• Title/Summary/Keyword: Safe system of work

Search Result 269, Processing Time 0.023 seconds

Development of an IoT-based Unmanned Home-Delivery Box System (사물인터넷(IoT) 기반의 무인 택배함 시스템 개발)

  • Park, Chan Hee;Kang, Hyun Tae;Kang, Chang Soon
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.129-138
    • /
    • 2017
  • This paper is concerned with an Internet of Things (IoT)-based unmanned home-delivery box system, in which the system is developed with a prototype using a weight sensor, shock sensor, the Arduino and Raspberry-Pi of open-source hardware platforms. The developed system provides several functions such as a safe storage means, prevention of delivery-theft, and remote control of the home-delivery box, etc. Specifically, the system recognizes the arrival of goods by detecting the weight of deliveries and sends the arrived message of deliveries to the recipient' smartphone, and also controls (i.e., open and close) the locker of the unmanned home-delivery box system remotely with the smartphone. Furthermore, the developed system provides automatically a warning alarm around the unmanned home-delivery box when an external shock is applied to the home-delivery box, and sends a message on the shock to the recipient' smartphone. The major functions of the developed home-delivery box system have been verified in a realistic environment, and confirmed to work well. With the application of the developed home-delivery box system to the homes and offices where recipients are always not to stay, it is expected to significantly improve the safety of delivered goods as well as to effectively prevent the delivery operatives posing as a crime.

A Study on Development of Unmanned Airship for Agricultural spray (농약 살포용 무인비행선 개발에 관한 연구)

  • Kim, Keonsik;Park, Kunbum;Kim, Junghan;Lee, Sangjun;Song, Yongkyu
    • Journal of Aerospace System Engineering
    • /
    • v.4 no.1
    • /
    • pp.15-18
    • /
    • 2010
  • In the hot summer manual spray work for plants would be the hardest one among the agricultural field works. Besides the physical load the possible toxication would strongly ask a way to do the job on behalf of human. Although an aircraft with sprayer could be a good candidate, the manned airplanes do not play proper roles in our country because of field geometry. Today, unmanned helicopter as expensive as 200,000 dollars can do the job with high risk of control. Therefore safe and cheap air vehicle with sprayer, if developed, could be a great help to agriculture.

  • PDF

PERFORMANCE EVALUATION INDEX FOR COMPARING TRADITIONAL CONSTRUCTION METHODS WITH A ROBOT-BASED AUTOMATED CONSTRUCTION METHOD

  • Donguk Oh;Younghoon Lee;Ung-Kyun Lee;Nakju Lett Doh;Hunhee Cho;Kyung-In Kang
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.1088-1093
    • /
    • 2009
  • To improve construction productivity and quality, and to make the construction environment safe, a new system, Robot-based Construction Automation (RCA), is currently being developed in Korea. To determine whether RCA is an improvement over traditional construction methods (TCMs), an evaluation method, called the Performance Evaluation Index (PEI), is suggested for RCA. The PEI considers the relationships among the factors influencing the performance of the system obtained using the Delphi method and the analytic hierarchy process (AHP). As the evaluation shows, RCA is much better than TCM except for three factors: the rate of work success, quality improvement by learning experience, and construction duration.

  • PDF

Numerical calculation method for response of friction pendulum system when XY shear keys are sheared asynchronously

  • Wei, Biao;Fu, Yunji;Jiang, Lizhong;Li, Shanshan
    • Structural Engineering and Mechanics
    • /
    • v.81 no.5
    • /
    • pp.591-606
    • /
    • 2022
  • When the friction pendulum system and shear keys work together to resist the ground motion, which inclined inputs (non 45°) to the bridge structure, the shear keys in XY direction will be sheared asynchronously, endowed the friction pendulum system with a violent curvilinear motion on the sliding surface during earthquakes. In view of this situation, firstly, this paper abandons the equivalent linearization model of friction and constructs a Spring-Coulomb friction plane isolation system with XY shear keys, and then makes a detailed mechanical analysis of the movement process of friction pendulum system, next, this paper establishes the mathematical model of structural time history response calculation by using the step-by-step integration method, finally, it compiles the corresponding computer program to realize the numerical calculation. The results show that the calculation method in this paper takes advantage of the characteristic that the friction force is always µmg, and creatively uses the "circle making method" to express the change process of the friction force and resultant force of the friction pendulum system in any calculation time step, which can effectively solve the temporal nonlinear action of the plane friction; Compared with the response obtained by the calculation method in this paper, the peak values of acceleration response and displacement response calculated by the unidirectional calculation model, which used in the traditional research of the friction pendulum system, are smaller, so the unidirectional calculation model is not safe.

