• Title/Summary/Keyword: Trustworthy

Search Result 242, Processing Time 0.025 seconds

Evaluation of die life during hot forging process (열간 단조 공정의 금형 수명 평가)

  • 이현철;박태준;고대철;김병민
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.1051-1055
    • /
    • 1997
  • Hot forging is widely used in the manufacturing of automotive component. The mechanical, thermal load and thermal softening which is happened by the high temperature die in hot forging. Tool life of hot forging decreases considerably due to the softening of the surface layer of a tool caused by a high thermal load and long contact time between the tool and workpieces. The service life of tools in hot forging process is to a large extent limited by wear, heat crack, plastic deformation. These are one of the main factors affecting die accuracy and tool life. It is desired to predict tool life by developing life prediction method by FE-simulation. Lots of researches have been done into the life prediction of cold forming die, and the results of those researches were trustworthy, but there have been little applications of hot forming die. That is because hot forming process has many factors influencing tool life, and there was not accurate in-process data. In this research, life prediction of hot forming die by wear analysis and plastic deformation has been carried out. To predict tool life, by experiment of tempering of die, tempering curve was obtained and hardness express a function of main tempering curve.

  • PDF

Development of Continuous and Scalable Nanomanufacturing Technologies Inspired by Traditional Machining Protocols Such as Rolling, Pullout, and Forging (롤압연, 압출, 단조 등 전통 기계가공법의 모사 응용을 통한 다양한 나노패턴의 대면적 연속생산 기술 구현)

  • Ok, Jong G.;Kwak, Moon Kyu;Guo, L. Jay
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.24 no.2
    • /
    • pp.198-202
    • /
    • 2015
  • We present a series of simple but novel nanopatterning methodologies inspired by traditional mechanical machining processes involving rolling, pullout, and forging. First, we introduce roll-to-roll nanopatterning, which adapts conventional rolling for continuous nanopatterning. Then, nano-inscribing and nano-channel lithography are demonstrated, whereby seamless nanogratings can be continuously pulled out, as in a pullout process. Finally, we discuss vibrational indentation micro- and nanopatterning. Similarly to the forging/indentation process, this technique employs high-frequency vertical vibration to indent periodic micro/nanogratings onto a horizontally fed substrate. We discuss the basic principles of each process, along with its advantages, disadvantages, and potential applications. Adopting mature and reliable traditional technologies for small-scale machining may allow continuous nanopatterning techniques to cope with scalable and low-cost nanomanufacturing in a more productive and trustworthy way.

Study on the Civil Legal Remedies against Cyber Defamation

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.3
    • /
    • pp.93-100
    • /
    • 2018
  • Cyber defamation is the act of damaging the reputation of the other person on the Internet, and the act of attacking by the commenting the article through a word or blog. The reason why punishment is stronger than general contempt is that the nature of crime about defamation is worse than contempt. Also, punishment intensity is higher than defamation because the nature of cyber information spreads widely. Honor is not only a question of self-esteem or identity, but also a function that economically reduces the cost of seeking information or socially trustworthy. Through these two functions, it has been developed as a legal system to protect the honor as well as asking the legal sanction for defamation. However, although honor is used in various meanings in everyday life, the honor of legal level is understood in a more limited sense. It is because the law cannot actively lead and protect all honor feelings for one's feelings or mood occurred by hurt. However, if the social evaluation of a group or individual is undermined through a certain distortion of the truth, the law will actively intervene. However, due to the ambiguity of the legal sanctions standards and the identification of the parties involved in the defamation of cyberspace, it was difficult to solve the problems related to defamation in fact. Therefore, this paper will try to find out the problems of civil legal remedy due to the cyber defamation, and seek a solution for civil legal remedy.

Webometrics Ranking of Digital Libraries of Iranian Universities of Medical Sciences

  • Dastani, Meisam;Atarodi, Alireza;Panahi, Somayeh
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.8 no.3
    • /
    • pp.41-52
    • /
    • 2018
  • Digital Library websites plays an important role in dissemination of information of the institution and library resources. It acts as a trustworthy mirror of the institute. To evaluate the library website performance webometrics tools and indicators are required. The aim of the present research is study the webometrics of Digital Libraries of Iranian Universities of Medical Sciences on the Web to determine the amount of the visibility a website and web pages. The URL and link of 42 digital library website is obtained directly by visiting the university's website. To extract the number of indexed web pages (size), rich files have used the Google search engine Also, to extract the number of scientific resources retrieved have used the Google Scholar search engine. To calculate and obtain the number of links received have used the MOZ search engine. Generally, the results indicated that the website of Iranian digital libraries did not have a good performance in term of webometric indexes, and none of them were not rated at all indexes, only some of the websites mentioned in one or two indicators.

