• Title/Summary/Keyword: Secure Monitoring

Search Result 341, Processing Time 0.029 seconds

Evaluation of Exposure to Isocyanates Used in Furniture Industry (가구산업에 사용되는 이소시안화물 폭로에 대한 평가)

  • Lee, Su-Gil;Lee, Nae-Woo;Pisaniello, Dino. L
    • Journal of the Korean Society of Safety
    • /
    • v.21 no.2 s.74
    • /
    • pp.138-142
    • /
    • 2006
  • Occupational asthma is commonly known to be induced by isocyanate exposure. Spray painters generally use isocyanates for 2-pack spray painting to coat wooden panel surfaces in the furniture industry in South Australia. Due to a lack of actual exposure data, this study conducted environmental and dermal/ocular monitoring from a company in the furniture industry. According to this study, there was no significant airborne contamination, due to the use of high volume low pressure (HVLP) spray guns, low concentration of hardener in paint solutions and appropriate respirator like full face-air line respirator. There was no significant HDI detection in the general work area around the spray booths. Owing to the use of disposable nitrile gloves during the spray painting, no significant dermal exposure was found. According to color monitoring, there was a possible dermal exposure from surfaces in the workplace, unless either protective gloves were worn or appropriate working practices like clean-up process and storage in a secure places. No eye contamination was detected from the spray painters. No significant exposure levels from inhalational, dermal, ocular were found. The area of most concern was work practices.

Quality Control to Improve Reliability of Automatic Water Quality Data (수질자동측정망 자료의 신뢰성 제고를 위한 정도관리)

  • Lim, Byung-Jin;Hong, Eun-Young;Kim, Hyun-Ook
    • Korean Journal of Ecology and Environment
    • /
    • v.43 no.2
    • /
    • pp.338-344
    • /
    • 2010
  • The automatic water quality monitoring system (AWQMS) have been installed to immediately response to any pollution incident. It also make it possible to conduct the task efficiently regarding water quality control. The purpose of this study is to enhance reliability by securing accuracy of automatic water quality data through quality assessment (QA) for temperature, pH, dissolved oxygen (DO), electric conductivity (EC), total organic carbon (TOC). The result of comparison between manual and automatic data, relative accuracy of general items (temperature, pH, EC, DO) and TOC were mostly satisfied with guideline (i.e. less than 20%). On the other hand, relative accuracy of DO between sampling site and housing site was somewhat against the guideline. The contamination by attaching algae and microorganism in the pipeline is considered as main cause. After backwashing the pipeline, DO concentration was increased up to 53%. Therefore, pipeline management is recognizable as important thing to secure reliability of water quality data.

Design and Implementation Endoscope System for Endotracheal Intubation (기관 내 삽관을 위한 내시경 시스템 설계 및 구현)

  • Kim, H.S.;Kang, S.K.;Kim, G.Y.;Han, Y.H.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.9 no.2
    • /
    • pp.153-160
    • /
    • 2015
  • With the development of recent IT fusion technology, IT fusion technology of medical equipment has been dramatically development. The need to most basic preferential implementation of emergency is the respiration of the patient, it is necessary to first aid is maintained in emergency patients airway simultaneously. However, to the endotracheal intubation is a procedure to secure the airway, it requires experience and first aid, Inc. good career, very that may lead to sequelae in patients who otherwise have failed to procedures It is a sensitive and important procedure. For these reasons, the success rate of current endotracheal intubation technique is not at a high level and about 50 percent. In an attempt to complement these problems, in this paper, in the process of endotracheal intubation, intubated by inserting an endoscopic camera to Into Activation tube, the streaming is a real-time monitoring and wireless video transmission method using, there is a purpose of enabling the monitoring in smart devices increase the success rate of endotracheal intubation of first aid purchases.

  • PDF

A Study on the Conceptual Design of Quay Process Monitoring System (안벽공정 모니터링 시스템의 개념 설계에 관한 연구)

  • Kim, Ho-Kyeong;Ko, Dae-Eun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.426-431
    • /
    • 2016
  • In quay processes in shipyards, it is difficult to manage workers and to maintain secure working environments because at least 1,000 people can occupy the quay at the same time. In this study, a system was designed to monitor the environment and processes of quay operation. In order to lower initial investments and the costs of maintenance and operation, the entire system consists of six connected components. Considering the communication environment of the shipyard site, Wi-Fi and the LoRa communication protocol were selected for the system. The feasibility of the communication protocols was verified by data transmission tests in the field. The designed system can provide real-time information about employees working in the quay area, the safety status of moored ships on the quay, and step-by-step alarms in dangerous situations based on the detected information. The system is expected to prevent or greatly reduce safety hazards.

