• Title/Summary/Keyword: Safety management efficiency

Search Result 865, Processing Time 0.024 seconds

Development of a Signal Control Algorithm Using an Individual Vehicle's Data in a Wireless Environment (무선통신 환경에서의 개별차량 정보를 이용한 교차로 신호제어 알고리즘 개발)

  • Lee, In-Gyu;Kim, Yeong-Chan
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.125-134
    • /
    • 2009
  • Recently, as IT technology and the ubiquitous environment have diffused, the application of these techniques are being attempted in the field of traffic operations and management. Therefore, it is necessary to develop data collection systems and signal control strategies that are suitable in the ubiquitous environment and that will improve efficiency and safety of signalized intersections. The authors conducted a study on the Wireless Sensor Network (WSN) signal control strategy using a wireless communication network between individual vehicles and a signal-control system and full actuated signal control technique to propose a new signal control strategy in the ubiquitous environment. The WSN was defined to evaluate the algorithm used with PARAMICS API simulation. The simulation produced results that the WSN signal control is more effective than other signal control methods. The WSN signal control could reduce vehicle delay time to a maximum of 64% in comparison with other signal control methods in low and near saturation flow conditions.

Performance of the RI Exhaust Filter at Chosun University Cyclotron Facility and 18F Emission Reduction (조선대학교 사이클로트론 시설의 RI 배기필터 성능평가 및 18F 배출저감 연구)

  • Jeong, Cheol-Ki;Jang, Han;Lee, Goung-Jin
    • Journal of Radiation Industry
    • /
    • v.11 no.1
    • /
    • pp.13-18
    • /
    • 2017
  • Recently, the number of PET cyclotrons has increased in Korea. A cyclotron mainly produces $^{18}F$, which is used for the production of [$^{18}F$]FDG, a cancer diagnostic radiopharmaceutical. For radiation protection, the discharge control standard under the Nuclear Safety Act limits the radioactive concentration of $^{18}F$ in the exhaust discharged from a nuclear power utilization facility to below $2,000Bq\;m^{-3}$. However, the radioactive concentration of $^{18}F$ discharged during [$^{18}F$]FDG production at the cyclotron facility at Chosun University is maintained at about $1,500Bq\;m^{-3}$ on average, which is 75% of the concentration limit of the discharge control standard, and temporarily exceeds the standard as per the real-time monitoring results. This study evaluated the performance of the exhaust filter unit of the cyclotron facility at Chosun University by assessing the concentration of $^{18}F$ in the exhaust, and an experiment was conducted on the discharge reduction, where $^{18}F$ is discharged without reacting with the FDG precursors during [$^{18}F$]FDG synthesis and is immediately captured by the [$^{18}F$]FDG automatic synthesis unit. Based on the performance evaluation results of the exhaust filter at the cyclotron facility of Chosun University, the measured capture efficiency before and after the filter was found to be 92%. Furthermore, the results of the discharge reduction experiment, where the exhaust $^{18}F$ was immediately captured by the [$^{18}F$]FDG synthesizer, showed a very satisfactory 94.3% reduction in the concentration of discharge compared to the existing discharge concentration.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

The Mechanism of Labor Motivation as a Determinant of Economic Security of Enterprises in Competitive Conditions

  • Lagodiienko, Volodymyr;Samoilenko, Viktoria;Pasko, Maryna;Ovod, Larysa;Matsulevych, Yevgeniy
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.385-393
    • /
    • 2022
  • In the study of the mechanism of labor motivation as a determinant of economic security of the enterprise in competitive conditions, it was found that motivation is determinant in creating the conditions for production and ensuring the active functioning of the enterprise. It is substantiated that the motivational mechanism is the presence of a system of levers, incentives, measures and other elements for economic and administrative incentives for employees, which are used for incentives to work, increase productivity and safety, and more. The motivational mechanism plays an important role in ensuring the economic security of the enterprise and at the same time is a lever to increase competitiveness in the market. The functions of the mechanism of labor motivation are singled out, among which: explanatory-substantiating, regulative, communicative, socialization, regulating. The stages of occurrence of the motive for the employee are classified. The interrelation of motives and incentives in the mechanism of labor motivation as determinants of economic security of the enterprise in competitive conditions is proved. It is proved that the mechanism of labor motivation as a determinant of economic security of the enterprise in competitive conditions should be aimed at: assistance in forming and achieving goals and objectives of the enterprise and achieving balance and equilibrium of economic goals and social responsibility of the enterprise; ensuring close cooperation between management and employees of the enterprise; focus on building a flexible mechanism; transition to a democratic style of governance and involvement of employees in decision-making.

