• 제목/요약/키워드: safeness

검색결과 39건 처리시간 0.038초

제조업 근로자의 작업환경안전에 영향을 미치는 요인에 관한 연구 (A Study on the Factors Influencing Safeness of Work Environment in Manufacturing Industry)

  • 권오준
    • 한국안전학회지
    • /
    • 제24권5호
    • /
    • pp.77-83
    • /
    • 2009
  • The manufacturing industry is the one with the most frequent industrial disasters, and it is important to study the safety climate recognized by workers in the industry in order to actively prevent industrial accidents. However, little research has been performed on the safety climate in workplaces felt by the workers in the manufacturing industry. The purpose of this study is to identify the factors affecting work environment safeness based on practical analysis via survey, and to establish the relation between safety performance factors and safeness of work environment. The survey was performed for workers in the manufacturing industry(n=228), and structural equations model analysis by using the AMOS 7.0 was performed in order to identify the fit of the research model and the causation among factors. According to the results of the analysis, the reliability and the model fit were appropriate for interpretation, and safety participation was shown to affect safeness of work environment more than safety compliance. The results of this study may serve as the reference for taking a measure to improve the level of safeness of the work environment felt by workers in the manufacturing industry.

3단 BGP 백업 라우팅 (A Three-Tier BGP Backup Routing)

  • 서창진
    • 한국정보과학회논문지:정보통신
    • /
    • 제32권6호
    • /
    • pp.745-752
    • /
    • 2005
  • BGP[1]는 광대역 인터넷에 사용되는 유일한 라우팅 방식으로서 인터넷의 계층구조와 자신의 정책에 의해서 경로를 선정한다. BGP 라우터는 일부의 인근 BGP 라우터에 대해서만 선택적으로 라우팅 정보를 공표하기 때문에 링크가 연결되었다고 해서 출발지 노드에서 목적지 노드까지의 라우팅 정보가 도달되지는 않는다. 특히 바이러스나 재난으로 인하여 광범위에 걸쳐서 많은 BGP 라우터가 다운되는 유사시에 인터넷의 연결성을 유지하기 위하여 BGP는 평소에 도달할 수 없는 경로도 제한적으로 도달할 수 있어야 한다. 이 논문은 BGP 백업 라우팅의 요구사항을 나열한 후 이러한 사항을 최대로 만족하는 백업 라우팅 규칙을 찾아본 결과 기존 방식이 안고 있던 대부분의 단점이 해결된 백업방식을 도출하였다. 제안되는 백업방식은 우선 BGP 백업 라우팅은 네트웍의 피해정도에 따라 3단계로 동작한다. 이 규칙 하에서 BGP 라우터는 평소에는 0단계에서 정의되는 경로만을 사용하다가 BGP 라우터의 손상범위에 따라서 1단계로, 손상범위가 더 커지면 2단계로 사용범위를 확장한다. 또한 이 논문은 제안된 백업 방식이 네크웍의 안정성(stability)과 안전성(safeness)을 보장함을 증명하였다. 그 결과 제안된 백업방식은 사소한 지역적인 네트웍 사고에서부터 전체적인 심한 네트웍 사고에 이르는 모든 사고에 대해서 적응력 있게 대처하여서 강력한 경로의 도달성을 항시 제공한다.

서비스업 사업장 안전분위기 평가에 관한 연구 (A Study on the Evaluation of Safety Climate in the Service Industry)

  • 권오준;최성원;김영선
    • 한국안전학회지
    • /
    • 제25권4호
    • /
    • pp.76-83
    • /
    • 2010
  • As one of crucial industries, the service industry occupies a large part of economy in Korea poor in natural resources. However, prevention of industrial disasters has been promoted mainly in manufacturing and construction industries where the frequencies of such disasters and victims are high. Research on the evaluation of workplace safety climate has been conducted centering on traditional industries like manufacturing and construction, and few studies have been made for service businesses. The objective of this study was to evaluate workplace safety climate perceived in the field by workers engaged in service businesses and to contribute to the establishment of industrial safety and health policies in consideration of the characteristics of each business category. Using research variables safety knowledge, safety attitude, safety motivation, safety participation, safety compliance, and safeness of work environment, we evaluated comprehensive workplace safety climate based on the causal relations among the variables. In the results of analyzing data from a questionnaire survey of service business employees, statistically significant effect relations among the variables were identified, and the fitness of the model with approved reliability and validity was verified.

전력 IT 네트워크 보안 전망 (Prospection of Power IT networks)

  • 김학만;강동주
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2007년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.294-295
    • /
    • 2007
  • The importance of security is increased in power industry. Recently Power IT networks are attacked in cyber space and demage of attack become increased. For solving the problems, many research studies for network security enhancement are globally carried out in the world. In this paper, we introduce recent cyber attack cases, efforts for enhancing cyber safeness and put into perspective of potential security areas for power IT areas.

  • PDF

An Elastic Joint Manipulator for a Human friendly robot

  • Takahashi, Takayuki;Murayama, Yasushi;Wang, Zhi-Dong;Nakano, Eiji
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.44.3-44
    • /
    • 2001
  • This articles describes a novel design elastic joint manipulator for a mobile robot, which works in an office environment with humans. The primary goal of this manipulator design is safeness on collision and contact. To achieve this, each joint is made of an elastic element and this is driver with a high ratio gear tram. The performance was verified, however, it has a serious drawback. It produce vibration, due to the elastic joints and high ratio gear train. We found that a sliding mode controller has an excellent performance for reducing such vibration. Results of computer simulation and experiments are shown.

