• Title/Summary/Keyword: protection of design

Search Result 2,384, Processing Time 0.031 seconds

A Study on the Quantitative Process Facility Standards that Require H2S Toxic Gas Detectors and Location Selection for Emergency Safety (H2S 독성가스감지기가 필요한 정량적 공정설비 기준 및 비상시 안전을 위한 위치선정 방안에 대한 연구)

  • Choi, Jae-Young;Kwon, Jung-Hwan
    • Journal of the Korean Institute of Gas
    • /
    • v.22 no.2
    • /
    • pp.90-96
    • /
    • 2018
  • Design techniques for minimizing the damage caused by leakage of $H_2S$ gas, contained in natural gas and petroleum, have been widely studied abroad in chemical plants that purify and process natural gas and petroleum. However, there is no domestic engineering practice and regulation of $H_2S$. In accordance with the circumstances, this study proposes the quantitative criteria of process equipment to install $H_2S$ toxic gas detector as 500 ppm and explains the valid basis. The $H_2S$ gas dispersion radius up to IDLH 100 ppm is calculated by ALOHA under previous $H_2S$ gas leak accident scenario. The weather conditions of modeling include the conditions of Ulsan, Yeosu and Daesan, the three major petrochemical complexes in Korea. The long radius up to 100 ppm was derived in order of Ulsan, Daesan, Yeosu. For emergency safety the dispersion radius up to 100 ppm of the $H_2S$ gas obtained in this study should be extended to apply the additional $H_2S$ toxic gas detector, and local climate conditions should be considered.

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF

Fault Location Estimation Algorithm in the Railway High Voltage Distribution Lines Using Flow Technique (반복계산법을 이용한 철도고압배전계통의 고장점표정 알고리즘)

  • Park, Kye-In;Chang, Sang-Hoon;Choi, Chang-Kyu
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.2
    • /
    • pp.71-79
    • /
    • 2008
  • High voltage distribution lines in the electric railway system placed according track with communication lines and signal equipments. Case of the over head lines is occurrence the many fault because lightning, rainstorm, damage from the sea wind and so on. According this fault caused protection device to wrong operation. One line ground fault that occurs most frequently in railway high voltage distribution lines and sort of faults is line short, three line ground breaking of a wire, and so on. For this reason we need precise maintenance for prevent of the faults. The most important is early detection and fast restoration in time of fault for a safety transit. In order to develop an advanced fault location device for 22.9[kV] distribution power network in electric railway system this paper deals with new fault locating algorithm using flow technique which enable to determine the location of the fault accurately. To demonstrate its superiorities, the case studies with the algorithm and the fault analysis using PSCAD/EMTDC (Power System Computer Aided Design/Electro Magnetic Transients DC Analysis Program) were carried out with the models of direct-grounded 22.9[kV] distribution network which is supposed to be the grounding method for electric railway system in Korea.

A Convergence Study on the Effect of Self-directed Practice based Peer-tutoring on Performance, Confidence and Self-efficacy of Core Nursing Skills in Nursing Students (동료 교수학습 기반 자율실습이 핵심기본간호술 숙련도, 수행자신감 및 자아효능감에 미치는 효과에 관한 융합연구)

  • Koo, Heesun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.453-463
    • /
    • 2019
  • The purpose of study was the non-equivalent control group pretest-posttest design to test the effect of self-directed nursing practice based peer-tutoring of same sophomore, on the level of confidence, performance and self-efficacy of core nursing skills in nursing students. The subjects were 68 nursing students in K City from May 1th to June 12th in 2019. The participants were shared into the peer tutoring practice group (experimental group, n=34) and the lecturer guided practice group (control group, n=34). The results of study, the experimental group scored significantly higher on the foley catheterization performance (t=11.60, p<.001), confidence (t=4.123, p<.001) and wearing protection equipment performance (t=5.91, p<.001), confidence (t=4.24, p<.001) and enema performance (t=2.82, p=.008), confidence (t=2.09, p=.044) and self-efficacy (t=4.52, p<.001) than control group. Therefore, the results justified that self-directed nursing practice based peer-tutoring could be effective in improving the performance, confidence and self-efficacy of core nursing skills in nursing students. Based on this, I suggest the study that examines the effects of peer-tutoring by applying it to various majors.

Case History of Sea Dyke Filter Construction Using Geotextile Tube Mattress (튜브형 매트리스를 활용한 방조제 필터공 축조사례연구)

  • Oh, Young-In;Yoo, Jeon-Yong;Kim, Hyun-Tae
    • Journal of the Korean Geosynthetics Society
    • /
    • v.6 no.1
    • /
    • pp.9-16
    • /
    • 2007
  • Geotextile is one of the most useful and effective polymer material in civil construction works and the main function of geotextile is separation, reinforcement, filtering and drainage. Recently, because of the shortage of natural rock, traditional forms of river and coastal structures have become very expensive to build and maintain. Therefore, the materials used in hydraulic and coastal structures are changing from the traditional rubble and concrete systems to the cheaper materials and systems. One of these alternatives employs geotextile tube technology in the construction of coastal and shore protection structures, such as embankment, see dyke, groins, jetties, detached breakwaters and so on. Geotextile tube technology has changed from being an alternative construction technique and, in fact, has advanced to become the most effective solution of choice. This paper presents case history of sea dyke filter construction using geotextile tube mattress and also, various issues related to the tube mattress design and construction technology.

  • PDF

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

A Study on the Artificial Intelligence Ethics Measurement indicators for the Protection of Personal Rights and Property Based on the Principles of Artificial Intelligence Ethics (인공지능 윤리원칙 기반의 인격권 및 재산보호를 위한 인공지능 윤리 측정지표에 관한 연구)

  • So, Soonju;Ahn, Seongjin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.111-123
    • /
    • 2022
  • Artificial intelligence, which is developing as the core of an intelligent information society, is bringing convenience and positive life changes to humans. However, with the development of artificial intelligence, human rights and property are threatened, and ethical problems are increasing, so alternatives are needed accordingly. In this study, the most controversial artificial intelligence ethics problem in the dysfunction of artificial intelligence was aimed at researching and developing artificial intelligence ethical measurement indicators to protect human personality rights and property first under artificial intelligence ethical principles and components. In order to research and develop artificial intelligence ethics measurement indicators, various related literature, focus group interview(FGI), and Delphi surveys were conducted to derive 43 items of ethics measurement indicators. By survey and statistical analysis, 40 items of artificial intelligence ethics measurement indicators were confirmed and proposed through descriptive statistics analysis, reliability analysis, and correlation analysis for ethical measurement indicators. The proposed artificial intelligence ethics measurement indicators can be used for artificial intelligence design, development, education, authentication, operation, and standardization, and can contribute to the development of safe and reliable artificial intelligence.

Safety Evaluation on Real Time Operating Systems for Safety-Critical Systems (안전필수(Safety-Critical) 시스템의 실시간 운영체제에 대한 안전성 평가)

  • Kang, Young-Doo;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.10
    • /
    • pp.3885-3892
    • /
    • 2010
  • Safety-Critical systems, such as Plant Protection Systems in nuclear power plant, plays a key role that the facilities can be operated without undue risk to the health and safety of public and environment, and those systems shall be designed, fabricated, installed, and tested to quality standards commensurate with the importance of the functions to be performed. Computer-based Instrumentation and Control Systems to perform the safety-critical function have Real Time Operating Systems to control and monitoring the sub-system and executing the application software. The safety-critical Real Time Operating Systems shall be designed, analyzed, tested and evaluated to have capability to maintain a high integrity and quality. However, local nuclear power plants have applied the real time operating systems on safety critical systems through Commercial Grade Item Dedication method, and this is the reason of lack of detailed methodology on assessing the safety of real time operating systems, expecially to the new developed one. This paper presents the methodology and experiences of safety evaluation on safety-critical Real Time Operating Systems based upon design requirements. This paper may useful to develop and evaluate the safety-critical Real Time Operating Systems in other industry to ensure the safety of public and environment.

A study on curing the wounded heart applications development and effect analysis by utilizing narrative therapy techniques (이야기치료 기법을 활용한 마음상처 치유 어플리케이션 개발 및 효과분석)

  • Ha, Tai-Hyun;Baek, Hyeon-gi
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.207-218
    • /
    • 2015
  • This study is to design and implement Smartphone application by applying the principles and processes of narrative therapy for the participants. The application is able for participants to fight out of the difficulty in question centered on the issue, and to be able to find a positive new stories to be evolving the story of their lives as well. Therefore, using the application will help them to live a healthier life out of the problems. As a way of currying the wounded heart of the youth, narrative therapy techniques were applied to Smartphone appliances accustomed to the youth. The youths' wounded minds will not only be easily cured but also can be a important factor in determining the direction of life. In this study, narrative flow was structured into four stages; relationships, externalization, creating new stories and strengthening the new story bsed on Doll & Doll' theory. Based on them, the Smartphone application for curing the wounded heart was designed and developed by utilizing narrative therapy techniques. The application was tested by 30 University students in Jeonbuk province in Korea and the results showed that they were satisfied with the application with relation to improving their heart health.

Study on Local Wireless Network Data Structure for Sludge Multimeter (슬러지 멀티미터를 위한 근거리무선네트워크 데이터구조 설계 연구)

  • Jung, Soonho;Kim, Younggi;Lee, Sijin;Lee, Sunghwa;Park, Taejun;Byun, Doogyoon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.96-100
    • /
    • 2014
  • Recently, the management system of wastewater treatment facility has magnified due to the stringent regulations for the protection of the environment, and a sewage treatment plant efficiency and research of the car development are activated in large facilities or industrial park. however, the existing sewerage disposal system and specific water quality monitoring network reliability for real-time transmission of this building is insufficient. In this paper, we proposed a local wireless network design for sludge multi meter data collection and control for measuring the concentration of the sludge efficiently. Also, the collected data over the local wireless network to transmitted to the central monitoring system and accumulate the data in real time to calculate statistics is possible to monitor the status of the sewage treatment facilities. The proposed system uses a short-range wireless networks of IEEE 802.15.4 and configures an IEEE 802.11 network which can monitor real-time status in central system. Also, we install a sludge multimeter and communication network in sewage treatment facilities and confirm the usefulness of the proposed technique by demonstrating its effectiveness.