• Title/Summary/Keyword: 본래성

Search Result 573, Processing Time 0.029 seconds

Seismic Performance Evaluation of a School Gymnasium Using Static Anlysis (정적해석에 의한 학교 체육관의 내진 성능 평가)

  • Morooka, Shigehiro;Tsuda, Seita;Ohsaki, Makoto
    • Journal of Korean Association for Spatial Structures
    • /
    • v.9 no.4
    • /
    • pp.49-59
    • /
    • 2009
  • The seismic responses of small-scale spatial frames such as school gymnasiums are usually evaluated using static analysis, although time-history analysis should be carried out to fully incorporate the dynamic responses of the structures against seismic motions. In this study, advanced static analysis procedures arc presented for school gymnasiums that will improve the performance evaluation against seismic motions. The seismic loads are approximated by equivalent static loads corresponding to the two performance levels; i.e., Levels 1 and 2 defined by the Japanese building standard. The importance of utilizing the eigenmode in the load pattern is discussed. Simple static analysis procedures are presented for evaluation of maximum vertical acceleration. It is shown that the static analysis for Level 2 input significantly underestimates the responses by dynamic analysis; however, the inelastic responses for Level 2 are shown to be successfully evaluated using the equivalent linearization that is similar to the $^{\circ}$Dmethod based on calculation of limit strength$^{\circ}{\pm}$ for building frames in Japan.

  • PDF

Speech synthesis using acoustic Doppler signal (초음파 도플러 신호를 이용한 음성 합성)

  • Lee, Ki-Seung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.35 no.2
    • /
    • pp.134-142
    • /
    • 2016
  • In this paper, a method synthesizing speech signal using the 40 kHz ultrasonic signals reflected from the articulatory muscles was introduced and performance was evaluated. When the ultrasound signals are radiated to articulating face, the Doppler effects caused by movements of lips, jaw, and chin observed. The signals that have different frequencies from that of the transmitted signals are found in the received signals. These ADS (Acoustic-Doppler Signals) were used for estimating of the speech parameters in this study. Prior to synthesizing speech signal, a quantitative correlation analysis between ADS and speech signals was carried out on each frequency bin. According to the results, the feasibility of the ADS-based speech synthesis was validated. ADS-to-speech transformation was achieved by the joint Gaussian mixture model-based conversion rules. The experimental results from the 5 subjects showed that filter bank energy and LPC (Linear Predictive Coefficient) cepstrum coefficients are the optimal features for ADS, and speech, respectively. In the subjective evaluation where synthesized speech signals were obtained using the excitation sources extracted from original speech signals, it was confirmed that the ADS-to-speech conversion method yielded 72.2 % average recognition rates.

Restoration for Speech Records Managed by the National Archives of Korea (국가기록원 음성 기록물의 복원과 분석)

  • Oh, Sejin;Kang, Hong-Goo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.3
    • /
    • pp.269-278
    • /
    • 2013
  • The speech recording of the National Archives of Korea contains very important traces which represent modern times of Korea. But the way to be recorded by analogue is easily contaminated as time goes by. So it has to be digitalized for management and services. Consequently, restoration method of distorted speech is needed. We propose the four classes for each distortion kind and apply restoration algorithms for the cases of speech level, stationary noise and abrupt noise. As a result, speech volume adjusts to -26 dBov for only on the speech region and SNR improves above 10dB. Especially, conventional way to remove the noise is almost impossible because we need to listen to all of them but it can be more effective by adaptation of auto restoration algorithm.

