• Title/Summary/Keyword: 이용분야별

Search Result 16,007, Processing Time 0.046 seconds

Availability Assessment of Single Frequency Multi-GNSS Real Time Positioning with the RTCM-State Space Representation Parameters (RTCM-SSR 보정요소 기반 1주파 Multi-GNSS 실시간 측위의 효용성 평가)

  • Lee, Yong-Chang;Oh, Seong-Jong
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.1
    • /
    • pp.107-123
    • /
    • 2020
  • With stabilization of the recent multi-GNSS infrastructure, and as multi-GNSS has been proven to be effective in improving the accuracy of the positioning performance in various industrial sectors. In this study, in view that SF(Single frequency) GNSS receivers are widely used due to the low costs, evaluate effectiveness of SF Real Time Point Positioning(SF-RT-PP) based on four multi-GNSS surveying methods with RTCM-SSR correction streams in static and kinematic modes, and also derive response challenges. Results of applying SSR correction streams, CNES presented good results compared to other SSR streams in 2D coordinate. Looking at the results of the SF-RT-PP surveying using SF signals from multi-GNSS, were able to identify the common cause of large deviations in the altitude components, as well as confirm the importance of signal bias correction according to combinations of different types of satellite signals and ionospheric delay compensation algorithm using undifferenced and uncombined observations. In addition, confirmed that the improvement of the infrastructure of Multi-GNSS allows SF-RT-SPP surveying with only one of the four GNSS satellites. In particular, in the case of code-based SF-RT-SPP measurements using SF signals from GPS satellites only, the difference in the application effect between broadcast ephemeris and SSR correction for satellite orbits/clocks was small, but in the case of ionospheric delay compensation, the use of SBAS correction information provided more than twice the accuracy compared to result of the Klobuchar model. With GPS and GLONASS, both the BDS and GALILEO constellations will be fully deployed in the end of 2020, and the greater benefits from the multi-GNSS integration can be expected. Specially, If RT-ionospheric correction services reflecting regional characteristics and SSR correction information reflecting atmospheric characteristics are carried out in real-time, expected that the utilization of SF-RT-PPP survey technology by multi-GNSS and various demands will be created in various industrial sectors.

Effect of Alkaline Ionized Water on Stabilization of Antioxidation, Antithrombosis and Antibacterial Activities (항산화, 항혈전 및 항세균 활성의 안정화에 미치는 알칼리 이온수의 영향)

  • Ahn, Seon-Mi;Kang, Mee-A;Kim, Moo-In;Sohn, Ho-Yong
    • Journal of Life Science
    • /
    • v.20 no.7
    • /
    • pp.1107-1112
    • /
    • 2010
  • In this study, the stable maintenance of bioactivity in alkaline ionized water (AIW) and antibacterial effects of AIW were evaluated to confirm benefits of AIW. As controls, purified water (PW) and tap drinking water (DW) were used. The pH and ORP (oxidation-reduction potential) of AIW, PW and DW used were 9.5 and 120 mV, 7.2 and 144 mV, and 7.3 and 564 mV, respectively. High level of minerals was observed in DW (DW>AIW>PW of mineral contents). Concentrations of $Ca^{++}$ and $Na^+$ in DW were 14.5, and 8.4 mg/l, respectively, while no $Ca^{++}$, $Mg^{++}$, $K^+$, and $Na^+$ were detected in PW. Evaluation of antioxidant activities for AIW, PW and DW showed that the waters did not act as antioxidants. However, the DPPH (1,1-diphenyl-2-picryl hydrazyl) or superoxide radical scavenging activities or reducing power of vitamin C were stably maintained in AIW and PW, though not in DW, against heat treatment ($60^{\circ}C$) or vigorous shaking (120 rpm) at $37^{\circ}C$. Similarly, after aspirin treatment at $60^{\circ}C$ for 1 hr, the antithrombosis activity in PW and AIW was 62.6% and 55.3%, while that of DW was 52.1%. Furthermore, cell growth analysis and viable cell count of Escherichia coli H7:O157 in PW, AIW and DW showed that AIW and DW, not DW, have antibacterial activities. Our results suggest that the state of water, for example pH, ORP and mineral contents of water, should be considered in medicine or food industries, and that AIW has high potential for utilization in various fields.

