• Title/Summary/Keyword: Heavy User

Search Result 205, Processing Time 0.021 seconds

A Study on the Standard for the Safety Zone in the Domestic LNG TTS Bunkering (국내 LNG TTS 벙커링 시 안전구역 기준에 관한 연구)

  • Park, Sung-In;Roh, Jae Seung;Park, Jaehee;Park, Kyoungmin;Shin, Dongkyu
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.59 no.5
    • /
    • pp.323-329
    • /
    • 2022
  • This paper suggests an example guideline of a safety zone layout for the domestic LNG Truck-To-Ship (TTS) bunkering. The safety zone is one of the controlled area in LNG bunkering and its layout is required as a fundamental safety barrier. While the international standard provides a layout methodology of the safety zone, its detail application is not user-friendly and only possible with a level of the process engineering. In the domestic case, the enforcement regulations are applied for LNG bunkering but the safety zone is not properly defined for TTS operation. Considerations are made for the intuitive approach of the safety zone layout and an example guideline is suggested for application in the domestic TTS bunkering. A technical background of the guideline is described and its applicability is demonstrated with regard to the characteristics of TTS bunkering. The findings of the study are summarized in association with a practical layout of the safety zone, contributing to the safety culture in the domestic LNG bunkering.

Extraction of user's representative emotions expressed while using a product (제품 사용 중 표출되는 사용자의 대표감성 추출에 관한 연구)

  • Jeong, Sang-Hoon;Lee, Kun-Pyo
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.69-80
    • /
    • 2005
  • So far, there have been mary studies on human emotions and the emotional side of products in the field of emotional engineering. Contemporary emotion-related researches have focused mainly on the relationship between product aesthetics and the emotional responses elicited by the products, but little is known about emotions elicited from using the products. In this study we have extracted some emotional words that can come up during user interaction with a product and reveal emotional changes. Firstly, we assembled a set of emotional words that were sufficient to represent a general overview of Korean emotions, collected from various literature studies in the field of psychology, linguistics, emotional engineering. Secondly, we found emotional words from collecting user opinion on the website. In this study, we used heavy traffic websites such as shopping mall and mania sites. Finally the emotional words were collected from verbal protocols by using Think Aloud technique. The collected words were integrated according to standards and they were applied on evaluation survey twice for evaluating their appropriateness. This survey was conducted for identification of emotional expressions while using a product. Finally, we extracted 88 emotional words for measuring user's emotions expressed while using products. And we categorized the 88 words to form 6 groups by using factor analysis. The 6 categories that were extracted as a result of this study, such as aesthetics, satisfaction in usability, novelty, uncomfortable- ness, pleasure and excellence were found to be user's representative emotions expressed while using products. It is expected that emotional words and user's representative emotions extracted in this study will be used as subjective evaluation data that is required to measure user's emotional changes while using a product.

  • PDF

Development of Decision Support System for Flood Forecasting and Warning in Urban Stream (도시하천의 홍수예·경보를 위한 의사결정지원시스템 개발)

  • Yi, Jaeeung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.6B
    • /
    • pp.743-750
    • /
    • 2008
  • Due to unusual climate change and global warming, drought and flood happen frequently not only in Korea but also in all over the world. It leads to the serious damages and injuries in urban areas as well as rural areas. Since the concentration time is short and the flood flows increase urgently in urban stream basin, the chances of damages become large once heavy storm occurs. A decision support system for flood forecasting and warning in urban stream is developed as an alternative to alleviate the damages from heavy storm. It consists of model base management system based on ANFIS (Adaptive Neuro Fuzzy Inference System), database management system with real time data building capability and user friendly dialog generation and management system. Applying the system to the Tanceon river basin, it can forecast and warn the stream flows from the heavy storm in real time and alleviate the damages.

Preliminary study for the development of radiation safety evaluation methodology for industrial kV-rated radiation generator facilities

  • Hye Sung Park ;Na Hye Kwon ;Sang Rok Kim ;Hwidong Yoo;Jin Sung Kim ;Sang Hyoun Choi;Dong Wook Kim
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3854-3859
    • /
    • 2023
  • Background: This study aims to develop an evaluator that can quickly and accurately evaluate the shielding of low-energy industrial radiation generators. Methods: We used PyQt to develop a graphical user interface (GUI)-based program and employed the calculation methodology reported in the National Council on Radiation Protection and Measurements (NCRP)-49 for shielding calculations. We gathered the necessary factors for shielding evaluation using two libraries designed for Python, pandas and NumPy, and processed them into a database. We verified the effectiveness of the proposed program by comparing the results with those from safety reports of six domestic facilities. Results: After verifying the effectiveness of the program using the NCRP-49 example, we obtained an average error rate of 1.73%. When comparing the facility safety report and results obtained using the program, we found that the error rate was between 1.09% and 6.51%. However, facilities that did not use a defined shielding methodology were underestimated by 31.82% compared with the program (the final barrier thickness satisfied the shielding standard). Conclusion: The developed program provides a fast and accurate shielding evaluation that can assist personnel that work in radiation generator facilities and government officials in reviewing safety.

