• Title/Summary/Keyword: 안전 설계

Search Result 7,737, Processing Time 0.045 seconds

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

Psychological benefits of bench-step aerobics program in overweight or obese adult women: its effects on anger, exercise self-efficacy, exercise-related affect, and body image (과체중 및 비만 성인 여성 대상 스텝운동 프로그램의 심리적 효과: 분노, 운동관련 자기 효능감, 운동관련 정서 및 신체상에 미치는 효과)

  • Lee, Mi-Ra;Kim, Wan-Soo
    • Korean Journal of Health Education and Promotion
    • /
    • v.24 no.5
    • /
    • pp.119-135
    • /
    • 2007
  • Objectives: The efficacy, feasibility, and safety of bench-step aerobics (BSA) program in overweight or obese Korean adult women have been implied. However, there has been almost no evidence for its psychological benefits. As such, the purpose of this study was to investigate the psychological benefits of BSA program in overweight or obese (body mass index ${\geq}\;23\;kg/m^2$) Korean adult women. Method: Anger, exercise self-efficacy, exercise-related affect, and body image of overweight or obese women who participated in a 12-week BSA program (n=15) were compared with those of their counterparts in the control group (n=13). Subjects were selected among public health center visitors and those recruited by putting an advertisement in local newspapers and the public health center homepage. Data from the exercise and control groups were collected before and after the 12-week BSA program (from August to November in 2006) at the public health centers. The exercise program consisted of 45 to 60 min moderate-intensity (40/50 to 50/60% of their hear rate reserve) BSA performed for 3 days a week. Results: After the BSA program, body image of the subjects in the exercise group was significantly improved and there was a significant difference between the exercise and control groups. Anger, exercise self-efficacy, and exercise-related affect were improved after the BSA program but the changes did not reach the level of statistical significance and there were no significant differences between the exercise and control groups. Conclusions: In conclusion, BSA appears to significantly enhance body image in overweight or obese Korean adult women but its effects on anger, exercise self-efficacy, and exercise-related affect do not appear to be statistically significant. Further studies involving different subjects, particularly whose levels of anger are high or whose levels of exercise-related affect are low to exclude the influence of the ceiling or floor effect, are warranted in a randomized controlled design.

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

Three-Dimensional Limit Equilibrium Stability Analysis of Spile-Reinforced Shallow Tunnel

    • Geotechnical Engineering
    • /
    • v.13 no.3
    • /
    • pp.101-122
    • /
    • 1997
  • A spiting reinforcement system is composed of a series of radially installed reinforcing spites along the perimeter of the tunnel opening ahead of excavation. The reinforcing spill network is extended into the in-situ soil mass both radially and longitudinally The sailing reinforcement system has been successfully used for the construction of underground openings to reinforce weak rock formations on several occasions. The application of this spiting reinforcement system is currently extended to soft ground tunneling in limited occasions because of lack of reliable analysis and design methods. A method of threetimensional limit equilibrium stability analysis of the smile-reinforced shallow tunnel in soft ground is presented. The shape of the potential failure wedge for the case of smile-reinforced shallow tunnel is assumed on the basis of the results of three dimensional finite element analyses. A criterion to differentiate the spill-reinforced shallow tunnel from the smile-reinforced deep tunnel is also formulated, where the tunnel depth, soil type, geometry of the tunnel and reinforcing spites, together with soil arching effects, are considered. To examine the suitability of the proposed method of threedimensional stability analysis in practice, overall stability of the spill-reinforced shallow tunnel at facing is evaluated, and the predicted safety factors are compared with results from twotimensional analyses. Using the proposed method of threetimensional limit equilibrium stability analysis of the smile-reinforced shallow tunnel in soft ground, a parametric study is also made to investigate the effects of various design parameters such as tunnel depth, smile length and wadial spill spacing. With slight modifications the analytical method of threeiimensional stability analysis proposed may also be extended for the analysis and design of steel pipe reinforced multi -step grouting technique frequently used as a supplementary reinforcing method in soft ground tunnel construction.

  • PDF

Alternative Concept to Enhance the Disposal Efficiency for CANDU Spent Fuel Disposal System (CANDU 사용후핵연료 처분시스템 효율향상 개념 도출)

  • Lee, Jong-Youl;Cho, Dong-Geun;Kook, Dong-Hak;Lee, Min-Soo;Choi, Heui-Joo
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.9 no.3
    • /
    • pp.169-179
    • /
    • 2011
  • There are two types of nuclear reactors in Korea and they are PWR type and CANDU type. The safe management of the spent fuels from these reactors is very important factor to maintain the sustainable energy supply with nuclear power plant. In Korea, a reference disposal system for the spent fuels has been developed through a study on the direct disposal of the PWR and CANDU spent fuel. Recently, the research on the demonstration and the efficiency analyses of the disposal system has been performed to make the disposal system safer and more economic. PWR spent fuels which include a lot of reusable material can be considered being recycled and a study on the disposal of HLW from this recycling process is being performed. CANDU spent fuels are considered being disposed of directly in deep geological formation, since they have little reusable material. In this study, based on the Korean Reference spent fuel disposal System (KRS) which was to dispose of both PWR type and CANDU type, the more effective CANDU spent fuel disposal systems were developed. To do this, the disposal canister for CANDU spent fuels was modified to hold the storage basket for 60 bundles which is used in nuclear power plant. With these modified disposal canister concepts, the disposal concepts to meet the thermal requirement that the temperature of the buffer materials should not be over $100^{\circ}C$ were developed. These disposal concepts were reviewed and analyzed in terms of disposal effective factors which were thermal effectiveness, U-density, disposal area, excavation volume, material volume etc. and the most effective concept was proposed. The results of this study will be used in the development of various wastes disposal system together with the HLW wastes from the PWR spent fuel recycling process.

