• Title/Summary/Keyword: Location Information Exposure

Search Result 64, Processing Time 0.026 seconds

Evaluation Method of Urban Development Location by APEI (Air Pollution Exposure Index) (대기오염 노출지표에 의한 도시개발 입지의 평가에 관한 연구)

  • Kim, Ki-Bum;Kwon, Woo-Taeg;Kim, Hyung-Chul
    • Journal of Environmental Impact Assessment
    • /
    • v.16 no.4
    • /
    • pp.267-275
    • /
    • 2007
  • In this study, relationship between the air pollution of Siheung city and the relative contribution of automobiles to the city's pollution was evaluated for the first time. Then, new air pollution exposure index was developed through simulation. Using the newly developed index, two different urban development scenarios were compared to present a sustainable urban development plan to reduce air pollution from the land utilization point of view. According to the result of this simulation, air quality of the city was found to be affected significantly by human activities. More populated area showed worse level of air quality. Any development in the city resulted in more automobile activity and deterioration of air quality. This simulation result thus explains that a rapid increase of automobiles accompanied by the land development near local roadsides in the city is the major cause of air pollution in Siheung city. In this study, if urban activities are vigorous in an area with high air pollution, people are more likely to be exposed to air pollutant under the bad environmental conditions. On the other hand, if urban activities are less vigorous in an area with high pollution or if urban activities are vigorous in an area with less pollution, the environmental condition was positive. The APEI (Air Pollution Exposure Index) was developed based on these considerations. Scenarios 1 and 2 were compared and analyzed using APEI. In result, scenario 1 is the case in which land is developed and used in an environmentally favorable manner. From this study, it was proved that the impact of air pollution on human health can be minimized with proper land use. The result form the current study can be used as the basic information to solve problems from improper land utilization and air pollution (by road traffic). It also can be utilized to evaluate air pollution level according to land use and road characteristics and to help to choose the best location of land use to comply with the road function and status.

Intent to Use a Smartphone Application for Radiation Monitoring in Correlation with Anxiety about Exposure to Radiation, Recognition of Risks, and Attitudes toward the Use of Radiation

  • Han, Eunkyoung;Rott, Carsten;Hong, Seung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.42 no.4
    • /
    • pp.205-211
    • /
    • 2017
  • Background: Radiation is used in a variety of areas, but it also poses potential risks. Although radiation is often used with great effectiveness in many applications, people perceive potential risks associated with radiation and feel anxious about the possibility of radiation exposure. Various methods of measuring radiation doses have been developed, but there is no way for the general public to measure their doses with ease. Currently, many people use smartphones, which provide information about the location of an individual phone through network connections. If a smartphone application could be developed for measuring radiation dosage, it would be a very effective way to measure individuals' radiation doses. Thus, we conducted a survey study to assess the social acceptance of such a technology by the general public and their intent to use that technology to measure radiation doses, as well as to investigate whether such an intention is correlated with anxiety and attitudes toward the use of radiation. Materials and Methods: A nationwide online survey was conducted among 355 Koreans who were 20 years old or older. Results and Discussion: Significant differences were found between the genders in attitudes, perceptions of radiation risk, and fears of exposure to radiation. However, a significant difference according to age was observed only in the intent to use a smartphone dose measurement application. Attitudes towards the use of radiation exerted a negative effect on radiation risk perception and exposure anxiety, whereas attitudes towards the use of radiation, risk perception, and anxiety about exposure were found to have a positive impact on the intent to use a smartphone application for dose measurements. Conclusion: A survey-based study was conducted to investigate how the general public perceives radiation and to examine the acceptability of a smartphone application as a personal dose monitoring device. If such an application is developed, it could be used not only to monitor an individual's dose, but also to contribute to radiation safety information infrastructure by mapping radiation in different areas, which could be utilized as a useful basis for radiation research.

2D Location Estimation of a Magnetized Tip Using Arrayed GMR Sensors (GMR센서 배열을 이용한 자석팁의 2D 위치 추정)

  • Lee, S.C.;Kim, J.K.;Ahn, J.H.;Kim, H.Y.
    • Journal of Sensor Science and Technology
    • /
    • v.28 no.6
    • /
    • pp.395-401
    • /
    • 2019
  • This paper proposes a method for estimating the location of a magnetized tip that is inside a non-transparent space or body by using arrayed giant magnetoresistance (GMR) sensors. In general, an object located in such an opaque space can be detected using X-rays, magnetic fields, ultra-sonic sensors, etc., depending on its characteristics. X-ray is mostly used for medical purposes but frequent exposure to it could cause harm to patients as well as doctors. In this study, how well a GMR sensor is applicable instead of an X-ray is investigated. The sensor's voltage output is experimentally fitted to distance with a relationship of 3rd degree polynomial. To detect a small magnetized tip with 900 Oe inside a human body, a 2×2 arrayed GMR sensor and a location estimation algorithm based on information acquired from four sensors is developed. Evaluation tests show that the suggested method is applicable to limited cases with a distance less than 33-55 mm, and the location of a magnet tip is estimated relatively well with an error less than 1.5 mm.

