• Title/Summary/Keyword: Evaluation on Technology Level

Search Result 1,515, Processing Time 0.036 seconds

Development of Self-Questionnaire for Internal Dose Assessment by Food Ingestion

  • JiEun Lee;Hyo Jin Kim;Yong-Uk Kye;Dong-Yeon Lee;Wol Soon Jo;Chang-Geun Lee;Jung-Ki Kim;Yeong-Rok Kang
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.4
    • /
    • pp.204-213
    • /
    • 2022
  • Background: The accident at the Fukushima Daiichi nuclear power plant increased the level of anxiety related to the radioactive contamination of various foods sourced in Japan. Particularly, after the accident, the detection of artificial radionuclides in locally produced foods raised food safety concerns. In this study, the radioactivity concentrations and annual ingestions of 40K and 137Cs in food products commonly and frequently consumed by the general public were investigated, and the annual effective dose of each was evaluated. Materials and Methods: The 2016-2018 data from the Radiation Safety Management Report released by the Korea Nuclear Safety Technology Center was referenced for the evaluation of the amounts of 40K and 137Cs contained in food. Using the food-ingestion survey mentioned above as a reference, we selected 62 foods to include in our radioactivity concentration and dose assessment. We also developed a questionnaire and evaluated the responses from the subjects who answered the questionnaire. Results and Discussion: The radioactivity concentration of 137Cs was found to be close to or below the level of minimum detectable activity. Additionally, the annual ingestion of 62 foods was 294.77 kg/yr, the effective doses from 40K and 137Cs were 136.4 and 0.163 μSv/yr, respectively. Conclusion: Thus, the findings confirmed that the effective dose from 40K and 137Cs in food tends to be lower than the effective dose limit of 1 mSv/yr suggested by the International Commission on Radiological Protection (ICRP) Publication 60. The questionnaire developed in this study is expected to be useful for estimating the annual effective dose status of Korean adults who consume foods containing 40K and 137Cs.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Study on Intelligent Value Chain Network System based on Firms' Information (기업정보 기반 지능형 밸류체인 네트워크 시스템에 관한 연구)

  • Sung, Tae-Eung;Kim, Kang-Hoe;Moon, Young-Su;Lee, Ho-Shin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.67-88
    • /
    • 2018
  • Until recently, as we recognize the significance of sustainable growth and competitiveness of small-and-medium sized enterprises (SMEs), governmental support for tangible resources such as R&D, manpower, funds, etc. has been mainly provided. However, it is also true that the inefficiency of support systems such as underestimated or redundant support has been raised because there exist conflicting policies in terms of appropriateness, effectiveness and efficiency of business support. From the perspective of the government or a company, we believe that due to limited resources of SMEs technology development and capacity enhancement through collaboration with external sources is the basis for creating competitive advantage for companies, and also emphasize value creation activities for it. This is why value chain network analysis is necessary in order to analyze inter-company deal relationships from a series of value chains and visualize results through establishing knowledge ecosystems at the corporate level. There exist Technology Opportunity Discovery (TOD) system that provides information on relevant products or technology status of companies with patents through retrievals over patent, product, or company name, CRETOP and KISLINE which both allow to view company (financial) information and credit information, but there exists no online system that provides a list of similar (competitive) companies based on the analysis of value chain network or information on potential clients or demanders that can have business deals in future. Therefore, we focus on the "Value Chain Network System (VCNS)", a support partner for planning the corporate business strategy developed and managed by KISTI, and investigate the types of embedded network-based analysis modules, databases (D/Bs) to support them, and how to utilize the system efficiently. Further we explore the function of network visualization in intelligent value chain analysis system which becomes the core information to understand industrial structure ystem and to develop a company's new product development. In order for a company to have the competitive superiority over other companies, it is necessary to identify who are the competitors with patents or products currently being produced, and searching for similar companies or competitors by each type of industry is the key to securing competitiveness in the commercialization of the target company. In addition, transaction information, which becomes business activity between companies, plays an important role in providing information regarding potential customers when both parties enter similar fields together. Identifying a competitor at the enterprise or industry level by using a network map based on such inter-company sales information can be implemented as a core module of value chain analysis. The Value Chain Network System (VCNS) combines the concepts of value chain and industrial structure analysis with corporate information simply collected to date, so that it can grasp not only the market competition situation of individual companies but also the value chain relationship of a specific industry. Especially, it can be useful as an information analysis tool at the corporate level such as identification of industry structure, identification of competitor trends, analysis of competitors, locating suppliers (sellers) and demanders (buyers), industry trends by item, finding promising items, finding new entrants, finding core companies and items by value chain, and recognizing the patents with corresponding companies, etc. In addition, based on the objectivity and reliability of the analysis results from transaction deals information and financial data, it is expected that value chain network system will be utilized for various purposes such as information support for business evaluation, R&D decision support and mid-term or short-term demand forecasting, in particular to more than 15,000 member companies in Korea, employees in R&D service sectors government-funded research institutes and public organizations. In order to strengthen business competitiveness of companies, technology, patent and market information have been provided so far mainly by government agencies and private research-and-development service companies. This service has been presented in frames of patent analysis (mainly for rating, quantitative analysis) or market analysis (for market prediction and demand forecasting based on market reports). However, there was a limitation to solving the lack of information, which is one of the difficulties that firms in Korea often face in the stage of commercialization. In particular, it is much more difficult to obtain information about competitors and potential candidates. In this study, the real-time value chain analysis and visualization service module based on the proposed network map and the data in hands is compared with the expected market share, estimated sales volume, contact information (which implies potential suppliers for raw material / parts, and potential demanders for complete products / modules). In future research, we intend to carry out the in-depth research for further investigating the indices of competitive factors through participation of research subjects and newly developing competitive indices for competitors or substitute items, and to additively promoting with data mining techniques and algorithms for improving the performance of VCNS.

