• Title/Summary/Keyword: Inappropriate Communications

Search Result 32, Processing Time 0.023 seconds

DEVELOPMENT OF NEW TAXONOMY OF INAPPROPRIATE COMMUNICATION AND ITS APPLICATION TO OPERATING TEAMS IN NUCLEAR POWER PLANTS

  • Kim, Ar Ryum;Park, Jinkyun;Lee, Seung Woo;Jang, Inseok;Kang, Hyun Gook;Seong, Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.44 no.8
    • /
    • pp.897-910
    • /
    • 2012
  • Inappropriate communications can cause a lack of necessary information exchange between operators and lead to serious consequences in large process systems such as nuclear power plants (NPPs). In this regard, various kinds of taxonomies of inappropriate communications have been developed to prevent inappropriate communications. However, there seems to be difficult to identify inappropriate communications from verbal protocol data between operators. Because the existing taxonomies were developed for use in report analysis, there is a problem of 'uncertainty'. In consequence, this paper proposes a new taxonomy of inappropriate communications and provides some insights to prevent inappropriate communications. In order to develop the taxonomy, existing taxonomies for four industries from 1980 to 2010 were collected and a new taxonomy is developed based on the simplified one-way communication model. In addition, the ratio of inappropriate communications from 8 samples of audio-visual format verbal protocol data recorded during emergency training sessions by operating teams is compared with performance scores calculated based on the task analysis. As a result, inappropriate communications can be easily identified from the verbal protocol data using the suggested taxonomy, and teams with a higher ratio of inappropriate communications tend to have a lower performance score.

Improved Channel Level Difference Quantization for Spatial Audio Coding

  • Kim, Kwang-Ki;Beack, Seung-Kwon;Seo, Jeong-Il;Jang, Dae-Young;Hahn, Min-Soo
    • ETRI Journal
    • /
    • v.29 no.1
    • /
    • pp.99-102
    • /
    • 2007
  • The channel level difference (CLD) is a main parameter in the reference model 0 (RM0) for MPEG Surround. Nevertheless, the CLD quantization method in the RM0 has problems such as the lack of theoretical background and inappropriate quantization levels. In this letter, a new CLD quantization method is proposed based on the virtual source location information which has strength in the quantization process. From experimental results, it is confirmed that the proposed scheme greatly reduces the quantization distortions measured in dB and degrees without any additional complexity.

  • PDF

A Study on the Collision between Fishing Vessel and non Fishing Vessel using Questionnaire Analysis (설문분석을 통한 어선 비어선간 충돌사고에 관한 연구)

  • Park, Moon-Kab;Jeon, Yeong-Woo;Lee, Yoo-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.3
    • /
    • pp.716-723
    • /
    • 2013
  • The postal or group questionnaire survey was conducted to inquire into the cause of collision between fishing vessel and non-fishing vessel targeting fishing vessel personnel(FVP), non-NFVP and a person involved in a marine accident. As a result, we could verify the root cause of collision, a negligence of lookout which noted overwork for FVP and careless for non-FVP. The cause of collision by inappropriate avoid action was poor communications for FVP and non-FVP. To reduce collision, we need to be trained to take a sharp lookout, a radio communication by VHF and the collision avoidance actions by early and substantial action to keep well clear. The results are expected to contribute for the reduction of collision and victims.

THE DISCRETE-TIME ANALYSIS OF THE LEAKY BUCKET SCHEME WITH DYNAMIC LEAKY RATE CONTROL

  • Choi, Bong-Dae;Choi, Doo-Il
    • Communications of the Korean Mathematical Society
    • /
    • v.13 no.3
    • /
    • pp.603-627
    • /
    • 1998
  • The leaky bucket scheme is a promising method that regulates input traffics for preventive congestion control. In the ATM network, the input traffics are bursty and transmitted at high-speed. In order to get the low loss probability for bursty input traffics, it is known that the leaky bucket scheme with static leaky rate requires larger data buffer and token pool size. This causes the increase of the mean waiting time for an input traffic to pass the policing function, which would be inappropriate for real time traffics such as voice and video. We present the leaky bucket scheme with dynamic leaky rate in which the token generation period changes according to buffer occupancy. In the leaky bucket scheme with dynamic leaky rate, the cell loss probability and the mean waiting time are reduced in comparison with the leaky bucket scheme with static leaky rate. We analyze the performance of the proposed leaky bucket scheme in discrete-time case by assuming arrival process to be Markov-modulated Bernoulli process (MMBP).

  • PDF

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting

  • Lim, Meng-Hui;Goi, Bok-Min;Lee, Sang-Gon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.822-839
    • /
    • 2011
  • Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners' identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.