A Study on the Status of Practical Application of Oral Hygiene Devices :with labor of the D heavy industries (D중공업 근로자의 구강위생용품 사용실태 조사)

  • Park, Hong-Ryurn
    • Journal of dental hygiene science
    • /
    • v.6 no.2
    • /
    • pp.93-99
    • /
    • 2006
  • This study was carried out to investigate practical application status of oral hygiene devices through making a survey of labor of the D industrial company-about carefully curing oral disease in home, the status of practical application of tooth brush, the status of practical application of fluoridated toothpaste, status of practical application of auxiliary oral hygiene devices, a motive use or unuse of auxiliary oral hygiene devices. 1. In home, carefully curing oral disease is dental caries(62.4%). 2. Status of practical application toothbrush showed the highest user ratio of mideum size(79.6%). 3. Showed the highest user ratio of horizontal plane toothbrush(73.5%). 4. Answerd don't take a prudent attitued in choice of fluoridated toothpaste(73.5%). 5. In the status of reconition of oral hygiene devices, showed the highest user ratio of eletric toothbrush(77.0%). 6. In the status of reconition of auxiliary oral hygiene devices, showed the highest user ratio of wooden wedge stimulator(89.4%)and gargle liquid(84.5%). In using of oral hygiene devices, showed the highest user ratio of electric toothbrush(13.3%), toohbrush for periodontal patients(2.7%). In using of auxiliary, wooden wedge stimulator (58.4%)and gargle liquid(41.2%). In effect using of oral hygiene devices showed the highest user ratio of denture brush(50.0%)and eletric toothbrush(43.3%), in effect using of auxiliary oral hygiene devices showed the highest user ratio of water pick(80.0%) and dental floss(75.8%). 6. A motive of the use auxiliary oral hygiene device is choice by oneself through TV, advertisement, public information(57.6%), and the reason-they don't use of auxiliary oral hygiene devicebecause of they don't know proper to them the kind of auxiliary oral hygiene device.

  • PDF

Robust Cognitive-Radio-Based OFDM Architecture with Adaptive Traffic Allocation in Time and Frequency

  • Kim, Nak-Myeong;Kim, Mee-Ran;Kim, Eun-Ju;Shin, Su-Jung;Yu, Hye-In;Yun, Sang-Boh
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • Cognitive radio (CR) has been proposed as an effective technology for flexible use of the radio spectrum. The interference between primary users and CR users, however, becomes a critical problem when they are using adjacent frequency channels with different transmission power levels. In this paper, a robust CR orthogonal frequency division multiplexing (OFDM) architecture, which can effectively suppress interference to nearby primary users and overcome adjacent channel interference (ACI) to the CR user, is proposed. This new approach is characterized by adaptive data repetition for subcarriers under heavy ACI, and adaptive time spreading for subcarriers near the borders of the CR user's spectrum. The data repetition scheme provides extra power gain against the ACI coming from primary users. Time spreading guarantees an acceptable interference level to nearby primary users. By computer simulation, we demonstrate that, under a CR environment, the proposed CR OFDM architecture outperforms conventional OFDM systems in terms of throughput and BER performance.

  • PDF

The Role of Sense of Belonging in Social Media Usage: A Tale of Two Types of Users

  • Liu, Chung-Tzer;Guo, Yi Maggie
    • Asia pacific journal of information systems
    • /
    • v.25 no.2
    • /
    • pp.403-422
    • /
    • 2015
  • Social media websites have continued to proliferate, and the way in which people stay connected has also evolved. The issue of user loyalty a website remains crucial given that the competition is severe. Websites need loyal users who continue to use their sites to survive and be successful. In this research, we applied self-regulation framework to investigate the factors leading to user loyalty to a social media site. In particular, the role of sense of belonging, which is a common emotional reaction to a social media site, is examined. A survey of users in a popular social media site in Taiwan was conducted. Results show that both sense of belonging and service quality have direct effect on loyalty, whereas trust affects loyalty indirectly by fostering a sense of belonging. Service quality affects loyalty through trust and sense of belonging. Notably, trust has insignificant effect on loyalty as originally proposed. Users are then classified into two groups, namely, heavy and light users, based on their usage. Among light users, service quality has no direct effect on loyalty. Therefore, sense of belonging has sole direct impact on loyalty. Both service quality and sense of belonging contribute to loyalty in users who spend more time online. Implications of this study are also discussed.

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

Mobile remote assistant robot using flex sensor and mecanum wheel (플렉스 센서와 메카넘 휠을 사용한 이동식 원격 작업보조 로봇)

  • Yoon, DongKwan;Park, CheolYoung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.53-59
    • /
    • 2022
  • In this paper, a mobile robot capable of remote control is designed in consideration of the user's various work environments. Specifically, a mobile remote work robot that moves in a predetermined direction and can perform a series of tasks in synchronization with the user's hand movements, and a control system and control method for controlling the robot were proposed. It was implemented using a robot hand and a wheel for movement to assist in tasks such as transporting dangerous goods or heavy goods. In order to evaluate the performance of the developed robot, the maximum weight that can be carried by the robot hand and the movable inclination of the robot were tested, and the test evaluation results satisfied most of the targeted design specifications.

An Unproved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack (Stolen-Verifier 공격과 Impersonation 공격에 안전한 개선된 OSPA 프로토콜)

  • Kwak, Jin;Oh, Soo-Hyun;Yang, Hyung-Kyu;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.439-446
    • /
    • 2004
  • In the Internet, user authentication is the most important service in secure communications. Although password-based mechanism is the most widely used method of the user authentication in the network, people are used to choose easy-to-remember passwords, and thus suffers from some Innate weaknesses. Therefore, using a memorable password it vulnerable to the dictionary attacks. The techniques used to prevent dictionary attacks bring about a heavy computational workload. In this paper, we describe a recent solution, the Optimal Strong-Password Authentication (OSPA) protocol, and that it is vulnerable to the stolen-verifier attack and an impersonation attack. Then, we propose an Improved Optimal Strong-Password Authentication (I-OSPA) protocol, which is secure against stolen-verifier attack and impersonation attack. Also, since the cryptographic operations are computed by the processor in the smart card, the proposed I-OSPA needs relatively low computational workload and communicational workload for user.