KSCE Journal of Civil and Environmental Engineering Research
/
v.42
no.2
/
pp.197-208
/
2022
The existence of shallow bedrock and the desire to use underground space necessitate the use of blasting methods. The standard blasting method under water after drilling is associated with certain technical difficulties, including reduced detonation power, the use of a fixed charge per delay, and decoupling. However, there is no blasting method to replace the existing blasting method. In this paper, a dry hole charged with ANFO blasting is assessed while employing a dry hole pumping system to remove water from the drill borehole. Additional standard blasting is also utilized to compare the blasting performances of the two methods. The least-squares linear regression method is adopted to analyze the blasting vibration velocity quantitatively using the measured vibration velocity for each blasting method and the vibration velocity model as a function of the scaled distance. The results show that the dry hole charged with ANFO blasting will lead to greater damping of the blasting vibration, more energy dissipation to crush the surrounding rock, and closer distances for the allowable velocity of the blasting vibration. Also, standard blasting shows much longer influencing distances and a wider range of the blasting pattern. The pilot test confirms the blasting efficiency of dry hole charged with ANFO blasting.
KIPS Transactions on Software and Data Engineering
/
v.12
no.11
/
pp.493-504
/
2023
The Republic of Korea is located far from the boundary of the earthquake plate, and the intra-plate earthquake occurring in these areas is generally small in size and less frequent than the interplate earthquake. Nevertheless, as a result of investigating and analyzing earthquakes that occurred on the Korean Peninsula between the past two years and 1904 and earthquakes that occurred after observing recent earthquakes on the Korean Peninsula, it was found that of a magnitude of 9. In this paper, the Korean Peninsula Historical Earthquake Record (2 years to 1904) published by the National Meteorological Research Institute is used to analyze the relationship between earthquakes on the Korean Peninsula and statistical self-similarity. In addition, the problem solved through this paper was the first to investigate the relationship between earthquake data occurring on the Korean Peninsula and statistical self-similarity. As a result of measuring the degree of self-similarity of earthquakes on the Korean Peninsula using three quantitative estimation methods, the self-similarity parameter H value (0.5 < H < 1) was found to be above 0.8 on average, indicating a high degree of self-similarity. And through graph visualization, it can be easily figured out in which region earthquakes occur most often, and it is expected that it can be used in the development of a prediction system that can predict damage in the event of an earthquake in the future and minimize damage to property and people, as well as in earthquake data analysis and modeling research. Based on the findings of this study, the self-similar process is expected to help understand the patterns and statistical characteristics of seismic activities, group and classify similar seismic events, and be used for prediction of seismic activities, seismic risk assessments, and seismic engineering.
Olivine, a major mineral in the upper mantle with strong intrinsic elastic anisotropy, plays a crucial role in seismic anisotropy in the mantle, primarily through its lattice preferred orientation (LPO). Despite this, the influence of the microstructure of mylonitic rocks on seismic anisotropy remains inadequately understood. Notably, there is a current research gap concerning seismic anisotropy directly inferred from mylonitic peridotite massifs in Korea. In this study, we introduce the deformation microstructure and LPO of olivine in the mantle shear zone. We calculate the characteristics of seismic anisotropy based on the degree of deformation (proto-mylonite, mylonite, ultra-mylonite) and establish correlations between these characteristics. Our findings reveal that the seismic anisotropy resulting from the olivine LPO in the ultra-mylonitic rock appears to be the weakest, whereas the seismic anisotropy resulting from the olivine LPO in the proto-mylonitic rock appears to be the strongest. The results demonstrate a gradual decrease in seismic anisotropy as the fabric strength (J-index) of olivine LPO diminishes, irrespective of the specific pattern of olivine's LPO. Moreover, all samples exhibit a polarization direction of the fast S-wave aligned subparallel to the lineation. This suggests that seismic anisotropy originating from olivine in mylonitic peridotites is primarily influenced by fabric strength rather than LPO type. Considering these distinctive characteristics of seismic anisotropy is expected to facilitate comparisons and interpretations of the internal mantle structure and seismic data in the Yugu area, Gyeonggi Massif.
