• Title/Summary/Keyword: mistake

Search Result 397, Processing Time 0.034 seconds

A study on the confrontation plan of accident through the subway fire instance analysis (지하철 화재 사례분석에 따른 사고대응방안에 대한연구)

  • Kim Myeong-Kyu;Han Seong-Ho;Kim Hag-Reon
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.997-1004
    • /
    • 2005
  • Representative of Korean accidents is that occurrence number of accidents is not many. But the extra-large size disaster like as Taegu subway accident are occurred continuously from multi place. It brings a big problem that people has spirit shock and a life damage nationally and socially. The problem point which brings like this tragic death is caused from the fire confrontation system of absent and human confrontation mistake. Therefore, we need the confrontation plan to overcome these accidents. It will be able to prepare favorably in accident confrontation. In this paper, we analyzed fire accidents case study on domestic and oversea and proposed the plan which confronts encounter to fire accidents in subway system urgently and properly.

  • PDF

MAXILLOFACIAL INFECTIONS MASQUERADING AS MALIGNANT TUMOR ; CASE REPORTS (악성종양과 감별이 어려웠던 악안면 영역의 감염질환에 대한 치험례)

  • Seo, Jae-Hoon;Yeo, Hwan-Ho;Kim, Young-Kyun
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.17 no.3
    • /
    • pp.302-308
    • /
    • 1995
  • It is very difficult to differentiate the malignant tumor from the maxillofacial infections that have unclear cause, severe indurated swelling, pain and nonresponsiveness to antibioitic treatment and incision and drainage. Incisional biopsy, CT, and MRI examination may not distinguish between infection and a malignant tumors. And then, the clinicians can make a mistake that they perform a unnecessary radical surgery because of inaccurate diagnosis. We present three case reports of maxillofacial infectious disease with diagnosis process, treatment and differential diagnosis. The infectious disease were not resolved with antibiotic and surgical drainage. The progression of clinical sign and radiographic, indings of these disease were masqueraded as malignant tumors.

  • PDF

Introduction of Profile of Foreign Mining Company, Xstrata, in Argentina (아르헨티나에서 외국광산기업, 엑스트라타, 개요소개)

  • Lee, Han-Yeang
    • The Journal of the Petrological Society of Korea
    • /
    • v.17 no.4
    • /
    • pp.231-237
    • /
    • 2008
  • Famous foreign mining companies in Argentina are Xstrata, Barrick Gold, Yamana Gold, and Anglogold Asaanti respectively. Among these companies firstly a profile of Xstrata including company history, current and future mining projects, production, and financial condition are introduced in this paper for the Korean mining companies those are sincerely looking for reliable collaborative partners not to make serious mistake in investment.

Electric power system effect investigation of large size digital signal accident thought in digital age (디지털시대의 대형사고의 전기적 영향 고찰)

  • Kang, Tae-Keun
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.05a
    • /
    • pp.575-580
    • /
    • 2004
  • The latest equipment automatic Intelligence of digital base done large size equipment appear in succession. That run by voltage electric current(mA, mV, ${\mu}A,\;{\mu}V$) that outline is microscopic of action of accuracy large size equipment of this digital base is bulk. Have received influence that is great in river electric field by installment that use computer. Most of domestic working voltage from service entrance extra-high voltage and working voltage of commercial frequency 60Hz working voltage 220V that use our country outside 1 country in interior of 22.900V for semiconductor use computer use digital installment of appliance as well as various smalls of digital base, middle, large size that safety is these fine voltage electric current that is not enough direct admonition hundred vast damage give can. Also, already act in surge circle and impulse transient phenomena such as several thousands, myriads, strong bit error more than billions time to digital fine electronic circuit by mistake use of using electric facility system of system electric power.

  • PDF

A Study on unperfected circuiting current of undergrounded cable (지중송전케이블의 불완전 순환전류에 관한 연구)

  • Lee, Kwan-Woo;Lee, Yong-Sung;Kim, Bo-Kyeng;Park, Bok-Ki;Park, Dae-Hee
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2004.05b
    • /
    • pp.3-6
    • /
    • 2004
  • In this paper, we studied on permissible current of unperfected earthing for cross-bond system. The factors of unperfected earth were jacket damage, cross-bonding mistake, arrestor damage, effect of other circuit but we only studied permissible current of arrestor or jacket damage. In the result, we earned that permissible current of normal 154[[kV]] CV $1C{\times}400SQMM$ cable is 760[A] but current of unperfected earthing cable is 76[A], unperfected earthing confirmed that accident of underground cable could occur. So, we could confirmed that Earthing resistance of unperfected earthing need to limit.

