• Title/Summary/Keyword: reliability and safety

Search Result 3,067, Processing Time 0.036 seconds

Estimation of Pyrolysis Properties for Fire Propagation Analysis of Furniture Materials (가구소재의 화재전파해석을 위한 열해리 물성 평가)

  • Kim, Sung-Chan
    • Fire Science and Engineering
    • /
    • v.27 no.4
    • /
    • pp.41-46
    • /
    • 2013
  • The present study has been conducted to investigate the reaction kinetics and pyrolysis parameters for flame propagation analysis of furniture material components. TGA measurement for component materials such as MDF (medium density fiberboad) panel including coating material, synthetic leather and foam cushion are performed under maximum temperature of $600^{\circ}C$ and heating rate of $10^{\circ}C/min$. The results of TGA have shown that the peak temperature of MDF panel was $324^{\circ}C$ and the initial peak temperature of coating material decreased by $270{\sim}280^{\circ}C$. In the case of synthetic leather and foam materials, the reference temperature and reference rate depend on the type of polymer consisting the sample, the initial kinetic characteristics was classified into 2 categories of about $270^{\circ}C$ and $420^{\circ}C$ of reference temperature for the tested synthetic materials. The present study showed the pyrolysis parameters of reference temperature and reference rate proposed by Lyon to evaluate the pre-exponential factor and activation energy. The present study can contribute to improve the reliability of computational fire analysis and enhance the understanding of fire propagation phenomena based on the thermal properties study of material.

Design of Network-Based Induction Motors Fault Diagnosis System Using Redundant DSP Microcontroller with Integrated CAN Module (DSP 마이크로컨트롤러를 사용한 CAN 네트워크 기반 유도전동기고장진단 시스템 설계)

  • Yoon, Chung-Sup;Hong, Won-Pyo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.5
    • /
    • pp.80-86
    • /
    • 2005
  • Induction motors are a critical component of many industrial processes and are frequently integrated in commercially available equipment. Safety, reliability, efficiency, and performance are some of the major concerns of induction motor applications. Fault tolerant control (FTC) strives to make the system stable and retain acceptable performance under the system faults. All present FTC method can be classified into two groups. The first group is based on fault detection and diagnostics (FDD). The second group is includes of FDD and includes methods such as integrity control, reliable stabilization and simultaneous stabilization. This paper presents the fundamental FDD-based FTC methods, which are capable of on-line detection and diagnose of the induction motors. Therefore, our group has developed the embedded distributed fault tolerant and fault diagnosis system for industrial motor. This paper presents its architecture. These mechanisms are based on two 32-bit DSPs and each TMS320F2407 DSP module processes the stator current, voltage, temperatures, vibration signal of the motor.

Research on Expansion and Improvement Approaches of Information Security Budget for Cybersecurity Enhancement (정보보호 기반 강화를 위한 정보보호 예산 확대 및 개선 방안 연구)

  • Bae, Sunha;KIM, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1279-1294
    • /
    • 2016
  • Information security to use information technology(IT) in safety and reliability environment is becoming of great importance. In advanced countries including United States and United Kingdom are consistently expanding budget for information security. Korea also has been a growing interest in information security and Korea government announced plan to develop information security into next-generation growth engine. However, information security budget has increased slightly in recent years, so many national institutions and state governments have budget shortfall to perform information security work. Moreover budget items do not include generic contents about information security and there are confined to some security SW, HW and services. It is necessary to expand information security budget for enhancement national capabilities of information security. In this paper, we analyze the IT and information security budget situation for Korea and United States and propose effective budget expansion and improvement approaches for Korea.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