Consideration for defense preparedness against non-traditional security threats (focused on the threat of infectious diseases) (비전통 위협에 대한 국방 업무수행체계 유지방안 (감염병 위협 중심으로))

  • Kwon, Hyukjin;Shin, Donggyu;Shin, Youngjoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.105-112
    • /
    • 2022
  • The national defense requires uninterrupted decision-making, even under direct or indirect impacts on non-traditional threats such as infectious diseases. Since all work utilizes the information system, it is very important to ensure the availability of the information system. In particular, in terms of security management, defense work is being performed by dividing the network into a national defense network and a commercial Internet network. This study suggests a work execution plan that takes into account the efficiency of work performed on the Internet and the effectiveness of security through effective defense information system operation. It is necessary to minimize the network contact point between the national defense network and the commercial Internet, and to select a high-priority one among various tasks and operate it efficiently. For this purpose, actual cases were investigated for "A" institution and characteristics were presented. Through the targeted tasks and operation plans to improve the effectiveness of defense tasks and ensure security, presented in this paper, it will be possible to increase the availability of task performance even in non-traditional threats such as infectious diseases.

A Study on the Quantitative Evaluation Method of Small-Scale Environmental Impact Assessment

  • Dong-Myung CHO;Ju-Yeon LEE;Woo-Taeg KWON
    • Journal of Wellbeing Management and Applied Psychology
    • /
    • v.6 no.2
    • /
    • pp.39-46
    • /
    • 2023
  • Purpose: The small-scale environmental impact assessment system in Korea was introduced and implemented in August 2000, but it has a problem that it cannot guarantee implementation due to the large proportion of qualitative reduction measures for each evaluation item. Therefore, when preparing a small-scale environmental impact assessment, research was conducted on how to improve the existing simple listing-type reduction measures and qualitative evaluation standards to quantitative reduction measures and evaluation standards reflecting regional characteristics. Research design, data and methodology: The small-scale environmental impact assessment system in Korea was introduced and implemented in August 2000, but it has a problem that it cannot guarantee implementation due to the large proportion of qualitative reduction measures for each evaluation item. Therefore, when preparing a small-scale environmental impact assessment, research was conducted on how to improve the existing simple listing-type reduction measures and qualitative evaluation standards to quantitative reduction measures and evaluation standards reflecting regional characteristics. Results: As a result of the analysis of qualitative and quantitative factors, the arithmetic sum of the qualitative factors of the total six projects is 160, accounting for 80% of the total number of reduction measures, and the quantitative factors are 40, accounting for 20%. Among them, the number of qualitative reduction measures reached 97.4% for animal and plant items, and more than 90% for air quality, noise and vibration, and eco-friendly resource circulation items. Conclusions: Therefore, it is necessary to avoid establishing qualitative reduction measures and set quantitative measures as the basis, but to specify the specifications, size, and installation location related to the reduction measures, and to calculate the numerical reduction efficiency.

