• Title/Summary/Keyword: Industrial Control Systems

Search Result 2,566, Processing Time 0.042 seconds

A Retrospective Study of 94 Hypercalcemic Dogs(2002-2004) (94 마리 고칼슘혈증 개들에 대한 회고연구(2002-2004))

  • Cho, Tae-Hyung;Kang, Byeong-Teck;Park, Chul;Jung, Dong-In;Yoo, Jong-Hyun;Kim, Ju-Won;Kim, Ha-Jung;Lim, Chae-Young;Lee, So-Young;Kim, Jung-Hyun;Woo, Eung-Je;Park, Hee-Myung
    • Journal of Veterinary Clinics
    • /
    • v.24 no.4
    • /
    • pp.479-485
    • /
    • 2007
  • A retrospective study of 94 hypercalcemic dogs was performed to find out most common causes that lead to hypercalcemia through investigating dogs referred to the Veterinary Teaching Hospital of Konkuk University from 2002 to 2004. During the study period, hypercalcemia was found in 94 dogs of 19 breeds, and they were evaluated as case group. Control group was made up of 94 dogs of 18 breeds without hypercalcemia admitted for the same study period. For general signalments, there were no significant differences between case and control group with the exception of age distribution. Shih-tzu(17.02%) and Yorkshire terrier(26.60%) was the most common breed in case and control group, respectively. The most common diseases associated with hypercalcemia were chronic renal failure (18.09%), acute renal failure(14.89%), and renal calculi(6.38%). Malignant neoplasia(lymphoma, hemangiosarcoma, chronic lymphocytic leukemia, mammary gland tumor, and multiple myeloma) and endocrinopathies(hyperadrenocorticism, hyperthyroidism, hypoadrenocorticism, and hypothyroidism) occupied 8.5% and 6.4%, respectively. This report is a first retrospective study of hypercalcemic dogs in South Korea.

A Studs on Exposure to Organic Dust and Ammonia in Poultry Confinement Buildings (일부 육용 양계 농업인의 유기먼지와 암모니아 노출에 관한 연구)

  • Shin, Cheol-Lim;Lee, Kyung-Suk;Kim, Kyung-Ran;Kang, Tae-Sun;Paik, Nam-Won
    • Journal of agricultural medicine and community health
    • /
    • v.29 no.2
    • /
    • pp.303-314
    • /
    • 2004
  • Objectives: This study was carried out to assess exposure levels of organic dusts and ammonia in poultry farms in Korea. Methods: A total of six poultry farms were investigated. The farms were located in Namwon, Chonlabuk-do and in Kae-San, Chungchongbuk-do. This study consisted of a questionnaire and measuring organic dusts and ammonia. The questionnaire included the characteristics of the farms, work patterns and the tasks of the poultry farms. Results and Conclusions: The farmers raised the chickens 45 times a year and the average number of years in the poultry farm were eight years ranging from 2 to 12 years. They worked for seven days per week and the average hours spent caring the chickens are 6.3 hours per day. The duration of staying in the confinement buildings was 3.3 hours per day. The work time in summer was longest. The feed and the water supply systems were automatic and the control of ventilation windows used "winch curtain" was semiautomatic. They used mechanical ventilation system in winter and used dilution ventilation system in the other seasons. The geometric mean concentration of total and respirable dust sampled in the poultry confinement buildings was 4.0 mg/$m^3$and 0.9 mg/$m^3$ respectively. The ratio of respirable to total dusts range from 9 to 49 percent. There was no sample exceeding the criteria 10 mg/$m^3$ for total dust and 3 mg/$m^3$ for respirable dust in farms. The criteria have been recommended by Korean Ministry of Labor and American Conference of Governmental Industrial Hygienist. The personal respirable dusts measured during a circle work averaged geometric mean concentration 1.4 mg/$m^3$ Two personal samples were exceeded the threshold 3 mg/$m^3$. There was a positive relation between an index and the personal samples of respirable dusts($R^2$=0.98). The index is calculated by multipling the total number of chickens in the farm by the age of the chickens and then dividing by the volume of the confinement building. The geometric mean concentration of area and personal ammonia samples was 23.3 ppm and 22.2 ppm, respectively. Some of the ammonia samples, both area and personal samples, exceeded the short term exposure limit value 35 ppm.

