• Title/Summary/Keyword: Application Procedures

Search Result 1,221, Processing Time 0.029 seconds

A Study on 3D Geospatial Information Model based Influence Factor Management Application in Earthwork Plan (3차원 지형공간정보모델기반 토공사 계획 및 관리에 미치는 영향요인 관리 애플리케이션 연구)

  • Park, Jae-woo;Yun, Won Gun;Kim, Suk Su;Song, Jae Ho
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.2
    • /
    • pp.125-135
    • /
    • 2019
  • In recent years, the digital transformation age represented by the "Fourth Industrial Revolution", which is a universalization of digitalization across all industries, has become a reality. In the construction sector in 2018, the Ministry of Land, Infrastructure and Transport established the Smart Construction 2025 vision and established the 'Smart Construction Technology Roadmap' aiming to complete construction automation by 2030. Especially, in the construction stage, field monitoring technology using drones is needed to support construction equipment automation and on-site control, and a 3D geospatial information model can be utilized as a base tool for this. The purpose of this study is to investigate the factors affecting earthworks work in order to manage changes in site conditions and improve communication between managers and workers in the earthworks plan, which has a considerable part in terms of construction time and cost as a single type of work. Based on this, field management procedures and applications were developed.

Underwater Laser Cutting of Thick Stainless Steel in Various Cutting Directions for Application to Nuclear Decommissioning

  • Shin, Jae Sung;Oh, Seong Y.;Park, Seung-Kyu;Kim, Taek-Soo;Park, Hyunmin;Lee, Jonghwan
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.19 no.3
    • /
    • pp.279-287
    • /
    • 2021
  • For application in nuclear decommissioning, underwater laser cutting studies were conducted on thick stainless-steel plates for various cutting directions using a 6 kW fiber laser. For cutting along the horizontal direction with horizontal laser irradiation, the maximum cutting speed was 110 mm·min-1 for a 48 mm thick stainless-steel plate. For cutting along the vertical direction with horizontal laser irradiation, a maximum speed of 120 mm·min-1 was obtained for the same thickness, which confirmed that the cutting performance was similar but slightly better. Moreover, when cutting with vertically downward laser irradiation, the maximum cutting speed was 120 mm·min-1 for a plate of the same thickness. Thus, the cutting performance for vertical irradiation was nearly identical to that for horizontal irradiation. In conclusion, it was possible to cut thick stainless-steel plates regardless of the laser irradiation and cutting directions, although the assist gas rose up due to buoyancy. These observations are expected to benefit laser cutting procedures during the actual dismantling of nuclear facilities.

An advanced technique to predict time-dependent corrosion damage of onshore, offshore, nearshore and ship structures: Part II = Application to the ship's ballast tank

  • Kim, Do Kyun;Lim, Hui Ling;Cho, Nak-Kyun
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.645-656
    • /
    • 2020
  • In this study (Part II), the empirical formulation of corrosion model of a ship's ballast tank was developed to predict nonlinear time-dependent corrosion wastage based on the advanced data processing technique proposed by Part I. The detail on how to propose generalised mathematical formulation of corrosion model was precisely documented in the previous paper (Part I). The statistical scatter of corrosion data at any exposure time was investigated by the refined method and formulated based on a 2-parameter Weibull distribution which selected the best fit PDF. Throughout the nine (9) steps, empirical formulation of the ship's seawater ballast tank was successfully proposed and four (4) key step results were also obtained. The proposed method in Part I was verified and confirmed by this application of seawater ballast tank, thus making it possible to predict accurate behaviours of nonlinear timedependent corrosion. Developed procedures and obtained corrosion damage model for ship's seawater ballast tank can be used for development of engineering software.

