이 되며 협상의 결과 주어진 역할을 수행하게 된다. 본 논문에서는 분산 침입 탐지 시스템 (Distributed Intrusion Detection System)의 침입 성능을 향상시키며, 침입 차단 시스템(firewall)과의 통신을 위해서 계약망프로토콜을 사용하여 연동하는 방법을 소개한다. IDS와 firewall의 모델을 계층적으로 구성하기 위해서 DEVS (Discrete Event system Specification) 방법론을 사용하였다. 각 침입 탐지 에이전트는 계약망 프로토콜을 사용하여 침입을 탐지하게 된다. 침입 탐지의 내용은 바로 방화벽에 알려지고 방화벽은 이러한 침입 사실을 바탕으로 유해 트래픽이 네트워크로 유입되는 것을 막는다. 즉 한 침입 탐지 시스템이 침입을 탐지하게 되면 이를 침입 차단 시스템에 알리게되어 해당 침입 패킷을 차단하게 된다. 이러한 방법을 사용하여 네트워크의 피해를 막게 된다.

  • PDF