Clinical Application of Acute Ischemic Stroke in Perfusion Computed Tomography (초급성 허혈성 뇌졸중에서 관류 전산화단층촬영의 임상적 적용에 대한 연구)

  • Lee, Jong-Seok;Yoo, Beong-Gyu;Kweon, Dae-Cheol
    • Progress in Medical Physics
    • /
    • v.18 no.3
    • /
    • pp.149-160
    • /
    • 2007
  • Recent advent of 64-multidetctor (MD) CT enables more coverage of Z-axis in the perfusion imaging. The purpose of this study was to evaluate the clinical usefulness of perfusion CT by using 64-MD CT in detecting the lesion in patients with acute stroke. The perfusion CT was performed by using 64-MD CT in 62 consecutive patients who were initially suspected to have subacute ischemic stroke symptoms during the period of recent 9 months. These patients had subacute stroke (n=62). CT scanning was conducted with Jog Mode which provided 16 imaging slices with 5 mm of slice thickness, and 8 cm of coverage in Z-axis. Scan interval was 1 seconds for each imaging slice and total 15 scans were repeated. After CT scanning, perfusion maps (CBV, CBF, MTT and TTP) were created at Extended Brilliance Workstation. The CBV and CBF maps showed that lesions were smaller images. While on the MTT and TTP map lesions were seen to be larger fifty-one were large than they appeared on these images. Two slices of perfusion maps obtained at the level of the basal ganglia were chosen to simulate conventional older perfusion CT with 8 cm of coverage in Z-axis. TTP and MTT maps may be clinically useful for evaluation of the penumbral zone in cases of aubacute cerebral ischemic stroke. The perfusion CT is useful in the assessment of acute stroke as an initial imaging modality.

  • PDF

Formation of Meatlike Flavors by Maillard Reaction Using Hydrolyzed Vegetable Protein (HVP) (HVP를 이용한 Maillard 반응에 의한 Meatlike Flavor의 생성)

