• 제목/요약/키워드: technical measures

검색결과 603건 처리시간 0.023초

Achievement of the KTX project for the past year and improvement measures - compared with those of the Tokaido Shinkansen- (고속철도 운행1년의 성과와 개선 방향 -일본의 동해도 신간선과 비교하여-)

  • LEE Yong-Sang;Won Jong-Deok
    • Proceedings of the KSR Conference
    • /
    • 한국철도학회 2005년도 춘계학술대회 논문집
    • /
    • pp.947-956
    • /
    • 2005
  • In this paper, I scrutinize what Korea has achieved from the KTX(Korea Train Express) project for the past one year of operation since it was open to public in April 2004 while looking into some improvement measures for better services in the future. I tried to compare the clements with those of the Tokaido Shinkasen in Japan. As things may turn at its premier operation, the KTX has been suffering from a small number of passengers, low in demand. However, when I compared the previous year with the post KTX operation of one year, demand of the passenger has increased $40\%$ on Kyong-bu line. I figured the first one year of the KTX operation pretty much followed in the footstep of the Tokaido Shinkansen's. For example, the rate of the each train to be on time as the timetable was equivalent while KTX went through less technical problems than the Tokaido Shinkansen. I have come up with some ideas for improvement, which I believe will lead to the development growth of KTX. First, I suggest that we complete the construction of laying new rails on Kyong-bu line at the earliest possible time. Second, we need to extend the high speed network as well as the rail modernization. Last, I have no doubt that we should secure high technology before we forge in the overseas markets.

  • PDF

The Introductory Concept of Maritime Safety Audit as a tool for Identifying Potential Hazards

  • Cho, Ik-Soon;Kim, In-Chul;Lee, Yun-Sok
    • Journal of Navigation and Port Research
    • /
    • 제34권9호
    • /
    • pp.699-704
    • /
    • 2010
  • Recently, the navigation risk is increasing significantly with growing of vessels' volume and propelling marine facilities, water bridges and port development etc. As a result, Ministry of Land, Transport and Maritime Affairs enacted a new law called MSA(Maritime Safety Audit) as a comprehensive maritime traffic safety management scheme in order to ensure safety improvements from the early planning stage to post managing of the development which affect the maritime traffic environment. MSA as a tool for improving maritime traffic safety is a formal safety diagnosis assessment in the existing or future ship's fairway by an independent audit institute. It examines the potential hazards of maritime traffic safety about the port development, if necessary, and is to ensure the implementation of appropriate safety measures. The primary purpose of MSA is to identify potential risk elements affecting safe navigation. This paper is aimed to introduce the backgrounds, the necessity and efficiency of MSA and also to describe some technical standards and diagnostic procedures.

Development of Equipment Operating Condition Diagnosis Model Using the Fuzzy Inference (퍼지추론을 이용한 설비가동상태진단 모델 연구)

  • Jeong, Young-Deuk;Park, Ju-Sik
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • 제28권4호
    • /
    • pp.109-115
    • /
    • 2005
  • In the study, Methods for operating measures in equipment security to find out dangerousness timely in the system and to need for the prevention and measures. The method for analyzing and reconstructing the causes of accident of equipment in site, and try to save the information of site in real-time and to analyze the state of equipment to look for the factors of accidents. By this analysis, one plan for efficiency of production, Equipment Fault Diagnosis Management and security is integrating and building module of using the Fuzzy Inference based on fuzzy theory. The case study is applied to the industrial electric motors that are necessarily used to all manufacturing equipment. Using the sensor for temperature is attached to gain the site information in real time and to design the hardware module for signal processing. In software, realize the system supervising and automatically saving to management data base by the algorithm based in fuzzy theory from the existing manual input system

Food Security Problems in North-East Asia and Cooperative Measures in the 21st Century (21세기 동북아 식량안보문제와 지역간 협력방안)

  • Kwon, Yong Dae
    • Korean Journal of Agricultural Science
    • /
    • 제27권2호
    • /
    • pp.182-189
    • /
    • 2000
  • The issue of food security will become one of the most widely concerned area of public policy in North East Asia coming 21st century. Although those countries such as China, Japan, South and North Koreas and Mongolia places emphasis on the need to have stable and reliable capacity for food production, it will be highly possible for these regions to experience the shortage of food supply due to growing population, expanding urbanization and rapid industrialization within next decade. Since world food markets are characterized as unstable structure and dominated by large multinational firms, their reliances on importing staple food may create the aggravation of food shortage problem in emergency situations. One possible proposal for solving food security in north-east region might be movements toward multilateral food supply assurance agreements as a component of trade negotiations among these countries. As measures for cooperation for securing food supply in these regions, following principles would be suggested; 1) encouraging agricultural cooperation based on private business, 2) exchange of technical and human resources rather than material support, 3) developing mutual concern and benefits, 4) managing joint buffer stock for staple food.