Structural Crack Detection Using Deep Learning: An In-depth Review

  • Safran Khan;Abdullah Jan;Suyoung Seo
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.4
    • /
    • pp.371-393
    • /
    • 2023
  • Crack detection in structures plays a vital role in ensuring their safety, durability, and reliability. Traditional crack detection methods sometimes need significant manual inspections, which are laborious, expensive, and prone to error by humans. Deep learning algorithms, which can learn intricate features from large-scale datasets, have emerged as a viable option for automated crack detection recently. This study presents an in-depth review of crack detection methods used till now, like image processing, traditional machine learning, and deep learning methods. Specifically, it will provide a comparative analysis of crack detection methods using deep learning, aiming to provide insights into the advancements, challenges, and future directions in this field. To facilitate comparative analysis, this study surveys publicly available crack detection datasets and benchmarks commonly used in deep learning research. Evaluation metrics employed to check the performance of different models are discussed, with emphasis on accuracy, precision, recall, and F1-score. Moreover, this study provides an in-depth analysis of recent studies and highlights key findings, including state-of-the-art techniques, novel architectures, and innovative approaches to address the shortcomings of the existing methods. Finally, this study provides a summary of the key insights gained from the comparative analysis, highlighting the potential of deep learning in revolutionizing methodologies for crack detection. The findings of this research will serve as a valuable resource for researchers in the field, aiding them in selecting appropriate methods for crack detection and inspiring further advancements in this domain.

Critical Success Factors of REID-based Fisheries Traceability Systems: From the Perspectives of Consumers and Suppliers (RFID기반수산물이력제의 성공요인에 대한 탐색적 연구 -소비자 및 공급자 관점을 중심으로-)

  • Kim, Jin-Baek
    • The Journal of Fisheries Business Administration
    • /
    • v.38 no.2
    • /
    • pp.25-40
    • /
    • 2007
  • Recently, fisheries safety has been a matter of primary concern among consumers and suppliers. This phenomenon made them require the introduction of fisheries traceability systems. For traceability systems to be effective, automatic identification means play an important role. Therefore, RFID-based fisheries traceability systems are more required than barcode-based fisheries traceability systems. Unlikely EU and Japan, Korea did not accept mandatory traceability regulations. But Many countries began to accept mandatory traceability regulations to diminish food risks. So Korea is expected to adopt them in the near future. The purpose of this study is to find what benefits are generated from the adoption of RFID-based fisheries traceability systems and are related to their success. To do these, this study investigated primary benefits of RFID-based fisheries traceability systems from the perspectives of consumers and suppliers. Consumers' benefits were derived from the perceived risk dimensions. And suppliers' benefits were derived from operational benefits of RFID systems. To purify the benefits from RFID-based fisheries traceability systems, reliability and factor analysis were used. And the refined benefits of RFID-based fisheries traceability systems were additionally analyzed to find which benefits were significantly related to fisheries traceability systems' success. According to the analysis results, all risk dimensions except social risk were significantly related to their success. But in the benefits of suppliers, only "recalls and counterfeits" factor was significantly related to their success. These results implied that fisheries traceability systems should be based RFID technology instead of barcode and fisheries traceability systems were related to almost food risk dimensions. It's because these significant factors are related all food risks except social risk and the benefits of suppliers can be derived from only RFID technology.

  • PDF

Study on the Fuzzy Inference System for Objectivity of Ground Evaluation in Tunnelling (터널지반 평가의 객관화를 위한 퍼지추론시스템 연구)

  • 조만섭;김영석
    • Tunnel and Underground Space
    • /
    • v.13 no.1
    • /
    • pp.6-19
    • /
    • 2003
  • This study has for its object to increase an objectivity of the observation result in the face mapping of tunnel and to suggest the reasonable support and reinforcement methods to be considered the rock properties. It was developed in this study to the tunnel stability evaluation system(Prototype NFEST) to be used fuzzy set theory and neuro-fuzzy techniques, and this system was verified according to the reliability evaluation between the 36 learning data and the inferred results. When it summarized the results; (1) 12 evaluation items and ranges were proposed to be modified basis on the RMR which are well known to the domestic workers. (2) It was shown that correlation coefficient(│R│) between $RMR_{inf}$ inferred by 12 items and $RMR_{org}$ due to arithmetic total, $RMR_{chk}$ due to subjective judgement of observer are relatively high relationship with each 0.83 and 0.79. (3) Inferred result of the total tunnel safety shows also a good relationship with $RMR_{inf}$ (│R│=0.7) and the rock weathering(│R│=0.84).