This study conducted both big data and netnography analysis to analyze consumer needs and behaviors of online consumer community. Big data analysis is easy to identify correlations, but causality is difficult to identify. To overcome this limitation, we used netnography analysis together. The netnography methodology is excellent for context grasping. However, there is a limit in that it is time and costly to analyze a large amount of data accumulated for a long time. Therefore, in this study, we searched for patterns of overall data through big data analysis and discovered outliers that require netnography analysis, and then performed netnography analysis only before and after outliers. As a result of analysis, the cause of the phenomenon shown through big data analysis could be explained through netnography analysis. In addition, it was able to identify the internal structural changes of the community, which are not easily revealed by big data analysis. Therefore, this study was able to effectively explain much of online consumer behavior that was difficult to understand as well as contextual semantics from the unstructured data missed by big data. The big data-netnography integrated model proposed in this study can be used as a good tool to discover new consumer needs in the online environment.
Journal of Korean Society of Environmental Engineers
/
v.27
no.3
/
pp.253-261
/
2005
Catalytic wet oxidation of ppm levels of trichloroethylene (TCE) in water has been conducted using $TiO_2$-supported cobalt oxides at a given temperature and weight hourly space velocity. 5% $CoO_x/TiO_2$ might be the most promising catalyst for the wet oxidation at $36^{\circ}C$ although it exhibited a transient behavior in time on-stream activity. Not only could the bare support be inactive for the wet decomposition reaction, but no TCE removal also occurred by the process of adsorption on $TiO_2$ surface. The catalytic activity was independent of all particle sizes used, thereby representing no mass transfer limitation in intraparticle diffusion. Characterization of the $CoO_x$ catalyst by acquiring XPS spectra of both fresh and used Co surfaces gave different surface spectral features of each $CoO_x$. Co $2p_{3/2}$ binding energy of Co species exposed predominantly onto the outermost surface of the fresh catalyst appeared at 781.3 eV, which is very similar to the chemical states of $CoTiO_x$ such as $Co_2TiO_4$ and $CoTiO_3$. The spent catalyst possessed a 780.3 eV main peak with a satellite structure at 795.8 eV. Based on XPS spectra of reference Co compound, the TCE-exposed Co surfaces could be assigned to be in the form of mainly $Co_3O_4$. XRD measurements indicated that the phase structure of Co species in 5% $CoO_x/TiO_2$ catalyst even before reaction is quite comparable to the diffraction lines of external $Co_3O_4$ standard. A model structure of $CoO_x$ present on titania surfaces would be $Co_3O_4$, encapsulated in thin-film $CoTiO_x$ species consisting of $Co_2TiO_4$ and $CoTiO_3$, which may be active for the decomposition of TCE in a flow of water.
We used $^6Li$ and $^7Li$ MAS NMR to investigate the fate and local environments of Li in the interlayer of clay minerals such as hectorite, Woming-montmorillonite, beidellite, and lepidollite at room and high ($250^{\circ}C$) temperature. Although $^6Li$ NMR spectra show narrower peaks than those of $^7Li$ NMR, S/N ratio is low and there are no obvious differences in chemical shifts suggesting that it is difficult to apply $^6Li$ NMR to have information on the local environments of Li in the clay interlayers. $^7Li$ NMR spectra, however, show changes in the peak width and quadrupole patterns providing information on the local environments of Li in the interlayer even though changes in the chemical shift are not observed. In montmorillonite, two different local environments of Li are observed; one has a narrow peak with typical quadrupole patterns whereas another has a broad peak without those of the patterns. Changes in the peak width is also observed from broad to narrow in the $^7Li$ NMR spectra for beidellite but not for hectorite at high temperature. Our results suggest that the peak width change in the broad peak is attributed to the coordination changes in the water molecules around Li which is tightly bonded on the basal oxygen of Si tetrahedra as inner-sphere complexes. The narrow peak in montmorillnoite can be assigned to the Li bended as outer-sphere complexes.
