• Title/Summary/Keyword: 식별방법

Search Result 2,309, Processing Time 0.03 seconds

Household Patterns in Early 18th - Century Korea -A Study Based on the Triinnial Household Register Data of Danseong-Hyon, Kyongsang Province, 1720- (1720년도 단성현 호적대장자료를 통한 이조중기 가구형태 분석)

  • 이흥탁
    • Korea journal of population studies
    • /
    • v.13 no.2
    • /
    • pp.19-47
    • /
    • 1990
  • 1720년 경상도 단성진 진내면 소재의 390가구를 대상으로 1970년대 초 케임브리지 대학의 역사인구학 연구소에서 개발한 Laslett-Hammel가구 형태 분석법을 적용하여 본 결과 표9에서 제시된바와 같이 전체가구의 48.9%가 핵가족의 형태이며, 42.1 퍼센트가 대가족으로 밝혀지고 있다. 물론 도표3에서 지적되고 있듯이 5세이하의 인구에 대한 자료가 미비한 상태라 호적 자료만으로 당시의 가구 형태에 대한 정확한 분석이 어렵다고 하드라도 이제까지 일반적으로 믿어져 왔던 대가족 형태의 이조 중기의 종가제도나 일반 서민들의 가구 형태 및 유아가구에 대한 보다 구체적인 연구가 호적 자료에 대한 면밀한 분석으로 가능해질것으로 믿어진다. 역촌, 즉 하류계층의 사람들이 주로 많이 주거하였던 단성진 진내면의 전체 조사 대상 가구의 절반이 핵가족의 형태로 보이고 있는것은 당연한 것으로 받아질수 있겠으나 표6에서 나타내고 있듯이 상류계층에 속하는 양소계층의 경우도 평균 가구 규격 16명중에서 약 13명이 율거유아로 실제 가구의 크기는 가족 구성원수 4명을 넘지않는 핵가족의 형태였을 가능성이 짙음을 알수 있다. 한가지 특이할만한 사항은 상류,중류,그리고 하류 계층 다같이 평균 가족 구성원수가 4명을 넘지 않는다는 점이다. 단성진이 독촌들로 구성되어 있는 만큼 앞으로 상류계층이 밀집되어 있었던 경북 월성군의 양동 지역 향방 자료나 호적 초안자료를 단성진의 자료와 비교 분석함으로써 이조 중기의 가구 형태에 대한 보다 신뢰성 있는 결과를 도출해 낼수 이ㅛ는것이다. 단성진의 자료는 이조 중기의 유아 인구와 유아 가구 형태에 대한 연구에는 귀중한 자료로 앞으로 역사인구학의 방법론 개발에 큰 기여를 할것으로 기대된다.의 핑거를 식별, 추적할 수 있었다.는 경도방향의 해구수가 많았으며, 특히 8월은 1년중 경도방향의 분산이 가장 컸고, 어장중심은 5월에는 3888해구, 6월에는 3884해구, 7월에는 4078해구, 8월에는 4154해구, 9월에는 4146해구, 10월에는 4044해구였다. 3. 어획수온과 어획적수온은 5월에는 $14.0~18.5^{\circ}C,$ $15.0~16.0^{\circ}C,$ 6월에는 $13.5~18.5^{\circ}C,$ $14.5~16.0^{\circ}C,$ 7월에는 $14.0~20.0^{\circ}C,$ $14.5^{\circ}C,$ $19.0^{\circ}C,$ 8월에는 $16.0~21.5^{\circ}C,$ $18.0~20.0^{\circ}C,$ 9월에는 $14.5~22.0^{\circ}C,$ $17.0~18.5^{\circ}C,$ 10월 $14.0~18.0^{\circ}C,$ $16.0~17.0^{\circ}C였다.$ 4. 평균CPUE는 5월에는 3.2kg/sheet, 6월에는 4.5kg/sheet, 7월에는 4.3kg/sheet, 8월에는 5.1kg/sheet, 9월에는 6.4kg/sheet, 10월에는 5.8kg/sheet였다. 5. 한국정부의 1990년 북태평양 오징어 어업감시계획과 실제의 어장형성범위를 비교하면 5월에는 어장이 형성된 21개 해구 가운데 12개, 6월에는 24개 가운데 7개, 7월에는 25개 가운데 4개 해구에서

  • PDF

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

Fire Mechanism in Power Connection Points of Outlets and Suggestion of a New Identification Method (콘센트 전원 접속구 화재 발생 메커니즘 고찰과 새로운 감식 방법 제시)

  • Park, Jin-Young;Bang, Sun-Bae;Eun, Hee-Rim;Oh, Se-Hyeok;Lee, Yoo-Bin;Ko, Young-Ho
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.76-84
    • /
    • 2020
  • Most outlet fires occur around plug pins and plug pin receivers. However, no research has been conducted on ignitions at power connection points. This study confirms the possibility of ignition after incomplete connection, using a stranded wire, to the power connection point of an outlet. The experiment was divided into basic and reproducing experiments. The basic experiment confirmed the possibility of ignition according to the number of wire strands connected to the power connection point, and it identified the characteristics of the residue after the fire. In the reproducing experiment, lamps, vacuum cleaners, and heaters were connected to an outlet to check if the ignition at the connection advanced into a fire. The fire advanced due to the heat and arc generated at the connection point, and partial losses were identified in the U-type holder and clip. Accordingly, the results demonstrate that a fire may occur when the stranded wire is incompletely connected to the outlet. Moreover, it was confirmed that the cause of a fire can be determined based on the characteristics of the residue.