Comparison of hybrid arch bar versus conventional arch bar for temporary maxillomandibular fixation during treatment of jaw fractures: a prospective comparative study

  • Samriddhi Burman;Santhosh Rao;Ankush Ankush;Nakul Uppal
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.49 no.6
    • /
    • pp.332-338
    • /
    • 2023
  • Objectives: This study aimed to compare the effectiveness of a hybrid arch bar (hAB) with the conventional Erich arch bar (EAB) for the management of jaw fractures, focusing on their use for temporary fixation in patients undergoing open reduction and internal fixation (ORIF). Materials and Methods: Patients presenting with maxillary and mandibular fractures at our institution were included in this prospective, comparative study. Placement time and ease of occlusal reproducibility were recorded intraoperatively for Group A (hAB patients) and Group B (EAB patients). The primary outcome was comparison of the postoperative stability of the two arch bars. Postoperative measurements also included mucosal overgrowth, screw loosening or wire retightening, and replacement rates. The data were tabulated and computed with a P<0.05 considered statistically significant. Results: The study included 41 patients. A statistically significant difference was observed in postoperative stability scores (3) between Group A and Group B (85.0% vs 9.5%, P=0.001). The mean placement time in Group A (23.3 minutes) significantly differed from that in Group B (86.4 minutes) (P<0.001). The ease of intraoperative occlusion was not different between the two groups (P=0.413). Mucosal overgrowth was observed in 75.0% of patients (15 of 20) in Group A. Conclusion: The hAB was superior to EAB in clinical efficiency, maxillomandibular fixation time reduction, stability, versatility, and safety. Despite temporary mucosal overgrowth, the benefits of hAB outweigh the disadvantages. The choice between hAB and EAB should be based on specific clinical requirements.

Establishment of the roof model and optimization of the working face length in top coal caving mining

  • Chang-Xiang Wang;Qing-Heng Gu;Meng Zhang;Cheng-Yang Jia;Bao-Liang Zhang;Jian-Hang Wang
    • Geomechanics and Engineering
    • /
    • v.36 no.5
    • /
    • pp.427-440
    • /
    • 2024
  • This study concentrates on the 301 comprehensive caving working face, notable for its considerable mining height. The roof model is established by integrating prior geological data and the latest borehole rock stratum's physical and mechanical parameters. This comprehensive approach enables the determination of lithology, thickness, and mechanical properties of the roof within 50 m of the primary mining coal seam. Utilizing the transfer rock beam theory and incorporating mining pressure monitoring data, the study delves into the geometric parameters of the direct roof, basic roof movement, and roof pressure during the initial mining process of the 301 comprehensive caving working face. The direct roof of the mining working face is stratified into upper and lower sections. The lower direct roof consists of 6.0 m thick coarse sandstone, while the upper direct roof comprises 9.2 m coarse sandstone, 2.6 m sandy mudstone, and 2.8 m medium sandstone. The basic roof stratum, totaling 22.1 m in thickness, includes layers such as silty sand, medium sandstone, sandy mudstone, and coal. The first pressure step of the basic roof is 61.6 m, with theoretical research indicating a maximum roof pressure of 1.62 MPa during periodic pressure. Extensive simulations and analyses of roof subsidence and advanced abutment pressure under varying working face lengths. Optimal roof control effect is observed when the mining face length falls within the range of 140 m-155 m. This study holds significance as it optimizes the working face length in thick coal seams, enhancing safety and efficiency in coal mining operations.

A Study on the Critical Success Factors of Social Commerce through the Analysis of the Perception Gap between the Service Providers and the Users: Focused on Ticket Monster in Korea (서비스제공자와 사용자의 인식차이 분석을 통한 소셜커머스 핵심성공요인에 대한 연구: 한국의 티켓몬스터 중심으로)

