• Title/Summary/Keyword: Work Inability

Search Result 43, Processing Time 0.03 seconds

New Framework and Mechanisms of Context-Aware Service Composition in the Future Internet

  • Gonzalez, Alberto J.;De Pozuelo, Ramon Martin;German, Martin;Alcober, Jesus;Pinyol, Francesc
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.7-17
    • /
    • 2013
  • The ongoing proliferation of new services, applications, and contents is leading the Internet to an architectural crisis owing to its inability to provide efficient solutions to new requirements. Clean-slate architectures for the future Internet offer a new approach to tackle current and future challenges. This proposal introduces a novel clean-slate architecture in which the TCP/IP protocol stack is decoupled in basic functionalities, that is, atomic services (ASs). A negotiation protocol, which enables context-aware service discovery for providing adapted communications, is also specified. Then, we present how ASs can be discovered and composed according to requesters' requirements. In addition, a media service provisioning use case shows the benefits of our framework. Finally, a proof-of-concept implementation of the framework is described and analyzed. This paper describes the first clean-slate architecture aligned with the work done within the ISO/IEC Future Network working group.

Subjective Sleep Characteristics and Depression of shift Nurses (교대근무 간호사의 주관적 수면특성과 우울성향)

  • Jeong, Sook Hee
    • Korean Journal of Occupational Health Nursing
    • /
    • v.7 no.2
    • /
    • pp.155-163
    • /
    • 1998
  • In order to investigate the effects of rotating shift work on the subjective characteristics of sleep and mental depression questionnaire survey was carried out on 405 shift workers and 153 nonshift workers who were nurses employed. in three university hospital. The questionnaire forms used in this study were the self rating depression scale(SDS) and circadian type questionnaire(CTQ) factor R(rigidity/flexbility of sleeping habit) and factor V(inability/ability to overcome drowsiness). The results were as follows ; 1. Mean score of CTQ R in shift workers was significantly lower than that in nonshift workers, however, no significant difference in CTQ V was observed between two groups. 2. Mean score of SDS was significantly higher in shift workers(44.1) than in nonshift workers(39.8). 3. Mean self rating depression scale scores of pervasive affect, physiologic equivalents and psychological equivalents were significantly higher in shift workers than in nonshift workers. 4. In shift worker, mean SDS score was the highest in confusion and followed by diurnal variation, retardation, and indeciveness in the descending order. In nonshift worker, that score was the highest in decreased libido and followed by confusion, and indeciveness in the descending order. 5. Circadian type questionnaire scores was significantly and negatively correlated with significantly and negatively correlating with Self-rating depression scale scores(r=-0.473).

  • PDF

A Study on Technophobia and Mobile Device Design

  • Ha, Joong-Gyu;Page, Tom;Thorsteinsson, Gisli
    • International Journal of Contents
    • /
    • v.7 no.2
    • /
    • pp.17-25
    • /
    • 2011
  • Technophobia is described as the 'abnormal fear or anxiety about the effects of advanced technology', affecting one third of the population, causing health problems and the inability to work efficiently. The development of the mobile phone, both in its design process and its following socioeconomic success, has a prominent effect on our society in general; this point will be explicated in this paper. The negative effects of these developments have also been assessed with questionnaire-based interviews, focus groups and media analysis in order to focus on those who are most susceptible to the effects of technophobia, to discover the possible causes and to develop a solution for overcoming the phobia. The findings of the literature review and empirical research have been debated; the results proved inconclusive. All age and sex and groups displayed levels of anxiety around technology. Therefore, designers cannot afford to abandon these individuals in the future, and attention should be directed into inclusive product design. Therefore, various solutions have been suggested for support for these sufferers, such as tuition and bespoke, 'built to specification' mobile phones.