Oxidation Stability of Fish Oil Containing Commercially Available Antioxidants (상업용 천연 항산화제의 사용에 다른 어유의 산화 안정성 연구)

  • Jang Ji-Sun;Lee Yun-Hee;Hong Jang-Hwan;Lee Ki-Teak
    • Food Science and Preservation
    • /
    • v.13 no.1
    • /
    • pp.66-70
    • /
    • 2006
  • The effects of commercially available antioxidants in fish oil were studied. Induction period of fish oil was determined from the oxidation curve by rancin\mat. The longest Induction period was observed with catechin (1,000 ppm). Among the rosemary extracts (Antox1, Antox2, Antox3), the most effective antioxidant effect was observed with Antox3 even though higher amount (5,000 ppm) was needed compared to catechin. Compared to oder of control, catechin rather than Antox3 did not affect much the odor changes. When ascorbic palmitate, vitamin C, gallic acid, EDTA, citric acid, or propyl gallate as a synergist were added with catechin (500 ppm), vitamin C and ascorbic palmitate prolonged the induction period significantly. This effect was also observed with Antox3 (1,000 ppm). Among all combinations of catechin (500 ppm) and Antox3 (1,000 ppm) with synergists, the longest Induction period was obtained from Antox3 with vitamin C (200 ppm), suggesting that this combination is most effective combination for retarding the oxidation in fish oil.

Dehydration of Omija (Schisandra chinensis B.) using Red Algae Extract as a Hypertonic Agent (홍조류 추출물을 이용한 오미자의 탈수 및 건조)

  • Kim, Nam Ho;Jo, Wan Shin;Song, Kyung Bin
    • Food Science and Preservation
    • /
    • v.20 no.2
    • /
    • pp.284-288
    • /
    • 2013
  • Omija (Schizandra chinensis B.) slices were dehydrated with 20, 40, and 60% (w/w) red algae extract (RAE), and 40% of RAE was selected as the proper processing concentration considering the dehydration efficiency and cost of the dehydrating agent. The RAE-treated omija samples were compared with the hot-air dried samples in terms of the qualities such as the rehydration capacity and total phenolic contents. The rehydration ratios of the RAE-treated samples were greater than those of the hot-air dried samples by 31%. The total phenolic contents of the RAE-treated samples (1304.8 mg GAE/100 g) were higher than those of the hot-air dried samples (999.5 mg GAE/100 g). Therefore, omija slices can be dehydrated with RAE without quality loss.

논제 부정 Access에 대한 Firewall의 과제와 대책

  • 변성준;서정석;최원석
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.227-238
    • /
    • 2000
  • Firewall은 다양한 부정Access의 방지책으로서 확실히 유효한 수단이지만 이 Firewall은 사용자로부터 지시된 설정을 충실히 실행하는 것으로 설정 오류, 소프트웨어의 정지, 허가된 룰을 악용한 침입 등 반드시 사용자가 바라는 작용을 무조건적 상태에서 보증해 주는 것은 아니다. 따라서 사용자는 도입 후 에도 운용시에 Access log를 감시하고 본래의 Security Policy에 반하는 행위를 매일 매일 체크하지 않으면 안될 상황에 처해 있다. 본 연구는 이러한 부정Access에 대한 이와 같은 Firewall의 현상에 대한 과제 중에서 "부정Access를 어떻게 하면 일찍, 정확히 체크할 수 있는가\ulcorner"라는 주제를 선택하여 Firewall의 한계와 그 대응책을 실제로 부정Access를 시험해 보는 것으로 검증하기로 하였다. 실험결과에서 (1)Port Scan이나 전자메일 폭탄(서비스정지공격)등은 Firewall로 방지하는 것은 불가능하거나 혹은 Checking이 곤란하다. (2)공격마다 로그 수집을 했음에도 관계없이 Firewall의 로그는 번잡하므로 단시간에 사태의 발견이 대단히 곤란하다고 하는 Firewall의 한계를 인식하였다. 그리고 그 대책으로서 우리는 체크 툴의 유효성에 착안하여 조사한 결과, 결국 무엇이 부정Access인가에 대해서는 어디까지나 이용하는 측이 판단하여 Firewall 상에 설정하지 않으면 안되지만 체크 툴은 이 부정Access 정보를 데이터베이스로서 갖고 있음으로써 '무엇이 부정Access인가'를 이용자 대신에 판단하고 툴에 따라서는 설정을 자동적으로 변경하여 부정 Access의 저지율을 향상시킨다. 이처럼 체크 툴은 Firewall의 수비능력을 보강하는 위치에 있다고 생각할 수 있다.다. 4 장에서는 3장에서 제기한 각각의 문제점에 대해 RAD 의 관점에 비추어 e-business 시스템의 단기개발을 실현하기 위한 고려사항이나 조건 해결책을 제안한다. 본 논문이 지금부터 e-business 를 시작하려고 하는 분, e-business 시스템의 개발을 시작하려고 하는 분께 단기간의 e-business 실현을 위한 하나의 지침이 된다면 다행이겠다.formable template is used to optimize the matching. Then, clustering the similar shapes by the distance between each centroid, papaya can be completely detected from the background.uage ("Association of research for algorithm of calculating machine (1992)"). As a result, conventional NN and CNN were available for interpolation of sampling data. Moreover, when nonlinear intensity is not so large under the field condition of small slope, interpolation performance of CNN was a little not so better than NN. However, when nonlinear intensity is large under the field condition of large slope, interpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를

