• Title/Summary/Keyword: Safe design

Search Result 2,037, Processing Time 0.032 seconds

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

A Case Study on the Characteristics of Cultural Expression in Contemporary Commercial Architecture Design in China (중국 현대 상업건축 실내 공간의 문화적 표현특성에 대한 사례연구)

  • Yu, DeSheng
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.32-44
    • /
    • 2019
  • Based on the characteristics of cultural expressions, this paper compares and analyzes the cases of representative commercial architectural spaces of six largest cities in China.In order to promoting the sustainable development of the indoor space culture of modern commercial buildings in China.Six cases were analyzed from the viewpoints of cultural tradition, locality, popularity, technology, and ecology. The results are as follows. First, the tradition of culture requires the emphasis on the traditional elements of specific areas in the interior space of commercial architecture.Second, the regional character of culture is closely related to the social and natural environment factors such as the economic development of the interior space of commercial architecture, historical intrinsic space, geographical environmental conditions, and climate.Fourth, the technicality of culture is to integrate construction method, structure form, and material with local culture into commercial architecture interior space.Fifth, cultural ecology places attention to placing plants in the interior space of commercial architecture and creating a healthy, pleasant and safe environment.

Optmized Design for Flood Mitigation at Sea Side Urban Basin (해안 도시유역의 수재해 저감설계 최적화 기법 연구)

  • Kim, Won Bum;Kim, Min Hyung;Son, kwang Ik;Jung, Woo Chang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.267-267
    • /
    • 2016
  • Extreme events, such as Winnie(1987), Rusa(2002), Maemi(2003) at sea-side urban area, resulted not only economic losses but also life losses. The Korean sea-side characterisitcs are so complicated thar the prediction of sea level rise makes difficult. Geomophologically, Korean pennisula sits on the rim of the Pacific mantle so the sea level is sensitive to the surges due to earth quake, typoon and abnormal climate changes. These environmetns require closer investigation for the preparing the inundatioin due to the sea level rise with customized prediction for local basin. The goal of this research is provide the information of inundation risk so the sea side urban basin could be more safe from the natural water disastesr.

  • PDF

Criticality Safety Analysis of Spent Fuel Storage Facility for Bo-Ri Unit 1 (핵연료 저장시설의 임계 안전성 분석)

  • Dong Ha Kim;Un Chul Lee
    • Nuclear Engineering and Technology
    • /
    • v.14 no.2
    • /
    • pp.86-91
    • /
    • 1982
  • In 1977, spent fuel storage capacity of Ko-Ri Unit 1 was raised to contain 4-2/3 core, by reducing the center-to-center spacing between fuel assemblies from 53.34cm to 36cm. In this paper the adequacy is discussed in detail by examining the previous design analysis report. According to the analytic method presented by Core Performance Branch, study on credible abnormal moderator density condition is performed by using KENO-IV for the redesigned spent fuel storage facility. Result shows that 36cm for the center-to-center spacing between fuel assemblies is not enough to keep the storage safe at water density of 0.1143g/㎤, which gives the maximum $K_{eff}$ 0.9958$\pm$0.0048, which exceeds the CPB regulation limit 0.98. From sensitivity study regarding to the center-to-center spacing, it should be maintained to space greater than 43cm in order to meet the CPB requirements.s.

  • PDF

Role of Headmasters, Teachers, and Supervisors in Knowledge Transfer about Occupational Health and Safety to Pupils in Vocational Education

