• Title/Summary/Keyword: Service Flow

Search Result 1,227, Processing Time 0.027 seconds

The Structure Integrity Assessment of the Wall Thinned Elbow Considering In/Out-Plane Bending (열림·닫힘 방향 하중이 고려된 두께 감소된 엘보우의 건전성평가)

  • Jang, Ungburm;Shin, Kyuin;Lee, Sungho;Kuan, Changhee
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • Local wall thinning elbow due to the water flow is one of the main degradation phenomenon in carbon steel pipe of plant system. The API579 code of FFS (fitness for service) used in the chemical plant gives a guideline to protect local wall thin problem in a straight pipe, but it does not include an elbow. In this study, the locally wall thinned elbow, which is considered an extrados or intrados wall thinned elbow, was carried out considering in-plane or out-plane bending using FEM (finite element method) analysis, and some of results were also compared with the experimental data. The results could give the structure integrity assessment to protect the local wall thinned elbow.

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing

  • Hundera, Negalign Wake;Mei, Qian;Xiong, Hu;Geressu, Dagmawit Mesfin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.455-472
    • /
    • 2020
  • As a user in modern societies with the rapid growth of Internet environment and more complicated business flow processes in order to be effective at work and accomplish things on time when the manager of the company went for a business trip, he/she need to delegate his/her signing authorities to someone such that, the delegatee can act as a manager and sign a message on his/her behalf. In order to make the delegation process more secure and authentic, we proposed a secure and efficient identity-based proxy signcryption in cloud data sharing (SE-IDPSC-CS), which provides a secure privilege delegation mechanism for a person to delegate his/her signcryption privilege to his/her proxy agent. Our scheme allows the manager of the company to delegate his/her signcryption privilege to his/her proxy agent and the proxy agent can act as a manager and generate signcrypted messages on his/her behalf using special information called "proxy key". Then, the proxy agent uploads the signcrypted ciphertext to a cloud service provider (CSP) which can only be downloaded, decrypted and verified by an authorized user at any time from any place through the Internet. Finally, the security analysis and experiment result determine that the proposed scheme outperforms previous works in terms of functionalities and computational time.

Implementation of Remote Monitoring Scenario using CDMA Short Message Service for Protected Crop Production Environment

  • Bae, Keun-Soo;Chung, Sun-Ok;Kim, Ki-Dae;Hur, Seung-Oh;Kim, Hak-Jin
    • Journal of Biosystems Engineering
    • /
    • v.36 no.4
    • /
    • pp.279-284
    • /
    • 2011
  • Protected vegetable production area is greater than 26% of the total vegetable production area in Korea, and portion of protected production area is increasing for flowers and fruits. To secure stable productivity and profitability, continuous and intensive monitoring and control of protected crop production environment is critical, which is labor- and time-consuming. Failure to maintain proper environmental conditions (e.g., light, temperature, humidity) leads to significant damage to crop growth and quality, therefore farmers should visit or be present close to the production area. To overcome these problems, application of remote monitoring and control of crop production environment has been increasing. Wireless monitoring and control systems have used CDMA, internet, and smart phone communications. Levels of technology adoption are different for farmers' needs for their cropping systems. In this paper, potential of wireless remote monitoring of protected agricultural environment using CDMA SMS text messages was reported. Monitoring variables were outside weather (precipitation, wind direction and velocity, temperature, and humidity), inside ambient condition (temperature, humidity, $CO_2$ level, and light intensity), irrigation status (irrigation flow rate and pressure), and soil condition (volumetric water content and matric potential). Scenarios and data formats for environment monitoring were devised, tested, and compared. Results of this study would provide useful information for adoption of wireless remote monitoring techniques by farmers.