The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
/
v.18
no.4
/
pp.186-194
/
2013
We investigated the concentrations and distribution patterns of 17 polychlorinated dibenzo-p-dioxins/dibenzofurans(PCDD/Fs), 12 dioxin-like polychlorinated biphenyls(DL-PCBs) and 24 polybrominated diphenyl ethers(PBDEs) in sediments from Ulsan Bay in Korea. The concentrations of PCDD/Fs, DL-PCBs, and PBDEs in 33 sediment samples ranged from 0.11 to 4.86($1.81{\pm}1.04$) pg $WHO_{2005}$-TEQ $g^{-1}$ dry weight(dw), 0.06 to 44.2($4.02{\pm}7.99$) pg $WHO_{2005}$-TEQ $g^{-1}$ dw, and 2.81 to 63.8($19.4{\pm}13.9$) ng $g^{-1}$ dw, respectively. DL-PCBs had dominant contributions(mean, 88%) of total TEQ concentrations in sediment. The concentrations of target compounds in inner locations were higher than those in outer locations in Ulsan Bay (p<0.05). The dominant contribution of highly chlorinated DD/Fs in sediment was associated with combustion process from industrial complexes. Distribution pattern of DL-PCBs was similar with those of commercial PCB products. BDE209 was a dominant congener in sediment, suggesting high use amount of commercial deca-BDE product in surrounding areas.
Park, DaeKyeong;Shin, DongIl;Shin, DongKyoo;Kim, Sangsoo
KIPS Transactions on Software and Data Engineering
/
v.10
no.7
/
pp.271-278
/
2021
As the current cyber attacks become more intelligent, the existing Intrusion Detection System is difficult for detecting intelligent attacks that deviate from the existing stored patterns. In an attempt to solve this, a model of a deep learning-based intrusion detection system that analyzes the pattern of intelligent attacks through data learning has emerged. Intrusion detection systems are divided into host-based and network-based depending on the installation location. Unlike network-based intrusion detection systems, host-based intrusion detection systems have the disadvantage of having to observe the inside and outside of the system as a whole. However, it has the advantage of being able to detect intrusions that cannot be detected by a network-based intrusion detection system. Therefore, in this study, we conducted a study on a host-based intrusion detection system. In order to evaluate and improve the performance of the host-based intrusion detection system model, we used the host-based Leipzig Intrusion Detection-Data Set (LID-DS) published in 2018. In the performance evaluation of the model using that data set, in order to confirm the similarity of each data and reconstructed to identify whether it is normal data or abnormal data, 1D vector data is converted to 3D image data. Also, the deep learning model has the drawback of having to re-learn every time a new cyber attack method is seen. In other words, it is not efficient because it takes a long time to learn a large amount of data. To solve this problem, this paper proposes the Siamese Convolutional Neural Network (Siamese-CNN) to use the Few-Shot Learning method that shows excellent performance by learning the little amount of data. Siamese-CNN determines whether the attacks are of the same type by the similarity score of each sample of cyber attacks converted into images. The accuracy was calculated using Few-Shot Learning technique, and the performance of Vanilla Convolutional Neural Network (Vanilla-CNN) and Siamese-CNN was compared to confirm the performance of Siamese-CNN. As a result of measuring Accuracy, Precision, Recall and F1-Score index, it was confirmed that the recall of the Siamese-CNN model proposed in this study was increased by about 6% from the Vanilla-CNN model.