Analysis of Knowledge and Competency for the Fourth Industrial Revolution Based on Anderson's Revision of Bloom's Taxonomy: Focused on Achievement Standard in the 2015 revised Practical Arts(Technology·Home Economics) (Bloom의 신교육목표 분류체계에 기초한 4차 산업혁명 시대에 요구하는 지식과 역량 분석: 2015 개정 실과(기술·가정) 교육과정의 가정과 성취기준을 대상으로)

  • Yang, Ji Sun;Lee, Gyeong Suk
    • Journal of Korean Home Economics Education Association
    • /
    • v.30 no.3
    • /
    • pp.129-149
    • /
    • 2018
  • This study has attempted to analyze the achievement standards in the 2015 revised curriculum, based on the revision of Bloom's Taxonomy and aims to identify the knowledge and required competencies in the fourth industrial era. The results of this study are as follows: First, the knowledge dimensions was the highest 'metacognitive knowledge' in middle school, while 'factual knowledge' was the highest in high school, and 'knowledge of specific details and elements' was the highest subtype of all of the knowledge dimensions. The dimensions of the cognitive process, such as the terms 'apply' and 'analyze' in middle school, as 'understand' and 'evaluate' in high school have been treated inattentively. Second, the knowledge dimension and the cognitive process dimension according to key concepts display the metacognitive knowledge and 'understand' in development, the conceptual knowledge and 'understand' in relationship. While the 'metacognitive knowledge' and 'apply' in life culture, the 'procedural knowledge' and 'evaluate' in safety, the 'factual knowledge' and 'apply' in management and the 'metacognitive knowledge' and 'understand' in life design were extremely high. Third, the verbs used in the achievement standards displayed as 'explore', 'understand', 'analyze', 'practice', 'suggest', 'recognize' and 'evaluate'. Since the statement of the action verb is the very basis for determining the performance process, specific competencies may be achieved by reflecting on the actual achievement standards. These standards should provide us with a effective cognitive process for to understand a learner's performance skills and support the direction of the education required, through a strategy that refines the connection between content elements and functions and develop their competences for the future.

Relationship between Compressive Strength and Dynamic Modulus of Elasticity in the Cement Based Solid Product for Consolidating Disposal of Medium-Low Level Radioactive Waste (중·저준위 방사성 폐기물 처리용 시멘트 고화체의 압축강도와 동탄성계수의 관계)

  • Kim, Jin-Man;Jeong, Ji-Yong;Choi, Ji-Ho;Shin, Sang-Chul
    • Journal of the Korea Concrete Institute
    • /
    • v.25 no.3
    • /
    • pp.321-329
    • /
    • 2013
  • Recently, the medium-low level radioactive waste from nuclear power plant must be transported from temporary storage to the final repository. Medium-low level radioactive waste, which is composed mainly of the liquid ion exchange resin, has been consolidated with cementitious material in the plastic or iron container. Since cementitious material is brittle, it would generate cracks by impact load during transportation, signifying leakage of radioactive ray. In order to design the safety transporting equipment, there is a need to check the compressive strength of the current waste. However, because it is impossible to measure strength by direct method due to leakage of radioactive ray, we will estimate the strength indirectly by the dynamic modulus of elasticity. Therefore, it must be identified the relationship between of strength and dynamic modulus of elasticity. According to the waste acceptance criteria, the compressive strength of cement based solid is defined as more than 3.44 MPa (500 psi). Compressive strength of the present solid is likely to be significantly higher than this baseline because of continuous hydration of cement during long period. On this background, we have tried to produce the specimens of the 28 day's compressive strength of 3 to 30 MPa having the same material composition as the solid product for the medium-low level radioactive waste, and analyze the relationship between the strength and the dynamic modulus of elasticity. By controling the addition rates of AE agent, we made the mixture containing the ion exchange resin and showing the target compressive strength (3~30 MPa). The dynamic modulus of elasticity of this mixtures is 4.1~10.2 GPa, about 20 GPa lower in the equivalent compressive strength level than that of ordinary concrete, and increasing the discrepancy according to increase strength. The compressive strength and the dynamic modulus of elasticity show the liner relationship.