수학적 창의성과 개방형 문제(open ended problem)

  • Gwon, O-Nam;Jo, Yeong-Mi;Park, Jeong-Suk;Park, Ji-Hyeon;Kim, Yeong-Sil
    • Communications of Mathematical Education
    • /
    • v.16
    • /
    • pp.217-218
    • /
    • 2003
  • 제7차 교육과정의 기본방향인 '21세기의 세계화 정보화 시대를 주도할 자율적이고 창의적인 한국인 육성'에서 볼 수 있듯이, 새로운 교육과정에서는 학생들의 창의력을 신장시키기 위한 방안으로 교과별 교육과정이나 재량활동 운영 등을 제시한 바 있다. 수학교육에서도 이러한 시대적 흐름에 발맞추어 수학적 창의력의 신장이 강조되고 있는 상황이다. 그동안 이론적인 측면과 실제적인 측면에서 수학적 창의성에 대한 성과가 축적되었다. 이론적인 측면에서 볼 때, Haylock(1987)등에 의해 창의력과 수학적 창의력의 구분되었으며, 특히 '수학적' 창의력에 대한 다양한 정의가 제안되었다. 실제적인 측면에서도 수학적 창의력을 측정하려는 평가 도구들이 그 동안 여러 가지로 개발하였다. 그러나, 이러한 수학적 창의력에 관한 전반적인 연구는 종국적으로 교실 수학수업에 반영되어야 함에도 불구하고, 그리 만족스럽지 못한 상황이다. 특히, 교실에서 수학수업을 실제로 담당하는 교사들이 수학적 창의력을 위한 수업을 하고자 하더라도 당장 가까이에서 구할 수 있는 교수 학습 자료가 여전히 부족한 상황이다. 물론 그 동안 교실 수학수업에서 사용할 수 있는 창의력 개발 프로그램이 전무한 것은 아니다. 그런데 그들 대부분은 게임이나 퍼즐을 이용한 것으로 그 수준이 단순 흥미유발에 그치고 있거나 소수의 영재아를 위한 소재를 중심으로, 특히 수학적 사고 과정을 따르기보다는, 시행착오를 거쳐 원하는 결과를 얻을 가능성이 많으며, 수학과의 연계성이 불분명한 채로 단순놀이에 그치는 경우가 적지 않아, 수업과 연관되어 창의력의 신장이라는 측면에서 볼 때, 적용하기 어려운 사례가 많다. 이러한 상황을 개선하는 데 기여하고자, 현재 교과교육공동연구 지원사업의 하나로 한국 학술 진흥재단의 지원을 받아, '개방형 문제(open-ended problems)'를 중심 소재로 한 '수학적 창의성'을 신장하기 위한 교수학습 프로그램을 개발하여, 중학교 1학년을 대상으로 연구를 진행하고 있다. 개방형 문제라 함은 명백한 정의가 어렵지만 Pehkeon(1995)는 개방형문제의 정의를 명백히 하기위한 시도로서 그 반대로 닫힌 문제에 대한 정의로부터 시작하여, 어떤 문제가 닫혀있다고 하는 것은 그 문제의 출발 상황과 목표 상황이 닫혀 있는 것, 즉 명백히 설명되어있을 때라면 개방형 문제는 이와 반대의 개념임을 시사하였다. Silver(1995)는 개방형 문제를 문제 자체가 다른 해석이 가능하거나 서로 다를 인정할만한 답을 가질 수 있는 문제 또는 풀이과정이 다양한 문제, 자연스럽게 다른 문제들을 제안하거나 일반화를 제시할 수 있는 문제라고 정의하였다. 따라서 개방형 문제란 출발상황이나 목표 상황의 일부가 닫혀있지 않을 때를 말하고 문제의 조건을 만족하는 해답이 여러 가지로 존재하는 문제를 뜻한다. 수학적 창의력을 개발하는 데, 다른 문제 유형보다도, 개방형 문제가 유리하다는 점은 이미 여러 학자들에 의해 주장되어왔다. 미국 국립영재교육센터(NRCG/T)는 기존의 사지선다형이나 단답형 문제와 질문들은 학생들의 사고 능력에 관한 정보를 거의 알려주지 못하기 때문에 한 가지 이상의 답을 요구하는 ‘open-ended' 또는 ’open-response' 문제와 질문을 가지고 수학 분야에서의 창의적 사고 능력과 표현능력을 측정해야 한다고 하였고, 개방형 문제가 일반적으로 정답이 하나인 문제보다 고차원적인 사고를 요구하게 하는 문제 형태라고 하였다. 본 연구에서는 이러한 근거를 바탕으로 개방형 문제의 유형을 다양한 답이 존재하는 문제, 다양한 해결 전략이 가능한 문제, 답이 없는 문제, 문제 만들기, 일반화가 가능한 문제 등으로 보고, 수학적 창의성 중 특히 확산적 사고에 초점을 맞추어 개방형 문제가 확산적 사고의 요소인 유창성, 독창성, 유연성 등에 각각 어떤 영향을 미치는지 20주의 프로그램을 개발, 진행하여 그 효과를 검증하고자 한다. 개방형 문제를 활용한 수학적 창의력 신장 프로그램을 개발하고 현장 학교에 실험 적용하여 그 효과를 분석하고자 하는 본 연구는 창의력 신장에 비중을 두는 수학과 교수-학습 과정에 실제적인 교수 학습 자료를 제공하는 것뿐만 아니라 교사들에게는 수학교실에서 사용 가능한 실제적인 활용방안을, 학생들에게는 주어진 문제를 여러 가지 각도에서 생각하면서 다양한 사고를 경험하는 기회를 가질 수 있어, 수학을 보는 학생들의 태도에도 긍정적인 변화를 가져올 수 있을 것이라 기대한다.