Domestic Application and Procedure Analysis of Gearbox Field Test (증속기 현장시험 국내 적용 사례 및 절차 분석)

  • Lee, Gwang-Se;Kang, Minsang;Kim, Seokwoo;Lee, Jin-Jae
    • New & Renewable Energy
    • /
    • v.16 no.4
    • /
    • pp.23-32
    • /
    • 2020
  • The wind turbine gearbox has the longest downtime among other major turbine components such as blades, generators, and main bearings. Therefore, gearbox manufacturers conduct rig tests to evaluate conformity in terms of design and function. Rig tests, however, have limited similarity compared with atmospheric wind turbine operating conditions. Rig test conditions are thoroughly controlled and maintained by testers and the component certificates of gearboxes issued through the test cannot fulfill wind farm operator's requirements. Hence, certification bodies such as DNV-GL and UL require a mandatory gearbox field test report for type certification. The Korea Energy Agency (KEA) also introduced gearbox field test as a part of the KS type certificate in 2016, although it is optional . In this paper, gearbox field test procedures and requirements are introduced, and the first domestic application case of the test is reported. The field test was conducted with a 1.5 MW wind turbine gearbox located in Jeju as the test object.

A WTLS Handshake protocol against Active Attack (능동적 공격에 안전한 WTLS Handshake 프로토콜)

  • Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.113-127
    • /
    • 2003
  • WTLS as secure protocol of WAP makes TLS that is used in wireless Intemet protocol for TCP security be appropriate for wireless environments. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of 4 protocols(Handshake, ChangeCipherSpec, Alert, Application Data etc.). In this papers we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attacker models with them for a basis. Also we propose new Handshake protocol that is secure against active attacker model and can provide various security services.

Potential application of biomimetic exosomes in cardiovascular disease: focused on ischemic heart disease

  • Kang, In Sook;Kwon, Kihwan
    • BMB Reports
    • /
    • v.55 no.1
    • /
    • pp.30-38
    • /
    • 2022
  • Cardiovascular disease, especially ischemic heart disease, is a major cause of mortality worldwide. Cardiac repair is one of the most promising strategies to address advanced cardiovascular diseases. Despite moderate improvement in heart function via stem cell therapy, there is no evidence of significant improvement in mortality and morbidity beyond standard therapy. The most salutary effect of stem cell therapy are attributed to the paracrine effects and the stem cell-derived exosomes are known as a major contributor. Hence, exosomes are emerging as a promising therapeutic agent and potent biomarkers of cardiovascular disease. Furthermore, they play a role as cellular cargo and facilitate intercellular communication. However, the clinical use of exosomes is hindered by the absence of a standard operating procedures for exosome isolation and characterization, problems related to yield, and heterogeneity. In addition, the successful clinical application of exosomes requires strategies to optimize cargo, improve targeted delivery, and reduce the elimination of exosomes. In this review, we discuss the basic concept of exosomes and stem cell-derived exosomes in cardiovascular disease, and introduce current efforts to overcome the limitations and maximize the benefit of exosomes including engineered biomimetic exosomes.

Structural performance evaluation of bolted end-plate connections in a half-through railway inclined girder

  • Jung Hyun Kim;Chang Su Shim
    • Steel and Composite Structures
    • /
    • v.49 no.5
    • /
    • pp.473-486
    • /
    • 2023
  • A through-railway bridge with an inclined girder has recently been applied to optimize the cross-section of a slender bridge structure in railway bridges. To achieve the additional cross-section optimization effect by the bolted end-plate connection, it is necessary to investigate the application of the bolted end-plate tension connection between the inclined girder and the crossbeam. This basic study was conducted on the application of the bolted end-plate moment connection of crossbeams to half-through girders with inclined webs. The combined behavior of vertical deflection and rotational behavior was observed due to the effect of the web inclination in the inclined girder where the steel crossbeam was connected to the girder by the bolted end-plate moment connection. Therefore, in the experiment, the deflection of the inclined girder was 1.77-2.93 times greater than that of the vertical girder but the lateral deflection of the inclined girder was 0.4 times less than that of the vertical girder. Moreover, the tensile stress of the upper bolts in the inclined girder with low crossbeams was clearly 0.81 times lower than that of the vertical girder. According to the results, the design formula for vertical girders does not reflect the influence of the web inclination. Therefore, this study proposed the design procedures for the inclined girder to apply the bolted end-plate moment connection of the crossbeam to the inclined girder by reflecting the design change factors according to the effect of the web inclination.