Possible Methods of Identifying Underground Cavities Using Seismic Waves (지진파를 이용한 지하 공동의 탐지 방법)

  • 김소구;마상윤;김지수
    • The Journal of Engineering Geology
    • /
    • v.6 no.3
    • /
    • pp.137-153
    • /
    • 1996
  • The purpose of this study is to investigate the possibilities of identifying and detecting underground cavities using seismic waves recorded by the fixed and mobile stations. During 18 months of field work we recorded chemical explosions near the Bongdarn station. Seismic Stations were installed on the free surface and underground inside the Samba mine. The seismograms at the fixed(lorg-term) seismic station show abrupt change of polarization characteristics which can he associated with the appearance of P-to-S converted phase(PS) at 150 ~ 200 msec after the first P arrival. This result indicates that converted phases are generated very near to the Bongdarn station at a depth of 190m. Shear-wave splitting phenomena have also been observeci The time delay between fast shear(fS) and slow shear(sS) waves ranges between 30 and 60 msec(average is 42 msec). However, exact time delay between the fast and the slow shear waves can not be accurately measured because of the very short time delay and limitation of sampling rate. Chemical explosion experiments were recorded at stations along various paths to contrast the seismic response of areas with and without cavities. The seismograms recorded at the stations installed at cavity areas show an abrupt change of polarization characteristics but not on the other stations. Seismic waves propagating through the cavity are characterized by the attenuation of high frequency waves and predominantly low frequency seismic waves after the S wave arrivals.

  • PDF

Application of Breed-specific DNA Markers for the use of Identifying Major Pure Pig Breeds Maintained in Korea (대한민국내 주요 돼지 품종의 순종 식별을 위한 품종특이 DNA marker의 활용)

  • Seo, B.Y.;Kim, J.H.;Park, E.W.;Lim, H.T.;Cho, I.C.;Kim, B.W.;Oh, S.J.;Cheong, I.C.;Lee, J.G.;Jeon, J.T.
    • Journal of Animal Science and Technology
    • /
    • v.46 no.5
    • /
    • pp.735-742
    • /
    • 2004
  • This study was conducted for the identification of pure Landrace, Large White and Duroc breeds which are mainly maintained in Korea using DNA markers. We used known KIT and MC1R mutations, which were related coat color in pigs, and pig mitochondrial DNA variations. The KIT mutation was used to distinguish white and colored animals. Duroc breed could be discriminated from other colored breeds using the MC1R mutation N121D. Discriminating Landrace and Large White was possible using the l l-bp duplication of D-Ioop region and alternative initiation codon of ND2. In conclusion, identification of Landrace, Large White and Duroc breeds was might be possible using the procedure designed in this study.

MPEG-21 Terminal (MPEG-21 터미널)

  • 손유미;박성준;김문철;김종남;박근수
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.410-426
    • /
    • 2003
  • MPEG-21 defines a digital item as an atomic unit lot creation, delivery and consumption in order to provide an integrated multimedia framework in networked environments. It is expected that MPEG-21 standardization makes it Possible for users to universally access user's preferred contents in their own way they want. In order to achieve this goal, MPEG-21 has standardized the specifications for the Digital Item Declaration (DID). Digital Identification (DII), Rights Expression Language (REL), Right Data Dictionary (RDD) and Digital Item Adaptation (DIA), and is standardizing the specifications for the Digital Item Processing (DIP), Persistent Association Technology (PAT) and Intellectual Property Management and Protection (IPMP) tot transparent and secured usage of multimedia. In this paper, we design an MPEG-21 terminal architecture based one the MPEG-21 standard with DID, DIA and DIP, and implement with the MPEG-21 terminal. We make a video summarization service scenario in order to validate ow proposed MPEG-21 terminal for the feasibility to of DID, DIA and DIP. Then we present a series of experimental results that digital items are processed as a specific form after adaptation fit for the characteristics of MPEG-21 terminal and are consumed with interoperability based on a PC and a PDA platform. It is believed that this paper has n important significance in the sense that we, for the first time, implement an MPEG-21 terminal which allows for a video summarization service application in an interoperable way for digital item adaptation and processing nth experimental results.