  • PDF

The Effect Of Job Insecurity To The Union Commitment, Dual Commitment and The Union-Related Orientation (고용불안이 노조몰입, 이중몰입, 노사관계행동지향성에 미치는 영향에 관한 연구)

  • Son, Heon-I;Jung, Hyun-Woo
    • Management & Information Systems Review
    • /
    • v.34 no.2
    • /
    • pp.131-149
    • /
    • 2015
  • Recently many organizations have engaged in widespread restructuring as well as more flexible usage of labor in an attempt to cut costs and to increase profit. As a result of lays offs resulting from frequent restructuring, many people no longer consider their jobs as permanent positions. many employees have an increased feeling of job insecurity. There structuring and following downsizing have created an uncertain environment within creased fear offer ther job losses. therefore the study of job insecurity is significant. especially To understand the relationship between job security and union-relation behaviors on the industrial relations. The purpose of this study suggested the strategies to company and union. The purpose of this study is to examine how the union-relation behaviors are influenced by the job security. This study built a exploratory model that there is causal relationship of job security to union commitment, dual commitment, and labor related behaviors. For the verification of this study model, the regression analysis was applied to the surveys of 236 members of union that are located in Busan, Gyeongnam, Ulsan, and Pohang. The result of this research shows that the job insecurity is strongly related to the union commitment and union related behaviors. According to the research, the effect that the job security affects union commitment and union related behaviors are positive. With the research outputs, we have discussed about the academic and pragmatic viewpoint. We proposed comprehensive model to verify how the job insecurity affects the union-related behaviors, and objectively analyzed the model. The research result was opposite to what the existing theories have said that high job insecurity derives high union-related behaviors. This result is meaningful because it is concerned with the social issues-present situation of Korean company, low-employment, unstable employment and so on. Moreover, this research may contribute to expand the aspect of academic research on job insecurity as there are few research conducted in korea. This research also suggests the realistic alternative of union-related behaviors because it is proved that job security can contribute to innovation activities. Also, this research implies that the matter of job insecurity is the basic need of organizational individual and presents that job security is not a notion but the alternative by using of the positional stability and situational control power. The limitation of this research is that it is only utilized the cross-sectional study. To remedy the cross-sectional study, vertical, and serial method of research is needed. And there is no enough sample to secure more comprehensive data as the targets of the research is limited to Busan and Gyeongnam regions. Finally, the measurement tool for job security is needed to be suitably modified to by the South Korea's economic, linguistic, and cultural situation.

  • PDF

An Empirical Study on Key Success Factors of Company Informatization and Informatization Performance Determinants - Focused on SER-M Framework - (기업 정보화 핵심 성공요인과 정보화 성과 결정요인에 관한 실증 연구 - SER-M Framework을 중심으로 -)

  • Choi, Hae-Lyong;Gu, Ja-Won
    • Management & Information Systems Review
    • /
    • v.36 no.2
    • /
    • pp.277-306
    • /
    • 2017
  • Most past studies on the Critical Success Factors of Company Informatization focused on the completeness of Informatization and its financial effect, and there have not been enough studies on whether a company's management strategies can be supported by establishing Informatization direction. This implies that there must be verification on the followings; whether Informatization focuses on steering the implementation of management strategies, what correlation there are between major mechanism factors and Informatization performance. This also implies that there must be a new study to re-interpret the existing success factors of Informatization into strategic management paradigm. The purpose of this study is to empirically verify the influence of subject, environment, resource, and mechanism factors on informatization achievement, and to analyze the differences in influence of informatization success factors on informatization achievement depending on domestic large corporations and SMEs. This study presented the verification results for seven research hypotheses. It was confirmed through empirical analysis that securing resource factor was significant in informatization performance and that all sub-factors of learning mechanism and coordination mechanism were also significant in enterprise informatization achievement. In addition, it was confirmed through the control effect analysis depending on enterprise size that the differences in informatization performance of large corporations and SMEs are due to support environment factor, learning mechanism, and selection mechanism. The implications of this study are as follows: First, the significance of mechanism factors such as learning, internal coordination, and external coordination are relatively higher than other factors in informatization achievement. Secondly, informatization success factors that SMEs must focus on achieving are presented by analyzing the differences on informatization achievement of large corporations and SMEs. Third, since empirical research for informatization success mechanism factors not covered empirically in the prior research was directly progressed, it is thought that it could provide a comprehensive understanding for mechanism factors. In addition, this study is thought to provide a practical contribution that can be applied to other industrial areas and enterprises.