Numerical data-driven machine learning model to predict the strength reduction of fire damaged RC columns

  • HyunKyoung Kim;Hyo-Gyoung Kwak;Ju-Young Hwang
    • Computers and Concrete
    • /
    • v.32 no.6
    • /
    • pp.625-637
    • /
    • 2023
  • The application of ML approaches in determining the resisting capacity of fire damaged RC columns is introduced in this paper, on the basis of analysis data driven ML modeling. Considering the characteristics of the structural behavior of fire damaged RC columns, the representative five approaches of Kernel SVM, ANN, RF, XGB and LGBM are adopted and applied. Additional partial monotonic constraints are adopted in modelling, to ensure the monotone decrease of resisting capacity in RC column with fire exposure time. Furthermore, additional suggestions are also added to mitigate the heterogeneous composition of the training data. Since the use of ML approaches will significantly reduce the computation time in determining the resisting capacity of fire damaged RC columns, which requires many complex solution procedures from the heat transfer analysis to the rigorous nonlinear analyses and their repetition with time, the introduced ML approach can more effectively be used in large complex structures with many RC members. Because of the very small amount of experimental data, the training data are analytically determined from a heat transfer analysis and a subsequent nonlinear finite element (FE) analysis, and their accuracy was previously verified through a correlation study between the numerical results and experimental data. The results obtained from the application of ML approaches show that the resisting capacity of fire damaged RC columns can effectively be predicted by ML approaches.

Case Study of New Employee Mentoring Program at Hospital A (의료기관 신입직원 멘토링프로그램 사례연구: A병원을 중심으로)

  • Jiyoung Han;Jongil Choi
    • Korea Journal of Hospital Management
    • /
    • v.29 no.1
    • /
    • pp.19-31
    • /
    • 2024
  • Purposes: The purpose of this study is to analyze cases of development and operation of a mentoring program that provides psychological support to new employees and helps them adapt to work, thereby applying it to actual work and laying the foundation for follow-up research. Methodology: We explored the development and application process of A Hospital mentoring program by applying the mentoring program model developed according to the procedures of the ADDIE model, and confirmed the perceptions of participants who participated in the training course through analysis of activity logs and in-depth interviews. Findings: The main results of the case analysis are as follows. First, the curriculum was developed according to the stages of analysis, design, development, implementation, and evaluation. As a result of activity log and in-depth interview analysis, participants recognized that the mentoring program was helpful in forming social relationships, organizational adaptation, and preventing job turnover, and recognized difficulties in communication. Participants mentioned supplementing the operating system. Practical Implication: The results of a systematic review of the application and effectiveness of mentoring programs for new employees can serve as reference material for practical program design.

  • PDF

Study on Application of Safety Management System to K-Drone Delivery (K-드론배송에 대한 항공안전관리시스템(SMS) 적용 방안)

  • Jeong Kwen Park;Keumjin Lee
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.32 no.3
    • /
    • pp.189-195
    • /
    • 2024
  • K-drone delivery system is a commercial delivery system that ensures compliance with aviation safety. It is equipped with flight routes for automated deliveries and features a drone identification device along with a real-time monitoring system for drone positions. This study proposes the application of an ICAO SMS-based safety management system as an appropriate safety management framework that non-aviation personnel drone operators can adopt. It suggests that applying an ICAO SMS-based safety management system to the K-drone delivery system, similar to Europe and the USA, is valid. To introduce ICAO SMS into the K-drone delivery system, procedures must be established for building a drone safety management system, from business registration to drone operation and training. The main components of the drone safety management system are presented, including 8 items: safety policy and authority and responsibility, risk management, safety assurance, safety promotion, drone control system, drone delivery operation manual, drone maintenance manual, and accident response, incorporating the four fundamental elements of ICAO SMS and European Light UAV operator Certificate standards. Additionally, as a core aspect of the drone safety management system, a seven-step risk assessment procedure is proposed, which includes basic risk identification, hazard identification, risk scenario development, calculation of severity and likelihood, SMS matrix risk assessment, mitigation measures, and implementation determination.