  • Andersson, Ing-Marie;Gunnarsson, Kristina;Rosen, Gunnar
    • Safety and Health at Work
    • /
    • v.6 no.4
    • /
    • pp.317-323
    • /
    • 2015
  • Background: Young people are at an increased risk for illness in working life. The authorities stipulate certain goals for training in occupational health and safety (OHS) in vocational schools. A previous study concluded that pupils in vocational education had limited knowledge in the prevention of health risks at work. The aim of the current study, therefore, was to study how OHS training is organized in school and in workplace-based learning (WPL). Methods: The study design featured a qualitative approach, which included interviews with 12 headmasters, 20 teachers, and 20 supervisors at companies in which the pupils had their WPL. The study was conducted at 10 upper secondary schools, located in Central Sweden, that were graduating pupils in four vocational programs. Results: The interviews with headmasters, teachers, and supervisors indicate a staggered picture of how pupils are prepared for safe work. The headmasters generally give teachers the responsibility for how goals should be reached. Teaching is very much based on risk factors that are present in the workshops and on teachers' own experiences and knowledge. The teaching during WPL also lacks the systematic training in OHS as well as in the traditional classroom environment. Conclusion: Teachers and supervisors did not plan the training in OHS in accordance with the provisions of systematic work environment management. Instead, the teachers based the training on their own experiences. Most of the supervisors did not receive information from the schools as to what should be included when introducing OHS issues in WPL.

Design Errors and Cryptanalysis of Shin's Robust Authentication Scheme based Dynamic ID for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.101-108
    • /
    • 2021
  • In this paper, we analyze Shin's proposed dynamic ID-based user authentication scheme for TMIS(Telecare Medicine Information System), and Shin's authentication scheme is vulnerable to smart card loss attacks, allowing attackers to acquire user IDs, which enables user impersonation attack. In 2019, Shin's proposed authentication scheme attempted to generate a strong random number using ECC, claiming that it is safe to lose a smart card because it is impossible to calculate random number r'i due to the difficulty of the ECC algorithm without knowing random number ri. However, after analyzing Shin's authentication scheme in this paper, the use of transmission messages and smart cards makes it easy to calculate random numbers r'i, which also enables attackers to generate session keys. In addition, Shin's authentication scheme were analyzed to have significantly greater overhead than other authentication scheme, including vulnerabilities to safety analysis, the lack of a way to pass the server's ID to users, and the lack of biometric characteristics with slightly different templates.

A Study on the Stabilization of a System for Big Data Transmission of Intelligent Ventilation Window based on Sensor and MCU (센서 및 MCU기반 지능형 환기창 빅데이터전송용 시스템 안정화에 관한 연구)

  • Ryoo, Hee-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.3
    • /
    • pp.551-558
    • /
    • 2021
  • In this paper, we made the integrated intelligent air ventilation of the actuator module that can be remotely controlled based on IoT and sensors. we implemented a ventilation window system by configuring an algorithm design and a driving circuit to control the operation of the actuator to open and close the ventilation port based on a predetermined number of data that detects indoor gas/CO2/humidity temperature and outdoor fine dust related indoor/outdoor environment. It is difficult to store, manage, and analyze data due to the large number of sensors and conditions for the transmission data of indoor air circulation module. The remote monitoring and remote wireless control screens were constructed to automate the separation and operation conditions by extracting and managing the state. We apply MQTT to enhance big data transmission and construct the system using Rocket MQ to ensure safe transmission of operational big data against system errors.

Novel Hybrid Hydroxyapatite Spacers Ensure Sufficient Bone Bonding in Cervical Laminoplasty

  • Tanaka, Nobuhiro;Nakanishi, Kazuyoshi;Kamei, Naosuke;Nakamae, Toshio;Kotaka, Shinji;Fujimoto, Yoshinori;Ochi, Mitsuo;Adachi, Nobuo
    • Asian Spine Journal
    • /
    • v.12 no.6
    • /
    • pp.1078-1084
    • /
    • 2018
  • Study Design: Prospective observational study. Purpose: This prospective analysis aimed to evaluate the efficacy and bone-bonding rate of hybrid hydroxyapatite (HA) spacers in expansive laminoplasty. Overview of Literature: Various types of spacers or plates have been developed for expansive laminoplasty. Methods: Expansive open-door laminoplasty was performed in 146 patients with cervical myelopathy; 450 hybrid HA spacers and 41 autogenous bone spacers harvested from the spinous processes were grafted into the opened side of each lamina. The patients were followed up using computed tomography (CT), and their bone-bonding rates for hybrid HA and autogenous spacers, bone-fusion rates of the hinges of the laminae, and complications associated with the implants were then examined. Results: Clinical symptoms significantly improved in all patients, and no major complications related to the procedure were noted. The hybrid HA spacers exhibited sufficient bone bonding on postoperative CT. The hinges completely fused in over 95% patients within 1 year of the procedure. Only 4 spacers (0.9%) developed lamina sinking, and most expanded laminae maintained their positions without sinking or floating throughout the follow-up period. Conclusions: Hybrid HA spacers contributed to high bone-fusion rates of the spacers and hinges of the laminae, and no complications were associated with their use. Cervical laminoplasty with these spacers is safe and simple, and it yields sufficient fixation strength while ensuring sufficient bone bonding during the immediate postoperative period.