  • PDF

Analyzing the Performance of a Temperature and Humidity Measuring System of a Smart Greenhouse for Strawberry Cultivation (딸기재배 스마트 온실용 온습도 계측시스템의 성능평가)

  • Jeong, Young Kyun;Lee, Jong Goo;Ahn, Enu Ki;Seo, Jae Seok;Kim, Hyeon Tae;Yoon, Yong Cheol
    • Journal of Bio-Environment Control
    • /
    • v.28 no.2
    • /
    • pp.117-125
    • /
    • 2019
  • This study compared the temperature and humidity measured by an aspirated radiation shield (ARS), the accuracy of which has been recently verified, and those measured by a system developed by the parent company (Company A) to investigate and improve the performance of the developed system. The results are as follows. Overall, the two-plate system had a lower radiation shielding effect than the one-plate system but showed better performance results when excluding the effect of strawberry vegetation on the systems. The overall maximum temperature ranges measured by company A's system and the ARS were $20.5{\sim}53.3^{\circ}C$ and $17.8{\sim}44.1^{\circ}C$, respectively. Thus, the maximum temperature measured by company A's system was $2.7{\sim}9.2^{\circ}C$ higher, and the maximum daily temperature difference was approximately $12.2^{\circ}C$. The overall average temperature measured by company A's system and the ARS was $12.4{\sim}38.6^{\circ}C$ and $11.8{\sim}32.7^{\circ}C$, respectively. Thus, the overall average temperature measured by company A's system was $0.6{\sim}5.9^{\circ}C$ higher, and the maximum daily temperature difference was approximately $6.7^{\circ}C$. The overall minimum temperature ranges measured by company A's system and the ARS were $4.2{\sim}28.6^{\circ}C$ and $2.9{\sim}26.4^{\circ}C$, respectively. Thus, the minimum temperature measured by company A's system was $1.3{\sim}2.2^{\circ}C$ higher, and the minimum daily temperature difference was approximately $2.9^{\circ}C$. In addition, the overall relative humidity ranges measured by company A's system and the ARS were 52.9~93.3% and 55.3~96.5%, respectively. Thus, company A's system showed a 2.4~3.2% lower relative humidity range than the ARS. However, there was a day when the relative humidity measured by company A's system was 18.0% lower than that measured by the ARS at maximum. In conclusion, there were differences in the relative humidity measured by the two company's devices, as in the temperature, although the differences were insignificant.

Memory Organization for a Fuzzy Controller.