Influence of Negative-Pressure Wound Therapy on Tissue Oxygenation of the Foot

  • Shon, Yoo-Seok;Lee, Ye-Na;Jeong, Seong-Ho;Dhong, Eun-Sang;Han, Seung-Kyu
    • Archives of Plastic Surgery
    • /
    • v.41 no.6
    • /
    • pp.668-672
    • /
    • 2014
  • Background Negative-pressure wound therapy (NPWT) is believed to accelerate wound healing by altering wound microvascular blood flow. Although many studies using laser Doppler have found that NPWT increases perfusion, recent work using other modalities has demonstrated that perfusion is reduced. The purpose of this study was to investigate the influence of NPWT on tissue oxygenation of the foot, which is the most sensitive region of the body to ischemia. Methods Transcutaneous partial pressure of oxygen ($TcpO_2$) was used to determine perfusion beneath NPWT dressings of 10 healthy feet. The sensor was placed on the tarso-metatarsal area of the foot and the NPWT dressing was placed above the sensor. $TcpO_2$ was measured until it reached a steady plateau state. The readings obtained at the suction-on period were compared with the initial baseline (pre-suction) readings. Results $TcpO_2$ decreased significantly immediately after applying NPWT, but gradually increased over time until reaching a steady plateau state. The decrease in $TcpO_2$ from baseline to the steady state was 2.9 to 13.9 mm Hg (mean, $9.3{\pm}3.6$ mm Hg; $13.5{\pm}5.8%$; P<0.01). All feet reached a plateau within 20 to 65 minutes after suction was applied. Conclusions NPWT significantly decrease tissue oxygenation of the foot by 2.9 to 13.9 mm Hg. NPWT should be used with caution on feet that do not have adequate tissue oxygenation for wound healing.

Study on Antecedent Moisture Condition for Seolma Stream Basin

  • Ly, Sidoeun;Shin, Hyun Seok;Kim, Duck Hwan;Kim, Beom Jun;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.15 no.4
    • /
    • pp.609-618
    • /
    • 2013
  • Curve number (CN), originally developed, compiled by 'The Natural Resources Conservation Service (NRCS)', and has been widely used throughout the world. However, there is the uncertainty of CN derived from the use of antecedent moisture condition (AMC)/Antecedent Runoff Condition (ARC). As in Korea where nearly 70% covered by mountainous area, it is still not sufficient handbook precedent to guide or support the estimation of AMC/ARC. The failure to develop formal criteria of applying AMC/ ARC will be a gaping profession and results not only in uncertainty of CN estimation in particular, but also in designing appropriate structures in Korea as a whole. This paper is aiming at presenting a critical review of AMC/ARC and deriving a procedure to deal more realistically with event rainfall-runoff over wider variety of initial conditions. Proposed methods have been developed. It is based on modifying estimated runoff to observed runoff with coefficient of determination and then applying different algebraic expression with the verification of AMC by antecedent rainfall table of NEH-1964. The result shows that algebraic expression by Arnold et al. (1996) is the most appropriate for AMC/ARC and the results of AMC/ARC estimation criteria are generally very close to each other. Therefore, this algebraic expression might be applied in South Korea condition properly.

An efficient user authentication protocol for cloud computing environments (클라우드 컴퓨팅 환경에서 효과적인 사용자 인증 프로토콜)

  • Moon, Jeong-Kyung;Kim, Jin-Mook;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2353-2359
    • /
    • 2011
  • The request of Green-IT technology and recommend of computer hardware resource are increasing explosively. So, necessity of Cloud computing is increasing rapidly. Berkeley Univ. announced teens constituent that threat Cloud computing in 2009 and problem for user authentication should be solved as is urgentest among them. So, We wish to propose effective user authentication protocol in Cloud computing environment. Secure safety for user quotation through Kerberos's ticket issue that is existent representative user authentication techniques, and defined authentication procedure of two steps that flow user authentication and service authentication through PKI's. Is uncomplicated structurally more than efficiency for certification protocol and examination result about safety, existent PKI that propose and simplify achievement procedure and system configuration more than Kerberos and reduced response time.

