• Title/Summary/Keyword: 1 step protection

Search Result 136, Processing Time 0.025 seconds

An Experimental Study on Airborne Contamination and Decontamination for $Na^{131}I$ Solution ($Na^{131}I$에 의(依)한 오염도(汚染度) 및 오염제거(汚染除去)의 실험적(實驗的) 연구(硏究))

  • Chu, Sung-Sil;Park, Chang-Yun
    • Journal of Radiation Protection and Research
    • /
    • v.9 no.2
    • /
    • pp.112-117
    • /
    • 1984
  • A lot of radioisotopes are applied to medical fields. It's very important to measure the activities on airborne radioiodine discharged in air from $Na^{131}I$ solutions and from patients treated with radioiodine. Also surface decontamination is another one important problem to be completly solved in the isotope laboratory where there is always the possibility of radiation contamination. The Authors measured the activities on airborne radioiodine with RI collector and scintillation counter. 1. The mean accumulative activity of airborne radioiodine discharged into air from $Na^{131}I$ solution was measured as $1.3{\times}10^{-3}/hr$ rate, and the maximum value was $1.8{\times}10^{-3}/hr$. 2. Radioactivity rate per hour of airborne iodine discharged into air from patients treated with $Na^{131}I$ was measured as $6.2{\times}10^{-5}/hr$ at 8 hour after administration of radioiodine and decreased into $2{\times}10^{-6}/hr$ after 24 hour. 3. Metalic surfaces such as stainless steel or aluminum are decontaminated 5 to 6 times more rapidly than wood and concrete surfaces. 4. Decontamination with wet wiping with detergent was 9 to 10 times more rapidly than dry wiping method, but dry wiping was useful for the first step to prevent spreading and flowing from liquid radioactive materials.

  • PDF

A Study on the Activity and Training Plan of a Field Crew for the Design of Training Scenarios Assuming Chemical Accidents and Terrorism (화학사고·테러를 가정한 훈련 시나리오 설계를 위한 현장 대원의 활동성 분석과 훈련방안에 관한 연구)

  • Kim, Si-Kuk;Choi, Su-Gil;Hong, Sung-chul
    • Fire Science and Engineering
    • /
    • v.34 no.2
    • /
    • pp.72-85
    • /
    • 2020
  • This article is a study on the activity of rescue workers for designing simulation training scenarios assuming chemical accidents. On the basis of the complexity of the indoor scene in the case of chemical accidents and terrorism, we designed a 12-step simulation training scenario for two teams to analyze the improvement in firefighters' capabilities. On the basis of activity measurement in the simulation scenario, step 2 of training had the most drops in the maximum heart rate, as follow: N1, from 163 bpm to 153 bpm; N2, from 186 bpm to 151 bpm; N3, from 168 bpm to 162 bpm; and N4, from 166 bpm to 152 bpm. In terms of intensity level in the allowable activity time, it was found that in step 2 both N1 and N2 reduced from Level 5 to Level 3, N3 remained at Level 4, N4 reduced from Level 4 to Level 3, and the maximum allowable activity time increased.

Role of heme oxygenase-1 expression by dietary phytoconstituents: A nutritional cytoprotective strategy for human diseases

  • Lee, Seung Eun;Park, Yong Seek
    • CELLMED
    • /
    • v.3 no.1
    • /
    • pp.1.1-1.7
    • /
    • 2013
  • The present review investigates the role of the cytoprotective enzyme heme oxygenase-1 (HO-1) in human diseases and explores strategies for its clinical use. In recent years, there has been a growing evidence, for the beneficial effects of some phytoconstituents via induction of HO-1 expression, contained in commonly used spices, fruits, and herbs, in preventing various pathologic conditions, including cancer, diabetes, and cardiovascular diseases. HO-1 catalyzes the rate-limiting step in heme catabolism to generate ferrous iron, carbon monoxide, and biliverdin. HO-1 is reported to play crucial roles in cellular protection, such as anti-inflammatory, anti-proliferative and anti-apoptotic effects. These evidences indicate that HO-1 may functions as a potential therapeutic target in various human diseases. The article highlights the current status of the development of the HO-1 modulation pathway using dietary phytoconstituents.

