• Title/Summary/Keyword: damaging event

Search Result 15, Processing Time 0.024 seconds

Clinical Characteristics of Poor Responders to Acupotomy and Safety Pretreatment Management (침도 침술시 부작용과 예방법에 관한 연구)

  • Kim, Sung-Chul
    • Journal of Acupuncture Research
    • /
    • v.25 no.4
    • /
    • pp.117-125
    • /
    • 2008
  • Objectives : Analyze according to types of event causing the adverse outcome due to acupotomy, and discuss problems and safety reqirements to using this therapy in Korea. Methods : Based upon the indication, contraindication, treatment procedures, clinical obsevations, acupotomy-related adverse outcome case reports, the factors of damaging event were classified. Results : The main factors of adverse outcome by acupotomy were anatomical ignorance, contamination of device or hospital staff, failure to notice preexisting disease(cardiovascular disease, hypertension, renal failure, hemophilia, chronic Liver Disease, etc.), unskilled treatment procedures(massive bleeding) and techniques(nerve injury, hepatic and splenic injury, Pneumothorax). Conclusions : It is mandatory to prepare adequate sterilie aseptic technique. The clinician should ensure understand genernal health state of patient and anatomical direction.

  • PDF

A Study on Releases Determination Scheme for a Forecasted Flood (예측홍수의 방류량 결정방안에 관한 연구)

  • Kwon, Oh-Ig;Shim, Myung-Pil
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.3
    • /
    • pp.257-268
    • /
    • 1997
  • Reservoir operators and managers need to present a rational basis of determining releases for a flood event. This study divides a forecasted flood hydrograph by two parts on the basis of non-damaging discharge, which consists of one part con,trolled by non-damaging discharge and another controlled by using flood control storage of the reservoir. In case of using flood control storage, a new reservoir operation method. called TRF (Transformed Reservoir Flood) ROM, is suggested for the operating rules during a flood to consider the reservoir security as well as the operational efficiency. This paper presents an application of the methodology to the operation of a single multipurpose reservoir at the Taechong Dam during flood and the results analyzed.alyzed.

  • PDF

Security Simulation with Collaboration of Intrusion Detection System and Firewall (침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

Surface measurements of the 5 June 2013 damaging thunderstorm wind event near Pep, Texas

  • Gunter, W. Scott;Schroeder, John L.;Weiss, Christopher C.;Bruning, Eric C.
    • Wind and Structures
    • /
    • v.24 no.2
    • /
    • pp.185-204
    • /
    • 2017
  • High-resolution wind measurements at 2.25 m in height were used to investigate the mean and turbulence properties of an extreme thunderstorm wind event in West Texas. These data were combined with single Doppler scans from the Texas Tech University Ka-band mobile Doppler radars systems (TTUKa) to provide meteorological context over the surface measurement stations for portions of the outflow. Several features characteristic of a severe wind event were noted in the radar data, including a bowing portion of the thunderstorm complex and a small circulation on the leading edge. These features were reflected in the surface wind time histories and provided natural separation between various regions of the outflow. These features also contributed to the peak 1-s gust at all measurement stations. The turbulence characteristics of each outflow region were also investigated and compared. Reduced values of running turbulence intensity and elevated values of longitudinal integral scales were noted during the period of peak wind speed. Larger scales of turbulence within the outflow were also suggested via spectral analysis.

Minimal Cut Set of Electric Power Installations using Fault Tree Analysis (FTA를 이용한 수변전설비의 최소절단집합 도출)

  • Park, Young-Ho;Kim, Doo-Hyun;Kim, Sung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.1
    • /
    • pp.41-46
    • /
    • 2017
  • In this paper, from making an electrical fire which is thought to be the most damaging among potential dangers as a top event, minimal cut sets (MCS) about it were analyzed. For this, components of a power substation were classified into 15 items. Failure rates and modes were extracted based on Korea Electrical Safety Corporation, IEEE Gold Book, and RAC. To analyze the top event (an electrical fire), main events were assorted into "safety devices for overcurrent" and "ampere meter of detecter". Failure of components was divided into failure of VCB, COS, and MCCB. A fault tree was composed of 3 AND gate, 5 OR gates and 17 basic events. Overlapped events among the basic events are things which occur from relevant components. They were attached to the tree by distinguishing identifiers. In case of FT, two minimal cut sets of "IO_METER", "MF_METER", "DO_MCCB" and "IO_METER", "MF_METER", "DO_VCB" take 46% of electrical fires. Therefore, about basic events which are included in the top two minimum cut sets, strict control is necessary.

