• Title/Summary/Keyword: Power system operations

Search Result 764, Processing Time 0.03 seconds

Survey on Practical use of Sanitizers and Disinfectants on Food Utensils in Institutional Foodservice (단체급식소의 기구등의 살균소독제 사용실태 조사)

  • Lee, Yu-Si;Lee, Seong-Hee;Ryu, Kyung;Kim, Yong-Soo;Kim, Hyung-Il;Choi, Hyun-Chul;Jeon, Dae-Hoon;Lee, Young-Ja;Ha, Sang-Do
    • Journal of Food Hygiene and Safety
    • /
    • v.22 no.4
    • /
    • pp.338-345
    • /
    • 2007
  • This study surveyed on the actual conditions of using sanitizers and disinfectants for improvements of sanitization on food utensils at 105 school and 20 industry foodservice operations. The questionnaire which was administered to 125 foodservices was used as a mail or visitation method. The answers of asking "Perception on temporary authorization system of sanitizers and disinfectants on food utensils" were 75% in contract managed school foodservices, 81.8% in self operated school foodservices, and 50% in industry. Main factors to choose sanitizers were sterilizing power (38.6%, 28.6%, 38.9%) and safety (32.6%, 46.1%, 33.3%) at every foodservices. Keeping ratio of sanitizers and disinfectants guidelines in contract managed school, self operated school and industry foodservices were 64.8%, 52% and 73.7%, respectively. If easy and practical guideline is developed, most foodservices replied to use if for disinfection of foodservices. Most of the foodservices were not only knowing sanitizers and disinfectants but also possessing a guideline. However, they didn't perform disinfection according to the guideline due to its complexity. Consequently, we suggest that it is necessary to provide an easy and practical "sanitizers and disinfectants guideline" and useful information.

Improvement of Heat Pump Heating Performance by Selective Heat Storage Using Air Heat of Inside and Outside Greenhouse (온실 내외부 공기열의 선택적 축열에 의한 히트펌프 난방성능 개선)

  • Kwon, Jin Kyung;Kim, Seung Hee;Jeon, Jong Gil;Kang, Youn Koo;Jang, Kab Yeol
    • Journal of Bio-Environment Control
    • /
    • v.26 no.4
    • /
    • pp.353-360
    • /
    • 2017
  • In this study, the design and performance test of the air to water heat pump capable of producing hot water for greenhouse heating by using the surplus solar heat inside the greenhouse and the air heat outside greenhouse as the selective heat source were conducted. The heat storage operations using the surplus solar heat and the outside air heat were designed to be switched according to the setting temperature of the greenhouse in consideration of the optimum temperature range of the crop. In the developed system, it was possible to automatically control the switching of heat storage operation, heating and ventilation by setting 12 reference temperatures on the control panel. In the selective heat storage operation with the surplus solar heat and outside air heat, the temperature of thermal storage tank was controlled variably from $35^{\circ}C$ to $52^{\circ}C$ according to the heat storage rate and heating load. The heat storage operation times using the surplus solar heat and outside air heat were 23.1% and 30.7% of the experimental time respectively and the heat pump pause time was 46.2%. COP(coefficient of performance) of the heat pump of the heat storage operation using the surplus solar heat and outside air heat were 3.83 and 2.77 respectively and was 3.24 for whole selective heat storage operation. For the comparative experiment, the heat storage operation using the outside air heat only was performed under the condition that the temperature of the thermal storage tank was controlled constantly from 50 to $52^{\circ}C$, and COP was analyzed to be 2.33. As a result, it was confirmed that the COP of the heat storage operation using the surplus solar heat and outside air heat as selective heat source and the variable temperature control of the thermal storage tank was 39% higher than that of the general heat storage operation using the outside air heat only and the constant temperature control of the thermal storage tank.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Utilization of Naval Personnel According to Characteristics of New Generations: Discussion from the Perspective of Generation Z, a Newly Emerging Generation (신세대의 특성에 따른 해군 인력 활용의 과제 - 또 다른 신세대, Z세대 관점에서의 고찰)

  • Min, Seung-Un;Kim, Seong-Yeol
    • Maritime Security
    • /
    • v.4 no.1
    • /
    • pp.57-82
    • /
    • 2022
  • The objective of this treatise is to explore the limitations of the current navy manpower utilization system and the ways to improve it from the perspective of Generation Z. As Generation Z, following Millennials, has finally come of age, this new group is constituting a gradually greater proportion of military personnel. Due to the typical characteristics of naval operations, the harmony between Millennials and Generation Z, which is differentiated from Generation X in view of dispositions and traits, is one of the essential issues to be discussed. Generally, in a naval vessel, there are numerous pieces of equipment necessary to carry out a wide range of missions and a large number of crew members who operate them with consistent levels of fighting power. This is all while members are living together within the narrow space throughout the 24 hours of each day. Under such particular circumstances, any inter-generational conflicts may have a disruptive effect on the successful accomplishment of naval missions. Currently, new generations of military personnel are facing social difficulties in different aspects compared with the previous generations, and also have different viewpoints on the military. In this regard, in order to foster true harmony between generations, it is considered necessary to take a closer look at the inter-generational differences from their respective standpoints and to examine whether the military organization has taken adequate steps to respond to such changes. Accordingly, Chapters 1 and 2 cover the environments in which Millennials and Generation Z were raised during their childhood to young adulthood, which are distinct from those of older generations, their viewpoints formed based on such backgrounds, and the need to resolve various conflicts between generations. In Chapter 3, the current actions taken by overseas military powers to enhance the coexistence with Generation MZ are analyzed to find the significant implications they had. Chapter 4 examines the operation environments specific to the navy; identifies the potential barriers to achieving harmony between generations by assessing the current status of personnel utilization in the Korean navy in terms of the seaman, petty officer, and the officer, as well as policy; and outlines the solutions to drive harmony. Finally, Chapter 5 emphasizes the need to establish a genuine empathy between generations based on the understanding of unique inter-generational characteristics. This section also discusses the importance of addressing difficulties in utilizing technology-centered naval manpower, and forecasts a scenario of a naval organization that resolves the problem of utilizing naval personnel and the inter-generational conflicts in the future.

  • PDF