Field Application of RFID for the Cavity Maintenance of Under Pavement (도로하부 공동의 유지관리를 위한 RFID의 현장 적용성 평가)

  • Park, Jeong Jun;Shin, Eun Chul;Kim, In Dae
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.4
    • /
    • pp.459-468
    • /
    • 2019
  • Purpose: The cavity exploration of the lower part of the road is carried out to prevent ground-sinking. However, the detected communities cannot be identified by the cavity location and history information, such as repackaging the pavement. Therefore, the field applicability of RFID systems was evaluated in this study to enable anyone to accurately identify information. Method: During temporary recovery, tag recognition distance and recognition rate were measured according to underground burial materials and telecommunication tubes using RFID systems with electronic tag chips attached to the bottom of the rubber cap. Result: The perceived distance and perceived rate of depth for each position of the electron tag did not significantly affect the depth up to 15cm, but it did have some effect if the depth was 20cm. In addition, water effects from nearby underground facilities and rainfall are relatively small, and the effects of wind will need to be considered during the weather conditions of the road. Conclusion: The RFID tags for field application of the pavement management system store various information such as location and size of cavity, identification date, cause of occurrence, and surrounding underground facilities to maximize cavity management effect with a system that can be computerized and mobile utilization.

A Study of the Selection of the Valuation Items of the Environmental Illumination Design for a Bridge (교량의 경관조명연출디자인 평가항목 도출에 관한 연구)

  • Cho, Hyun-Choul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.6
    • /
    • pp.22-30
    • /
    • 2004
  • It is an attempt to suggest the standard valuation method of the environmental illumination for the bridges across the Han-river from an aesthetic point of view, deviating from the technical and traditional viewpoint. In Korea the current evaluation criterion to verify the value of bridge design has a partiality for the technical and structural safety rather than the sentient beauty on the whole. However, the recently cultural reform of Korean mass society with the elevation of the standard of living forces the engineering designers for bridges to focus not only on competing physical structures but also on enhancing the formative beauty including the illumination effects for night view. Additionally, the new policy, which transforms the environments around the Han-river into the major tourist attractions has been executing strongly by the city authorities to revitalize the symbolic, historic, and cultural identity of the capital city with the introduction of the high-quality environmental illumination for the bridges. As a result, It becomes necessary to establish the manual and standardization of the environmental illumination planning for the city in terms of the formative beauty, and this study is to suggest the valuation model method of the environmental illumination for the bridges as the initial step of the standardization. In the study, the valuation items of the standard questionnaire are selected by the documentary records and the consultation of various experts in architecture, design, fine art, urban planning and even administration to verify the essential elements of the aesthetic beauty with the local amenity and the environmental harmony for the chosen bridges across the Han-river.

Control Networks for Information Systems Development : Organizational and Agency Theory Perspectives (조직 이론과 대리 이론 관점에서 본 정보시스템 개발의 통제 네트워크에 관한 연구)

  • Hong, Sa-Neung
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.71-90
    • /
    • 2012
  • Although it has been studied for a long time in various disciplines, most of control theories remain being developed by analyzing relatively simple tasks. Even recent research on control of information systems development explains only a small part of control phenomena observed in the real world projects. This research focuses on identifying and analyzing the concepts and structures in order to make them useful for understanding and explaining control of information systems development comprehensively This investigation utilizes the complementary relationship between views on control from organizational and economic perspectives. A conceptual framework developed by integrating previous research on control allows us to analyze the development of information systems for control purposes. The results of discussion about control mechanisms and network can be used as guidelines for designing control systems in real projects. Analysis of control networks shows that control of development projects requires quite complex networks intertwining a variety of controllers and controlees. The results of this research are expected to contribute to correcting the unbalanced status of IS research which has emphasized too heavily on planning and implementation, and deepening and widening our understanding about controlling development projects. Practitioners can use the results as guidelines for designing control mechanisms and networks, and get alerted by them about the agency risks inherent in outsourced developments.

Speech Activity Detection using Lip Movement Image Signals (입술 움직임 영상 선호를 이용한 음성 구간 검출)

  • Kim, Eung-Kyeu
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.289-297
    • /
    • 2010
  • In this paper, A method to prevent the external acoustic noise from being misrecognized as the speech recognition object is presented in the speech activity detection process for the speech recognition. Also this paper confirmed besides the acoustic energy to the lip movement image signals. First of all, the successive images are obtained through the image camera for personal computer and the lip movement whether or not is discriminated. The next, the lip movement image signal data is stored in the shared memory and shares with the speech recognition process. In the mean time, the acoustic energy whether or not by the utterance of a speaker is verified by confirming data stored in the shared memory in the speech activity detection process which is the preprocess phase of the speech recognition. Finally, as a experimental result of linking the speech recognition processor and the image processor, it is confirmed to be normal progression to the output of the speech recognition result if face to the image camera and speak. On the other hand, it is confirmed not to the output the result of the speech recognition if does not face to the image camera and speak. Also, the initial feature values under off-line are replaced by them. Similarly, the initial template image captured while off-line is replaced with a template image captured under on-line, so the discrimination of the lip movement image tracking is raised. An image processing test bed was implemented to confirm the lip movement image tracking process visually and to analyze the related parameters on a real-time basis. As a result of linking the speech and image processing system, the interworking rate shows 99.3% in the various illumination environments.