Process Development of a Standard Operating Procedure (SOP) for the Manufacturing of Standardized Distribution Boards (규격화된 분전반 제작을 위한 표준작업절차(SOP)의 공정 개발)

  • Ko, Wan-Su;Lee, Byung-Seol;Choi, Chung-Seog
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.5
    • /
    • pp.21-27
    • /
    • 2018
  • The purpose of this study is to develop a SOP (Standard Operating Procedure) for a distribution board that can monitor the leakage current of a load distribution line in real time. The developed distribution board was fabricated by applying IEC 61439-1. It consists of the distribution board and an alarm device. The work process for making the distribution board was compliant with the KEMC (Korea Electrical Manufacturers Cooperative) regulations. And the AC distribution board range is 1,000 V. In addition, the voltage in DC is less than 1500 V. The distribution board receives a 3-phases and 4-wires power supply system and can supply power to the load of a maximum of 32 single or three phase distribution circuits. Also, leakage current measured on the power distribution board was used by sensors installed. The SOP of the developed distribution board consists of the installation standards for the short circuit alarm device and sensor, the surge protection device, switches and indication lamps, and other devices. The operation procedure was prepared so that each manufacturing step of the distribution board must be confirmed by the persons in charge of preparation, production, quality control and approval before moving forward to the next step.

Smart City Governance Logic Model Converging Hub-and-spoke Data Management and Blockchain Technology (허브 앤 스포크형 데이터 관리 및 블록체인 기술 융합 스마트도시 거버넌스 로직모델)

  • Choi, Sung-Jin
    • Journal of KIBIM
    • /
    • v.14 no.1
    • /
    • pp.30-38
    • /
    • 2024
  • This study aims to propose a smart city governance logic model that can accommodate more diverse information service systems by mixing hub-and-spoke and blockchain technologies as a data management model. Specifically, the research focuses on deriving the logic of an operating system that can work across smart city planning based on the two data governance technologies. The first step of the logic is the generation and collection of information, which is first divided into information that requires information protection and information that can be shared with the public, and the information that requires privacy is blockchainized, and the shared information is integrated and aggregated in a data hub. The next step is the processing and use of the information, which can actively use the blockchain technology, but for the information that can be shared other than the protected information, the governance logic is built in parallel with the hub-and-spoke type. Next is the logic of the distribution stage, where the key is to establish a service contact point between service providers and beneficiaries. Also, This study proposes the establishment of a one-to-one data exchange relationship between information providers, information consumers, and information processors. Finally, in order to expand and promote citizen participation opportunities through a reasonable compensation system in the operation of smart cities, we developed virtual currency as a local currency and designed an open operation logic of local virtual currency that can operate in the compensation dimension of information.

Energy Spectrum Measurement of High Power and High Energy (6 and 9 MeV) Pulsed X-ray Source for Industrial Use

  • Takagi, Hiroyuki;Murata, Isao
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.2
    • /
    • pp.93-99
    • /
    • 2016
  • Background: Industrial X-ray CT system is normally applied to non-destructive testing (NDT) for industrial product made from metal. Furthermore there are some special CT systems, which have an ability to inspect nuclear fuel assemblies or rocket motors, using high power and high energy (more than 6 MeV) pulsed X-ray source. In these case, pulsed X-ray are produced by the electron linear accelerator, and a huge number of photons with a wide energy spectrum are produced within a very short period. Consequently, it is difficult to measure the X-ray energy spectrum for such accelerator-based X-ray sources using simple spectrometry. Due to this difficulty, unexpected images and artifacts which lead to incorrect density information and dimensions of specimens cannot be avoided in CT images. For getting highly precise CT images, it is important to know the precise energy spectrum of emitted X-rays. Materials and Methods: In order to realize it we investigated a new approach utilizing the Bayesian estimation method combined with an attenuation curve measurement using step shaped attenuation material. This method was validated by precise measurement of energy spectrum from a 1 MeV electron accelerator. In this study, to extend the applicable X-ray energy range we tried to measure energy spectra of X-ray sources from 6 and 9 MeV linear accelerators by using the recently developed method. Results and Discussion: In this study, an attenuation curves are measured by using a step-shaped attenuation materials of aluminum and steel individually, and the each X-ray spectrum is reconstructed from the measured attenuation curve by the spectrum type Bayesian estimation method. Conclusion: The obtained result shows good agreement with simulated spectra, and the presently developed technique is adaptable for high energy X-ray source more than 6 MeV.

Vietnamese Annexation of Cambodia(1835-1847) with the Handling of the Queen Mei (베트남의 캄보디아 병합(1835-1847) - 여왕 메이(Mei)의 처리문제를 중심으로)