Nature of the Wiggle Instability of Galactic Spiral Shocks

  • Kim, Woong-Tae;Kim, Yonghwi;Kim, Jeong-Gyu
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.39 no.1
    • /
    • pp.37.2-37.2
    • /
    • 2014
  • Gas in disk galaxies interacts nonlinearly with a underlying stellar spiral potential to form galactic spiral shocks. Numerical simulations typically show that these shocks are unstable to the wiggle instability, forming non-axisymmetric structures with high vorticity. While previous studies suggested that the wiggle instability may arise from the Kelvin-Helmholtz instability or orbit crowding of gas elements near the shock, its physical nature remains uncertain. It was even argued that the wiggle instability is of numerical origin, caused by the inability of a numerical code to resolve a shock that is inclined to numerical grids. In this work, we perform a normal-mode linear stability analysis of galactic spiral shocks as a boundary-value problem. We find that the wiggle instability originates physically from the potential vorticity generation at a distorted shock front. As the gas follows galaxy rotation, it periodically passes through multiple shocks, successively increasing its potential vorticity. This sets up a normal-mode that grows exponentially, with a growth rate comparable to the orbital angular frequency. We show that the results of our linear stability analysis are in good agreement with the those of local hydrodynamic simulations of the wiggle instability.

  • PDF

SAT-Analyser Traceability Management Tool Support for DevOps

  • Rubasinghe, Iresha;Meedeniya, Dulani;Perera, Indika
    • Journal of Information Processing Systems
    • /
    • v.17 no.5
    • /
    • pp.972-988
    • /
    • 2021
  • At present, DevOps environments are getting popular in software organizations due to better collaboration and software productivity over traditional software process models. Software artefacts in DevOps environments are vulnerable to frequent changes at any phase of the software development life cycle that create a continuous integration continuous delivery pipeline. Therefore, software artefact traceability management is challenging in DevOps environments due to the continual artefact changes; often it makes the artefacts to be inconsistent. The existing software traceability related research shows limitations such as being limited to few types of artefacts, lack of automation and inability to cope with continuous integrations. This paper attempts to overcome those challenges by providing traceability support for heterogeneous artefacts in DevOps environments using a prototype named SAT-Analyser. The novel contribution of this work is the proposed traceability process model consists of artefact change detection, change impact analysis, and change propagation. Moreover, this tool provides multi-user accessibility and is integrated with a prominent DevOps tool stack to enable collaborations. The case study analysis has shown high accuracy in SAT-Analyser generated results and have obtained positive feedback from industry DevOps practitioners for its efficacy.

Android Malware Detection using Machine Learning Techniques KNN-SVM, DBN and GRU

  • Sk Heena Kauser;V.Maria Anu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.202-209
    • /
    • 2023
  • Android malware is now on the rise, because of the rising interest in the Android operating system. Machine learning models may be used to classify unknown Android malware utilizing characteristics gathered from the dynamic and static analysis of an Android applications. Anti-virus software simply searches for the signs of the virus instance in a specific programme to detect it while scanning. Anti-virus software that competes with it keeps these in large databases and examines each file for all existing virus and malware signatures. The proposed model aims to provide a machine learning method that depend on the malware detection method for Android inability to detect malware apps and improve phone users' security and privacy. This system tracks numerous permission-based characteristics and events collected from Android apps and analyses them using a classifier model to determine whether the program is good ware or malware. This method used the machine learning techniques KNN-SVM, DBN, and GRU in which help to find the accuracy which gives the different values like KNN gives 87.20 percents accuracy, SVM gives 91.40 accuracy, Naive Bayes gives 85.10 and DBN-GRU Gives 97.90. Furthermore, in this paper, we simply employ standard machine learning techniques; but, in future work, we will attempt to improve those machine learning algorithms in order to develop a better detection algorithm.

Better Management (Risk and Change) through NEC Contracts in Hong Kong

  • TUNG, Chu Hoi;MEMON, Shoeb Ahmed;JAVED, Arshad Ali
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.323-330
    • /
    • 2020
  • Project delays, cost overruns, and disputes are becoming a norm for the construction industry in Hong Kong. Researchers argue that the inability of traditional contracts to manage risk and associated changes are perhaps the main points of contention. The Institution of Civil Engineers published a new engineering contract (NEC), NEC4 Suite of Contracts in this to facilitate better risk management through collaborative culture in construction projects. NEC aims to increase the chances of project success thought its flexible nature of contracts, 'simple' and 'clearly written' documents and provision for the incentive by adopting a better management approach. This paper focuses on traditional and NEC contracts to compare risk management and change management aspects. Through literature review and preliminary interviews with three industry professionals, the paper is exploring how a change in traditional contracts can recuperate from disaster. Our interviewees in this work have extensive experience in traditional as well as in NEC contracts. The results suggest a proactive risk management provisions in NEC contracts does make a difference to avoid later escalation of issues. Whereas, management of change helps streamline all identified issues through a structured process without going in mediation or litigation. NEC, with its new approach to collaborative working, allows partners to be vigilant, yet gratifying in the project process.

