• Title/Summary/Keyword: Establishing Design Procedures

Search Result 35, Processing Time 0.026 seconds

A Study on Establishing Target Reliability Levels for Flammable Gas Transmission Pipelines (가연성가스 수송배관에 대한 목표 신뢰도 수준 설정에 관한 연구)

  • Lee, Jin-Han;Jo, Young-Do;Moon, Jong-Sam
    • Journal of the Korean Institute of Gas
    • /
    • v.22 no.6
    • /
    • pp.52-58
    • /
    • 2018
  • In reliability based design and assessment (RBDA) methodology, reliability targets are used to ensure that safety levels are met relevant limit states in the stage of design and maintenance. The target reliability for flammable gas pipelines have not been developed yet in Korea. Instead of the reliability targets, the tolerable criteria for risk measures such as societal and individual risk have been applied in pipeline risk management. This paper introduces the procedures to develop the target reliability using tolerable risk criteria for societal and individual risk which can be enforced for high pressure natural gas pipelines in quantitative risk assessment. In addition, we propose the target reliability for natural gas and hydrogen gas transmission pipelines by the procedures.

A Study for Security-Based Medical Information Software Architecture Design Methodology (의료정보보안 기반 소프트웨어 아키텍처 설계방법)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.35-41
    • /
    • 2013
  • What is an alternative to medical information security of medical information more secure preservation and safety of various types of security threats should be taken, starting from the software design. Interspersed with medical information systems medical information to be able to integrate the real-time exchange of medical information must be reliable data communication. The software architecture design of medical information systems and sharing of medical information security issues and communication phase allows the user to identify the requirements reflected in the software design. Software framework design, message standard design, design a web-based inter-process communication procedures, access control algorithm design, architecture, writing descriptions, evaluation of various will procedure the establishing architecture. The initial decision is a software architecture design, development, testing, maintenance, ongoing impact. In addition, the project will be based on the decision in detail. Medical information security method based on the design software architecture of today's medical information security has become an important task of the framework will be able to provide.

Heuristic Rules and Automation for Optimal Design of Distillation Column (증류탑 최적 설계를 위한 경험 법칙 제시 및 자동화)

  • Chae, Hyunyeob;Lee, Jongmin;Jung, Kwangseop
    • Korean Chemical Engineering Research
    • /
    • v.58 no.4
    • /
    • pp.550-564
    • /
    • 2020
  • Distillation columns are one of the main equipment used for the separation of chemical components in petrochemical process design. However, in spite of the efficient operation in wide range, and the advantage of data collection for equipment verification, the distillation columns are inherently known for high energy consumption and capital cost. Hence, the trade-off analysis needs to be done between investment cost and operation cost to develop the most economical distillation columns. This study was conducted using Aspen Plus, a popular process simulation program, in the pursuit of broad application by as many process engineers as possible. In this paper, design variables for optimization of distillation columns were defined to improve emphatically the design quality with reducing erratic practice of many engineers. In addition, by eliminating unnecessary reviewing step and establishing systematic and efficient procedures, the amount of time for design and human resources were minimized. Aspen Process Economic Analyzers (APEA) program was introduced in order to calculate the investment cost reliably, and the efficient systematic procedure for utilization of APEA was established.

Application of Patient-based Real-time Quality Control (환자 기반 실시간 정도관리의 적용)

  • Seung Mo LEE;Kyung-A SHIN
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.56 no.2
    • /
    • pp.105-114
    • /
    • 2024
  • Clinical laboratories endeavor to secure quality by establishing effective quality management systems. However, laboratory environments are complex, and single quality control procedures may inadequately detect many errors. Patient-based real-time quality control (PBRTQC) is a laboratory tool that monitors the testing process using algorithms such as Bull's algorithm and several variables, such as average of normal, moving median, moving average, and exponentially weighted moving average. PBRTQC has many advantages over conventional quality control, including low cost, commutability, continuous real-time performance monitoring, and sensitivity to pre-analytical errors. However, PBRTQC is not easily implemented as it requires statistical algorithm selection, the design of appropriate rules and protocols, and performance verification. This review describes the basic concepts, methods, and procedures of PBRTQC and presents guidelines for implementing a patient-based quality management system. Furthermore, we propose the combined use of PBRTQC when the performance of internal quality control is limited. However, clinical evaluations were not conducted during this review, and thus, future evaluation is required.

A Behavioral Study of Cyworld Mini Homepage Users' Fashion Consciousness and Their Online Clothing Purchase Patterns in Relation to the Level of Self-disclosure (싸이월드 미니홈피 사용자의 자기노출 정도에 따른 패션 의식 및 온라인 의복 구매행동 연구)

  • Kim, Yeon-Ji;Kim, Chil-Soon
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.5
    • /
    • pp.991-1002
    • /
    • 2010
  • Nowadays, personal media is a new tool for communication as digital cameras and mobile phones are developing rapidly. We are concerned over Cyworld users who could have different personal characteristics which will influence on buying patterns in on line shopping behaviors. The purpose of this research was to observe fashion attitudes and purchase behavior of Cyworld mini homepage users, for establishing marketing strategies by understanding consumers. For this study, one line survey was used for 500 male and female subjects who are 20 to 40 years old. Only reliable 441 questionnaires were used for analysis. The SPSS program was used for frequency, K-means cluster, t test, and chi-square test. A total of 441 respondents were clustered on the basis of 8 item self-disclosure scale, using the K-means procedures. The results indicated that respondents were clustered into two segments; 267 respondents(active attitude towards self-disclosure) and 164 ones(not active). We examined fashion attitudes in mini home page and buying behavior by self-disclosed variable. Those who are involved actively in self expression and self-disclosure considered more fashion style and trend. The major motivates of web surfing was finding a good design, and good price. High self-disclosure group tends to search many shopping mall for right design and low self disclosure group tends to search them for the right price. High self-disclosure group tend to shop the fashion products more, while low self disclosure group tend to purchase books more through the internet. We realized that active group in self-disclosure purchased their clothing accidently when they visit Cyworld.