Gyu Cheol Choi;KyungBeom Kim;Bonghwan Kim;Jong Min Kim;SangMok Chang
Clean Technology
/
v.29
no.4
/
pp.255-261
/
2023
Power semiconductors are semiconductors used for power conversion, transformation, distribution, and control. Recently, the global demand for high-voltage power semiconductors is increasing across various industrial fields, and optimization research on high-voltage IGBT components is urgently needed in these industries. For high-voltage IGBT development, setting the resistance value of the wafer and optimizing key unit processes are major variables in the electrical characteristics of the finished chip. Furthermore, the securing process and optimization of the technology to support high breakdown voltage is also important. Etching is a process of transferring the pattern of the mask circuit in the photolithography process to the wafer and removing unnecessary parts at the bottom of the photoresist film. Ion implantation is a process of injecting impurities along with thermal diffusion technology into the wafer substrate during the semiconductor manufacturing process. This process helps achieve a certain conductivity. In this study, dry etching and wet etching were controlled during field ring etching, which is an important process for forming a ring structure that supports the 3.3 kV breakdown voltage of IGBT, in order to analyze four conditions and form a stable body junction depth to secure the breakdown voltage. The field ring ion implantation process was optimized based on the TEG design by dividing it into four conditions. The wet etching 1-step method was advantageous in terms of process and work efficiency, and the ring pattern ion implantation conditions showed a doping concentration of 9.0E13 and an energy of 120 keV. The p-ion implantation conditions were optimized at a doping concentration of 6.5E13 and an energy of 80 keV, and the p+ ion implantation conditions were optimized at a doping concentration of 3.0E15 and an energy of 160 keV.
As social data become into the spotlight, mainstream web search engines provide data indicate how many people searched specific keyword: Web Search Traffic data. Web search traffic information is collection of each crowd that search for specific keyword. In a various area, web search traffic can be used as one of useful variables that represent the attention of common users on specific interests. A lot of studies uses web search traffic data to nowcast or forecast social phenomenon such as epidemic prediction, consumer pattern analysis, product life cycle, financial invest modeling and so on. Also web search traffic data have begun to be applied to predict tourist inbound. Proper demand prediction is needed because tourism is high value-added industry as increasing employment and foreign exchange. Among those tourists, especially Chinese tourists: Youke is continuously growing nowadays, Youke has been largest tourist inbound of Korea tourism for many years and tourism profits per one Youke as well. It is important that research into proper demand prediction approaches of Youke in both public and private sector. Accurate tourism demands prediction is important to efficient decision making in a limited resource. This study suggests improved model that reflects latest issue of society by presented the attention from group of individual. Trip abroad is generally high-involvement activity so that potential tourists likely deep into searching for information about their own trip. Web search traffic data presents tourists' attention in the process of preparation their journey instantaneous and dynamic way. So that this study attempted select key words that potential Chinese tourists likely searched out internet. Baidu-Chinese biggest web search engine that share over 80%- provides users with accessing to web search traffic data. Qualitative interview with potential tourists helps us to understand the information search behavior before a trip and identify the keywords for this study. Selected key words of web search traffic are categorized by how much directly related to "Korean Tourism" in a three levels. Classifying categories helps to find out which keyword can explain Youke inbound demands from close one to far one as distance of category. Web search traffic data of each key words gathered by web crawler developed to crawling web search data onto Baidu Index. Using automatically gathered variable data, linear model is designed by multiple regression analysis for suitable for operational application of decision and policy making because of easiness to explanation about variables' effective relationship. After regression linear models have composed, comparing with model composed traditional variables and model additional input web search traffic data variables to traditional model has conducted by significance and R squared. after comparing performance of models, final model is composed. Final regression model has improved explanation and advantage of real-time immediacy and convenience than traditional model. Furthermore, this study demonstrates system intuitively visualized to general use -Youke Mining solution has several functions of tourist decision making including embed final regression model. Youke Mining solution has algorithm based on data science and well-designed simple interface. In the end this research suggests three significant meanings on theoretical, practical and political aspects. Theoretically, Youke Mining system and the model in this research are the first step on the Youke inbound prediction using interactive and instant variable: web search traffic information represents tourists' attention while prepare their trip. Baidu web search traffic data has more than 80% of web search engine market. Practically, Baidu data could represent attention of the potential tourists who prepare their own tour as real-time. Finally, in political way, designed Chinese tourist demands prediction model based on web search traffic can be used to tourism decision making for efficient managing of resource and optimizing opportunity for successful policy.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.