• Title/Summary/Keyword: safe use

Search Result 2,011, Processing Time 0.033 seconds

Using Ultrasonography Measurements to Determine the Depth of the GB 21 Acupoint to Prevent Pneumothorax

  • Chen, Hsiao-Neng;Chang, Chau-Yi;Chen, Lian-Zen;Chang, Yu-Jun;Lin, Jaung-Geng
    • Journal of Acupuncture & Meridian Studies
    • /
    • v.11 no.6
    • /
    • pp.355-360
    • /
    • 2018
  • Introductions: Pneumothorax is the most frequent severe acupuncture-related adverse event occurring at the GB 21 acupoint. This study used ultrasonography (US) to measure the depth of the GB 21 acupoint in adults and assessed its applicability for ensuring safe acupuncture practices. Materials and methods: A US probe was used to measure the vertical depth from the skin to the pleural line of the apex of the lungs at the right and left GB 21 acupoints. The sex, age, body weight, height, and body mass index of each person were recorded. Student t test and generalized estimating equations were used for statistical analysis. Results: Sixty women and 41 men with a median age of 29 years were included in this study. The depth of GB 21 increased with body weight, height, and body mass index (p < 0.001). The mean depth of GB 21 in men (17.4 mm) was greater than that in women (14.6 mm; p < 0.001). The depth difference between the right and left shoulders was significant in men (p < 0.001) but not in women. Conclusions: US can be used to measure GB 21 acupoint depth. Further control studies on its use to ensure safe clinical practices, including preventing acupuncture-related pneumothorax, are warranted.

Analysis of the IPsec Internet Key Exchange (IKE) Protocol (IPsec의 키 교환 방식에 대한 안전성 분석)

  • 주한규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.33-46
    • /
    • 2000
  • IPsec is a protocol suite to protect the data communication between computers on internet and many VPNs(Virtual Private Networks) use IPsec protocol. IKE protocol is used to exchange keys in IPsec. Formal analysis method is used increasingly in computer science to increase the reliability of a system. In this paper, the IKE protocol is analyzed formally. This paper shows that IKE with Authentication with Signature and Authentication with Pre-Shared Key is safe, but Authentication with Public Key Encryption and A Revised Method of Authentication with Public Key Encryption are safe only with the assumption that a participant has the correct public key of the correspondent. To make sure that a participant has the correct public key of the correspondent, the usage of certificate is recommended.

The Measurement of Flash Point for Binary Mixtures of 2,2,4-Trimethylpentane, Methylcyclohexane, Ethylbenzene and p-xylene at 101.3 kPa

  • Hwang, In Chan;In, Se Jin
    • Clean Technology
    • /
    • v.26 no.4
    • /
    • pp.279-285
    • /
    • 2020
  • Laboratories and industrial processes typically involve the use of flammable substances. An important property used to estimate fire and explosion risk for a flammable liquid is the flash point. In this study, flash point data at 101.3 kPa were determined using a SETA closed cup flash point tester on the following solvent mixtures: {2,2,4-trimethylpentane + methylcyclohexane}, {2,2,4-trimethylpentane + ethylbenzene}, and {2,2,4-trimethylpentane + p-xylene}. The purpose of this work is to obtain flash point data for binary mixtures of 2,2,4-trimethylpentane with three hydrocarbons (methylcyclohexane, ethylbenzene, and p-xylene), which are representative compounds of the main aromatic hydrocarbon fractions of petroleum. The measured flash points are compared with the predicted values calculated using the GE models' activity coefficient patterns: the Wilson, the Non-Random Two-Liquid (NRTL), and the UNIversal QUAsiChemical (UNIQUAC) models. The non-ideality of the mixture is also considered. The average absolute deviation between the predicted and measured lower flash point s is less than 1.99 K, except when Raoult's law is calculated. In addition, the minimum flash point behavior is not observed in any of the three binary systems. This work's predicted results can be applied to design safe petrochemical processes, such as identifying safe storage conditions for non-ideal solutions containing volatile components.

