Ham, Kwang-Jun;Kim, Joon-Hyun;Yi, Geon-Ho;Choi, Ji-Yong;Jeong, Ui-Ho
Journal of Environmental Impact Assessment
/
v.13
no.6
/
pp.285-294
/
2004
The purpose of this study is to understand the quantitative change of water resources using RMS(Remote Monitoring System) which takes real time data with high reliability. Also, the characteristic of stormwater runoff was understood by the application of the above system for three streams (Jiam, Yulmun, and Gongji stream) in Chuncheon City. The detailed results of these studies are as follows; RMS(Remote Monitoring System) was constructed by the combination of the automatic water-level meter, which measures water-level of streams at all times, and the wireless communication system sending real-time data from the meter. This system is used to evaluate the stormwater runoff in watersheds and the quantitative changes of streams. It is possible to overcome the limit of field investigations needed, which takes a lot of manpower and time, and it is very efficient to provide the reliable flowrate data. Also, it can be applied to the disaster prevention system for flood because the change of flowrate in stream is monitored at real-time. For 3 streams with different watershed characteristics, correlation equations induced from the relation analysis results. In terms of the relation between water-level and flowrate, flowrate was increased rapidly as the water-level rises in case of small watershed and steep slope. The application results of the proposed system for 3 streams (Jiam, Yulmun, Gongji) in Chuncheon city are as follows; The remote monitoring system was very useful for acquisition of the flow rate in stream that are basic data to understand pollutants runoff in watershed. In case of no-rainy day, the runoff ratio for pollutant loading rate was the highest level in Yulmun stream(BOD:2.3%, TN:20.2%, TP:1.2%). So, it shows the management of pollution source is needed such as rehabilitation of sewer line. Runoff ratio of total phosphorus by rainfall in Gongji watershed was increased about 19 times than no-rainy day, which is estimated as the influence of sewer overflow.
The Journal of Korean Institute of Electromagnetic Engineering and Science
/
v.8
no.2
/
pp.185-196
/
1997
By considering the definition and application of resolution as well as the concept and theory of SAR, the essential contents of the SAR design and analysis are described. This paper is to compare and analyze the resolution performance capability of three techniques for achieving azimuth resolution such as the real aperture, the unfocused and the focused techniques, through the simulation. Simulation is performed to make the restricted conditions for the unfocused technique that can be implemented by the less commputing load of signal processingand the lower cost. Through the mission analysis, the use of SAR image can be applied for estimation of whole situation at the regional area in the field of military demands for tactical purpose as well as civilian demands for the damage of disaster. RPV and sall or medium aircraft are selected to carry the SAR for these purposes and the proper resolution turns ou 5~15 m. The trade-off study of variables through the simulations results in the proper conditions such that range is less 3, 000 m, Wavelength is 1~10 m, and the raw signals and results processed by three techniques for two point targets are exhibited undr such conditions. Therefore, at some points, the result of this paper si proposed for useful applications of unforcused technique in the restricted conditions except the identification of the small target at a long range re- quired for high resolution.
This study performed the construction of test bed for the combination of the health monitoring system In Yongjong grand bridge with the safety management network system in order to explore the feasibility of combining the existing monitoring system with the safety management network system. For this purpose, connection program which consists of DAQ sender server program and DAQ receiver server program has been developed. DAQ sender server program installed in the connection server, which is located on the DMZ zone of the existing monitoring system, plays the role of communicating with the monitoring system. On the other hand, DAQ receiver server program installed in the connection server, which is located on the integrated operation center of the safety management network system, plays the part of gathering real time and tim history data of the existing monitoring system and storing them in the integrated operation server through the communication with the DAQ sender. Test bed demonstrated the feasibility of combining the existing monitoring system with the safety management network system.
Journal of the Korea Society of Computer and Information
/
v.25
no.8
/
pp.159-172
/
2020
Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.
KIPS Transactions on Computer and Communication Systems
/
v.5
no.12
/
pp.447-454
/
2016
The research on multipath routing has been studied to solve the problem of frequent path breakages due to node and link failures and to enhance data delivery reliability in wireless sensor networks. In the multipath routing, mobile sinks such as soldiers in battle fields and rescuers in disaster areas bring about new challenge for handling their mobility. The sink mobility requests new multipath construction from sources to mobile sinks according to their movement path. Since mobile sinks have continuous mobility, the existing multipath can be exploited to efficiently reconstruct to new positions of mobile sinks. However, the previous protocols do not address this issue. Thus, we proposed an efficient multipath reconstruction protocol called LGMR for mobile sinks in wireless sensor networks. The LGMR address three multipath reconstruction methods based on movement types of mobile sinks: a single hop movement-based local multipath reconstruction, a multiple hop movement-based local multipath reconstruction, and a multiple hop movement-based global multipath reconstruction. Simulation results showed that the LGMR has better performance than the previous protocol in terms of energy consumption and data delivery delay.
The Journal of Korean Institute of Next Generation Computing
/
v.15
no.3
/
pp.7-15
/
2019
Cloud computing markets are rapidly growing as cost savings and business innovation are being carried out through ICT worldwide. In line with this paradigm, the nation is striving to introduce cloud computing in various areas, including the public sector and defense sector, through various research. In the defense sector, DIDC was established in 2015 by integrating military, naval, air and military computing centers, and it provides cloud services in the form of IaaS to some systems in the center. In DIDC and various future cloud defense systems, It is an important issue to ensure availability in cloud defense systems in the defense sector because system failures such as network delays and system resource failures are directly linked to the results of battlefields. However, ensuring the highest levels of availability for all systems in the defense cloud can be inefficient, and the efficiency that can be gained from deploying a cloud system can be reduced. In this paper, we classify and define the level of availability of defense cloud systems step by step, and propose the strategy of introducing Erasure coding and failure acceptance systems, and disaster recovery system technology according to each level of availability acquisition.
