• Title/Summary/Keyword: storage management

Search Result 2,631, Processing Time 0.031 seconds

Comparative assessment of urban stormwater low impact strategies equipped with pre-treatment zones (침강지 시설이 조성된 LID 시설의 환경적 영향평가)

  • Yano, K.A.V.;Reyes, N.J.D.G.;Jeon, M.S.;Kim, L.H.
    • Journal of Wetlands Research
    • /
    • v.21 no.2
    • /
    • pp.181-190
    • /
    • 2019
  • Recently, Low impact development techniques, a form of nature-based solutions (NBS), were seen cost-efficient alternatives that can be utilized as alternatives for conventional stormwater management practices. This study evaluated the effectiveness of an infiltration trench (IT) and a small constructed wetland (SCW) in treating urban stormwater runoff. Long-term monitoring data were observed to assess the seasonal performance and cite the advantages and disadvantages of utilizing the facilities. Analyses revealed that the IT has reduced performance during the summer season due to higher runoff volumes that exceeded the facility's storage volume capacity and caused the facility to overflow. On the other hand, the pollutant removal efficiency of the SCW was impacted by the winter season as a result of dormant biological activities. Sediment data also indicated that fine and medium sand particles mostly constituted the trapped sediments in the pretreatment and media zones. Sediments in SCW exhibited a lower COD and TN load due to the phytoremediation and microbiological degradation capabilities of the system. This study presented brief comparison LID facilities equipped with pre-treatment zones. The identified factors that can potentially affect the performance of the systems were also beneficial in establishing metrics on the utilization of similar types of nature-based stormwater management practices.

Analysis and Improvement Plan of Cultivation and Postharvest Management Status of Cut Chrysanthemum Farms in Korea (국내 절화국화 재배농가의 재배와 수확 후 관리현황 분석 및 개선 방안)

  • Roh, Yong Seung;Yoo, Yong Kweon
    • FLOWER RESEARCH JOURNAL
    • /
    • v.26 no.4
    • /
    • pp.187-194
    • /
    • 2018
  • This study was conducted to investigate the facilities, cultivation, postharvest management, and distribution status of 27 cut chrysanthemum farms in Korea. The 60% of farms have cultivated the cut chrysanthemum using soil fertigation system in the PE plastic house. In Jeonnam and Busan provinces, Standard type of chrysanthemum was cultivated mainly than spray type of chrysanthemumJeoas. Most farms have been producing the rooted cuttings by plug system using cuttings self-propagated or purchased from the company, but farms in Jeonnam have been planting cuttings directly on cultivation bed. And the 66.6% of cut chrysanthemum farms have been pretreating with dipping in hot water or tap water after harvesting. Precooling was not performed on 70.4% of the farms, and precooling farms have been mainly conducted at temperature of $2-4^{\circ}C$. After harvesting, 70.4% of the farms stored the cut flowers at $2-4^{\circ}C$ for more than 48 hours to control the distribution volume. Cut chrysanthemum was graded mainly by individuals before distribution, and some export farmers have been conducting the cooperative grading. In distribution, all farms have distributed the cut flowers to the domestic markets, and 44.4% of these farms have been also exporting. The 63.0% of farms distributed to domestic market have been trading with flower auction sites.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

Impact of Renewable Energy on Extension of Vaccine Cold-chain: a case study in Nepal (신재생 에너지의 백신 콜드체인 확장 효과: 네팔 사례 연구)

