• Title/Summary/Keyword: Sense of Control

Search Result 1,163, Processing Time 0.03 seconds

Case Study on the Analysis of Disaster Vulnerabilities (Focused on the Fire & Explosion in the N-Industrial Complex) (재난 취약성 분석에 관한 사례연구(N공단의 화재·폭발을 중심으로))

  • Ha, Kag Cheon
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.94-100
    • /
    • 2021
  • In general, the industrial complex is a place where factories of various industries are concentrated. It is only as efficient as it is designed. However, the risks vary as there are various industries. These features are also associated with various types of disasters. The dangers of natural disasters such as a typhoon, flood, and earthquake, as well as fire and explosions, are also latent. Many of these risks can make stable production and business activities difficult, resulting in massive direct and indirect damage. In particular, decades after its establishment, the vulnerabilities increase even more as aging and small businesses are considered. In this sense, it is significant to assess the vulnerability of the industrial complex. Thus analysing fire and explosion hazards as stage 1 of the vulnerability evaluation for the major potential disasters for the industrial complex. First, fire vulnerabilities were analyzed quantitatively. It is displayed in blocks for each company. The assessment block status and the fire vulnerability rating status were conducted by applying the five-step criteria. Level A is the highest potential risk step and E is the lowest step. Level A was 11.8% in 20 blocks, level B was 22.5% in 38 blocks, level C was 25.4% in 43 blocks, level D was 26.0% in 44 blocks, and level E was 14.2% in 24 blocks. Levels A and B with high fire vulnerabilities were analyzed at 34.3%. Secondly, the vulnerability for an explosion was quantitatively analyzed. Explosive vulnerabilities were analyzed at 4.7% for level A with 8 blocks, 3.0% for level B with 5, 1.8% for level C with 3, 4.7% for level D with 8, and 85.8% for level E with 145. Levels A and B, which are highly vulnerable to explosions, were 7.7 %. Thirdly, the overall vulnerability can be assessed by adding disaster vulnerabilities to make future assessments. Moreover, it can also assist in efficient safety and disaster management by visually mapping quantified data. This will also be used for the integrated control center of the N-Industrial Complex, which is currently being installed.

Performance Analysis of IEEE 802.15.4e Time Slotted Channel Hopping for Low-Rate Wireless Networks

  • Chen, Shuguang;Sun, Tingting;Yuan, Jingjing;Geng, Xiaoyan;Li, Changle;Ullah, Sana;Alnuem, Mohammed Abdullah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.1-21
    • /
    • 2013
  • The release of IEEE 802.15.4e specification significantly develops IEEE 802.15.4. The most inspiring improvement is the enhancement for medium access control (MAC) sublayer. To study the performance of IEEE 802.15.4e MAC, in this paper we first present an overview of IEEE 802.15.4e and introduce three MAC mechanisms in IEEE 802.15.4e. And the major concern here is the Time Slotted Channel Hopping (TSCH) mode that provides deterministic access and increases network capacity. Then a detailed analytical Markov chain model for TSCH carrier sense multiple access with collision avoidance (CSMA-CA) is presented. Expressions which cover most of the crucial issues in performance analysis such as the packet loss rate, energy consumption, normalized throughput, and average access delay are presented. Finally the performance evaluation for the TSCH mode is given and we make a comprehensive comparison with unslotted CSMA-CA in non-beacon enabled mode of IEEE 802.15.4. It can validate IEEE 802.15.4e network can provide low energy consumption, deterministic access and increase network capacity.

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

CDASA-CSMA/CA: Contention Differentiated Adaptive Slot Allocation CSMA-CA for Heterogeneous Data in Wireless Body Area Networks

  • Ullah, Fasee;Abdullah, Abdul Hanan;Abdul-Salaam, Gaddafi;Arshad, Marina Md;Masud, Farhan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5835-5854
    • /
    • 2017
  • The implementation of IEEE 802.15.6 in Wireless Body Area Network (WBAN) is contention based. Meanwhile, IEEE 802.15.4 MAC provides limited 16 channels in the Superframe structure, making it unfit for N heterogeneous nature of patient's data. Also, the Beacon-enabled Carrier-Sense Multiple Access/Collision-Avoidance (CSMA/CA) scheduling access scheme in WBAN, allocates Contention-free Period (CAP) channels to emergency and non-emergency Biomedical Sensors (BMSs) using contention mechanism, increasing repetition in rounds. This reduces performance of the MAC protocol causing higher data collisions and delay, low data reliability, BMSs packet retransmissions and increased energy consumption. Moreover, it has no traffic differentiation method. This paper proposes a Low-delay Traffic-Aware Medium Access Control (LTA-MAC) protocol to provide sufficient channels with a higher bandwidth, and allocates them individually to non-emergency and emergency data. Also, a Contention Differentiated Adaptive Slot Allocation CSMA-CA (CDASA-CSMA/CA) for scheduling access scheme is proposed to reduce repetition in rounds, and assists in channels allocation to BMSs. Furthermore, an On-demand (OD) slot in the LTA-MAC to resolve the patient's data drops in the CSMA/CA scheme due to exceeding of threshold values in contentions is introduced. Simulation results demonstrate advantages of the proposed schemes over the IEEE 802.15.4 MAC and CSMA/CA scheme in terms of success rate, packet delivery delay, and energy consumption.

