• Title/Summary/Keyword: General Coordinates

Search Result 165, Processing Time 0.021 seconds

Development of Radiation Dose Assessment Algorithm for Arbitrary Geometry Radiation Source Based on Point-kernel Method (Point-kernel 방법론 기반 임의 형태 방사선원에 대한 외부피폭 방사선량 평가 알고리즘 개발)

  • Ju Young Kim;Min Seong Kim;Ji Woo Kim;Kwang Pyo Kim
    • Journal of Radiation Industry
    • /
    • v.17 no.3
    • /
    • pp.275-282
    • /
    • 2023
  • Workers in nuclear power plants are likely to be exposed to radiation from various geometrical sources. In order to evaluate the exposure level, the point-kernel method can be utilized. In order to perform a dose assessment based on this method, the radiation source should be divided into point sources, and the number of divisions should be set by the evaluator. However, for the general public, there may be difficulties in selecting the appropriate number of divisions and performing an evaluation. Therefore, the purpose of this study is to develop an algorithm for dose assessment for arbitrary shaped sources based on the point-kernel method. For this purpose, the point-kernel method was analyzed and the main factors for the dose assessment were selected. Subsequently, based on the analyzed methodology, a dose assessment algorithm for arbitrary shaped sources was developed. Lastly, the developed algorithm was verified using Microshield. The dose assessment procedure of the developed algorithm consisted of 1) boundary space setting step, 2) source grid division step, 3) the set of point sources generation step, and 4) dose assessment step. In the boundary space setting step, the boundaries of the space occupied by the sources are set. In the grid division step, the boundary space is divided into several grids. In the set of point sources generation step, the coordinates of the point sources are set by considering the proportion of sources occupying each grid. Finally, in the dose assessment step, the results of the dose assessments for each point source are summed up to derive the dose rate. In order to verify the developed algorithm, the exposure scenario was established based on the standard exposure scenario presented by the American National Standards Institute. The results of the evaluation with the developed algorithm and Microshield were compare. The results of the evaluation with the developed algorithm showed a range of 1.99×10-1~9.74×10-1 μSv hr-1, depending on the distance and the error between the results of the developed algorithm and Microshield was about 0.48~6.93%. The error was attributed to the difference in the number of point sources and point source distribution between the developed algorithm and the Microshield. The results of this study can be utilized for external exposure radiation dose assessments based on the point-kernel method.

The Preventive Measures On Terrorism Against Overseas Korean Businessmen(A view of recent ethnic minority separation movement) (해외근무(海外覲務) 기업체(企業體)에 대(對)한 테러 방지책(防止策) - 최근(最近) 소수민족분리주의운동지역(小數民族分離主義運動地域)을 중심(中心)으로 -)

  • Choi, Yoon-Soo
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.351-370
    • /
    • 1997
  • This study concerns possible measures to prevent separatists' terrorist acts against overseas Korean businessmen. Of late, many Korean enterprises are helping a number of foreign countries develop their economy, by building factories and manning regional offices in those countries. But recent development of terrorism especially against Korean businessmen is alarming. This report discusses the need for Korean enterprises heading overseas to prepare themselves with awareness of terrorism and possible protective measures against it, besides their routine pursuance of profits; and for the government and prospective enterprises to refrain from investing in those countries having active separatist movements. If an investment has become inevitable, a careful survey of the region in conflict should be conducted and self-protective measures should be put in place through security information exchange, emergency coordination and training of personnel, etc. This study will first review the past terrorist incidents involving employees of overseas Korean enterprises, and then will focuss on seeking effective measures on the basis of the reported incidents. In carrying out the study, related literature from both home and abroad have been used along with the preliminary materials reported and known on the Internet from recent incidents. 1. The separatist movements of minority groups Lately, minority separatist groups are increasingly resorting to terrorism to draw international attention with the political aim of gaining extended self rule or independence. 2. The state of terrorism against overseas Korean enterprises and Koreans Korean enterprises are now operating businesses, and having their own personnel stationed, in 85 countries including those in South East Asia and Middle East regions. In Sri Lanka, where a Korean enterprise recently became a target of terrorist bombing, there are 75 business firms from Korea and some 700 Korean employees are stationed as of August 1996. A total of 19 different terrorist incidents have taken place against Koreans abroad since 1990. 3. Terrorism preventive measures Terrorism preventive measures are discussed in two ways: measures by the government and by the enterprises. ${\blacktriangleleft}$ Measures by the government - Possible measures at governmental level can include collection and dissemination of terrorist activity information. Emphasis should be given to the information on North Korean activities in particular. ${\blacktriangleleft}$ Measures by individual enterprises - Organizational security plan must be established by individual enterprises and there should also be an increase of security budget. A reason for reluctant effort toward positive security plan is the perception that the security budget is not immediately linked to an increment of profit gain. Ensuring safety for overseas personnel is a fundamental obligation of an enterprise. Consultation and information exchange on security plan, and an emergency support system at a threat to security must be sought after and implemented. 4. Conclusion Today's terrorism varies widely depending on reasons and causes, and its means has become increasingly informationalized and scientific as well while its method is becoming more clandestine and violent. Terrorist organizations are increasingly aiming at enterprises for acquisition of budgets needed for their activities. Korean enterprises have extended their business realm to foreign countries since 1970, exposing themselves to terrorism. Enterprises and their employees, therefore, should establish their own security measures on the one hand while the government must provide general measures, on the other, for the protection of the life and property of Korean residents abroad from terrorist attacks. In this regard, set-up of a counter terrorist organization that coordinates the efforts of government authorities in various levels in planning and executing counter terrorist measures is desired. Since 1965, when the hostile North Korea began to step up its terrorist activities against South Koreans, there have been 7 different occasions of assassination attempt on South Korean presidents and some 500 cases of various kidnappings and attempted kidnappings. North Korea, nervous over the continued economic growth and social stabilization of South Korea, is now concentrating its efforts in the destruction and deterioration of the national power of South Korea for its earlier realization of reunification by force. The possibility of North Korean terrorism can be divided into external terrorist acts and internal terrorist acts depending on the nationality of the terrorists it uses. The external terrorist acts include those committed directly by North Korean agents in South Korea and abroad and those committed by dissident Koreans, hired Korean residents, or international professionals or independent international terrorists bought or instigated by North Korea. To protect the life and property of Korean enterprises and their employees abroad from the threat of terrorism, the government's administrative support and the organizational efforts of enterprises should necessarily be directed toward the planning of proper security measures and training of employees. Also, proper actions should be taken against possible terrorist acts toward Korean business employees abroad as long as there are ongoing hostilities from minority groups against their governments.

  • PDF

An Empirical Study on the Impact of the Perception of the Monitoring Function on Effective BPMS Adoption (모니터링 기능에 대한 인식이 효과적인 BPMS 도입에 미치는 영향)

  • Chae, Myung-Sin;Park, Jin-Suk;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.105-130
    • /
    • 2007
  • Recently, there is a substantial interest in implementing Business Process Management System(BPMS) among enterprises with the purpose of business process innovation. BPMS redesigns and coordinates business processes in terms of both automated steps and human involvement in order to maximize the value of both involved people and systems. The reason why BPMS is getting attention from top managers is that it has the possibility to optimize the business processes by cycling the process of modeling, execution, monitoring, evaluation, and redesigning work processes. Thus, it has created high expectations about not only productivity improvement but also business process innovation. However. having an innovative nature, which is used for process innovation, BPMS implementation has great potential to stir up employee resistance. The analysis and the discussion about the prevention of the resistance against IS(Information Systems) is important because IS change the way people work and also alter the power structure within the organization, in general. The purpose of this study is to investigate factors that have an impact on the effective adoption of BPMS at the enterprise level. To find out these factors, this study considers two characteristics of BPMS: First. BPMS shares some characteristics with other enterprise-wide IS such as ERP. Second, it has special BPMS-specific characteristics. Due to the lack of previous research on BPMS adoption, interviews were carried out with IT-consultants and CIOs who conducted BPMS projects previously to find out BPMS-specific features that would make BPMS unique when compared to other enterprise-wide IS. As a result, the monitoring function was chosen as the main BPMS-specific factor. Thus, this paper reviewed studies both on enterprise-wide IS adoptions, which applied Technology Acceptance Model (TAM) and secondly on computer based monitoring to find out factors that would influence the employees' perception on the monitoring function of BPMS. Based on the literature review, the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses, out factors that would impact the employees' perception on the monitoring function of BPMS. Based on the literature review the study suggested three factors that would have an impact on the employee's perception of the monitoring function: fairness of enterprise evaluation system, fairness of the boss, and self-efficacy of their work. Three factors that would impact the enterprise-wide IS adoption were also set: the shared belief in the benefit of BPMS, training, and communication. Then, these factors were integrated with TAM. Structural equation modeling was used to test hypotheses. The data analysis results showed that two among three monitoring function related factors - enterprise evaluation system and fairness of the boss - were significant. This implies that employees would worry less about the BPMS implementation as long as they perceive the monitoring results will be used fairly for their performance evaluation. However, employees' high self-efficacy on their job was not a significant factor in their perception of the usefulness of BPMS. This is related to cases that showed employees resisted against the information systems because they automated their works (Markus, 1983). One specific case was an electronic company, where the accounting department workers were requested to redefine their job because their working processes were automated due to BPMS implementation.

RPC Correction of KOMPSAT-3A Satellite Image through Automatic Matching Point Extraction Using Unmanned AerialVehicle Imagery (무인항공기 영상 활용 자동 정합점 추출을 통한 KOMPSAT-3A 위성영상의 RPC 보정)

  • Park, Jueon;Kim, Taeheon;Lee, Changhui;Han, Youkyung
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_1
    • /
    • pp.1135-1147
    • /
    • 2021
  • In order to geometrically correct high-resolution satellite imagery, the sensor modeling process that restores the geometric relationship between the satellite sensor and the ground surface at the image acquisition time is required. In general, high-resolution satellites provide RPC (Rational Polynomial Coefficient) information, but the vendor-provided RPC includes geometric distortion caused by the position and orientation of the satellite sensor. GCP (Ground Control Point) is generally used to correct the RPC errors. The representative method of acquiring GCP is field survey to obtain accurate ground coordinates. However, it is difficult to find the GCP in the satellite image due to the quality of the image, land cover change, relief displacement, etc. By using image maps acquired from various sensors as reference data, it is possible to automate the collection of GCP through the image matching algorithm. In this study, the RPC of KOMPSAT-3A satellite image was corrected through the extracted matching point using the UAV (Unmanned Aerial Vehichle) imagery. We propose a pre-porocessing method for the extraction of matching points between the UAV imagery and KOMPSAT-3A satellite image. To this end, the characteristics of matching points extracted by independently applying the SURF (Speeded-Up Robust Features) and the phase correlation, which are representative feature-based matching method and area-based matching method, respectively, were compared. The RPC adjustment parameters were calculated using the matching points extracted through each algorithm. In order to verify the performance and usability of the proposed method, it was compared with the GCP-based RPC correction result. The GCP-based method showed an improvement of correction accuracy by 2.14 pixels for the sample and 5.43 pixelsfor the line compared to the vendor-provided RPC. In the proposed method using SURF and phase correlation methods, the accuracy of sample was improved by 0.83 pixels and 1.49 pixels, and that of line wasimproved by 4.81 pixels and 5.19 pixels, respectively, compared to the vendor-provided RPC. Through the experimental results, the proposed method using the UAV imagery presented the possibility as an alternative to the GCP-based method for the RPC correction.

A STUDY ON THE IONOSPHERE AND THERMOSPHERE INTERACTION BASED ON NCAR-TIEGCM: DEPENDENCE OF THE INTERPLANETARY MAGNETIC FIELD (IMF) ON THE MOMENTUM FORCING IN THE HIGH-LATITUDE LOWER THERMOSPHERE (NCAR-TIEGCM을 이용한 이온권과 열권의 상호작용 연구: 행성간 자기장(IMF)에 따른 고위도 하부 열권의 운동량 강제에 대한 연구)

  • Kwak, Young-Sil;Richmond, Arthur D.;Ahn, Byung-Ho;Won, Young-In
    • Journal of Astronomy and Space Sciences
    • /
    • v.22 no.2
    • /
    • pp.147-174
    • /
    • 2005
  • To understand the physical processes that control the high-latitude lower thermospheric dynamics, we quantify the forces that are mainly responsible for maintaining the high-latitude lower thermospheric wind system with the aid of the National Center for Atmospheric Research Thermosphere-Ionosphere Electrodynamics General Circulation Model (NCAR-TIEGCM). Momentum forcing is statistically analyzed in magnetic coordinates, and its behavior with respect to the magnitude and orientation of the interplanetary magnetic field (IMF) is further examined. By subtracting the values with zero IMF from those with non-zero IMF, we obtained the difference winds and forces in the high-latitude 1ower thermosphere(<180 km). They show a simple structure over the polar cap and auroral regions for positive($B_y$ > 0.8|$\overline{B}_z$ |) or negative($B_y$ < -0.8|$\overline{B}_z$|) IMF-$\overline{B}_y$ conditions, with maximum values appearing around -80$^{\circ}$ magnetic latitude. Difference winds and difference forces for negative and positive $\overline{B}_y$ have an opposite sign and similar strength each other. For positive($B_z$ > 0.3125|$\overline{B}_y$|) or negative($B_z$ < -0.3125|$\overline{B}_y$|) IMF-$\overline{B}_z$ conditions the difference winds and difference forces are noted to subauroral latitudes. Difference winds and difference forces for negative $\overline{B}_z$ have an opposite sign to positive $\overline{B}_z$ condition. Those for negative $\overline{B}_z$ are stronger than those for positive indicating that negative $\overline{B}_z$ has a stronger effect on the winds and momentum forces than does positive $\overline{B}_z$ At higher altitudes(>125 km) the primary forces that determine the variations of tile neutral winds are the pressure gradient, Coriolis and rotational Pedersen ion drag forces; however, at various locations and times significant contributions can be made by the horizontal advection force. On the other hand, at lower altitudes(108-125 km) the pressure gradient, Coriolis and non-rotational Hall ion drag forces determine the variations of the neutral winds. At lower altitudes(<108 km) it tends to generate a geostrophic motion with the balance between the pressure gradient and Coriolis forces. The northward component of IMF By-dependent average momentum forces act more significantly on the neutral motion except for the ion drag. At lower altitudes(108-425 km) for negative IMF-$\overline{B}_y$ condition the ion drag force tends to generate a warm clockwise circulation with downward vertical motion associated with the adiabatic compress heating in the polar cap region. For positive IMF-$\overline{B}_y$ condition it tends to generate a cold anticlockwise circulation with upward vertical motion associated with the adiabatic expansion cooling in the polar cap region. For negative IMF-$\overline{B}_z$ the ion drag force tends to generate a cold anticlockwise circulation with upward vertical motion in the dawn sector. For positive IMF-$\overline{B}_z$ it tends to generate a warm clockwise circulation with downward vertical motion in the dawn sector.