  • Yoon, Suk-Hwan;Lee, Jung-Keun;Nam, Hee-Sop;Lee, Hyung-Jae
    • Korean Journal of Food Science and Technology
    • /
    • v.26 no.6
    • /
    • pp.781-786
    • /
    • 1994
  • Meatlike flavors were manufactured using hydrolyzed vegetable protein (HVP) with several reactive precursors at different reaction conditions. Both pH and temperature affected significantly on brown colority of reaction product, whose velocity became fast with increasing pH and temperature. Drastic decrease in residual reducing sugars and free amino acids appeared until 1 hour, being little affected by reaction temperature. Glutamic acid and cysteine were decreased with reaction time, whereas glycine and methionine remained constant. Forty nine aroma compounds formed through Maillard reaction were isolated and identified with GC/MSD, including 3-methyl butanal, 2-methyl tetrahydrothiophen-3-one, 3,4-dimethylthiophene and 2,4-dimethyl thiazole previously known as natural meat flavors. The sensory evaluation showed that one-hour reaction product was the highest in savory taste and the lowest in nasty taste on the level of 5% significant difference among all reaction products tested in this experiment. From the results above, it could be speculated that the initial stage of Maillard reaction in this experimental system occured until one hour, thereafter, savory taste decreased accompanied by increasing nasty taste with elapsed reaction time.

  • PDF

Development of Composite Flours and Their Products Utilizing Domestic Raw Materials IV. Textural Characteristics of Noodles made of Composite Flours Based on Barley and Sweet Potato (국산원료(國産原料)를 활용한 복합분(複合粉) 및 제품개발(製品開發)에 관한 연구(硏究) 제4보 보리 및 고구마복합분(複合粉)을 이용한 면류(麵類)의 Texture 특성(特性))

  • Chang, Kyung-Jung;Lee, Su-Rae
    • Korean Journal of Food Science and Technology
    • /
    • v.6 no.2
    • /
    • pp.65-69
    • /
    • 1974
  • Noodles were made from composite flours based on barley or sweet potato/wheat flour and their quality was assessed to obtain the following results. 1) In noodle sheet and dried noodle formation, barley flour could substitute 100% and sweet potato flour, 70% of wheat flour and their textural characteristics were improved by addition of glyceryl monostearate and sodium polycrylate. 2) Textural parameters such as hardness, cohesiveness and gumminess of noodle sheet and dried noodle were decreased by admixture of barley of sweet potato flour whereas they were increased by use of the additives. Noodle sheet required hardness over 6.2 and gumminess over 430 while dried noodle needed hardness over 6.8. 3) In cooked noodle, replacement of wheat flour and use of additives tended to lower the textural parameters. With respect to the cooking quality, barley flour could substitute 60% and sweet potato flour, 40% of wheat flour. 4) In organoleptic evaluation of cooked noodle with respect to its color, taste and texture, 20% replaced composite flour was not different significantly at 5% level from wheat flour and the quality defect was mainly due to discoloration of the product.

  • PDF

Evaluation of Static and Fatigue Performances of Decks Reinforced with GFRP Rebar for Reinfocement Ratio (GFRP 보강근으로 보강된 바닥판의 보강비에 따른 정적 및 피로성능 평가)

  • You, Young-Jun;Park, Young-Hwan;Choi, Ji-Hun;Kim, Jang-Ho Jay
    • Journal of the Korea Concrete Institute
    • /
    • v.26 no.4
    • /
    • pp.491-497
    • /
    • 2014
  • The corrosion of steel reinforcement in reinforced concrete bridge decks significantly affects the degradation of the capacity. Due to the advantageous characteristics such as high tensile strength and non-corrosive property, fiber reinforced polymer (FRP) has been gathering much interest from designers and engineers for possible usage as a alternative reinforcement for a steel reinforcing bar. However, its application has not been widespread, because there data for short- and long-term performance data of FRP reinforced concrete members are insufficient. In this paper, seven full-scale decks with dimensions of $4000{\times}3000{\times}240mm$ were prepared and tested to failure in the laboratory. The test parameter was the bottom reinforcement ratio in transverse direction. The decks were subjected to various levels of concentrated cyclic load with a contact area of $577{\times}231mm$ to simulate the vehicle loading of DB-24 truck wheel loads acting on the center span of the deck. It was observed that the glass FRP (GFRP) reinforced deck on a restraint girder is strongly effected to the level of the applied load rather than the bottom reinforcement ratio. The study results showed that the maximum load less than 58% of the maximum static load can be applied to the deck to resist a fatigue load of 2 million cycles. The fatigue life of the GFRP decks from this study showed the lower and higher fatigue performance than that of ordinary steel and CFRP rebar reinforced concrete deck. respectively.