Marriage and Family Discourse of Ever-Single Women in their 40s and 50s (40, 50대 비혼 여성의 결혼 및 가족 담론)

  • Sung, Miai
    • Journal of Families and Better Life
    • /
    • v.32 no.2
    • /
    • pp.131-141
    • /
    • 2014
  • This study attempted to achieve an understanding of how ever-single women in their 40s and 50s deconstructed and restructured on marriage and family. For this aim, this study adopted a qualitative method. The participants were 13 single women in their 40s and 50s who had never been married. In-depth individual interviews were carried out, focusing on ever-single women's views about marriage and family. The result of theme analysis indicated that the participants considered marriage as an unfavorable lifestyle for women. The participants could be split into two types based on their perspectives on marriage. The first type had a universal concept of marriage. In other words, they believed that when they growup, they should be married women. The other type had a negative concept of marriage because of their parents'unhappy marriage. Despite their view of marriage, all of the participants recognized marriage as a patriarchal structure. Also, they had a strong sense of responsibility to their original families. They had a broad definition of family, so they considered their parents, siblings, and siblings' family members as their family. In addition, they interacted with their families, especially their mothers, who did not have control over their lives but supported them and showed interest in their lives. Like this, the participants maintained their views of married life and family without changing after their single status and had close relationships with their family members.

Cultivating Environmental Literacy through Journal Writing on the Environment (환경 일기 쓰기를 통한 환경 소양 함양)

  • Bak, Jeong-Hae;Choi, Don-Hyung
    • Hwankyungkyoyuk
    • /
    • v.21 no.3
    • /
    • pp.13-25
    • /
    • 2008
  • This study examined the educational effects of journal writing on environmental literacy of elementary students. Thirty-one 3rd grade students were involved in the journal writing which is considered as one of the most frequently performed writing activities in elementary students. Topics for the journal writing were chosen from a textbook on the environment. Before and after the journal writing, an instrument was used to measure the environmental literacy of the students. The environmental literacy instrument was originally developed by Jin (2004) then were modified by Kim (2005) for elementary students. The results of this study are as follows. The environmental literacy of the students, on average, was improved from 140.84 (74.5%) to 161.84 (85.6%) after the journal writing and the difference was statistically significant(t=7.46, p<.001). The environmental literacy scores were significantly improved in every variable after the journal writing: ecological knowledge(t=3.60, p<.01), environmental sensitivity(t=2.54, p<.05), knowledge of environmental issues(t=3.11, p<.01), environmental attitude(t=5.92, p<.001), environmental concern(t=5.27, p<.001), sense of environmental crisis(t=2.97, p<.01), environmental issue investigation and action strategy knowledge (t=2.34, p<.05), environmental skill(t=4.86, p<.001), locus of control(t=5.63, p<.001), and responsible environmental behavior(t=4.64, p<.001). This study also shows that improvement of the students was statistically significant in each of the four levels of goals in environmental education: EE goal level I (t=4.22, p<.001), level II (t=7.53, p<.001), level III(t=5.01, p<.001), and level IV(t=5.46, p<.001). The results imply that the journal writing on the environment is effective in cultivating elementary students' environmental literacy and in achieving goals in environmental education.

  • PDF

Meaning of a Meal among Nursing Home Elderly and Staff (요양시설 노인과 요양보호사에 있어 식사의 의미)

  • Lee, Kyung Hee
    • 한국노년학
    • /
    • v.36 no.4
    • /
    • pp.1157-1176
    • /
    • 2016
  • The purpose of this study was to understand meaning of a meal among Nursing home elderly and staff. The meaning of a mean was explained to participants through observation and in-depth interviews based on Ethnomethodologic method. The meaning of a meal expressed by the Elderly was applied as personal philosophy on diversity and Caregiver also had become a management work on convenient logic. Elderly has been recognized has as hope of health recovery in important elements such as the air life indispensable to life. In contrast, Caregiver was following their will to live formally without any sense of the meaning of life. they are just extending their life. Meaning of Nursing-home elderly was lighthearted. They eat salt with snack to have massive power and escape from the daily life. However, Caregivers have other control measure. From the above result, In the standard operation of the meal, the manual of the laws of the instructions regarding long-term care insurance for the Aged, must reflect the elderly continued proposed the need to have diversity for the education about understanding and acceptance of the elderly.