Screening Effects of Double-track Electric Railway and Shielded Cables on Communication-Line Inductive Interference (전기철도 복선화 및 차폐 케이블 적용에 따른 통신선 유도장해 차폐 효과)

  • Seol, Il-Hwan;Choi, Kyu-Hyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.5148-5155
    • /
    • 2013
  • The induced voltage on the telecommunication cable generated by nearby electric railway system may bring about telecommunication errors and safety accidents. In order to reduce the induced voltage and to achieve communication reliability, the effect of the shield cables and the recent double-track railway systems on the inductive interference should be investigated. This paper analyzes the parameters which seriously influence the induced voltage on the telecommunication cables which run parallel with a AT-fed electric railway line, and provides a simulation-based approach to estimate the amount of the induced voltage. Simulation results indicate that the induced noise voltage generated by a double-track railway decreases by 18 % compared to that generated by a single-track railway, showing the screening effect by nearby track. The induced noise voltages on the 50%-shielded cable and 15%-shielded cable decrease to 1/8 and 1/15 of the induced voltage on the non-shielded cable, respectively. A meaningful shield effect is achieved and the induced voltage is minimized by the double-track railway and the shielded cable.

Multiple Object Tracking and Identification System Using CCTV and RFID (감시 카메라와 RFID를 활용한 다수 객체 추적 및 식별 시스템)

  • Kim, Jin-Ah;Moon, Nammee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.51-58
    • /
    • 2017
  • Because of safety and security, Surveillance camera market is growing. Accordingly, Study on video recognition and tracking is also actively in progress, but There is a limit to identify object by obtaining the information of object identified and tracked. Especially, It is more difficult to identify multiple objects in open space like shopping mall, airport and others utilized surveillance camera. Therefore, This paper proposed adding object identification function by using RFID to existing video-based object recognition and tracking system. Also, We tried to complement each other to solve the problem of video and RFID based. Thus, through the interaction of system modules We propose a solution to the problems of failing video-based object recognize and tracking and the problems that could be cased by the recognition error of RFID. The system designed to identify the object by classifying the identification of object in four steps so that the data reliability of the identified object can be maintained. To judge the efficiency of this system, this demonstrated by implementing the simulation program.

The Effect of Computer-Assisted Instruction(CAI) through the Multimedia CD-ROM on the Prevention of Child Sexual Abuse (CAI를 이용한 어린이 성희롱/성폭력 예방교육 효과)

  • Bae, Jeong-Yee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.10 no.2
    • /
    • pp.239-251
    • /
    • 2004
  • The purpose of this study was to find out the effects of education for prevention of child sexual abuse (rape, sexual assault, sexual harassment etc.) of children in elementary school students. Incidences of sexual abuse in Korea is ranked 3rd in the world. Sexual abuse of children, particularly, is one of the most serious crimes that affect both the victimized children and their family. The issue related to sexual abuse of children has been ignored, and there is a lack of systematic education to prevent sexual abuse of children either for children or their parents. Furthermore, lack of knowledge and poor attitude of teachers limit their capability to provide education for sexual abuse prevention to the children. The education for teachers may change their knowledge of the sexual abuse and their attitude toward it and improve their capability in helping children. 223 Korean elementary school students participated in this study. Research design was One group pretest-posttest design. The education given to the subjects included 4 hours through the multimedia CD-ROM on the prevention of child sexual abuse. The education program was developed based on a survey. School- aged- children, parents, and teachers were interviewed to reveal their educational needs based on their experiences related to sexual abuse. This program includes such as safety education, crisis management, resource person(s), and phone numbers of available hospital. Data was collected before, during and after the education was given to the subjects, to assess their knowledge and attitude toward child sexual abuse. Two instruments were used in this study. Using Cronbach's ALPHA validity and reliability of 2 instruments were tested. The analysis of the data was done with Window SPSS 10.0 for descriptive statistics, t-test and ANOVA. The results of this analysis were as follows : 1. After education, the score of school nurses knowledge was higher than before(t= -4.677, p=0.000). 2. After education, the score of school nurses attitude was not higher than before (t=0.131, p=0.896). The findings from this study will provide an intervention strategy for prevention of sexual abuse in children.

  • PDF