The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and moni...The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and monitoring means to bring and maintain the plant in a safe state as a backup of main computerized control mean (MCM), in any plant conditions that are probable during a planed or unplanned unavailability of the MCM. The successful engineering applications of SICS in different digital I&C system platform are introduced in the paper. The thesis gives the research conclusion for new general SICS of digital I&C system.展开更多
The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed...The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.展开更多
This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing...This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents.展开更多
As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach ...As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach in which the modular exponentiation of huge number is simplified by using the Chinese Remainder Theorem. We have already succeeded in completing RSA in IC cards. Results indicate that RSA algorithm applied in IC cards has the equivalent speed of DES algorithm with the same environment.展开更多
The article describes the digital instrumentation and control system for unit 5 & 6 of YangJiang NPP, involving the overall I & C (instrumentation and control) structure, the basic requirements and independent ver...The article describes the digital instrumentation and control system for unit 5 & 6 of YangJiang NPP, involving the overall I & C (instrumentation and control) structure, the basic requirements and independent verification and validation. Advanced I & C systems for YangJiang NPPs have to meet increasing demands for safety and availability. Additionally, the specific requirements coming from the nuclear qualification have to be fulfilled.展开更多
Smart mobile applications are software applications that are designed to run on smart phones, tablets, and other mobile electronic devices. In this era of rapid technological advances, these applications have become o...Smart mobile applications are software applications that are designed to run on smart phones, tablets, and other mobile electronic devices. In this era of rapid technological advances, these applications have become one of the primary tools we use daily both in our personal and professional lives. The applications play key roles in facilitating many applications that are pivotal in our today's society including communication, education, business, entertainment, medical, finance, travel, utilities, social, and transportation. This paper reviewed the opportunities and challenges of the applications related to transportation. The opportunities revealed include route planning, ridesharing/carpooling, traffic safety, parking information, transportation data collection, fuel emissions and consumption, and travel information. The potential users of these applications in the field of transportation include (I) transportation agencies for travel data collection, travel information, ridesharing/carpooling, and traffic safety, (2) engineering students for field data collection such as travel speed, travel time, and vehicle count, and (3) general traveling public for route planning, ridesharing/carpooling, parking, traffic safety, and travel information. Significant usage of smart mobile applications can be potentially very beneficial, particularly in automobile travel mode to reduce travel time, cost, and vehicle emissions. In the end this would make travel safer and living environments greener and healthier. However, road users' interactions with these applications could manually, visually, and cognitively divert their attention from the primary task of driving or walking. Distracted road users expose themselves and others to unsafe behavior than undistracted. Road safety education and awareness programs are vital to discourage the use of applications that stimulate unsafe driving/walking behaviors. Educating the traveling public about the dangers of unsafe driving/walking behavior could have significant safety benefits to all road users. Future research needs to compare accuracies of the applications and provide guidelines for selecting them for certain transportation related applications.展开更多
文摘The thesis researches the safety infonnation and control system (SICS) design principle and introduces engineering application in CPR1000 nuclear power station in China. The SICS provides sufficient control and monitoring means to bring and maintain the plant in a safe state as a backup of main computerized control mean (MCM), in any plant conditions that are probable during a planed or unplanned unavailability of the MCM. The successful engineering applications of SICS in different digital I&C system platform are introduced in the paper. The thesis gives the research conclusion for new general SICS of digital I&C system.
文摘The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.
文摘This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents.
文摘As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach in which the modular exponentiation of huge number is simplified by using the Chinese Remainder Theorem. We have already succeeded in completing RSA in IC cards. Results indicate that RSA algorithm applied in IC cards has the equivalent speed of DES algorithm with the same environment.
文摘The article describes the digital instrumentation and control system for unit 5 & 6 of YangJiang NPP, involving the overall I & C (instrumentation and control) structure, the basic requirements and independent verification and validation. Advanced I & C systems for YangJiang NPPs have to meet increasing demands for safety and availability. Additionally, the specific requirements coming from the nuclear qualification have to be fulfilled.
文摘Smart mobile applications are software applications that are designed to run on smart phones, tablets, and other mobile electronic devices. In this era of rapid technological advances, these applications have become one of the primary tools we use daily both in our personal and professional lives. The applications play key roles in facilitating many applications that are pivotal in our today's society including communication, education, business, entertainment, medical, finance, travel, utilities, social, and transportation. This paper reviewed the opportunities and challenges of the applications related to transportation. The opportunities revealed include route planning, ridesharing/carpooling, traffic safety, parking information, transportation data collection, fuel emissions and consumption, and travel information. The potential users of these applications in the field of transportation include (I) transportation agencies for travel data collection, travel information, ridesharing/carpooling, and traffic safety, (2) engineering students for field data collection such as travel speed, travel time, and vehicle count, and (3) general traveling public for route planning, ridesharing/carpooling, parking, traffic safety, and travel information. Significant usage of smart mobile applications can be potentially very beneficial, particularly in automobile travel mode to reduce travel time, cost, and vehicle emissions. In the end this would make travel safer and living environments greener and healthier. However, road users' interactions with these applications could manually, visually, and cognitively divert their attention from the primary task of driving or walking. Distracted road users expose themselves and others to unsafe behavior than undistracted. Road safety education and awareness programs are vital to discourage the use of applications that stimulate unsafe driving/walking behaviors. Educating the traveling public about the dangers of unsafe driving/walking behavior could have significant safety benefits to all road users. Future research needs to compare accuracies of the applications and provide guidelines for selecting them for certain transportation related applications.