Stability Analysis of Open Pit Slopes in the Pasir Coal Field, Indonesia (인도네시아 Pasir 탄전에서의 노천채탄장 사면의 안정성 해석)

  • 정소걸;선우춘;한공창;신희순;박연준
    • Tunnel and Underground Space
    • /
    • v.10 no.3
    • /
    • pp.430-440
    • /
    • 2000
  • A series of studies such as geological logging data analysis, detailed geological survey, rock mass evaluation, in-situ and laboratory tests, rock strength and mechanical properties of the rock were concerned. The stability of the slope were carried out inorder to design the pit slope and individual benches using the stereographic projection analysis and numerical methods in Roto Pit of Pasir coal field. The bedding plane was one of the major discontinuities in the Roto Pit and the dip of which is about 60$^{\circ}$ in the northern part and 83$^{\circ}$ in the southern part. The dip of bedding becomes steeper from north to south. The plane and toppling failures are presented in many slopes. In laboratory test the average uniaxial compressive strength of mudstone was 9MPa and that of weak sandstone was 10MPa. In-situ test showed that the rocks of Roto north mining area are mostly weak enough to be classified in grade from R2(weak) to R3(medium strong weak) and the coal is classified in grades from R1(Very weak) to R2(Weak). The detailed stability analysis were carried out on 4 areas of Roto north (east, west, south and north), and 2 areas of Roto south(east and west). In this paper, the minimum factor of safety was set to 1.2 which is a general criterion for open pit mines. Using the stereographic projection analysis and the limit equilibrium method, slope angles were calculated as 30∼36$^{\circ}$ for a factor of safety greater than 1.2. Then these results were re-evaluated by numerical analysis using FLAC. The final slope angles were determined by rational described above. A final slope of 34 degrees can guarantee the stability for the eastern part of the Roto north area, 33 degrees for the western part, 35 degrees for the northern part and 35 degrees for the southern part. For the Roto south area, 36 degrees was suggested for both sides of the pit. Once the pit slope is designed based on the stability analysis and the safety measures, the stability of slope should be checked periodically during the mining operations. Because the slope face will be exposed long time to the rain fall, a study such aspreventive measures against weathering and erosion is highly recommended to be implemented.

  • PDF

Experimental Design of S box and G function strong with attacks in SEED-type cipher (SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적 설계)

  • 박창수;송홍복;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.123-136
    • /
    • 2004
  • In this paper, complexity and regularity of polynomial multiplication over $GF({2^n})$ are defined by using Hamming weight of rows and columns of the matrix ever GF(2) which represents polynomial multiplication. It is shown experimentally that in order to construct the block cipher robust against differential cryptanalysis, polynomial multiplication of substitution layer and the permutation layer should have high complexity and high regularity. With result of the experiment, a way of constituting S box and G function is suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with a nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over $GF({2^8})$ which has neither a fixed pout, whose input and output are the same except 0 and 1, nor an opposite fixed number, whose output is one`s complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes linear transform with 4 S-box outputs using the matrix of 4${\times}$4 over $GF({2^8})$. The components in the matrix of linear transformation have high complexity and high regularity. Furthermore, G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, and there can be no weak input where a fixed point an opposite fixed point, and output can be two`s complement of input. The primitive polynomials of nonlinear function affine transform and linear transformation are different each other. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

Calcium Removal from Effluent of Electronics Wastewater Using Hydrodynamic Cavitation Technology (수리동력학적 캐비테이션을 이용한 전자폐수 처리수에 함유된 칼슘저감에 관한 연구)

  • Park, Jin-Young;Kim, Sun-Jip;Lee, Yong-Woo;Lee, Jae-Jin;Hwang, Kyu-Won;Lee, Won-Kwon
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.29 no.6
    • /
    • pp.715-721
    • /
    • 2007
  • Residual calcium concentration is high, in general, at the effluent of the fluoride removal process in the electronics industry manufacturing semiconductor and LCD. To increase the stability of the membrane process incorporated for reuse of wastewater, the residual calcium is required to be pre-removed. Hyperkinetic Vortex Crystallization(HVC) process was installed in the electronics industry manufecturing semi conductor as a pilot scale for accelerating calcification of calcium ion. Compared to the conventional soda ash method, the 31% higher calcium removal efficiency was achieved when HVC was applied at the same sodium carbonate dosage. In order to maintain the economic calcium removal target of 70% preset by manufacturer, the dosing concentration of the soda ash was 530 mg/L based on influent flowrate. The seed concentration in the reactor was one of the critical factors and should be maintained in the range of $800\sim1,200mg$ SS/L to maximize the calcium removal efficiency. The calcite production rate was 0.30 g SS/g $Na_2CO_3$ in the average. The economic HVC passing time of the mixture was in the range of $2\sim5$ times. Relatively, stable calcium concentration was maintained in the range of $30\sim72$ mg/L(average 49 mg/L) although the calcium concentration in the feed was severely fluctuated with $74\sim359$ mg/L(average 173 mg/L). The HVC process was characterized as environment-friendly technology reducing chemical dosage and chemical sludge production and minimizing maintenance cost.