Management of Andersson Lesion in Ankylosing Spondylitis Using the Posterior-Only Approach: A Case Series of 18 Patients

  • Shaik, Ismail;Bhojraj, Shekhar Yeshwant;Prasad, Gautam;Nagad, Premik Bhupendra;Patel, Priyank Mangaldas;Kashikar, Aaditya Dattatreya;Kumar, Nishant
    • Asian Spine Journal
    • /
    • v.12 no.6
    • /
    • pp.1017-1027
    • /
    • 2018
  • Study Design: This retrospective study was conducted including 18 patients who underwent posterior-only stabilization and fusion procedure for pseudoarthrosis in the ankylosed spine from October 2007 to May 2015. Purpose: This study aimed to describe the treatment outcomes in 18 patients with Andersson lesion (AL) who were managed using the posterior-only approach. Literature Review: AL is an unstable, localized, vertebral, or discovertebral lesion of the spine. It is observed in patients with ankylosing spondylitis. The exact etiology of this disorder remains unclear, and the treatment guidelines are not clearly described. Methods: We analyzed 18 patients with AL who were treated with posterior long segment spinal fusion without any anterior interbody grafting or posterior osteotomy. Pre- and postoperative radiography, computed tomography, and recent follow-up images were examined. The pre- and postoperative Visual Analog Scale score and the Oswestry Disability Index score were evaluated for all patients. Whiteclouds' outcome analysis criteria were applied at the follow-up. Moreover, at study completion, patient feedback was collected; all the patients were asked to provide their opinion regarding the surgery and were asked whether they would recommend this procedure to other patients and them self undergo the same procedure again if required. Results: The most common site was the thoracolumbar junction. The symptom duration ranged from 1 month to 10 years preoperatively. Most patients experienced fusion by the end of 1 year, and the fusion mass could be observed as early as 4 months. Pseudoarthrosis void of up to 2.5 cm was noted to be healed in subsequent imaging. In addition, clinically, the patients reported good symptomatic relief. No patient required revision surgery. Whiteclouds' outcome analysis score at the latest follow-up revealed goodto-excellent outcomes in all patients. Conclusions: ALs can be treated using the posterior-only approach with long segment fixation and posterior spinal fusion. This is a safe, simple, and quick procedure that prevents the morbidity of anterior surgery.

Securing communication between EMS and remote devices in a Microgrid (마이크로그리드 환경에서 EMS와 원격 장치간 통신 보안)

  • Kim, Mi-sun;Park, Kyung-Woo;Kim, Jong-Man;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.52-60
    • /
    • 2018
  • Energy Management System(EMS) of Microgrid(MG) collects and analyzes data from devices in the microgrid to provide information to operators, users and other systems. In the middle of the process, it is required to securely provide information through both wired and wireless communication networks. In this paper, we design and implement a module that provides encryption and decryption, key management, key distribution, and message authentication functions, thus enabling the development of a system which is safe from the exposure and modulation of data potentially occurrable during data transmission between RTU(Remote Terminal Unit) and EMS. Our method can increase the efficiency of connection and key management for RTU by connecting a virtual device(VD) to RTU.