An evaluation of the effectiveness of the Behaviour Based Safety Initiative card system at a cement manufacturing company in Zimbabwe

  • Nunu, Wilfred N.;Kativhu, Tendai;Moyo, Phakamani
    • Safety and Health at Work
    • /
    • v.9 no.3
    • /
    • pp.308-313
    • /
    • 2018
  • Background: A behavior-based safety initiative card-issuing system was introduced at a cement-manufacturing company in Zimbabwe in 2008 to try and curb accident occurrence. The purpose of this study was to evaluate the effectiveness of the Behaviour Based Safety Initiative card system as a tool used for reducing accident frequencies. Methods: A mixed-method approach that involving administering piloted questionnaires to 40 out of 244 randomly selected employees, making observations, and reviewing secondary data were done to collect data from different sources in the organization in 2013. A paired t-test was conducted to test whether there was significant difference in accident occurrence before and after the implementation of the BBSI. Scatterplots were also used to establish the correlation between the issuance of cards and the accident and injury occurrence. Results: The findings suggest that the introduction of the card system brought a significant decrease in accident and injury occurrence. A negative correlation between card issuance and accident occurrence was observed, i.e., the greater the number of cards issued, the fewer the number of accidents. It was also noted that the card system positively influenced the mindset of workers towards safe work practices. Conclusion: The card system had an influence on the reduction of accidents and injuries. The organization should leverage on issuing more cards to further reduce the number of accidents and injuries to zero.

A Study of Computerized Industrial Hygiene Control System (작업환경관리 전산화에 관한 연구)

  • Lee, Song Kwon;Lee, Young Sei;Kim, Young Su;Kim, Yong Lae
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.4 no.1
    • /
    • pp.117-126
    • /
    • 1994
  • Some of the important and vital roles performed by the Health Care Center of Pohang Iron & Steel Co., Ltd.(POSCO) are the periodic monitoring of the work sites as well as regular medical check-ups for each workers to ensure both pleasant and safe working conditions and to protect employees' health. Pohang Steel Works, which has 42 plants, 26 facilities and 12,000 employees, has an annual crude steel production capacity of 9,670,000 using 24,500,000 ton of raw materials. We have measured lots of areal and personal working environment according to Occupational Safety and Health Law semiannually. All data collected on industrial hygiene is stored and managed by personal computer. The developed of a computerized industrial hygiene control system linked to the company's main computer system will provide efficient evaluation of the working environment as well as critical informations on employees' health. Development of this system had begun in May, 1992 and was completed in March, 1994. The computerized industrial hygiene control system can; 1. store industrial hygiene data, providing key pertinent to the diagnosis of occupational related illnesses, and if necessary, the basis for improving the working environment, 2. decide type and time of medical examination of each work for exposure to specific agents, and supply proper protection periodically, 3. prevent occupational related illnesses through evaluation of environmental and biological monitoring, and performance of epidemiological surveillance, 4. facilitate proper job placement through linking of industrial hygiene control and personnel information systems, 5. monitor job processes. levels of chemical agents used, and new agents introduced, 6. and increase productivity by saving time resulting from the implementation of the computerized sysyte,

  • PDF

Systematizing Information Use to Address Determinants of Health Worker Health in South Africa: A Cross-sectional Mixed Method Study