  • Kim, Il Jung;Lee, Dae Chul;Lim, Gyoo Gun
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.211-232
    • /
    • 2014
  • Recently, there is a growing interest toward social commerce using SNS(Social Networking Service), and the size of its market is also expanding due to popularization of smart phones, tablet PCs and other smart devices. Accordingly, various studies have been attempted but it is shown that most of the previous studies have been conducted from perspectives of the users. The purpose of this study is to derive user-centered CSF(Critical Success Factor) of social commerce from the previous studies and analyze the CSF perception gap between social commerce service providers and users. The CSF perception gap between two groups shows that there is a difference between ideal images the service providers hope for and the actual image the service users have on social commerce companies. This study provides effective improvement directions for social commerce companies by presenting current business problems and its solution plans. For this, This study selected Korea's representative social commerce business Ticket Monster, which is dominant in sales and staff size together with its excellent funding power through M&A by stock exchange with the US social commerce business Living Social with Amazon.com as a shareholder in August, 2011, as a target group of social commerce service provider. we have gathered questionnaires from both service providers and the users from October 22, 2012 until October 31, 2012 to conduct an empirical analysis. We surveyed 160 service providers of Ticket Monster We also surveyed 160 social commerce users who have experienced in using Ticket Monster service. Out of 320 surveys, 20 questionaries which were unfit or undependable were discarded. Consequently the remaining 300(service provider 150, user 150)were used for this empirical study. The statistics were analyzed using SPSS 12.0. Implications of the empirical analysis result of this study are as follows: First of all, There are order differences in the importance of social commerce CSF between two groups. While service providers regard Price Economic as the most important CSF influencing purchasing intention, the users regard 'Trust' as the most important CSF influencing purchasing intention. This means that the service providers have to utilize the unique strong point of social commerce which make the customers be trusted rathe than just focusing on selling product at a discounted price. It means that service Providers need to enhance effective communication skills by using SNS and play a vital role as a trusted adviser who provides curation services and explains the value of products through information filtering. Also, they need to pay attention to preventing consumer damages from deceptive and false advertising. service providers have to create the detailed reward system in case of a consumer damages caused by above problems. It can make strong ties with customers. Second, both service providers and users tend to consider that social commerce CSF influencing purchasing intention are Price Economic, Utility, Trust, and Word of Mouth Effect. Accordingly, it can be learned that users are expecting the benefit from the aspect of prices and economy when using social commerce, and service providers should be able to suggest the individualized discount benefit through diverse methods using social network service. Looking into it from the aspect of usefulness, service providers are required to get users to be cognizant of time-saving, efficiency, and convenience when they are using social commerce. Therefore, it is necessary to increase the usefulness of social commerce through the introduction of a new management strategy, such as intensification of search engine of the Website, facilitation in payment through shopping basket, and package distribution. Trust, as mentioned before, is the most important variable in consumers' mind, so it should definitely be managed for sustainable management. If the trust in social commerce should fall due to consumers' damage case due to false and puffery advertising forgeries, it could have a negative influence on the image of the social commerce industry in general. Instead of advertising with famous celebrities and using a bombastic amount of money on marketing expenses, the social commerce industry should be able to use the word of mouth effect between users by making use of the social network service, the major marketing method of initial social commerce. The word of mouth effect occurring from consumers' spontaneous self-marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers; in this context, the word of mouth effect should be managed as the CSF of social commerce. Third, Trade safety was not derived as one of the CSF. Recently, with e-commerce like social commerce and Internet shopping increasing in a variety of methods, the importance of trade safety on the Internet also increases, but in this study result, trade safety wasn't evaluated as CSF of social commerce by both groups. This study judges that it's because both service provider groups and user group are perceiving that there is a reliable PG(Payment Gateway) which acts for e-payment of Internet transaction. Accordingly, it is understood that both two groups feel that social commerce can have a corporate identity by website and differentiation in products and services in sales, but don't feel a big difference by business in case of e-payment system. In other words, trade safety should be perceived as natural, basic universal service. Fourth, it's necessary that service providers should intensify the communication with users by making use of social network service which is the major marketing method of social commerce and should be able to use the word of mouth effect between users. The word of mouth effect occurring from consumers' spontaneous self- marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers. in this context, it is judged that the word of mouth effect should be managed as CSF of social commerce. In this paper, the characteristics of social commerce are limited as five independent variables, however, if an additional study is proceeded with more various independent variables, more in-depth study results will be derived. In addition, this research targets social commerce service providers and the users, however, in the consideration of the fact that social commerce is a two-sided market, drawing CSF through an analysis of perception gap between social commerce service providers and its advertisement clients would be worth to be dealt with in a follow-up study.