Analyzing the Spatial Transformation of Johannesburg: Background, Process and Effectiveness (约翰内斯堡空间转型的背景, 进程与效果研究)

  • Tang, Wei
    • Analyses & Alternatives
    • /
    • v.2 no.2
    • /
    • pp.93-110
    • /
    • 2018
  • Due to its speciality, Johannesburg has drawn wide attention from the international academia, which the existing urban theory cannot easily explain. This paper focuses on the spatial pattern of Johannesburg, and finds that it is highly fragmented: first North-South Division due to apartheid and gold mining, secondly, the continuous sprawl due to population densification, and thirdly formation of city-region due to the fill-in spatial policy. The fragmented spatial pattern undermines the social integration and weakens the potential economic sustainability, which make the balanced multi-core spatial pattern inevitable under the influence of the international planning thought. The Johannesburg's spatial transformation comes not only from social integration, but also from the development vison of world-class status of an African city. In reality, since the collapse of apartheid, the municipal government has released series of strategic planning in different executive phase. These different plannings unanimously focus on the world class status although since 2008, the social inclusiveness is more emphasized. Thus, Johannesburg implements some spatial policies, as promoting the corridor of freedom, identifying the key nodes in the city then developing with high density, implementing the in-filling policy, managing the urban growth boundary, effectively preserving the natural system. However, the industrial structure in Johannesburg is already quite high-ended which cannot produce many jobs and also require much investment in advanced infrastructure. Thus, the strategic goals of world-class status of an African city and social inclusiveness which really need widely shared public services to some extent are in tension. After evaluation, we can see that spatial transformation is quite limited. Obviously spatial transformation largely depends on the social-economy. The population is still in flow. In this sense Johannesburg must energetically support the employment-based industry, effectively control the spatial sprawl and carry out institutional innovation which further incentive investment, gradually build an integrated regional governance. In general, how Johannesburg combines globalization and its own condition is still worth thinking in both theory and practice.

  • PDF

A Study on Systematic Management of Civilian Forces for Efficient Search and Rescue Mission in the Ocean (수난구호 업무의 효율화를 위한 민간해양구조세력의 체계적 관리에 관한 연구)

  • Soon, Gil-Tae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.4
    • /
    • pp.409-420
    • /
    • 2015
  • In this study, I researched, analysed and compared the examples of civilian maritime search and rescue auxiliaries of world leading countries' such as Japan and America, and the Korean volunteer fire fighting team. Through this, I suggest that the decentralized civilian maritime search and rescue forces of Maritime Rescue and Salvage Association and KCG Civilian Auxiliary should be united into unified search and rescue system and establish legal basis for stabilized support and development. It seem that we should organize laws and regulations for the government to have centralized control of rescue mission as in the cases of America and Canada and elivate rescue mission capability with systemized education and training entrusted to specialized external training organization. I proposed to establish financial support such as fund for the stabilized status of civilian auxiliary, domestic and overseas training session for the civilian auxiliary to inspire integrity and sense of duty as a part of maritime search and rescue forces.

The Politics of Hollywood Conspiracy Films in the Era of Late Capitalism (후기 자본주의 시대 헐리우드 음모론 영화의 정치성)

  • Lee, Jeeheng
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.3
    • /
    • pp.140-150
    • /
    • 2014
  • Conspiracy theory is often considered as a kind of paranoid and an act of throwing all the blame solely on the Big Other who is presumed to control all the incidents behind the curtain. While, it is also assessed as a socio-political sub-culture and a way of interpreting the world full of closure and insufficient information, keeping us from grasping 'the totality'. Meanwhile recent conspiracy films reflect the ever dense and concealed anatomy of the world now. And it reveals some kind of ideological tendency which is, 'sense of catastrophe' and 'non-ideology' reflecting the world of late capitalism society. This article intends to examine the altered representational appearance and ideology in recent conspiracy films so as to understand how the conspiracy theory, the social-political interpretational mechanism, is converged into the film narrative against the backdrop of late capitalism, a socio-political condition we live in.