  • Kim, Min-Soo;Mun, Jeong-Wook;Yu, Jongha;Kim, Min-Sik;Bhandari, Binayak;Bak, Jeongeun;Bhattachan, Anuj;Mogasale, Vittal;Chu, Won-Shik;Lee, Caroline Sunyong;Song, Chulki;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.94-102
    • /
    • 2020
  • Renewable energy (RE) is essential to comprise sustainable societies, especially, in rural villages of developing countries. Furthermore, application of off-grid RE systems to health care can improve the quality of life. In this research, a RE-based vaccination supply management system was constructed to enlarge the cold-chain in developing countries for the safe storage and delivery of vaccines. The system was comprised of the construction of RE plants and development of vaccine carriers. RE plants were constructed and connected to health posts in local villages. The cooling mechanism of vaccine carriers was improved and monitoring devices were installed. The effect of the system on vaccine cold-chain was evaluated from the field test and topographical analysis in the southern village of Nepal. RE plants were normally operated for the vaccine refrigerator in the health post. The modified vaccine carriers had a longer operation time and better temperature control via monitoring and RE-based recharging functionality. The topographical analysis estimated that the system can cover larger region. The system prototype showed great potential regarding the possibility of a sustainable and enlarged cold-chain. Thus, RE-based vaccine supply management is expected to facilitate vaccine availability while minimizing waste in the supply chain.

A Case Study on the Human Error Analysis of Forklift Operations in a Small Enterprise (소규모 사업장의 지게차 작업에 관한 휴먼에러 분석 사례 연구)

  • Ha, Gyu Cheol;Park, Jungchul
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.207-215
    • /
    • 2021
  • A forklift is an industrial vehicle with a power-operated fork for lifting and moving heavy loads over short distances. A significant number of accidents are caused by forklifts every year. Most of them are known to be caused by the unsafe acts of workers. However, only a few studies have focused on the risks of forklift work from the perspective of human error. In addition, various methods have been developed to analyze the risk of human error, while it is hard to find studies that directly compare the effectiveness or strengths/weaknesses of those methods. This study aims to analyze risk factors related to unsafe behavior in forklift operations using two representative human error analysis techniques, i.e., .SHERPA and HE-HAZOP, and compare their advantages and disadvantages. The analysis was performed on three main forklift operations ('unloading from the truck', 'moving and loading into the storage', and 'loading on the truck'). As a result, 118 errors and 34 remedial measures were derived by SHERPA. Through HAZOP, 139 errors and 54 measures were derived. The two techniques were compared in terms of the number of results and the method of deriving errors and remedial measures, cause analysis, and risk assessment. This study might be used to reduce human error related disasters in workplaces using forklifts. In order to provide a guide for choosing an appropriate analysis method, more comparative studies on different techniques involving wide range of tasks are needed in the future.

Inundation Pattern Analysis of Excavation at Construction Site and Derivation of Diasaster Cause and Effect Using Fish-bone Diagram (굴착공사현장 침수양상 해석 및 어골도에 의한 침수피해 원인 및 결과 도출)

  • Yoo, Dong-Hyun;Song, Chang Geun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.84-91
    • /
    • 2021
  • In the 21st century, a number of storm and flood disasters caused by rapidly changing climate change is increasing, and the number of flood accidents at construction sites is also increasing. However, no specific reduction measures have been presented and thereby safety management to prevent flood accident need to be improved. Therefore, in this study, the inundation pattern by downpour at the excavation site was interpreted and the inundation risk quantification method was used to classify the risk magnitude. Finally, using the fish-bone diagram, we derived the major reasons of inundation accident at construction site systematically. The simulation results showed that the inundation depths of small-scale excavation sites and excavation sites exceeded 3 m due to the fluid flowing through the excavation surface. In addition, depending on the excavation site, a high velocity temporarily observed and decreased due to the storage effect, or high velocity surpassing 10 m/s continued. Since this type of flooding can pose a risk to most or all workers, if proper management measures are insufficient, fatal damage to life and property could occur. Consideration of the roots of these disasters is judged to be helpful in understanding the causes of inundation accidents that result in casualties and presenting accident reduction measures.