  • Choi, Byung-Wook
    • The Southeast Asian review
    • /
    • v.20 no.2
    • /
    • pp.1-29
    • /
    • 2010
  • In 1835, quickly after the Cambodian king Ang Chan died, Vietnamese emperor Minh Mang started to proceed his ambition to grab the territory of Cambodia. As the first step, he stationed big forces led by Truong Minh Giang in Phnom Phen, and appointed the Ang Chan's second daughter, Mei, as the successor of her father but with the humble title of Chan Lap Quan Chu, or the Prefecture sovereign of Cambodia. This article discusses the ways how the Vietnamese leaders manipulated the status of the Cambodian queen with each step of protection, assimilation, and finally a rupture. The author seeks for Vietnamese own theory of annexation in the process. In doing so, the author claims that Vietnamese tough policy of annexation was closely interwoven with the unequal relationship between the Vietnamese emperors and the Cambodian queen, i. e. men and woman. The first chapter discusses how and why the second daughter was chosen, and what in reality the status of the queen was under the protection of Vietnamese general Truong Minh Giang. Second chapter shows how much Mei was bullied by the Vietnamese. She was kidnapped to Vietnam, and was even regarded by the Cambodian people that she became the 'lover' or the 'concubine' of the general Truong Minh Giang. Third chapter deals with Vietnam's retreat forced by the Cambodian resistance together with the Thai intervention, and discusses how much Vietnam tried to maintain its authority over Cambodia through the queen Mei. Cambodia, in the 19th century, was a experimental place for the 'mission of civilization' from the side of Vietnam. Mei was a main character in this period from the beginning to the end. The conclusion of this article stresses that the desire of Vietnam ('civilized') to assimilate Cambodia ('barbarious') was strengthened by the psychology of the male master (Vietnam) to domesticate the female subject (Cambodia). The relationship between Vietnam and Cambodia was not only political but also gender oriented. In this epic, the existence of the queen Mei should be regarded as an important key to understanding of the Vietnamese theory for the annexation of Cambodia.

Case Study on the Analysis of Disaster Vulnerabilities (Focused on the Fire & Explosion in the N-Industrial Complex) (재난 취약성 분석에 관한 사례연구(N공단의 화재·폭발을 중심으로))

  • Ha, Kag Cheon
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.94-100
    • /
    • 2021
  • In general, the industrial complex is a place where factories of various industries are concentrated. It is only as efficient as it is designed. However, the risks vary as there are various industries. These features are also associated with various types of disasters. The dangers of natural disasters such as a typhoon, flood, and earthquake, as well as fire and explosions, are also latent. Many of these risks can make stable production and business activities difficult, resulting in massive direct and indirect damage. In particular, decades after its establishment, the vulnerabilities increase even more as aging and small businesses are considered. In this sense, it is significant to assess the vulnerability of the industrial complex. Thus analysing fire and explosion hazards as stage 1 of the vulnerability evaluation for the major potential disasters for the industrial complex. First, fire vulnerabilities were analyzed quantitatively. It is displayed in blocks for each company. The assessment block status and the fire vulnerability rating status were conducted by applying the five-step criteria. Level A is the highest potential risk step and E is the lowest step. Level A was 11.8% in 20 blocks, level B was 22.5% in 38 blocks, level C was 25.4% in 43 blocks, level D was 26.0% in 44 blocks, and level E was 14.2% in 24 blocks. Levels A and B with high fire vulnerabilities were analyzed at 34.3%. Secondly, the vulnerability for an explosion was quantitatively analyzed. Explosive vulnerabilities were analyzed at 4.7% for level A with 8 blocks, 3.0% for level B with 5, 1.8% for level C with 3, 4.7% for level D with 8, and 85.8% for level E with 145. Levels A and B, which are highly vulnerable to explosions, were 7.7 %. Thirdly, the overall vulnerability can be assessed by adding disaster vulnerabilities to make future assessments. Moreover, it can also assist in efficient safety and disaster management by visually mapping quantified data. This will also be used for the integrated control center of the N-Industrial Complex, which is currently being installed.

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.

A Study on Minimization of Leakage of Important Information in M&A (인수합병(M&A)시 기업 중요정보 유출 최소화 방안 연구)

  • An, Young Baek;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.215-228
    • /
    • 2020
  • M&As are continuing to grow globally and are expected to increase in the future. With the fourth industrial revolution and the strengthening of neo-protection trade between countries, technology is cited as the core of national competitiveness, and the trend of M&A's increase, which is aimed at securing technology, is expected to continue. However, the risk of technology leakage, which is difficult to determine clearly illegally in the process of M&A, is still growing, and there is not enough prevention or response to this problem. the purpose of this paper was to divide the M&A process into seven stages and to ensure that important information of the enterprises during M&A between the countries and the domestic companies was not leaked unfairly, and each step analyzed the risk factors and causes of the leakage of important information in the M&A process and presented a risk-specific management plan for minimizing the leakage of important information based on the importance of the risk factors. Companies that pursue M&A in the future will reflect the M&A step-by-step risk and risk management measures derived based on case analysis and expert surveys. I hope to use risk management measures to help minimize unintentional leakage of important corporate information into the outside.