Optimal field synthesis for enhancing the modeling capabilities of reservoir/aquifer fields

  • Jang, Min-Chul;Choe, Jong-Geun
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.684-689
    • /
    • 2003
  • One field identified by an inverse method is one of multiple candidate solutions those are independently obtained through a specific estimation technique. While averaging of optimized fields can provide a better description of the spatial feature of an unknown field, it deteriorates the flow and transport characteristics of the optimized fields. As a result, the averaged field is not suited for modeling aquifer performances. Based on genetic algorithm, an optimal field synthesis technique is developed, which combines diversely optimized fields into a refined group of fields. Each field in the population is paired, and a sub-region of each field is exchanged by crossover operation to create a group of synthesized fields of enhanced modeling capability. The population of the fields is evolved till the synthesized fields become sufficiently similar. Applications of the optimal field synthesis to synthetic cases indicate that the objective functions of the fields assessing the modeling capabilities are further reduced after the optimal field synthesis. The identified fields from various inverse techniques may yield a range of modeling results under varied flow situations. The uncertainty is narrowed down through the optimal field synthesis and the associated modeling results converge on that of the reference field. The developed inverse modeling facilitates the construction of a reliable simulation model and hence trustworthy predictions of the future performances.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

Process Evaluation of the First Computer Tailored Program for Smoking Cessation among Romanian Smokers

  • Lotrean, Lucia Maria;Ailoaiei, Roxana;Popa, Monica;De Vries, Hein
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.20
    • /
    • pp.8809-8814
    • /
    • 2014
  • The objective of this paper is to present the implementation and process evaluation of the first computer tailored program for smoking cessation among Romanian smokers. The program targeted adult smokers who declared the intention to quit smoking in the next six months. The intervention consisted of a letter tailored to several respondent characteristics: gender, cognitive variables (attitude, social influence, and self-efficacy), intention to quit smoking, goal and relapse prevention strategies (action and coping plans), and smoking behaviour. The first 80 participants entered into the program filled in a process evaluation questionnaire one month after the intervention. The results of our study confirmed that the participants had read and remembered the letter. Moreover, new for Romania, this approach was positively appreciated by the participant and the score received for the tailored letter was high. The opinions of the participants confirmed that the tailored letter provided information that was useful, trustworthy and relevant for the individual. At the same time, the participants appreciated the polite, easy to understand content of the letter. These data underlined the premises for continuing the program and for using the information and communication technologies for healthy lifestyle promotion among Romanian population.

Disease Experience of Korean Women with Eating Disorders (식사장애를 가진 여성의 질병 경험)

  • Han, Dallong
    • Korean Journal of Adult Nursing
    • /
    • v.27 no.6
    • /
    • pp.695-706
    • /
    • 2015
  • Purpose: This study was aimed to explore and describe the disease experience of Korean women with eating disorders within psychological and sociocultural context. Methods: The participants were 12 young adult women suffering with eating disorders or have recovered from the diseases. Data were collected via in-depth interviews and analyzed according to the grounded theory methodology by Strauss and Corbin. Results: The core category of the disease experience was 'becoming the master of life through desperate efforts'. The disease experience was categorized into five different phases including 'falling under the influence of others', 'collapsing the self: life swallowed by loosening weight', 'facing the wrecked self', 'struggling between the self and others', 'truly facing the self'. The intervening conditions were various supporting systems such as 'support from family', 'economic support' and 'support from trustworthy health professionals'. Conclusion: The findings of this study indicate that it is necessary to develop nursing interventions to support women with eating disorders and alleviate their suffering from eating disorders. Also specialized educational programs are warranted to prevent the eating disorders, and to reduce social stigma of eating disorders.

Adaptation Experiences in South Korea of Men defecting from North Korea (북한이탈 남성주민의 남한 사회에서의 적응경험)

  • Kim, Kyoung Mi;Kim, Miyoung
    • Journal of Korean Academy of Nursing
    • /
    • v.43 no.3
    • /
    • pp.431-441
    • /
    • 2013
  • Purpose: The study was done to explore meanings and essence of the experience in South Korea of men defectors from North Korea. Methods: Data were collected from March, 2011 to May, 2012, through in-depth interviews with ten men defectors. Data analysis was conducted using the process of hermeneutic phenomenological reflection. Results: Eight essential themes were extracted; 'buoyant expectation for a new life', 'feeling guilty about family left behind in North Korea', 'inability to become acclimatized due to communication difficulties', 'inability to socialize with South Koreans due to different lifestyles', 'finding strength through trustworthy acquaintances', 'continuing reconciliation with oneself while trying to assimilate into South Korean culture', 'self-realization of one's original self', and 'continuing to feel out the possibility of a future in South Korea'. Conclusion: The findings indicate that North Korean men who defect to South Korea shape their identity through three phases: forming self-image during escape from North Korea, trying to become accustomed to South Korean society, and finding their own identity by self-realization of their original self. Eventually, the whole process enables them to recover their identity, to feel a sense of belonging, and to discover possibilities for a better future.

THE GOVERNANCE OF RETIREMENT FUNDS IN MEMBERS RIGHTS AND TRUSTEES DUTIES IN SOUTH AFRICA: A LESSON LEARNT FROM USA, UK AND MALAWI

  • Nevondwe, Lufuno;Odeku, Kola;Matotoka, Mothlatlego
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.1 no.3
    • /
    • pp.55-70
    • /
    • 2013
  • Purpose: The article looks at the member' rights and trustees duties and determines where should the emphasis be as it often happens that these two aspects often clash. Research Design, Data and Methodology: It is determined in this article whether the trustees owe fiduciary duties to both the fund and members and further determines whether the trustees should advance the interests of the members. Results: The article further looks at the governance of the retirement funds and argues that the proper governance of these funds protects the interest of the members. The duty to disclosure of information to members is of paramount importance to ensure that members are able to make well informed decisions. Conclusion: The article considers the issues of disclosure of information from other countries, United Kingdom, United States and Malawi. It is argued in this article that trustees must be persons who are trustworthy and have the best interest of the members at heart and must therefore familiarize themselves with the laws that regulate their duties.