Tests for homogeneity of proportions in clustered binomial data

  • Jeong, Kwang Mo
    • Communications for Statistical Applications and Methods
    • /
    • v.23 no.5
    • /
    • pp.433-444
    • /
    • 2016
  • When we observe binary responses in a cluster (such as rat lab-subjects), they are usually correlated to each other. In clustered binomial counts, the independence assumption is violated and we encounter an extra-variation. In the presence of extra-variation, the ordinary statistical analyses of binomial data are inappropriate to apply. In testing the homogeneity of proportions between several treatment groups, the classical Pearson chi-squared test has a severe flaw in the control of Type I error rates. We focus on modifying the chi-squared statistic by incorporating variance inflation factors. We suggest a method to adjust data in terms of dispersion estimate based on a quasi-likelihood model. We explain the testing procedure via an illustrative example as well as compare the performance of a modified chi-squared test with competitive statistics through a Monte Carlo study.

Quantile-based Nonparametric Test for Comparing Two Diagnostic Tests

  • Kim, Young-Min;Song, Hae-Hiang
    • Communications for Statistical Applications and Methods
    • /
    • v.14 no.3
    • /
    • pp.609-621
    • /
    • 2007
  • Diagnostic test results, which are approximately normal with a few number of outliers, but non-normal probability distribution, are frequently observed in practice. In the evaluation of two diagnostic tests, Greenhouse and Mantel (1950) proposed a parametric test under the assumption of normality but this test is inappropriate for the above non-normal case. In this paper, we propose a computationally simple nonparametric test that is based on quantile estimators of mean and standard deviation, instead of the moment-based mean and standard deviation as in some parametric tests. Parametric and nonparametric tests are compared with simulations under the assumption of, respectively, normality and non-normality, and under various combinations of the probability distributions for the normal and diseased groups.

A Study on K -Means Clustering

  • Bae, Wha-Soo;Roh, Se-Won
    • Communications for Statistical Applications and Methods
    • /
    • v.12 no.2
    • /
    • pp.497-508
    • /
    • 2005
  • This paper aims at studying on K-means Clustering focusing on initialization which affect the clustering results in K-means cluster analysis. The four different methods(the MA method, the KA method, the Max-Min method and the Space Partition method) were compared and the clustering result shows that there were some differences among these methods, especially that the MA method sometimes leads to incorrect clustering due to the inappropriate initialization depending on the types of data and the Max-Min method is shown to be more effective than other methods especially when the data size is large.

Is a Cause-Related Self-Prevention Campaign a Good CSR Strategy?: Effects of Negative Social Acceptance and Consumer Attitude on Biased Evaluations

  • Park, Jihye
    • Asia Marketing Journal
    • /
    • v.19 no.2
    • /
    • pp.25-43
    • /
    • 2017
  • This paper addresses the central issue of whether it is effective for a firm to discourage the purchase of its own product in order to support a social cause. The objectives of this study were: a) to examine whether a cause-related self-prevention ad would stimulate more positive evaluations compared to promotional ad, particularly when the product category is more negatively socially accepted; and 2) to determine if a negative attitude toward the product could induce a boomerang effect of a selfprevention ad. Results from three experiments revealed that socially responsible prevention campaigns against firm's own product may be more effective for the product category negatively associated with social concerns or welfare. If products are more limited in the social context, communications of product prevention are beneficial to improve the public image of the brand. However, the self-hurting approach may be inappropriate for potential customers who currently possess a strong negative attitude toward the product.

Concept Analysis of Self-stigma in Patients with Tuberculosis (결핵 환자의 자기 낙인(self-stigma)에 대한 개념 분석)

  • Yeom, Seonmi;Kang, Jeong Hee;Yang, Youngran
    • Research in Community and Public Health Nursing
    • /
    • v.32 no.3
    • /
    • pp.312-324
    • /
    • 2021
  • Purpose: Tuberculosis is an infectious condition with a high disease burden, and the stigma in patients with tuberculosis causes negative health outcomes. The purpose of this study was to define and clarify the concept of self-stigma among patients with tuberculosis. Methods: The analysis was conducted using Walker and Avant's conceptual approach. Twenty-seven studies met the selection criteria. Results: Self-stigma in patients with tuberculosis can be defined by the following attributes: 1) self-esteem decrement; 2) fear; 3) negative emotions to oneself; 4) social withdrawal; and 5) discrimination. The antecedents identified were 1) inappropriate knowledge of tuberculosis, 2) spread of improper health information through media and social communications, 3) stereotypes and prejudices, 4) visibility due to symptoms appearing, 5) recognizing the risk of infection, and 6) low financial status. The consequences were 1) concealing the disease, 2) treatment delay, 3) poor treatment adherence, 4) poor quality of life, and 5) deterioration in or lack of social activities. Conclusion: The definition and attributes of self-stigma identified by this study can be applied to enhance the understanding of stigma in tuberculosis patients and to improve communications between healthcare providers and researchers. It can also be used to develop theories and measurements related to stigma in patients with tuberculosis.