  • PDF

Track Circuit Topology Design by Double Vertex Graph Algorithm (Double Vertex 그래프에 의한 궤도회로 토플로지의 생성)

  • Hwang, Jong-Gyu;Lee, Jong-Woo;Joung, Eui-Jin;Kim, Tae-Sin
    • Proceedings of the KIEE Conference
    • /
    • 2000.11b
    • /
    • pp.389-391
    • /
    • 2000
  • A representation technique of a given track topology is required by many software applications in railway technology such as signalling system simulator. To achieve these, the concept of double vertex graph architecture is proposed. These are composed of pairs of vertices and node between the single vertices. Double vertex graph architecture can be understood as a extension of classical graphs. In developed railway signalling simulation software, it is shown that track topology can be represented by proposed algorithm in a efficient way. Especially it makes sure that these are suitable technique for representing and implementing of switch, routes which can be introduced some mistake in classical graph algorithm.

  • PDF

A Novel Spectrum Allocation Strategy with Channel Bonding and Channel Reservation

  • Jin, Shunfu;Yao, Xinghua;Ma, Zhanyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4034-4053
    • /
    • 2015
  • In order to meet various requirements for transmission quality of both primary users (PUs) and secondary users (SUs) in cognitive radio networks, we introduce a channel bonding mechanism for PUs and a channel reservation mechanism for SUs, then we propose a novel spectrum allocation strategy. Taking into account the mistake detection and false alarm due to imperfect channel sensing, we establish a three-dimensional Markov chain to model the stochastic process of the proposed strategy. Using the method of matrix geometric solution, we derive the performance measures in terms of interference rate of PU packets, average delay and throughput of SU packets. Moreover, we investigate the influence of the number of the reserved (resp. licensed) channels on the system performance with numerical experiments. Finally, to optimize the proposed strategy socially, we provide a charging policy for SU packets.

Analysis of Apartment Building Service System Flaw (공동주택 건축설비 시공개선 유형 분석)

  • Park, Jin-Kwan;Park, Jong-Il
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.1250-1254
    • /
    • 2006
  • The aim of this paper is to analysis mechanical system flaw in apartment building service system. From this paper, most mechanical flaws are from design mistake, materials flaw, other engineering construction's negligence of construction execution and careless system operation management. Through this study, the author suggested the way to reduce mechanical flaw, during construction process from drawing survey before execution start to completion of construction.

  • PDF

Party Autonomy in Arbitration Agreement: The U.S. Laws (중재합의의 당사자자치에 관한 미국계약법상 해석)

  • Ha, Choong-Lyong
    • Journal of Arbitration Studies
    • /
    • v.29 no.2
    • /
    • pp.89-105
    • /
    • 2019
  • This paper reviews and analyzes the U.S. cases and statutes on the issue of party autonomy in arbitration agreement. Arbitration agreement has been interpreted somewhat differently from general contracts because its legal characteristics are not purely contractual by nature. For example, some legal scholars insist that an arbitration contract is more about an agreement on a process of dispute resolution than a creation of rights and obligations to avoid litigation. Party autonomy was discussed in diverse legal perspectives including contract of adhesion, VKI principle, and separability of arbitration clause. These three legal perspectives are discussed to set the legal relationship between party autonomy and protection of consumers in consumer arbitration. In addition, it was discussed how legal defects in the formation of an arbitration contract can influence the party autonomy. The legal defects that were discussed to analyze the relationship between arbitration agreement and party autonomy included misrepresentation, fraud, mistake, duress, and undue influence.

PC User Authentication using Hand Gesture Recognition and Challenge-Response

  • Shin, Sang-Min;Kim, Minsoo
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.8 no.2
    • /
    • pp.79-87
    • /
    • 2018
  • The current PC user authentication uses character password based on user's knowledge. However, this can easily be exploited by password cracking or key-logging programs. In addition, the use of a difficult password and the periodic change of the password make it easy for the user to mistake exposing the password around the PC because it is difficult for the user to remember the password. In order to overcome this, we propose user gesture recognition and challenge-response authentication. We apply user's hand gesture instead of character password. In the challenge-response method, authentication is performed in the form of responding to a quiz, rather than using the same password every time. To apply the hand gesture to challenge-response authentication, the gesture is recognized and symbolized to be used in the quiz response. So we show that this method can be applied to PC user authentication.