  • PDF

Genetic Algorithm based hyperparameter tuned CNN for identifying IoT intrusions

  • Alexander. R;Pradeep Mohan Kumar. K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.755-778
    • /
    • 2024
  • In recent years, the number of devices being connected to the internet has grown enormously, as has the intrusive behavior in the network. Thus, it is important for intrusion detection systems to report all intrusive behavior. Using deep learning and machine learning algorithms, intrusion detection systems are able to perform well in identifying attacks. However, the concern with these deep learning algorithms is their inability to identify a suitable network based on traffic volume, which requires manual changing of hyperparameters, which consumes a lot of time and effort. So, to address this, this paper offers a solution using the extended compact genetic algorithm for the automatic tuning of the hyperparameters. The novelty in this work comes in the form of modeling the problem of identifying attacks as a multi-objective optimization problem and the usage of linkage learning for solving the optimization problem. The solution is obtained using the feature map-based Convolutional Neural Network that gets encoded into genes, and using the extended compact genetic algorithm the model is optimized for the detection accuracy and latency. The CIC-IDS-2017 and 2018 datasets are used to verify the hypothesis, and the most recent analysis yielded a substantial F1 score of 99.23%. Response time, CPU, and memory consumption evaluations are done to demonstrate the suitability of this model in a fog environment.

An Application of XML Based Manufacturing Information for Forming Shop (XML을 이용한 곡면 가공 시스템의 정보 구조화에 관한 연구)

  • Ha, Kwang-Cheol;Lee, Jang-Hyun;Oh, Dae-Kyun;Shin, Jong-Gye;Ryu, Cheol-Ho
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.41 no.6
    • /
    • pp.126-133
    • /
    • 2004
  • As the automation of ship production system proliferates, it is unavoidable to move the real machinery, facility, application software, and virtual environment from the heterogeneous data environment to the integrated one. However, it is a prevailing situation that each component operates under the different environment, due to the inability of interchanging the data in a structured manner between the components. The issue is obstacles to improvement of the application system. To facilitate seamless exchange of data among the manufacturing systems, STEP, PDML, and XML has been tried by other studies. This study has investigated how XML data can be applied to exchange the data among the ship production system components. XML data is applied to the forming shop in shipyard to overcome the present difficulties on sharing and exchanging of the information. An example of forming information is represented by XML to demonstrate the feasibility of the proposed approach. In addition, an application of XML information applicable to virtual factory and electronic work order sheet is included.

Method to Acquire Safety of Work Spaces by Ensuring Proper Ratio of Visibility of Unsafe Factors in Building Construction Sites (건설현장 위험요소의 관측비율분석에 의한 작업공간의 안전성 확보방안)

  • Choi, Heebok;Jang, Myung-Houn
    • Journal of the Korea Institute of Building Construction
    • /
    • v.13 no.6
    • /
    • pp.557-564
    • /
    • 2013
  • Unsafe and dangerous factors or environments on building construction sites often cause safety accidents. Sometimes, accidents happen despite the existence of warning and caution signs. Such warning signs are likely to be hidden by stacked materials or temporary facilities on site. If workers cannot see the signs when moving or working, they could be injured, sometimes fatally. Many studies have focused on each worker's position, and various systems have been developed using GPS signals and sensors. This paper suggests a method for identifying the problem of worker inability to see the unsafe factors, to manage the problem in the construction planning phase by considering things from the worker's perspective. The method uses CAD software to investigate the relation between the height of stacked materials and the visible ratio of the unsafe factor. The results of a sample project show that the changes in the height and location of stacked materials make the site safer.