A Study on Updated Object Detection and Extraction of Underground Information (지하정보 변화객체 탐지 및 추출 연구)

  • Kim, Kwangsoo;Lee, Heyung-Sub;Kim, Juwan
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.99-107
    • /
    • 2020
  • An underground integrated map is being built for underground safety management and is being updated periodically. The map update proceeds with the procedure of deleting all previously stored objects and saving newly entered objects. However, even unchanged objects are repeatedly stored, deleted, and stored. That causes the delay of the update time. In this study, in order to shorten the update time of the integrated map, an updated object and an unupdated object are separated, and only updated objects are reflected in the underground integrated map, and a system implementing this technology is described. For the updated object, an object comparison method using the center point of the object is used, and a quad tree is used to improve the search speed. The types of updated objects are classified into addition and deletion using the shape of the object, and change using its attributes. The proposed system consists of update object detection, extraction, conversion, storage, and history management modules. This system has the advantage of being able to update the integrated map about four times faster than the existing method based on the data used in the experiment, and has the advantage that it can be applied to both ground and underground facilities.

Bacterial Contamination in Disposable Wet Wipes in General Restaurants 2nd (대중음식점 일회용 물티슈의 세균 오염도 조사(2))

  • Chong, Moo-Sang
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.54 no.1
    • /
    • pp.23-27
    • /
    • 2022
  • Disposable wet wipes provided by general restaurants in the Jeju Special Self-Governing Province were evaluated for compliance with the labeling requirements and the degree of bacterial contamination set by the Ministry of Food and Drug Safety. Of the 32 types of disposable wipes, five types of disposable wipes did not indicate the name and location of the business office of the manufacturer. Only 12 types of wet wipes were marked with the date of manufacture and expiration date. Bacterial contamination was seen in 9 types of wet wipes through bacterial culture but these were absent in the remaining 23 types (71.9%). The results of the antimicrobial susceptibility test for the 9 identified strains showed no methicillin-resistant coagulase-negative staphylococci (MRCNS) or multidrug-resistant bacteria. Through this study, it is recommended that the date of manufacture and expiration date must be indicated on the surface of disposable wet wipes designated as hygiene products, and clean uncontaminated wet wipes must comply with storage standards. In addition, the results are expected to contribute to the enhancement and improvement of hygiene management supervision, personal hygiene management, and an improvement in national health.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Risk Factor Analysis for Preventing Foodborne Illness in Restaurants and the Development of Food Safety Training Materials (레스토랑 식중독 예방을 위한 위해 요소 규명 및 위생교육 매체 개발)

  • Park, Sung-Hee;Noh, Jae-Min;Chang, Hye-Ja;Kang, Young-Jae;Kwak, Tong-Kyung
    • Korean journal of food and cookery science
    • /
    • v.23 no.5
    • /
    • pp.589-600
    • /
    • 2007
  • Recently, with the rapid expansion of the franchise restaurants, ensuring food safety has become essential for restaurant growth. Consequently, the need for food safety training and related material is in increasing demand. In this study, we identified potentially hazardous risk factors for ensuring food safety in restaurants through a food safety monitoring tool, and developed training materials for restaurant employees based on the results. The surveyed restaurants, consisting of 6 Korean restaurants and 1 Japanese restaurant were located in Seoul. Their average check was 15,500 won, ranging from 9,000 to 23,000 won. The range of their total space was 297.5 to $1322.4m^2$, and the amount of kitchen space per total area ranged from 4.4 to 30 percent. The mean score for food safety management performance was 57 out of 100 points, with a range of 51 to 73 points. For risk factor analysis, the most frequently cited sanitary violations involved the handwashing methods/handwashing facilities supplies (7.5%), receiving activities (7.5%), checking and recording of frozen/refrigerated foods temperature (0%), holding foods off the floor (0%), washing of fruits and vegetables (42%), planning and supervising facility cleaning and maintaining programs of facilities (50%), pest control (13%), and toilet equipped/cleaned (13%). Base on these results, the main points that were addressed in the hygiene training of restaurant employees included 4 principles and 8 concepts. The four principles consisted of personal hygiene, prevention of food contamination, time/temperature control, and refrigerator storage. The eight concepts included: (1) personal hygiene and cleanliness with proper handwashing, (2) approved food source and receiving management (3) refrigerator and freezer control, (4) storage management, (5) labeling, (6) prevention of food contamination, (7) cooking and reheating control, and (8) cleaning, sanitation, and plumbing control. Finally, a hygiene training manual and poster leaflets were developed as a food safety training materials for restaurants employees.