Possibility of Applying Infrared Background Threshold Values for Detecting Asian dust in Spring from Geostationary Satellite (봄철 황사탐지를 위한 정지궤도위성 적외선 채널의 배경경계값 적용 가능성 연구)

  • Hong, S.J.;Kim, J.H.;Ha, J.S.
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.4
    • /
    • pp.387-394
    • /
    • 2010
  • There has been an increasing trend in damaging by the Asian dust in spring. The continuous monitoring of the dust event with IR channels in geostationary satellite is very useful for forecasting and preventing the event. However, the monitoring with the IR channels revealed various problems associated with sensitivity. To eliminate these problems, we introduced a new concept of monitoring by constructing the background threshold values (BTV) and aerosol index (AI). This paper is about to test the reliability of this concept by applying to geostationary satellite, MTSAT-1R.

Vibration based damage localization using MEMS on a suspension bridge model

  • Domaneschi, Marco;Limongelli, Maria Pina;Martinelli, Luca
    • Smart Structures and Systems
    • /
    • v.12 no.6
    • /
    • pp.679-694
    • /
    • 2013
  • In this paper the application of the Interpolation Damage Detection Method to the numerical model of a suspension bridge instrumented with a network of Micro-Electro-Mechanical System sensors is presented. The method, which, in its present formulation, belongs to Level II damage identification method, can identify the presence and the location of damage from responses recorded on the structure before and after a seismic damaging event. The application of the method does not require knowledge of the modal properties of the structure nor a numerical model of it. Emphasis is placed herein on the influence of recorded signals noise on the reliability of the results given by the Interpolation Damage Detection Method. The response of a suspension bridge to seismic excitation is computed from a numerical model and artificially corrupted with random noise characteristic of two families of Micro-Electro-Mechanical System accelerometers. The reliability of the results is checked for different damage scenarios.

Micro Cracking and Elastic/Plastic Transition Radii Associated with Indenting on Ceramics by Diamond Indenter (경취재료에 있어 압자압입시의 균열진전에 관한 연구)

  • Park, G.H.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.5
    • /
    • pp.164-172
    • /
    • 1996
  • In hard and brittle materials as advanced ceramics indented by a hard indenter, the indenter's transition radius, was defined as critical radius which distinguishes the occurrence of the first plastic deformation from the elastic cracking as the first damaging event, is analytically and experimentally investigated. The analytical result is shown that the critical load, which not enlarge pre-existing cracks as the form of median crack beneath a indenter, is constant, and is determined by the order of $k_{IC}$$^{4}$ $P_{Y}$$^{3}$(where, $K_{IC}$ , $P_{Y}$are the fracture toughness of materials and the applied pressure by indenting, respectively). And the size of transiton radii were experimentally obtained with the similar values to the analytical results.lts..

  • PDF

Some recent extreme wind events in New Zealand

  • Turner, R.;Revell, M.;Reese, S.;Moore, S.;Reid, S.
    • Wind and Structures
    • /
    • v.15 no.2
    • /
    • pp.163-176
    • /
    • 2012
  • Damaging winds, associated with a variety of weather phenomena, are frequently experienced in New Zealand. Observations and modelling of two recent extreme wind events; the Taranaki tornado outbreak of July 2007, and the Greymouth down-slope easterly wind storm of July 2008 are described in detail here. Post-event engineering damage surveys, rare for New Zealand, were done for these storms and the results are summarized here. Finally, the issue of sampling extreme wind events is raised and the need to include detailed numerical modelling analysis to understand wind gust climatologies at observing sites and extending these to wider regions is discussed.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF