• Title/Summary/Keyword: digital risk

Search Result 825, Processing Time 0.027 seconds

Characteristic Analysis on the Distribution Pattern of Discharge Signals Generated in the Power Cable (전력 케이블에서 발생되는 방전 신호의 분포패턴에 관한 특성 분석)

  • So, Soon-Youl;Hong, Kyung-Jin;Jung, Woo-Seong;Lim, Jang-Seob;Lee, Jin;Lee, Joon-Ung;Kim, Tae-Sung
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.11 no.11
    • /
    • pp.1035-1042
    • /
    • 1998
  • After the 1990's, a computer-aided partial discharge(PD) measurement system was referred in part of aging diagnosis using digital signal processing as the new technology has been studied. The PD patterns and relevant information for pattern recognition are discussed in PD research area, because discharge quantity(q), the number of discharge pulse(n) and the applied boltage phase($\varphi$) was combined with the system information of the aging state. This paper investigates the discharge phase and quantity, as well as the number of discharge(n) with regard to discharge signals generated in power cable. therefore, according to characteristic analysis on the distribution of $\varphi$, q and n, it is able to apply in the aging analysis of power cable which visual observation is impossible and distribution change of discharge signals offers much information for risk degree on aging progress of insulation materials.

  • PDF

Gender Differences of Vertical Drop Landing Strategies in College Students

  • Yi, Chung-Hwi;Park, So-Yeon;Yoo, Won-Gyu
    • Physical Therapy Korea
    • /
    • v.11 no.4
    • /
    • pp.1-6
    • /
    • 2004
  • The kinematics involved in different landing strategies may be related to the occurrence of trauma. Several sources suggest that the angle of knee extension on touchdown and impact with the ground determines the magnitude of the impact force and, indirectly, knee loading. This study compared the initial knee angle and maximum knee flexion angle at the instant of impact on drop-landings between healthy men and women. In this study, 60 participants (30 males, 30 females) dropped from a height of 43 cm. A digital camera and video motion analysis software were used to analyze the kinematic data. When landing, there was significant difference between the two groups ($15.67{\pm}6.05^{\circ}$ in male, $24.10{\pm}6.34^{\circ}$ in female) in the mean knee flexion angle. The range of knee flexion on landing ($44.06{\pm}10.97^{\circ}$ in male, $36.96{\pm}9.99^{\circ}$ in female) also differed significantly (p<.05). The greater knee flexion that was observed in the male subjects would be expected to decrease their risk of injury. Women land with smaller range of knee flexion than men and this might increase the likelihood of a knee injury.

  • PDF

An Information Systems Operation Framework for Small and Medium Enterprises (중소기업을 위한 정보시스템 운영 프레임웍)

  • Park, Kwang-Ho;Baek, Dong-Hyun
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.223-239
    • /
    • 2006
  • In digital economy, information systems are recognized as the most critical survival factor of companies. Companies must launch and expand business based on information systems either developed newly or adopted as ERP. However, successful information systems operation shall face many realistic problems. Especially most small and medium enterprises experience many difficulties in systems operation or even give up operating information systems due to unexpected operational problems. This paper suggests a framework for effective information systems operation for small and medium enterprises. The framework is designed through case studies, consisting of service framework, auditing framework, and risk management framework. It is expected that the framework contributes to successful information systems operation in small and medium enterprises.

Development of Multi-Sensor based River Monitoring Technology for River Flood Risk surveillance (하천 홍수 위험 감시를 위한 다중센서 기반 하천 관측 기술 개발)

  • Jang, Bong-Joo;Jung, In Taek
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.11
    • /
    • pp.1372-1382
    • /
    • 2020
  • This paper proposes a core technology for a micro river monitoring terminal device suitable for flood monitoring in small rivers and valleys. Our proposed device is basically equipped with a 77GHz radar, gyro and accelerometer sensors. To measure the flow velocity and water level, we proposed a signal processing technique that extracts pure water energy components from the observed Doppler velocity and reflection intensity from the radar. And to determine the stability of the river structure equipped with our device, we constantly monitor the displacement of the measured values of the gyro and accelerometer sensors. Experimental result verified that our method detects pure water energy in various river environments and distinguishes between flow velocity and water level well. And we verified that vibration and position change of structures can be determined through a gyro sensor. In future research, we will work to build a secure digital twin river network by lowering the cost of supplying RF-WAV devices. Also we expect our device to contribute to securing a preventive golden time in rivers.

Application of Drones for the Analysis of Hazard Areas in Mountainous Disaster (산지재해 발생 위험지역 분석을 위한 드론의 적용)

  • Lee, Jeong Hoon;Jun, Kye Won;Jun, Byong Hee
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.3
    • /
    • pp.65-70
    • /
    • 2018
  • Terrain data for disaster analysis in hazardous or disaster areas is not only important but also needs to be built quickly. In particular, the introduction of drones is in the early stages of research using drones in a variety of fields such as shooting, analyzing and managing hazardous areas. It is expected that drone will be faster, safer and more effective than existing data collection method in case of small scale disaster hazard area and disaster area where equipment or manpower input is difficult. Therefore, in this study, drone shooting was performed for hazardous areas in mountainous roads located in Samcheok city, Gangwon province, and ground reference points were measured by RTK-GPS. The measured data were converted into DSM (Digital Surface Model) data by coordinate correction using Pix4D postprocessing program and then applied to the analysis of the hazard area of mountainous area. As a result, it was shown that it is effective to identify the risk by using the basic terrain data obtained from the drones.