  • PDF

The Role of Modeling in Prosthetics Make-up (보철분장에 있어 모델링의 역할)

  • Lee, Hwa-Jin
    • Journal of the Korean Society of Fashion and Beauty
    • /
    • 제2권3호
    • /
    • pp.60-67
    • /
    • 2004
  • Representing all the parts of human body visible to fit into the script, it can be told that real make-up has been done. Based on the point of view. it will be different from others. To become the beautiful, beauty make-up has to be done, however, to be someone described in the script or any other factions after analyzing characters of being represented, special make-up fits into that category. In the special make-up, there are two different pins: one is 2 dimension make-up which is describing images using dots, lines and colors and other is 3 dimension which will include necessary shapes to figure. Even though there seems to be different between modern technologies and handy work, since accurate measures and graphics have to be used to make perfect character describes in the script, more investments and studies than before have to be made. Real attraction of 3 dimension make-up is building up the images and shapes using unseen abstract images having analyzing characters. It will be decided in the working process called modeling. As having distinguished this part from other make-ups as named prosthetics make-up, proposing means and measures of prosthetics make-up will actually help the others who are studying make-up.

  • PDF

Technology and Policy Post-Security Management Framework for IoT Electrical Safety Management (IoT 제품의 안전 관리를 위한 기술 및 정책적 사후 보안관리 프레임워크)

  • Lee, Donghyeok;Park, Namje
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • 제66권12호
    • /
    • pp.1879-1888
    • /
    • 2017
  • The Internet of Things (IoT) environment has been gradually approaching reality, and although it provides great convenience, security threats are increasing accordingly. For the IoT environment to settle safely, careful consideration of information security is necessary. Although many security measures in the design and development stages of IoT products have been studied thus far, apart from them, the establishment of systems and countermeasures for post management after the launch of IoT products is also very important. In the present paper, a technical and policy post-security management framework is proposed to provide secure IoT environments. The proposed framework defines the concrete response procedures of individual entities such as users, manufacturers, and competent authorities in the case of the occurrence of security flaws after launching IoT products, and performs appropriate measures such as software updates and recalls based on an assessment of the risk of security flaws.

A Study on Assessment of Vessel Traffic Safety Management by Marine Traffic Flow Simulation (해상교통류 시뮬레이션에 의한 해상교통안전관리평가에 관한 연구)

  • Park Young- Soo;Jong Jae-Yong;Inoue Kinzo
    • Journal of the Korea Society for Simulation
    • /
    • 제11권4호
    • /
    • pp.43-55
    • /
    • 2002
  • Vessel traffic safety management means the managerial technical measures for improving the marine traffic safety in general terms. The main flow of vessel traffic safety management is that: 1) Traffic Survey, 2) Replay by Marine Traffic Flow Simulation, 3) Quantitative Assessment, 4) Policy Alternatives, 5) Prediction·Verification. In the management of vessel traffic safety, it is most important to establish assessment models that can numerically estimate the current safety level and quantitatively predict the correlation between the measures to be taken and the improvement of safety and the reduction of ship handling difficulties imposed on mariners. In this paper, the replay model for traffic flow simulation was made using marine traffic survey data, and the present traffic situation became replay in the computer. An attempt was made to rate the current safety of ports and waterways by applying the Environmental Stress model. And, as a countermeasure for traffic management, by taking of, the promotion of total traffic congestion in early morning rush hour, the correlation between traffic control rate and the reduction in ship handling difficulties imposed on mariners was predicted quantitatively.

  • PDF

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권2호
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Defense ICT Supply Chain Security Threat Response Plan (국방 ICT 공급에 대한 보안 위협 대응 방안)

  • Lee, Yong-Joon
    • Convergence Security Journal
    • /
    • 제20권4호
    • /
    • pp.125-134
    • /
    • 2020
  • The potential security threat is increasing as the supply of ICT products to the defense sector increases with the development of information and communication technology. Attempts to neutralize, such as intelligence gathering and destruction, through attacks on the defense power support system and the intelligence system of the weapons system could pose a fatal threat.Therefore, security measures of supply chain shear system that take into account ICT product production and operation stage to maintenance stage are needed in defense field. In the paper, technical and administrative measures for responding to 12 ICT supply chain security threats at each stage of the defense ICT supply chain life cycle were presented.

Non-Tariff Trade Policy in the Context of Deep Trade Integration: An Ex-Post Gravity Model Application to the EU-South Korea Agreement

  • Grubler, Julia;Reiter, Oliver
    • East Asian Economic Review
    • /
    • 제25권1호
    • /
    • pp.33-71
    • /
    • 2021
  • Many different approaches and databases have been developed for the evaluation of non-tariff measures (NTMs) and free trade agreements (FTAs). This paper is devoted to the EU-South Korea agreement, which is the first 'second-generation' FTA of the EU, addressing a wide array of non-tariff policies. We review the evolution of NTM types applicable to the EU-South Korea trade relationship and the role of NTMs in ex-ante and ex-post analyses of the agreement. Subsequently a structural gravity model is employed to assess the value added of information on different aspects of FTAs and types of NTMs by evaluating their ability to predict the trade effects of the EU-South Korea FTA. Our results show that, when accounting for information on the components common in modern deep trade agreements, no additional trade effect is attributable to the EU-South Korea FTA. The evolution of NTMs differs considerably across indicators used, but trade predictions are hardly affected. Most specifications point towards a negative effect of bilateral differences in the number of technical barriers to trade (TBT) applied and sanitary and phytosanitary measures (SPS) against which trading partners issued complaints at the WTO.