Identification on Fatigue Failure of Impeller at Single Stage Feedwater Pumps During Commissioning Operation (단단 주 급수 펌프 임펠러에서 시운전 중 발생한 피로 절손에 관한 규명 연구)

  • Kim, Yeon-Whan;Kim, Kye-Yean;Bae, Chun-Hee;Lee, Young-Shin
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.18 no.9
    • /
    • pp.937-942
    • /
    • 2008
  • This paper presents a case history on failures of impeller and shaft due to pressure pulsation at single stage feed water pumps in 700 MW nuclear power plant during commissioning operation. The pumps had been service and had run for approximately $40{\sim}50$ hours. For the most part, the failures of impeller occurred with the presence of a number of fatigue cracks. All cracks were associated with the deleterious surface layer of impeller by visual and metallurgical examination. On-site testing and analytical approach was performed on the systems to diagnose the problem and develop a solution to reduce the effect of exciting sources. A major concern at high-energy centrifugal pump is the pressure pulsation created from trailing edge of the Impeller blade, flow separation and recirculation at centrifugal pumps of partial load. Pressure pulsation due to the interaction generating between impeller and casing coincided with natural frequencies of the impeller and shaft system during 1ow load operation. It was identified that dynamic stress exceeding the fatigue strength of the material at the thin shroud section due to the hydraulic instability at running condition below BEP.

Development of Information System in Nursing Practice;spinal cord injury patients (간호실무를 위한 정보체계 개발;척수손상 환자를 중심으로)

  • Kang, In-Soon;Kim, Myung-Hee
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.2 no.2
    • /
    • pp.43-57
    • /
    • 1996
  • The purpose of this research conducted has been an the development of a computer program to be used for nursing of spinal cord injury patients. The research is also intended to contribute by supplying the basic data, to the development of other programs in relevant areas where similar nursing information system is required. This research used System Development Life Cycle method. Results from the study were as follows : The scope of Information System in nursing practice were based on a wide range of mateials as charts at four hospitals in Pusan that cover the nursing period of spinal cord injury patients from admission to discharge and other sources of reference, the research is done for nursing diagnosis, nursing history, admission and discharge education, and the performing of doctor's order, which were divided into a subsystem that consisted of help, Patient Management, Performing of Docter's Order, and Basic Data Management and then these was analysed systematically using Hierachy Plus Input Process Output, necessary information, data flow diagram, and conceptual designs were developed for chosem system. Furthemore, the system has been programed by a conceptual design that includes the objects of the program and the origins of the sources. The oder to make sure of the proper function, the computer program was actually applied to a nursing practice that had been developed for a hypothetical situation through the two nurses who were in charge of spinal cord injury patients after they were trained to understand the structure and the contents of computer program about the nursing practice from using the computer program developed. Also, the compensatory strategy has been worked out against any problems to arise. It is expected that this kind of nursing practice information system to be used for the spinal cord injury patients that has been developed through the processes shown above will increase the satisfaction for both patients and nurses by enabling them to give more professional advice and service to the development of more information systems for many hospitals.

  • PDF

A scheme to increase the speed at which special vehicles enter the expressway (특수차량의 고속도로 진입 속도를 향상시키기 위한 방안)

  • Qin, Zhicong;Pan, Young-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.59-67
    • /
    • 2020
  • Expressway is the main link in promoting the national economic development, which plays a vital part in improving the regional economy and people's living standards, therefore, it is of great significance to accelerate the construction of expressways. However, because it is difficult for the existing system to identify the information of special vehicles quickly, leading to the cumbersome flow of special vehicles passing through the toll station of expressways [1], which brings a certain burden to the work of expressway administrators. The surge in the number of private cars also increased the traffic pressure of toll stations, especially the free expressways traffic policy implemented by the State during holidays, resulting in more frequent traffic jams at high-speed intersections. According to this situation, a intelligent system was created to ameliorate the difficult situation of special vehicle identification on expressways, reduce the congestion at high-speed intersections, and improve the efficiency of staff by data-based means.

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.