  • Muzimkhulu Zungu;Annalee Yassi ;Jonathan Ramodike;Kuku Voyi;Karen Lockhart;David Jones;Spo Kgalamono;Nkululeko Thunzi;Jerry Spiegel
    • Safety and Health at Work
    • /
    • v.14 no.4
    • /
    • pp.368-374
    • /
    • 2023
  • Background: Recognizing that access to safe and healthy working conditions is a human right, the World Health Organization (WHO) calls for specific occupational safety and health (OSH) programs for health workers (HWs). The WHO health systems' building blocks, and the International Labour Organization (ILO), highlight the importance of information as part of effective systems. This study examined how OSH stakeholders access, use, and value an occupational health information system (OHIS). Methods: A cross-sectional survey of OSH stakeholders was conducted as part of a larger quasi experimental study in four teaching hospitals. The study hospitals and participants were purposefully selected and data collected using a modified questionnaire with both closed and open-ended questions. Quantitative analysis was conducted and themes identified for qualitative analysis. Ethics approval was provided by the University of Pretoria and University of British Columbia. Results: There were 71 participants comprised of hospital managers, health and safety representatives, trade unions representatives and OSH professionals. At least 42% reported poor accessibility and poor timeliness of OHIS for decision-making. Only 50% had access to computers and 27% reported poor computer skills. When existing, OHIS was poorly organized and needed upgrades, with 85% reporting the need for significant reforms. Only 45% reported use of OHIS for decision-making in their OSH role. Conclusion: Given the gap in access and utilization of information needed to protect worker's rights to a safe and healthy workplace, more attention is warranted to OHIS development and use as well as education and training in South Africa and beyond.

Development of Safe and Effective rec-OPV Using Poliovirus Sabin 1-derived Mucosal Vaccine Vector

  • Bae Yong-Soo
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2002.10a
    • /
    • pp.121-124
    • /
    • 2002
  • This work was initiated to develope a recombinant oral poliovaccine (OPV), which is highly advanced in safety (minimizing VAPP) by introducing Type 2,3 poliovirus epitopes into our RPS-Vax system. We have introduced several potential vaccine epitopes of poliovirus Type 2, and 3 into RPS-Vax system, resulting in production of recombinant polioviruses. Any of these chimeric viruses, however, were not detected for their foreign gene expression by serotype-specific mouse antiserum. We have designed several folding units to stabilize the introduced vaccine protein and attached short epitope-concatamer or epitope-multimer to them, followed by production of chimeric viruses. Only those who have an HIV-1 Tat-mediated folding unit were nicely detected for the introduced foreign proteins by anti-Tat antiserum and type-specific peptide-induced antisera. Nevertheless, introduced epitopes were not detected in Western blot experiment with each serotype-specific antiserum. None of the mice inoculated with these chimeric viruses showed preventative immunity when challenged with Lansing and Leon wildtype 2 and 3 poliovirus, and the antiserum did not show neutralizing capacity in vitro. Conformational epitope covering B/C loop region of type 2 and 3 were newly designed by computer modeling, and introduced into the RPS-Vax vector system, followed by production of chimeric viruses. Introduced epitope regions were nicely detected by anti-Tag23 mAb or peptide antibody, but still not detected by poliovirus antiserum. Nevertheless, neutralizing antibody was detected in the Tg-PVR mice even when inoculated once with these chimeric viruses. Also, the immunized mice showed perfect preventative immunity against the wild Type poliovirus Lancing or Leon. When boosted appropriately, those chimeric virus-inoculated Tg-PVR mice produced equivalent amounts of neutralizing antibody to those in Sabin 2/3-immunized mice. These data strongly suggest that our recombinant poliovirus (RPS-PV2 and RPS-PV3) can be used as a safe and effective rec-OPV instead of any preexisting poliovaccine.

  • PDF

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

(Restrictions and translation rules of ANSI-C language for analyzing integrity of C program using SPARK Examiner) (SPARK Examiner를 이용해 ANSI-C프로그램의 안전성을 분석하기 위한 C언어의 제약 조건과 변환 방법)

  • 김진섭;차성덕
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.587-597
    • /
    • 2003
  • The C language is widely adopted for safety-critical systems. However, it is known that the C language is an unsuitable choice for safety-critical system since the C language includes several bad language features such as heavy use of pointers. The aim of this work is to define safe subset of the C language and translate the subset into the SPARK Ada so that we can verify the program's safety using SPARK analysis tools. SPARK is a safe subset of Ada and has been successfully applied to high integrity system development. The C program translated into SPARK has the same integrity level as SPARK, and the program correctness can be verified by using Examiner which is a SPARK analysis tool. An elevator controller case study is presented and is used to demonstrate the potential use of our approach to implement a realistic system. We also developed a translator that automatically translates C code into SPARK in accordance with the translation rules.