Evaluation for Mechanical Properties of High Strength Concrete at High Temperature by Stressed Test and Unstressed Test (설계하중 사전재하 및 비재하방식에 의한 고강도콘크리트의 고온특성 평가)

  • Kim, Gyu-Yong;Kim, Young-Sun;Lee, Tae-Gyu;Park, Chan-Kyu;Lee, Seung-Hoon
    • Journal of the Korea Concrete Institute
    • /
    • v.20 no.5
    • /
    • pp.583-592
    • /
    • 2008
  • Recently, the effects of high temperature on compressive strength, elastic modulus and strain at peak stress of high strength concrete were experimentally investigated. The present study is aimed to study the effect of elevated temperatures ranging from 20 to 700 on the material mechanical properties of high strength concrete of 40, 60, 80 MPa grade. In this study, the types of test were the stressed test and stressed residual test that the specimens are subjected to a 25% of ultimate compressive strength at room temperature and sustained during heating and when target temperature is reached, the specimens are loaded to failure. And another specimens are loaded to failure after 24 hour cooling time. Tests were conducted at various temperatures ($20{\sim}700^{\circ}C$) for concretes made with W/B ratios 46%, 32% and 25%. Test results showed that the relative values of compressive strength and elastic modulus decreased with increasing compressive strength grade of specimen and the axial strain at peak stress were influenced by the load before heating. Thermal strain of concrete at high temperature was affected by the preload level as well as the compressive strength. Finally, model equation for compressive strength and elastic modulus of heated high strength concrete proposed by result of this study.

Centralized Controller High-altitude Work Car Elevations Lift Structure Safety Assessment (중앙집중식 컨트롤러 고소작업차의 고소리프트의 구조안정성 평가)

  • Kim, Jun-tae;Lee, Gi-yeong;Lee, Sang-sik;Park, Won-yeop
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.350-357
    • /
    • 2017
  • This study was conducted as a post - study on the development of a centralized controller and a hydraulic lift system including structural analysis and remote control for the development of a vertically elevated car. The safety review was carried out through the structural modification of the elevator lift which was developed during the previous research. 3D modeling was performed with Solidworks, and a model of finite element was created through Hypermesh S / W. In addition, the loading environment of the work vehicle for the evaluation is a condition in which the loading amount is 250 kg per position (total, upper, upper, lower, and lower) on the work table, ), The structural analysis was carried out under the condition that the load was 600 kg, and safety was examined in various aspects. As a result, when the allowable load of 250 kg and the excess load of 600 kg are excluded (except Case-11), the stress level is below the yield strength. In the case of Case-11, there is a region exceeding the yield strength at the center support portion of the safety bar at the upper end even after excluding the component which generates the maximum stress, but it does not affect the safety aspect of the whole structure Respectively. Looking at the deflection results, it can be seen that in all cases the maximum deflection occurs in the same table, and the tendency of sagging in both 250 kg and 600 kg is the same.

Evaluation on Chloride Binding Capacity of Mineral Mixed Paste Containing an Alkaline Activator (알칼리 활성화제를 사용한 무기질 혼합 페이스트의 염화물이온 고정화 평가)

  • Cho, Gyu-Hwan;Yeo, In-Hwan;Ji, Dong-Hun
    • Journal of the Korea Concrete Institute
    • /
    • v.28 no.2
    • /
    • pp.157-165
    • /
    • 2016
  • It is possible to achieve high strength ranging from 40 MPa to 70 MPa in alkali-activated slag concrete (AASC), and AASC is also known to have a finer pore structure due to its high latent hydraulicity and fineness of slag cement, which makes it difficult for chloride ions to penetrate. Electrophoresis is mostly used to calculate the effective diffusion coefficient of chloride ions, and then to evaluate resistance to salt damage. Few studies have been conducted on the fixation capacity of chloride ions in AASC. For this reason, in this study the chloride fixation within the hardened paste was evaluated according to the type and the amount of alkaline activators. As a result, it was revealed that among the test specimens, the chloride fixation was greatest in the paste containing $Na_2SiO_3$. In addition, it was found that as more activator was added, a higher level of chloride fixation was observed. Through this analysis, it can be concluded that the type and the amount of alkaline activators have a high correlation with the amount of C-S-H produced.