Bacterial Community of Galchi-Baechu Kimchi Based on Culture-Dependent and - Independent Investigation and Selection of Starter Candidates

  • Kim, Tao;Heo, Sojeong;Na, Hong-Eun;Lee, Gawon;Kim, Jong-Hoon;Kwak, Mi-Sun;Sung, Moon-Hee;Jeong, Do-Won
    • Journal of Microbiology and Biotechnology
    • /
    • v.32 no.3
    • /
    • pp.341-347
    • /
    • 2022
  • In this study, the bacterial community of galchi-baechu kimchi was determined using culture-based and culture-independent techniques (next generation sequencing:NGS), and showed discrepancies between results. Weissella koreensis and Pediococcus inopinatus were the dominant species according to the NGS results, while Bacillus species and P. inopinatus were dominant in the culture-dependent analysis. To identify safe starter candidates, sixty-five Bacillus strains isolated from galchi-baechu kimchi using culture-dependent methods were evaluated for their antibiotic resistance, presence of toxin genes, and hemolytic activity. Strains were then assessed for salt tolerance and protease and lipase activity. As a result, four strains-B. safensis GN5_10, B. subtilis GN5_19, B. velezensis GN5_25, and B. velezensis GT8-were selected as safe starter candidates for use in fermented foods.

Location-based smart hard hat for deforestation workers (산림 벌목 작업자간 측위 기반 스마트 안전모)

  • Park, Changsu;Kang, Yunhee;Kim, Yuri;Kim, Jilrea;Park, Subin;Kang, Myungju
    • Journal of Platform Technology
    • /
    • v.10 no.1
    • /
    • pp.3-10
    • /
    • 2022
  • In high-risk workplaces where communication is not possible, such as deforestation, it is necessary to use equipment that monitors the worker's situation in real time and obtains information according to the worker's location in case of an emergency. This paper analyzes the development and demonstration experiments of smart hard hats for deforestation workers to maintain a safe working environment. The developed smart helmet identifies the location of the worker based on the UWB signal for location estimation, and it is necessary to keep the distance between the workers not too close. UWB, Gyro, and LoRa are used to communicate even in the communication shadow area. It is used to provide a safe working environment such as improved construction to reduce worker risks and risks in forest working environments.

On the use of flyash-lime-gypsum (FaLG) bricks in the storage facilities for low level nuclear waste

  • Sidhu, Baltej Singh;Dhaliwal, A.S.;Kahlon, K.S.;Singh, Suhkpal
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.674-680
    • /
    • 2022
  • In the present study, radiation shielding and protection ability of prepared Flyash-lime-Gypsum (FaLG) bricks has been studied in terms of energy exposure build up factors and dose parameters. The energy exposure build up factors of Flyash-lime-Gypsum (FaLG) bricks have been calculated for the energy range of 0.015 MeV-15 MeV and for penetration depth upto 40 mfp directly using a new and simplified Piecewise Linear Spline Interpolation Method (PLSIM). In this new method, the calculations of G.P fitting parameters are not required. The verification and accuracy of this new method has been checked by comparing the results of exposure build up factor for NBS concrete calculated using present method with the results obtained by using G.P fitting method. Further, the relative dose distribution and reduced exposure dose rate for various radioactive isotopes without any shielding material and with Flyash-lime-Gypsum (FaLG) bricks have been calculated in the energy range of 59.59-1332 keV. On the basis of the obtained results, it has been reported that the prepared Flyash-lime-Gypsum (FaLG) bricks possess satisfactory radiation shielding properties and can be used as environmentally safe storage facilities for low level nuclear waste.