The flammable liquid conductivity is an important factor in determining the generation of electrostatic in fire and explosion hazardous areas, so it is necessary to study the physical properties of flammable liquids. In particular, the relevant liquid conductivity in the process of handling flammable liquids in relation to the risk assessment and risk control in fire and explosion hazard areas, such as chemical plants, is classified as a main evaluation item according to the IEC standard, and it is necessary to have flammable liquid conductivity measuring devices and related data are required depending on the handling conditions of the material, such as temperature and mixing ratio for preventing the fire and explosion related to electrostatic. In addition, IEC 60079-32-2 [Explosive Atmospheres-Part 32-2 (Electrostatic hazards-Tests)] refers to the measuring device standard and the conductivity of a single substance. It was concluded that there is no measurement data according to the handling conditions such as mixing ratio of flammable liquid and temperature together with the use and measurement examples. We have developed the measurement reliability by improving the structure, material and measurement method of measuring device by referring to the IEC standard. We have developed a measurement device that is developed and manufactured by itself. The test results of flammable liquid conductivity measurement and the data of the NFPA 77 (Recommended Practice on Static Electricity) Annex B Table B.2 Static Electric Characteristic of Liquids were compared and verified by conducting the conductivity measurement of the flammable liquid handled in the fire and explosion hazardous place by using Measuring / Data Acquisition / Processing / PC Communication. It will contribute to the prevention of static electricity related disaster by taking preliminary measures for fire and explosion prevention by providing technical guidance for static electricity risk assessment and risk control through flammable liquid conductivity measurement experiment. In addition, based on the experimental results, it is possible to create a big data base by constructing electrostatic physical characteristic data of flammable liquids by process and material. Also, it is analyzed that it will contribute to the foundation composition for adding the specific information of conductivity of flammable liquid to the physical and chemical characteristics of MSDS.
In the context of the global pandemic caused by COVID-19, emergency alert text messages can violate the privacy of confirmed corona positive cases. This study used conjoint analysis to identify the essential information factors and the privacy invasion information factors of local government initiated safety notices. As a result of this study, we found eight essential information factors, including all routes of the confirmed case and ten privacy invasion factors of safety notices. In addition, we found that there is a similarity between the combinations of information perceived to be the most essential and perceived as the most significant privacy invasion; both combinations include the confirmed case's personal and route information. This study ultimately tried to suggest a way to lower the concern about privacy invasion of the confirmed cases without damaging the emergency alert text messages' essential information. We expect that this study will provide researchers and policymakers interested in disaster communication with valuable theoretical and practical implications.
The Journal of the Convergence on Culture Technology
/
v.8
no.4
/
pp.361-366
/
2022
Although safety and health education is reported to be very effective in reducing the industrial accident rate, the demand for improvement in safety and health education is also very high. The purpose of this study is to present measures to enhance effectiveness by investigating the effectiveness and demand for safety and health education for supervisors among the safety and health education systems. As a result of the study, it was found that the satisfaction and effectiveness of safety and health education were low. As the most important competency required for supervisors, it was investigated that job competency was the ability to discover harmful risk factors and formulate disaster prevention measures in the work process and work environment, and base competency was communication ability. In addition to designated safety and health education institutions, there was a high demand for recognition as education completion time even when professional education by job was completed by other professional education institutions. Therefore, in safety and health education for supervisors, it is necessary to focus on major items to improve supervisors' job competency and base competency, and to recognize that they have completed education at a wide range of educational institutions. We believe that it can increase the supervisor's capacity for safety management and improve the effectiveness of safety and health education.
Journal of the Korean Institute of Traditional Landscape Architecture
/
v.40
no.3
/
pp.46-56
/
2022
This study aimed to analyze the locational characteristics of heritage sites in Seoul in order to identify flood susceptibility by type. As for the location factors related to flood susceptibility, elevation, slope, distance to streams, and topographic location were analyzed. Literature review was supplemented for the historical and humanistic environments of heritage sites. The results of the study are as follows. First, heritage sites in Seoul are distributed throughout the city, and are especially highly dense in the Hanyangdoseong fortress. It was also confirmed that heritage sites were concentrated around Jung-gu, Jongno-gu, Jingwan-dong, and Ui-dong in the quantitative spatial analyses. Second, types of heritage sites at the circumstance susceptible to flood damage were related to commerce and distribution, traffic, modern traffic and communication, geological monument, residence, government office, and palace. Third, heritage types with locational characteristics that showed low flood susceptibility were found to be natural scenic spots, telecommunication, ceramics, Buddhism, tombs, and tomb sculptural heritage assets. In a time when risk factors that can damage the value of heritage are gradually increasing due to anthropogenic influences along with changes in the natural environment, this study provides basic data for vulnerability analysis that reflects the unique characteristics of heritage assets. The results can contribute to more comprehensive and comprehensive insights for the management and protection of heritage by including the humanities and social science data together with natural factors in the analysis.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.