  • Jee, K.D.S.;Poluzzi, R.;Russo, B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1041-1043
    • /
    • 1993
  • Fuzzy logic based Control Theory has gained much interest in the industrial world, thanks to its ability to formalize and solve in a very natural way many problems that are very difficult to quantify at an analytical level. This paper shows a solution for treating membership function inside hardware circuits. The proposed hardware structure optimizes the memoried size by using particular form of the vectorial representation. The process of memorizing fuzzy sets, i.e. their membership function, has always been one of the more problematic issues for the hardware implementation, due to the quite large memory space that is needed. To simplify such an implementation, it is commonly [1,2,8,9,10,11] used to limit the membership functions either to those having triangular or trapezoidal shape, or pre-definite shape. These kinds of functions are able to cover a large spectrum of applications with a limited usage of memory, since they can be memorized by specifying very few parameters ( ight, base, critical points, etc.). This however results in a loss of computational power due to computation on the medium points. A solution to this problem is obtained by discretizing the universe of discourse U, i.e. by fixing a finite number of points and memorizing the value of the membership functions on such points [3,10,14,15]. Such a solution provides a satisfying computational speed, a very high precision of definitions and gives the users the opportunity to choose membership functions of any shape. However, a significant memory waste can as well be registered. It is indeed possible that for each of the given fuzzy sets many elements of the universe of discourse have a membership value equal to zero. It has also been noticed that almost in all cases common points among fuzzy sets, i.e. points with non null membership values are very few. More specifically, in many applications, for each element u of U, there exists at most three fuzzy sets for which the membership value is ot null [3,5,6,7,12,13]. Our proposal is based on such hypotheses. Moreover, we use a technique that even though it does not restrict the shapes of membership functions, it reduces strongly the computational time for the membership values and optimizes the function memorization. In figure 1 it is represented a term set whose characteristics are common for fuzzy controllers and to which we will refer in the following. The above term set has a universe of discourse with 128 elements (so to have a good resolution), 8 fuzzy sets that describe the term set, 32 levels of discretization for the membership values. Clearly, the number of bits necessary for the given specifications are 5 for 32 truth levels, 3 for 8 membership functions and 7 for 128 levels of resolution. The memory depth is given by the dimension of the universe of the discourse (128 in our case) and it will be represented by the memory rows. The length of a world of memory is defined by: Length = nem (dm(m)+dm(fm) Where: fm is the maximum number of non null values in every element of the universe of the discourse, dm(m) is the dimension of the values of the membership function m, dm(fm) is the dimension of the word to represent the index of the highest membership function. In our case then Length=24. The memory dimension is therefore 128*24 bits. If we had chosen to memorize all values of the membership functions we would have needed to memorize on each memory row the membership value of each element. Fuzzy sets word dimension is 8*5 bits. Therefore, the dimension of the memory would have been 128*40 bits. Coherently with our hypothesis, in fig. 1 each element of universe of the discourse has a non null membership value on at most three fuzzy sets. Focusing on the elements 32,64,96 of the universe of discourse, they will be memorized as follows: The computation of the rule weights is done by comparing those bits that represent the index of the membership function, with the word of the program memor . The output bus of the Program Memory (μCOD), is given as input a comparator (Combinatory Net). If the index is equal to the bus value then one of the non null weight derives from the rule and it is produced as output, otherwise the output is zero (fig. 2). It is clear, that the memory dimension of the antecedent is in this way reduced since only non null values are memorized. Moreover, the time performance of the system is equivalent to the performance of a system using vectorial memorization of all weights. The dimensioning of the word is influenced by some parameters of the input variable. The most important parameter is the maximum number membership functions (nfm) having a non null value in each element of the universe of discourse. From our study in the field of fuzzy system, we see that typically nfm 3 and there are at most 16 membership function. At any rate, such a value can be increased up to the physical dimensional limit of the antecedent memory. A less important role n the optimization process of the word dimension is played by the number of membership functions defined for each linguistic term. The table below shows the request word dimension as a function of such parameters and compares our proposed method with the method of vectorial memorization[10]. Summing up, the characteristics of our method are: Users are not restricted to membership functions with specific shapes. The number of the fuzzy sets and the resolution of the vertical axis have a very small influence in increasing memory space. Weight computations are done by combinatorial network and therefore the time performance of the system is equivalent to the one of the vectorial method. The number of non null membership values on any element of the universe of discourse is limited. Such a constraint is usually non very restrictive since many controllers obtain a good precision with only three non null weights. The method here briefly described has been adopted by our group in the design of an optimized version of the coprocessor described in [10].