The Role of Environmental Education in Increasing Potential Green Consumers

  • Hyein, WOO
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.11 no.1
    • /
    • pp.31-40
    • /
    • 2023
  • Purpose - The prior literature indicated that green consumerism encouragements and programs have led to strict standards against environmental issues, thus reducing emissions from motors and engines and improving clean-burning energy options. The present study seeks to elaborate on the responsibility of ecological education in amplifying potential green consumers. Research design, Data, and methodology -The justification of the qualitative literature method used in this research is essential because, through the extensive explanation, justification and description of the methods used, researchers can enhance the trustworthiness of the research to a particular or designated audience. Result - Environmental education helps customers worldwide recognize the barriers to purchasing green products at every purchase level. Prior studies pointed out that after environmental education, consumers are much more willing to go greener in their consumption and safeguard the environment. Customers want to act green; however, they anticipate companies to lead the way. Conclusion - This research suggests that reusing prevailing resources creatively implies that fewer dollars are spent buying novel stock to generate green products. Although establishing a green company is expensive, it saves a lot of cash over time. Greening procedures can lead to efficiency gains by minimizing energy costs, permitting companies to acquire green tax credits.

A Study on SE Process based Defense M&S System Development Procedures (SE 프로세스 기반 국방 M&S체계 개발 절차 연구)

  • Dong Joon Lee;Seong Hyun Koh;Sang Bok Lee;Kwan Ghyun Ro;Ju Il Yoon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.44-55
    • /
    • 2023
  • The defense M&S system, which has been classified as a weapon system between requirements determination and project implementation, is being developed by applying the weapon system development procedure of the Defense Acquisition Program Administration. The M&S system abstracts and models the real world to suit the intended use and proceeds with the process of developing it as a software-oriented system. Overseas, the conceptual model development stage is staged before entering the design stage after the requirements analysis. In addition, each step includes verification and validation processes. In Korea, while establishing and applying the weapon system development procedure based on the SE process, the M&S system is also applied in the same way as the general weapon system, limiting appropriate development outputs and verification and validation. In this study, the system development procedure of the M&S system is established and presented based on the relevant standards and SE process of developed countries.

Comprehensive Survey on Multi Attribute Decision Making Methods for Wireless Ad Hoc Networks

  • Beom-Su Kim;Ki-Il Kim;GyuRi Chang;Kyong Hoon Kim;BongSoo Roh;Jae-Hyun Ham
    • Journal of Internet Technology
    • /
    • v.20 no.5
    • /
    • pp.1575-1588
    • /
    • 2019
  • Recently, to design dynamic networks without existing infrastructure, wireless ad hoc networks have been proposed to establish self-organizing networks. In this type of network, to resolve the primary research challenge of establishing a stable path between source and destination, several metrics or utility values have been proposed to meet the specific objectives, as well as improve packet delivery ratio when developing communication protocols or addressing technical issues. Notably, most existing studies use the Multi Attribute Decision Making (MADM) algorithm to balance weights between relevant metrics to realize the above objective. However, despite their significant efforts, a comprehensive survey paper analyzing them together has not been published. Thus, in this paper, we describe the recent research and development efforts to employ MADM in ad hoc networks. First, we provide an overview of MADM and explain the well-known algorithms. After categorizing the current work according to the algorithms, the existing schemes are further divided by the type of networks. Based on this classification, we then detail the procedures with their research objectives. Furthermore, we present other research challenges and apparent problems in this research area.

Examining and Refining the Code for Durability Design Criteria of Concrete Carbonation (개정 콘크리트 탄산화 내구성 설계기준의 적용상 문제점 분석)

  • Lim, Nam-Gi
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.3
    • /
    • pp.285-293
    • /
    • 2023
  • In this research, we embarked on a meticulous analysis of the challenges inherent in real-world scenarios relating to the durability design standards of engineered concrete structures and the assessment of carbonation durability in concrete guidelines. Our investigation brought to light substantial issues concerning constructability and quality assurance. The genesis of these problems is the exclusive application of prescribed strength to exterior walls, neglecting other elements to facilitate smoother licensing procedures. While this methodology aims to mitigate financial constraints in alignment with enhanced standards, it invariably invites complications. Furthermore, it is imperative to resolve the uncertainty surrounding durability evaluations by establishing a clear and definitive objective. Alongside this, actionable steps must be formulated to forestall the emergence of fissures between the floors of residential buildings, particularly apartment complexes. It is equally essential to tackle issues connected to application by devising a comprehensive management strategy for potential cracking during the phase of maintenance.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF