• Title/Summary/Keyword: Control of corruption

Search Result 51, Processing Time 0.023 seconds

Design and Integration of a Dual Redundancy Air Data System for Unmanned Air Vehicles (무인항공기 이중화 대기자료시스템 설계 및 통합 연구)

  • Won, Dae-Yeon;Yun, Seonghun;Lee, Hongju;Hong, Jin-Sung;Hwang, Sun-Yu;Lim, Heung-Sik;Kim, Taekyeum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.639-649
    • /
    • 2020
  • Air data systems measure airspeed, pressure altitude, angle of attack and angle of sideslip. These measurements are essential for operating flight control laws to ensure safe flights. Since the loss or corruption of air data measurements is considered as catastrophic, a high level of operational reliability needs to be achieved for air data systems. In the case of unmanned air vehicles, failure of any of air data sensors is more critical due to the absence of onboard pilot decision aid. This paper presents design of a dual redundancy air data system and the integration process for an unmanned air vehicle. The proposed dual-redundant architecture is based on two independent air data probes and redundancy management by central processing in two independent flight control computers. Starting from unit testing of single air data sensor, details are provided of system level tests used to meet overall requirements. Test results from system integration demonstrate the efficiency of the proposed process.

Study on Fumigation Method of Harvested Fresh Chestnuts Produced in Korea (한국산 생밤의 훈증소독방법에 관한 연구)

  • Hah Jae-Kyu;Lee Cheon-Koo;Yu Ki-Yull
    • Korean journal of applied entomology
    • /
    • v.21 no.3 s.52
    • /
    • pp.133-137
    • /
    • 1982
  • An experiment was conducted to find out the proper and effective fumigation method for harvested fresh chestnuts produced in Korea. Fumigation with phosphine, causing damages on chestnuts by rapid corruption or change in color on pericarp, did not completely kill chestnut curculio and nut fruit tortrix larvae in harvested fresh chestnuts regardless of long exposure of chestnuts to phosphine. Any damages not being appeared by fumigant, fumigation with methyl bromide at $40g/m^3$ for 4 hours at $21^{\circ}C$ would retain the low control against inclusion of any chestnut pests tested. Though fumigation with methyl bromide at $50g/m^3$ for 24hours was effective against any larvae of chestnut insects control, they caused serious damages by making the flesh surface of harvested fresh chests dark or dense brown. However, fumigation with methyl bromide at $50g/m^3$ for 4 hours at $21^{\circ}C$ resulted in complete kill of larvae of Curculio dentipes and Carpocapsa splendana in harvested fresh chestnuts with no significant damages on the treated fruits.

  • PDF

Information Systems in Project Management of The Public Sphere

  • Mamatova, Tetiana;Chykarenko, Iryna;Chykarenko, Oleksii;Kravtsova, Тetiana;Kravtsov, Olеg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.141-148
    • /
    • 2021
  • Project management is a current trend of management in the public sphere, based on different principles, methods and tools. The tools include information technologies providing control over time, cost, quality and planning process in order to ensure accountability to interested parties. The goal of the research was to examine the impact of the integration of information systems in project management of the public sphere on the quality of public governance and administration using the example of infrastructure projects involving the private sector in developing countries. The methodology of the research is based on the concepts of "digital-era governance" (DEG), "Information governance" and "project governance" to determine the effectiveness of information systems and technologies in the management of infrastructure projects in the public sphere. The data from the countries with Lower middle income (India, Indonesia, Philippines, Ukraine, Vietnam) and Upper middle income (Argentina, Brazil, China, Colombia, Mexico, Peru, Romania, Russian Federation, Thailand, Turkey) for 1996-2020 were used to study the effects of DEG. The results show two main trends in the countries with Lower middle income and Upper middle income. The first trend is the development of digital governance, the concept of "digital-era governance" through information systems and performance measurement of the governance system, forecasting of investment flows of infrastructure projects, measurement of payback and effectiveness parameters for investment management in the public sector, decision support. The second trend is the existence of systemic challenges related to corruption, social and institutional factors through the development of democracy in developing countries and the integration of NPM similar to developed countries. The confidence of interested parties, especially private investors, in public authorities is determined by other factors - the level of return on investment, risks and assignment of responsibility, probability of successful completion of the project. These data still remain limited for a wide range of project participants, including citizens.

Gloria Naylor's Linden Hills: A Tragic Saga of the Oppressive "Primal Scene" and Deformed "Family Romance" (글로리아 네일러의 『린덴 힐즈』 -억압적 '원장면'과 왜곡된 '가족 로맨스'의 비극)

  • Hwangbo, Kyeong
    • Journal of English Language & Literature
    • /
    • v.58 no.1
    • /
    • pp.21-42
    • /
    • 2012
  • Gloria Naylor's second novel Linden Hills (1985) explores the issues of self-exploration, empowerment, history, and memory by delineating the communal and familial tragedies and the distortion of values prevalent in a prosperous African-American urban community called Linden Hills. Drawing upon the Freud's concept of "primal scene" and "family romance," this paper aims to focus upon the Nedeed family, the founder of Linden Hills, and investigate the compelling traumatogenic force within the family, which is inseparably intertwined with the inversion of values and moral corruption permeating the entire community. The "primal crime" committed by the Nedeed ancestors serves to preserve and perpetuate a tyrannical rule by ruthless patriarchs who reign by underhanded strategies of purposefully neglecting and abusing others, including their own wives. The imprisonment, by Luther Nedeed, of his wife Willa in the family morgue epitomizes the long legacy running in the family-the oppression and burial of the pre-Oedipal, maternal history. Willa's accidental encounter, at the nadir of the family estate and her personal despair, with the faded records of the forgotten and abused Nedeed women exposes the violence-ridden ground of the family's primal scene and the absurdity of family romance the Nedeeds pursued. As the several lines of poem composed by Willie, Willa's male double, show, the hidden, forgotten history of the Nedeed women, in a sense, is the real, which cannot be assimilated to the social symbolic governed by the inhumane patriarchy of the Nedeed family and the success-oriented Linden Hills society. By portraying a catastrophic downfall of the Nedeed family and the futile outcome of its family romance, the ending of Linden Hills conveys implicitly that the contingent symbolic order and its oppressive control, however solid and invincible they may seem, can be toppled down by the real, its nameless forgotten Other.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Importance of Political Elements to Attract FDI for ASEAN and Korean Economy

  • Teeramungcalanon, Monthinee;Chiu, Eric M.P.;Kim, Yoonmin
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.63-80
    • /
    • 2020
  • Purpose - Recent empirical studies have shown that FDI is expected to be strongly associated with democratic governance, political stability, and sound macroeconomic conditions of the host country. We attempt to take it a step further to see if governments implement a major change in institutional characteristics, will the institutional reform toward better governance have a substantive effect in enhancing FDI inflows. This paper thus aims to analyze the importance of good governance as an important factor in the attractiveness of FDI inflows in ASEAN+3 (Korea, China, Japan) countries. Design/methodology - To determine the effects of good governance on FDI inflows across ASEAN+3 countries recorded between 1996-2018, the Worldwide Governance Indicators (WGI) are used to investigate the impact of good governance on FDI inflows. The model has been estimated by using fixed effects to show the robustness of the results. Findings - Our main findings can be summarized as follows: Political Stability, Rule of Law, and Voice and Accountability have a statistically significant impact on the inflow of FDI in the ASEAN+3 Countries, especially for Korean economy. Moreover, GDP growth continue to exert their positive influence. However, Regulatory Quality, Government Effectiveness and Control of Corruption, though equally important, are insignificant to attract FDI inflows. The key finding is that good governance has a significant impact on inward FDI in the ASEAN+3 countries. Originality/value - Existing studies focus on the impact of political factors on FDI across countries. This paper instead attempts to investigate which type of good governance is the most important in promoting FDI inflows across ASEAN+3 countries, which is essential for multinationals to consider when choosing a foreign site as a possible FDI destination.

Scenario for sudden change in North Korea! : Comparing North Korea with countries of Jasmine Revolution (북한 급변사태 시나리오 I : 재스민혁명 국가들과 북한의 비교를 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2017
  • The Jasmine Revolution started from Tunisia in January 2011 has brought many changes into countries in North Africa and Middle East. We need to study the causes of the revolution. First, the kings and dictators in those countries oppressed the opposition parties and the media aiming for long-term seizure of power. The power concentrated on specific people produced illegalities and corruption. Secondly, most of the national income of those countries belonged to kings and dictators producing problems during the distribution of the income. Especially, with the decrease of oil price in 1990s and the increase of the price of daily necessities in 2000s people lost their credits on their governments. Lastly, the number of people in those countries using the Internet has increased by 4,863% from 2000 to 2010. The expansion of social network services such as Facebook and Twitter was one of factors that made the information control by those countries difficult. We should think about the possibility of sudden change in North Korea. It is necessary to compare and analyze the political, economic and social characteristics between those countries and North Korea. It shouldn't be just a simple comparison or analysis. It should provide basic data for objective and quantified index development in relation to sudden change in North Korea.

Analysis of Fire Risk Assessment Indicators of Publicly-Used Establishments using Delphi/AHP (Delphi/AHP를 활용한 다중이용업 신종업종의 화재위험평가지표 분석)

  • Kim, Myung-Cheol;Kim, Hak-Joong;Park, Kyung-Hwan;Youn, Hae-Kwon;Lee, Seung-Ho
    • Fire Science and Engineering
    • /
    • v.33 no.6
    • /
    • pp.87-94
    • /
    • 2019
  • Through a press release dated July 17, 2018, the Anti-Corruption and Civil Rights Commission recommended that the National Fire Agency develop preventive measures against fire in the "Indoor Archery Ground" and "Room Escape Café" etc., which were originally excluded from the category of "Publicly Used Establishments." This study developed the hierarchy of domains and indicators of measurement for fire risk assessment of the new business of publicly used establishments through the Delphi Method. It analyzed the goodness of fit scores (over 3.00) and secured an average score of 4.25. Using AHP analysis, the ratio of consistency for the domains of measurement of fire risk assessment was found to be 4.0%, which was lower than CR ≤ 0.1 (10%). The consistency of subsequent measurement indicators were distributed in the range of 0.1%~3.6%, and they were identified as being commonly consistent. The indicators of measurement appeared as follows in order of importance and priority: Type of Internal Passage of Establishment and Evacuation Capacity of Exit (0.316), Control of Ignition Source (0.141), Inherent Risk (0.106), Appropriateness and Adaptiveness of Fire Detection System (0.097), Control of Inflammables/Combustibles (0.084), Guides and Facilities helping Evacuation (0.075), Fire Resistant Structure and Finishing Materials (0.060), Compartmentalization and Emergency Exit (0.049), Risk of Fire Expansion (0.046), and Appropriateness and Adaptiveness of Fire Extinguishing Facilities (0.026). The findings of this study are expected to be expansively used as data for future research on the development of fire risk assessment indicators.

Performance Analysis of RS codes for Low Power Wireless Sensor Networks (저전력 무선 센서 네트워크를 위한 RS 코드의 성능 분석)

  • Jung, Kyung-Kwon;Choi, Woo-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.83-90
    • /
    • 2010
  • In wireless sensor networks, the data transmitted from the sensor nodes are susceptible to corruption by errors which caused of noisy channels and other factors. In view of the severe energy constraint in Sensor Networks, it is important to use the error control scheme of the energy efficiently. In this paper, we presented RS (Reed-Solomon) codes in terms of their BER performance and power consumption. RS codes work by adding extra redundancy to the data. The encoded data can be stored or transmitted. It could have errors introduced, when the encoded data is recovered. The added redundancy allows a decoder to detect which parts of the received data is corrupted, and corrects them. The number of errors which are able to be corrected by RS code can determine by added redundancy. The results of experiment validate the performance of proposed method to provide high degree of reliability in low-power communication. We could predict the lifetime of RS codes which transmitted at 32 byte a 1 minutes. RS(15, 13), RS(31, 27), RS(63, 57), RS(127,115), and RS(255,239) can keep the days of 173.7, 169.1, 163.9, 150.7, and 149.7 respectively. The evaluation based on packet reception ratio (PRR) indicates that the RS(255,239) extends a sensor node's communication range by up about 3 miters.

A Study on the Antibacterial and Antifungal Properties of Zeolite/Zinc-polypeptide Coated Polypropylene Film (Zeolite/Zinc-polypeptide를 코팅한 폴리프로필렌필름의 항균 및 항진균 특성에 관한 연구)

  • Lee, Hakrae;Ko, Euisuk;Shim, Woncheol;Kim, Jongseo;Kim, Jaineung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.27 no.1
    • /
    • pp.1-8
    • /
    • 2021
  • This study is for the application of functional antibacterial packaging to fresh food. Zeolite/Zinc-polypeptide was coated on PP film at concentrations of 5%, 10%, and 15%, degree of dispersion was verified through FESEM and FT-IR analysis. In addition, the antibacterial and antifungal properties of the films were analyzed according to the control group and the concentration of coating materials. As a result, the degree of dispersion of coating material was irregular but wide, depending on the concentration of Zeolite/Zinc-polypeptide on the surface of PP film. The antibacterial effect against E. coli was over 99.9%, and the growth of R. oryzae was inhibited about 70%. Therefore, it was confirmed that Zeolite/Zinc-polypeptide had antibacterial and antifungal properties against E. coli and R. oryzae even after coated on PP film. In conclusion, Zeolite/Zinc-polypeptide coating film is expected to be effective in preventing corruption and improving the shelf life of fresh food as a functional packaging material. In order to be applied to various fresh foods in the future, storage experiments are additionally required with temperature and humidity conditions according to fresh foods.