  • PDF

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Sporicidal Efficacy of a Fumigation Disinfectant Composited to Ortho-phenylphenol Against Spores of Clostridium Perfringens (Ortho-phenylphenol을 주성분을 하는 훈증소독제의 Clostridium perfringens 아포에 대한 살아포 효과)

  • Cha, Chun-Nam;Cho, Youyoung;Lee, Hu-Jang
    • Journal of Food Hygiene and Safety
    • /
    • v.29 no.3
    • /
    • pp.217-222
    • /
    • 2014
  • This study was performed to evaluate the sporicidal efficacy of a fumigation disinfectant containing 20% ortho-phenylphenol against Clostridium perfringens (C. perfringens) spores. In this research, efficacy test of fumigant against C. perfringens spores was carried out according to French standard NF T 72-281. C. perfringens spores working culture suspension number (N value), all the spore numbers on the carriers exposed with the fumigant (n1, n2, and n3), the number of bacterial spore suspensions by pour plate method (N1), the number of bacterial spore suspensions by filter membrane method (N2) and the mean number of bacterial spore recovered on the control-carriers (T value) were obtained from the preliminary test. In addition, the reduction number of C. perfringens spores exposed with the fumigant (d value) was calculated using T value, the mean number of bacterial spore in recovery solution (n'1) and the mean number of bacterial spore on carriers plated in agar (n'2). N value was $4.3{\times}10^7spores/mL$, and n1, n2, and n3 were higher than 0.5N1, 0.5N2 and 0.5N1, respectively. Additionally, T value was $4.9{\times}10^5spores/carrier$. In the sporicidal effect of the fumigant, the d value was 4.52log reduction. According to the French standard for the fumigant, the d value for the effective sporicidal fumigant should be over than 3log reduction. The results indicated that Fumagari $OPP^{(R)}$ had an efficient sporicidal activity against spores of C. perfringens, then the fumigant can be applied to disinfect food materials and kitchen appliances contaminated with bacterial spores.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Bactericidal Efficacy of Fumagari OPP®, Fumigant Against Staphylococcus aureus (훈증소독제, Fumagari OPP®의 Staphylococcus aureus에 대한 살균효과)

  • Cha, Chun-Nam;Park, Eun-Kee;Choi, Hyunju;Kim, Yongpal;Yoo, Chang-Yeol;Kim, Suk;Lee, Hu-Jang
    • Journal of Food Hygiene and Safety
    • /
    • v.28 no.4
    • /
    • pp.349-353
    • /
    • 2013
  • This study was performed to evaluate the bactericidal efficacy of Fumagari OPP$^{(R)}$, fumigation disinfectant, containing 20% ortho-phenylphenol against Staphylococcus aureus (S. aureus). In this research, efficacy test of fumigant against S. aureus was carried out according to French standard NF T 72-281. S. aureus working culture suspension number (N value), all of the colony numbers on the carriers exposed with the fumigant (n1, n2, and n3), the number of bacterial test suspentions by pour plate method (N1), the number of bacterial test suspentions by filter membrane method (N2) and the mean number of bacteria recovered on the control-carriers (T value) were obtained from the preliminary test. In addition, the reduction number of S. aureus exposed with the fumigant (d value) was calculated using T value, the mean number of bacteria in recovery solution (n'1) and the mean number of bacteria on carriers plated in agar (n'2). N value was $4.0{\times}10^8$ CFU/mL, and n1, n2, and n3 were higher than 0.5N1, 0.5N2 and 0.5N1, respectively. Additionally, T value was $3.4{\times}10^6$ CFU/mL. In the bactericidal effect of the fumigant, the d value was 6.43 logCFU/mL. According to the French standard for the fumigant, the d value for the effective bactericidal fumigant should be over than 5 logCFU/mL. The results indicated that Fumagari OPP$^{(R)}$ had an effective bactericidal activity against S. aureus, then the fumigant can be applied to disinfect food materials and kitchen appliances contaminated with pathogenic bacteria.