Clinical Applications of a Non-ablative Fractional Dual Laser (1550/1927 nm)

  • Chang, Ho Sun;Lim, Nam Kyu
    • Medical Lasers
    • /
    • v.9 no.2
    • /
    • pp.110-118
    • /
    • 2020
  • The non-ablative fractional dual laser is equipped with two types of lasers, 1550 nm and 1927 nm in one device, and was approved by the United States Food and Drug Administration in 2013. The advantages of the non-ablative fractional laser (NAFL) include fewer side effects such as erythema, edema, post-laser pigmentation, and scab formation. Thus, the NAFL is preferred by both practitioners and consumers because it is convenient and safe for use. The 1550 nm erbium glass and 1927 nm thulium lasers are representative NAFLs that have been developed separately and are often used as a single-wavelength laser with proven clinical efficacy in various indications. The 1550 nm wavelength laser penetrates the dermis layer and the 1927 nm wavelength laser is effective for epidermal lesions. Therefore, targeting the skin layer can be easily achieved with both the 1550 and 1927 nm lasers, respectively, or in combination. Clinically, the 1550 nm laser is effective in the treatment of mild to moderate sagging and wrinkles, scars, and resurfacing. The 1927 nm laser improves skin texture and treats skin pigmentation and wounds. It can also be used for drug delivery. The selection and utilization rate of NAFL has been increasing in recent times, due to changes in lifestyle patterns and the need for beauty treatments with fewer side effects and short downtime. In this study, we present a plan for safe and effective laser therapy through a review of literature. Clinical applications of the multifunctional NAFL are also described.

Ergonomic and performance analysis of rail-type boom sprayer for agro-photovoltaic power system

  • Rack-Woo Kim;Jae-Woong Han;Woong Kim
    • Korean Journal of Agricultural Science
    • /
    • v.49 no.1
    • /
    • pp.151-162
    • /
    • 2022
  • This study was conducted to develop a rail-type boom sprayer, performing safe spraying with improved ergonomic postures during pesticide spraying of agro-photovoltaic power system. The sprayer was designed to reduce labor cost and to be safe from pesticide exposure, and was analyzed through a comparison with a conventional spray method. The rail-type boom sprayer, consisted of a self-propelled spray and hose winder, hose, and boom sprayer parts, was designed to automatically pull and spray in the vertical and horizontal directions. The performance of the sprayer for an agro-photovoltaic power system was appropriate. From the analysis of postures with the Ovako Working posture Analysis System (OWAS), Rapid Entire Body Assessment (REBA), and Rapid Upper Limb Assessment (RULA) methods, the musculoskeletal risk factors to the body using the rail-type boom sprayer were less than those with the conventional power sprayer. In addition, the possibility of pesticide poisoning was reduced compared to the conventional power sprayer. The working capacity with the rail-type boom sprayer was more than five times greater, compared with the conventional power sprayer. After performing pesticide spraying with the rail-type boom sprayer, the labor cost was reduced to 42,750 won·yr-1, which was 90% (402,750 won·yr-1) less than the cost with the use of a conventional power sprayer (445,500 won·yr-1).

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

Analysis of Crime Prevention Environment Design Elements in Old Building Districts -Focused on the Daegu Metropolitan City Safety Village Project- (노후건축지구의 범죄예방환경디자인 요소 분석 - 대구광역시 안전마을만들기사업 중심으로 -)

  • Kang, Kyung-Ha;Son, Byeung-Hun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.05a
    • /
    • pp.301-302
    • /
    • 2021
  • Recently, there has been a large social issue about the environmental sector for safe zones from crime. Since 2010, starting with Seoul, most local governments have enacted ordinances related to crime prevention environmental design (hereinafter referred to as CPTED) and are showing active movement. In this study, as part of a method to understand how to use the design elements applied to CPTED, the safety village creation project of deteriorated construction districts in Daegu Metropolitan City was conducted, focusing on the 10 project destinations using CPTED, and the CPTED application elements were evaluated by CPTED. The analysis was conducted according to the basic principles, and the elements related to the architectural plan of the environmental design elements were reviewed. In order to extract the environmental design elements of the project site, the CPTED guideline appropriate for the sector was used based on the standard guidelines for environmental design for crime prevention in Daegu City and the contents of the crime prevention urban design ordinance.

  • PDF