ACA: Automatic search strategy for radioactive source

  • Jianwen Huo;Xulin Hu;Junling Wang;Li Hu
    • Nuclear Engineering and Technology
    • /
    • v.55 no.8
    • /
    • pp.3030-3038
    • /
    • 2023
  • Nowadays, mobile robots have been used to search for uncontrolled radioactive source in indoor environments to avoid radiation exposure for technicians. However, in the indoor environments, especially in the presence of obstacles, how to make the robots with limited sensing capabilities automatically search for the radioactive source remains a major challenge. Also, the source search efficiency of robots needs to be further improved to meet practical scenarios such as limited exploration time. This paper proposes an automatic source search strategy, abbreviated as ACA: the location of source is estimated by a convolutional neural network (CNN), and the path is planned by the A-star algorithm. First, the search area is represented as an occupancy grid map. Then, the radiation dose distribution of the radioactive source in the occupancy grid map is obtained by Monte Carlo (MC) method simulation, and multiple sets of radiation data are collected through the eight neighborhood self-avoiding random walk (ENSAW) algorithm as the radiation data set. Further, the radiation data set is fed into the designed CNN architecture to train the network model in advance. When the searcher enters the search area where the radioactive source exists, the location of source is estimated by the network model and the search path is planned by the A-star algorithm, and this process is iterated continuously until the searcher reaches the location of radioactive source. The experimental results show that the average number of radiometric measurements and the average number of moving steps of the ACA algorithm are only 2.1% and 33.2% of those of the gradient search (GS) algorithm in the indoor environment without obstacles. In the indoor environment shielded by concrete walls, the GS algorithm fails to search for the source, while the ACA algorithm successfully searches for the source with fewer moving steps and sparse radiometric data.

Modification of User Authentication Protocol for Partial Anonymity in the GSM System (GSM 시스템에서 부분적 익명성을 위한 사용자인증 프로토콜의 변형)

  • Park Mi-Og;Kim Sang-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.645-650
    • /
    • 2006
  • GSM(Global System for Mobile communications) provides mobile users with portability and convenience as the most popular standard for mobile phones in the world. However, GSM system has the problem that can't normally authenticate a user by the exposure of IMSI(International Mobile Subscriber Identity) of Ms(Mobile station) during the user authentication procedure. In this paper, we propose secure user authentication by preventing the exposure if IMSI via transfer the encrypted IMSI from the HLR(Home Location Register) and making the only network entities verified from the HLR use the IMSI value, as the modified mechanism based on the original user authentication protocol to solve this authentication problem. Also the proposed mechanism provides fast user authentication without changing the architecture between new VLR and old VLR in the original GSM user authentication protocol as well as user's anonymity by using a temporary ID.

Occupational Factors Influencing the Forklift Operators' Exposure to Black Carbon (지게차 운전원의 블랙카본(black carbon, BC) 노출에 영향을 미치는 직업적 요인)

  • Lee, Hyemin;Lee, Seunghee;Ryu, Seung-Hun;Park, Jihoon;Park, Dong-Uk
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.27 no.4
    • /
    • pp.313-323
    • /
    • 2017
  • Objectives: This study aimed to assess exposure to black carbon(BC) among forklift operators and to identify environmental and occupational factors influencing their BC exposure. Methods: We studied a total of 23 forklift operators from six workplaces manufacturing paper boxes. A daily BC exposure assessment was conducted during working hours from January to April 2017. A micro-aethalometer was used to monitor daily BC exposure, and information on work activities was also obtained through a time-activity diary(TAD) and interviews. BC exposure records were classified into four categories influencing BC exposure level: working environment, workplace, forklift operation, and job characteristics. Analysis of variance(ANOVA) was used to compare average BC exposure levels among the four categories and the relationships between potential factors and BC exposure were analyzed using a multiple linear regression model. Results: The operators' daily exposure was $12.9{\mu}g/m^3$(N=9,148, $GM=7.5{\mu}g/m^3$) with a range: $0.001-811.4{\mu}g/m^3$. The operators were exposed to significantly higher levels when they operate a forklift in a room ${\leq}20,000m^3$($AM=12.3{\mu}g/m^3$), in indoor workplaces($AM=16.3{\mu}g/m^3$), when they operate a forklift manufactured before 2006 ($AM=13.2{\mu}g/m^3$), a forklift with a loading limit of four-tons($AM=27.1{\mu}g/m^3$), with a roll and bale type clamp($AM=17.1{\mu}g/m^3$), and with no particulate filter($AM=15.7{\mu}g/m^3$). Conclusions: Occupational factors including temperature, smoking, season, daytime, room volume($m^3$), location of operating, and manufacturing era and model of forklift influenced the BC exposure of forklift operators. The results of this study can be used to minimize the BC exposure of forklift operators.