  • PDF

비연속 시스템 제어를 위한 확장된 safe petri net 모델과 실시간제어를 위한 scanning algorithm의 개발 (Development of extended safe petri net model for discrete system control and scanning algorithm for real time control)

  • 황창선;서정일;이재만
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1988년도 한국자동제어학술회의논문집(국내학술편); 한국전력공사연수원, 서울; 21-22 Oct. 1988
    • /
    • pp.338-342
    • /
    • 1988
  • Recently, in sequence control systems, high flexibility and maintenance of control software are required. This is because product life cycles become shorter and control specification must be changed frequently. The authors extend the concept of Safe Petri Net to develop the design and analysis tool for sequence control systems taking the safeness and notation of input/output functions into consideration. Extended Safe Petri Net (S-Net) is proposed as such a new graph model and real time scanning algorithm based on S-Net is developed.

  • PDF

DEVS 형식론을 이용한 공항 PAR 관제 시스템 자동화 방안 검증 (Verification of Automatic PAR Control System using DEVS Formalism)

  • 성창호;구정;김탁곤;김기형
    • 한국시뮬레이션학회논문지
    • /
    • 제21권3호
    • /
    • pp.1-9
    • /
    • 2012
  • 본 논문에서는 공항 정밀접근 항공기의 안전성을 증대시키기 위한 방법으로 S/W 패킷모뎀을 이용한 PAR 관제 자동화 방안을 제안하고, DEVS 형식론을 이용하여 제안하는 시스템의 기능을 검증하였다. 기존의 PAR 관제는 음성으로 항공기를 통제함으로써 조종사의 정보 획득 능력이 떨어질 수 있다. 이를 해결하기 위하여 디지털 신호에 의한 자동 관제 시스템을 제안하고, 공항의 PAR이 추적하고 있는 항공기의 비행경로, 강하각, 거리를 조종사에게 실시간으로 전송해 주고 일반화함으로서 관제사의 숙련도와 관제 특성에 기인하는 요소를 배제할 수 있다. 제안된 시스템의 동작을 검증하기 위하여 확장된 DEVS 형식론인 C-DEVS 형식론을 사용하고, 하나의 모델로 합성된 원자 모델을 통해 시스템의 전체 상태 시퀀스를 검색하여 시스템의 안전성(Safeness)과 필연성(Liveness)을 검증할 수 있다. 제안하는 시스템의 C-DEVS 모델을 기존의 음성 관제 시스템과 비교하여 두 시스템이 동일한 상태 시퀀스를 가짐을 확인하였으며, 모든 상태를 검증함으로써 실제 상황에 적용할 수 있을 것으로 생각된다.

Development of the Speed Limit Model for Harbour and Waterway(II) - The Method of Speed Limit Decision and Application -

  • Kim, Deug-Bong;An, Kwang
    • 해양환경안전학회지
    • /
    • 제21권3호
    • /
    • pp.274-282
    • /
    • 2015
  • This research is the result on calculating the logical speed limit through certain process which some elements must be considered on selecting the speed limit of harbour and waterway. The suggested speed limit select model on this research is processed from 1~6 steps by forming a professional group of experts. Each step has its information which 1st step(water division), 2nd step(selecting the model vessel and vessel applied with speed limit.), 3rd step(selecting the maximum and minimum speed range on each section), 4th step(evaluation on the safeness of traffic), 5th step(suggesting the appropriate speed limit), 6th step(execution and evaluation.). The appropriate speed limit was decided on consideration of the safety of maritime traffic on the range of the maximum speed and the minimum speed. This model was used to derive the appropriate speed limit on the harbour water and Busan harbour entrance waterway. As the result, the harbour water was calculated to be 6.9 knots, the appropriate speed limit of Busan entrance harbour was 9.3 knots. The present calculation of the speed limit on the approaching channel area is 10 knots, inner harbour area is 7 knots, which are similar to the result of the speed limit. This research is the first research on selecting the speed limit model and has its limits on finding the perfect speed limit result. More detailed standards on the safeness of traffic evaluation must be found and additional study is necessary on discriminating consideration of the elements. This research has its value which it provides instances of aboard cases on guidelines of selecting the speed limit.

시간논리 구조와 Petri Net의 합성방법을 사용한 이산사건 시스템의 모델링 (A Modeling of Discrete Event System Using Temporal Logic Framework and Petri Net)

  • 김진권;모영승;류영국;황형수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1999년도 하계학술대회 논문집 B
    • /
    • pp.838-840
    • /
    • 1999
  • In this paper, modeling and analysis of discrete event systems by temporal logic frame works and petri net is considered. The reachability tree of the petri net can be used to solve the safeness, boundedness, conservation and coverability problems of discrete event systems. But the reachability tree of the petri net do not solve reachability and liveness problems in general. We proposed a method that synthesised the petri net and the temporal logic frameworks. This method slove some problems of petri net by logical representation of temporal logic frameworks.

  • PDF

Evaluation of Safeness and Functionality in Applied Technologies for Mobile Messengers

  • Cho, Gyu-Sang
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권8호
    • /
    • pp.29-39
    • /
    • 2016
  • Recently, KakaoTalk users seek secure messengers with fears of 'possible' censorship over a mobile messenger. Instead German messenger "Telegram" is gaining popularity in South Korea. Are the known as secure messengers actually secure? In this paper, we evaluate secure mobile messengers in terms of private information protection. We establish the fourteen criteria to evaluate the functionality of messenger apps including communication encryption in transit, the possibility of leakage of decrypted messages via server, an encryption algorithm, a key exchange algorithm, an ephemeral message application, etc. Line, Telegram, Snapchat, WhatsApp, Wickr, Facebook Messenger and KakaoTalk, which have many worldwide and domestic users, are to be targeted. Wickr is ranked at the top of the evaluation, followed by Telegram and Line but KakaoTalk and Snapchat are ranked at the bottom of the evaluation list.