Development of Electronic Management System for improving the utilization of Engineering Model in Domestic Nuclear Power Plant (국내 원전 엔지니어링운영모델 활용성 향상을 위한 시스템 개발)

  • Lee, Sang-Dae;Kim, Jung-Wun;Kim, Mun-Soo
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.5
    • /
    • pp.79-85
    • /
    • 2021
  • A standard engineering model that reflects the current organization system and engineering operation process of domestic nuclear power plants was developed based on the Standard Nuclear Performance Model developed by the American Nuclear Energy Association. The level 0 screen, which is the main screen of the engineering model computer system, consisted of an object tree structure, which provided information that is phased down from a higher structure level to a lower structure level (i.e., level 3). The level 1 screen provided information related to the sub-process of the engineering operation, whereas the Level 2 screen provided information related to each engineering operation activity. In addition, the Level 2 screen provided additional functions, such as linking electronic procedures/guidelines, providing electronic performance forms, and connecting legacy computer systems (such as total equipment reliability monitoring system, configuration management systems, technical information systems, risk monitoring systems, regulatory information, and electronic drawing system). This screen level increased the convenience of user's engineering tasks by implementing them. The computerization of an engineering model that connects the entire engineering tasks of an establishment enables the easy understanding of information related to the engineering process before and after the operation, and builds a foundation for the enhancement of the work efficiency and employee capacity. In addition, KHNP developed an online training module, which operates as an e-learning process, on the overview and utilization of a standard engineering model to expand the understanding of standard engineering models by plant employees and to secure competitiveness.

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

A Study on How to Reduce the Amount of Groundwater Used in the Dry Season and Improve the Water Quality of the Base Runoff (갈수기 지하수 물 사용량 저감 및 기저유출 수질 개선 방안 연구)

  • Kang, Tae-Seong;Yang, Dong-Seok;Yu, Na-Yeong;Shin, Min-Hwan;Lim, Kyoung-Jae;Kim, Jong-Gun
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.64 no.2
    • /
    • pp.27-35
    • /
    • 2022
  • Based on the current status of groundwater usage in the dry season through field surveys, this study tried to suggest countermeasures to reduce groundwater usage and to improve the water quality of baseflow from agricultural fields. For this purposes, basins with water curtain cultivation preceded were targeted where decreases of groundwater due to continuous use of groundwater in spring and winter annually observed. From monitoring groudwater usage of the study watershed, 130,058, 130,105 m3/day of water was pumped in during the water curtain cultivation period (October-February) in the Shindun, Seokwon watershed respectively. And the pilot application of the smart automated sensor-based water curtain cultivation system (smart WC system) developed in this study to reduce groundwater consumption has been conducted. As a result, the efficiency of the smart WC system when threshold temperature is set as 6.3 ℃ was 21.1% compared to conventional cultivation and efficiency increased as threshold temperature gets lower. Lastly, in this study, culvert drainage and Bio-filters were installed and rainfall monitoring was performed 15 times in order to analyze the baseflow securement and pollutant loads behavior. As a result, the test-bed with culvert drainage and Bio-filter installed together generated 61.4% more baseflow (4.974 m3) than the test-bed with only culvert drainage was installed (3.056 m3). However, the total pollutant load of all water quality contents (BOD, COD, T-N, TOC) except for the SS and T-P was found to be greater in the culvert drain and Bio-filter installed than in the culvert drain test-bed.

A study on the establishment and utilization of large-scale local spatial information using search drones (수색 드론을 활용한 대규모 지역 공간정보 구축 및 활용방안에 관한 연구)

  • Lee, Sang-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.1
    • /
    • pp.37-43
    • /
    • 2022
  • Drones, one of the 4th industrial technologies that are expanding from military use to industrial use, are being actively used in the search missions of the National Police Agency and finding missing persons, thereby reducing interest in a wide area and the input of large-scale search personnel. However, legal review of police drone operation is continuously required, and the importance of advanced system for related operations and analysis of captured images in connection with search techniques is increasing at the same time. In this study, in order to facilitate recording, preservation, and monitoring in the concept of precise search and monitoring, it is possible to achieve high efficiency and secure golden time when precise search is performed by constructing spatial information based on photo rather than image data-based search. Therefore, we intend to propose a spatial information construction technique that reduces the resulting data volume by adjusting the unnecessary spatial information completion rate according to the size of the subject. Through this, the scope of use of drone search missions for large-scale areas is advanced and it is intended to be used as basic data for building a drone operation manual for police searches.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Estimation of Design Wind Velocity Based on Short Term Measurements (단기 관측을 통한 설계풍속 추정)

  • Kwon, Soon-Duck;Lee, Seong Lo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.3A
    • /
    • pp.209-216
    • /
    • 2009
  • The structural stability as well as economical efficiency of the wind sensitive structures are strongly dependant on accurate evaluation of the design wind speed. Present study demonstrates a useful wind data obtained at the wind monitoring tower in the Kwangyang Suspension Bridge site. Moreover the Measure-Correlate-Predict (MCP) method has been applied to estimate the long-term wind data at the bridge site based on the wind data at the local weather station. The measured data indicate that the turbulent intensities and roughness exponents are strongly affected by the wind direction and surrounding topography. The new design wind speed based on MCP method is 20m/s lower than that at the original estimation, and the resulting design wind load is only 36% of the old prediction. The field measurement of wind data is recommended to ensure the economical and secure design of the wind sensitive structures because the measured wind data reveal much different from the estimated one due to local topography.