Risk and Opportunity of Interest Conflict Settlement : Introduction of Consumer Collective Lawsuit (Verbandsklage) (이해관계 갈등조정의 위기와 기회 - 소비자단체소송제도의 도입 -)

  • Min, Hyeon-Seon;Jang, Ju-Seong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.39-44
    • /
    • 2006
  • The purport of this paper is to deduce political implication and significance of the proposed redress scheme of 'Consumer Collective Lawsuit (hereinunder "CCL")' under way to be introduced by the Korean government via various assessments per each phase of policy implementation process. To this end, the paper classifies the subject policy (referring to CCL) implementation process into 4 phases: policy origination, policy enactment, policy advertisement, and policy execution. Based on the said classification, assessments per each phase together with pros and cons analysis have been conducted. Through the aforementioned analysis, the paper concludes the following political implication and significance of CCL under way of introduction: - 1. In the case of policy origination led by external parties, a social consensus by and from involved parties with various interests is the most critical; 2. Prior feasibility and/or suitability study is also crucial in the policy implementation procedure; 3. To mitigate inter-ministerial conflicts that might arise from the due policy making procedure, democratization of conflict settlement mechanism, and institutionalization of participation in and disclosure of policy making process are cal led upon; and 4. Prior planning wi th respect to the public relation and advertisements of the subject policy on the table poses substantial significance.

  • PDF

Characterization and Detection of Location Spoofing Attacks

  • Lee, Jeong-Heon;Buehrer, R. Michael
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.396-409
    • /
    • 2012
  • With the proliferation of diverse wireless devices, there is an increasing concern about the security of location information which can be spoofed or disrupted by adversaries. This paper investigates the characterization and detection of location spoofing attacks, specifically those which are attempting to falsify (degrade) the position estimate through signal strength based attacks. Since the physical-layer approach identifies and assesses the security risk of position information based solely on using received signal strength (RSS), it is applicable to nearly any practical wireless network. In this paper, we characterize the impact of signal strength and beamforming attacks on range estimates and the resulting position estimate. It is shown that such attacks can be characterized by a scaling factor that biases the individual range estimators either uniformly or selectively. We then identify the more severe types of attacks, and develop an attack detection approach which does not rely on a priori knowledge (either statistical or environmental). The resulting approach, which exploits the dissimilar behavior of two RSS-based estimators when under attack, is shown to be effective at detecting both types of attacks with the detection rate increasing with the severity of the induced location error.

Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis (인지지도분석을 통한 정보보호 산업 활성화전략)

  • Lee, Jung Mann;Cho, Ilgu;Rim, Myung Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.177-194
    • /
    • 2016
  • This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

An Adaptive Agent Approach to Micropayment System

  • Chaiyarangkitrat, Surachai;Permpoontanalarp,Yongyuth
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1331-1334
    • /
    • 2002
  • Micropayment is an electronic payment system for small value transaction. It needs to use a little amount of resources, such as communication and computation due to its small value. In other words, the processing cost for the micropayment must be less than the value of the payment. Several kinds of transactions are suitable for micropayment, eg. the purchasing of train tickets or digital newspapers. Since micropayment systems are designed for small-amount payment the key factor for any micropayment system design is believed to be the minimization of resource consumption without compromising the standard security. In this paper, we propose an adaptive agent approach to credit-based micropayment system, which employs the concept of dynamic balancing between the resource consumption and the risk in the system. As a result of the dynamic balancing, our system not only solves the problem of global overspending but also uses fewer amount of resources than existing approaches. Our approach limits the amount of money spent by untrusted customers to all merchants. Thus, our approach provides a boundary of the global overspending. In addition, for trusted customers, our approach requires less scale of communication for verifying authorizations than all existing approaches.

  • PDF

A versatile small-scale structural laboratory for novel experimental earthquake engineering

  • Chen, Pei-Ching;Ting, Guan-Chung;Li, Chao-Hsien
    • Earthquakes and Structures
    • /
    • v.18 no.3
    • /
    • pp.337-348
    • /
    • 2020
  • Experimental testing has been considered as one of the most straightforward approaches to realize the structural behavior for earthquake engineering studies. Recently, novel and advanced experimental techniques, which combine numerical simulation with experimental testing, have been developed and applied to structural testing practically. However, researchers have to take the risk of damaging specimens or facilities during the process of developing and validating new experimental methods. In view of this, a small-scale structural laboratory has been designed and constructed in order to verify the effectiveness of newly developed experimental technique before it is applied to large-scale testing for safety concerns in this paper. Two orthogonal steel reaction walls and one steel T-slotted reaction floor are designed and analyzed. Accordingly, a large variety of experimental setups can be completed by installing servo-hydraulic actuators and fixtures depending on different research purposes. Meanwhile, a state-of-the-art digital controller and multiple real-time computation machines are allocated. The integration of hardware and software interfaces provides the feasibility and flexibility of developing novel experimental methods that used to be difficult to complete in conventional structural laboratories. A simple experimental demonstration is presented which utilizes part of the hardware and software in the small-scale structural laboratory. Finally, experimental layouts of future potential development and application are addressed and discussed, providing the practitioners with valuable reference for experimental earthquake engineering.