Biometric User Authentication Method of Mobile Application in Trustable Space (신뢰할 수 있는 공간에서 생체인식기반의 모바일 애플리케이션 사용자인증 기법)

  • Lee, Tae Kyong;Kim, Yong Hyuk;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.201-212
    • /
    • 2017
  • As services using mobile devices increase, exposure of personal information, and secure threats increase. In this paper, we propose a location-based user authentication system used in mobile device for tightening security. Our authentication system is performed to authenticate two steps. The first authentication is location authentication to ensure that the user accesses an application in trustable space. This authentication method uses an Access Point's information. The second authentication is trustable space authentication to confirm the normal user. This method is carried out the authentication by using biometric information from the user.

A Study on Message Set of VMS on Express way and Evaluation of Driver's Preference (고속도로 VMS Message Set 연구 및 이용자 선호도 평가)

  • Kim, Nam-Sun;Jee, Dong-Mok;Oh, Young-Tae;Lee, Hwan-Pil;Kim, Sang-Bok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.1-13
    • /
    • 2009
  • VMS(Variable Message Sign) which makes the traffic flow smooth by providing traffic information to road users in real-time has been being installed or operated on the road as part of the detailed ITS system. However, some problems were found as a result of survey on express way currently. In the part of the phase operation, the message interpretation time wasn't defined so that the phase operation was difficult. In the part of the information service, not considering characteristic of the VMS section caused the confusion to drivers. In the part of the message exposure, font, alignment, conversion and composition of the information were not consistent and use of superfluous words and inconsistent use of word having the same meaning brought about the problem on information communication This study established the detailed exposure method based on instructions relative to VMS operation. The method established by defining the number of appropriate phase and setting required function of each individual VMS installation location. The method is as follow. the font type is the GULIM, the message conversion method is simple conversion method, the alignment method is centering alignment method and the color is defined according to each situation. In this study, the preference survey was performed to review the validity of the proposed improvement through the common driver. The results were similar with the pre-study except for the font type. This study established the detailed exposure method based on instructions relative to VMS operation. The method established by defining the number of appropriate phase and setting required function of individual VMS installation location. For the evaluation of status and improvement, preference survey of ordinary drivers and statistics analysis was carried.

  • PDF

User Key-based Fragile Watermarking for Detecting Image Modification (영상 변형 검출을 위한 사용자 Key기반 Fragile 워터마킹)

  • Im, Jae-Hyeon;Sim, Hyeok-Jae;Jeon, Byeong-U
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.5
    • /
    • pp.474-485
    • /
    • 2001
  • This paper proposes a user-key-based fragile watermarking for detecting image modification. The embedding data in a form of binary image for authentication are inserted to the DCT coefficients of each block of the given image. To minimize possible exposure of being watermarked and the location of insertion, it is proposed to utilize a user-specific key in randomizing those information. Each DCT block hides one bit of data, all of which represent the user-specific authentication data. Experiments with 5 real images demonstrate that the proposed method not only detects whether there is modification or not, but also the actual location of modification with minimal visual deterioration. However, the proposed method has room for improvement against its loss of watermark by an attack of compression by more than 50%.

  • PDF

Grid-based Cloaking Area Creation Scheme supporting Continuous Location-Based Services (연속적인 위치기반 서비스를 지원하는 그리드 기반 Cloaking 영역 설정 기법)

  • Lee, Ah-Reum;Kim, Hyeong-Il;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.19-30
    • /
    • 2009
  • Recent development in wireless communication technology and mobile equipment like PDA, cellular phone and GPS makes location-based services (LBSs) popular. However, because, in the LBSs, users continuously request a query to LBS servers by using their exact locations, privacy information could be in danger. Therefore, a mechanism for users' privacy protection is required for the safe and comfortable use of LBSs by mobile users. For this, this paper propose a grid-based cloaking area creation scheme supporting continuous LBSs. The proposed scheme creates a cloaking area rapidly by using grid-based cell expansion to efficiently support the continuous LBSs. In addition, to generate a cloaking area which makes the exposure probability of a mobile user to a minimum, we compute a privacy protection degree by granting weights to mobile users. Finally, we show from a performance analysis that our cloaking scheme outperforms the existing cloaking schemes, in terms of service time, privacy protection degree.

  • PDF