  • PDF

Security Gateway Extension Mechanism for Session Recovery in Virtual Private Network (가상 사설망에서의 세션 복구 서비스를 위한 Security Gateway 확장 메커니즘)

  • Kim, Jeong-Beom;Lee, Yun-Jung;Park, Nam-Sub;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.1
    • /
    • pp.77-85
    • /
    • 2002
  • The surge in use of networks has recently increased demands for cryptography. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. They have suggested many key recovery techniques up to the present. we propose a mechanism as a solution, which are employed to reduce the time needed to reconnect SG and the host in Host-to-Gateway in VPNs supporting IPsec, in case they are disconnected. This new mechanism using KRFSH stores information at each session in advance so that users can recall the session information when needed to rebuild the tunnel between SG and the host in a VPN. As a result, the mechanism built into SG will solve the problems above in host-to-gateway VPNs using IPsec.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

A Study of the Relation between Learning Outcomes and Learning Transfer in Engineering Design Programs (공학설계교육에서 학습과 학습전이간의 관계성 연구)

  • Yoon, Gwan-Sik;Lee, Byoung-Chul
    • Journal of Engineering Education Research
    • /
    • v.12 no.3
    • /
    • pp.3-12
    • /
    • 2009
  • The recent development of engineering design education has brought enormous influence in many engineering educations. But, most studies in this area have focused only on the system or curriculum development rather than on the effect of the program to the real situation, the transfer. The purpose of this study is to identify the effects of learning and learning transfer in engineering design program at the university level. Transfer is defined as the use of trained knowledge and skill back on the job. The results of the study are as follows. First, learner characteristics and curriculum design had a significant influence on learning effectiveness. Second, learner characteristics had a significant influence an learning transfer. Also, the learning had a significant influence an learning transfer.

Adaptive Noise Reduction using Standard Deviation of Wavelet Coefficients in Speech Signal (웨이브렛 계수의 표준편차를 이용한 음성신호의 적응 잡음 제거)

  • 황향자;정광일;이상태;김종교
    • Science of Emotion and Sensibility
    • /
    • v.7 no.2
    • /
    • pp.141-148
    • /
    • 2004
  • This paper proposed a new time adapted threshold using the standard deviations of Wavelet coefficients after Wavelet transform by frame scale. The time adapted threshold is set up using the sum of standard deviations of Wavelet coefficient in cA3 and weighted cDl. cA3 coefficients represent the voiced sound with low frequency and cDl coefficients represent the unvoiced sound with high frequency. From simulation results, it is demonstrated that the proposed algorithm improves SNR and MSE performance more than Wavelet transform and Wavelet packet transform does. Moreover, the reconstructed signals by the proposed algorithm resemble the original signal in terms of plosive sound, fricative sound and affricate sound but Wavelet transform and Wavelet packet transform reduce those sounds seriously.

  • PDF