  • PDF

Plant Hardiness Zone Mapping Based on a Combined Risk Analysis Using Dormancy Depth Index and Low Temperature Extremes - A Case Study with "Campbell Early" Grapevine - (최저기온과 휴면심도 기반의 동해위험도를 활용한 'Campbell Early' 포도의 내동성 지도 제작)

  • Chung, U-Ran;Kim, Soo-Ock;Yun, Jin-I.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.10 no.4
    • /
    • pp.121-131
    • /
    • 2008
  • This study was conducted to delineate temporal and spatial patterns of potential risk of cold injury by combining the short-term cold hardiness of Campbell Early grapevine and the IPCC projected climate winter season minimum temperature at a landscape scale. Gridded data sets of daily maximum and minimum temperature with a 270m cell spacing ("High Definition Digital Temperature Map", HD-DTM) were prepared for the current climatological normal year (1971-2000) based on observations at the 56 Korea Meteorological Administration (KMA) stations using a geospatial interpolation scheme for correcting land surface effects (e.g., land use, topography, and elevation). The same procedure was applied to the official temperature projection dataset covering South Korea (under the auspices of the IPCC-SRES A2 and A1B scenarios) for 2071-2100. The dormancy depth model was run with the gridded datasets to estimate the geographical pattern of any changes in the short-term cold hardiness of Campbell Early across South Korea for the current and future normal years (1971-2000 and 2071-2100). We combined this result with the projected mean annual minimum temperature for each period to obtain the potential risk of cold injury. Results showed that both the land areas with the normal cold-hardiness (-150 and below for dormancy depth) and those with the sub-threshold temperature for freezing damage ($-15^{\circ}C$ and below) will decrease in 2071-2100, reducing the freezing risk. Although more land area will encounter less risk in the future, the land area with higher risk (>70%) will expand from 14% at the current normal year to 23 (A1B) ${\sim}5%$ (A2) in the future. Our method can be applied to other deciduous fruit trees for delineating geographical shift of cold-hardiness zone under the projected climate change in the future, thereby providing valuable information for adaptation strategy in fruit industry.

Effects of ionizing and ultraviolet radiation on microbial mutation and DNA damage (전리방사선 및 자외선의 미생물 돌연변이와 DNA 손상에 대한 영향)

  • Nam, Ji-Hyun;Shin, Ji-Hye;Lee, Jung-Yun;Lee, Dong-Hun
    • Korean Journal of Microbiology
    • /
    • v.53 no.1
    • /
    • pp.20-28
    • /
    • 2017
  • Physical sterilization methods using ultraviolet radiation and ionizing radiation such as gamma ray and electron beam are applied in various industry fields due to disinfection effects and economic efficiency but may also cause microbial mutation. In this research, Salmonella enterica and Escherichia coli strains were treated with ionizing and ultraviolet radiation and their survival rate, mutation rate, and DNA damage were studied to evaluate the genetic safety. The survival rate of the strains decreased drastically as the irradiation dose of ultraviolet ray, gamma ray, and electron beam increased, and over 90% of the strain was exterminated at a dosage of $0.40{\sim}25.06mJ/cm^3$, 0.11~0.22 kGy, 0.14~0.53 kGy respectively. In SOS / umu-test, genotoxicity causing DNA damage was identified in all samples. In Ames test, back-mutation rate increased to $3.82{\times}10^{-4}$ and $9.84{\times}10^{-6}$ respectively when exposed to ultraviolet ray and gamma ray. At exposure to ultraviolet ray, gamma ray, and electron beam with dosage of over 99.99% extinction rate of S. enterica TA100, back-mutation rate increased 347 times, 220 times, 0.6 times respectively to the spontaneous back-mutation rate. Rifampicin resistance mutation rate of E. coli CSH100 exposed to ultraviolet ray, gamma ray, and electron beam was $2.46{\times}10^{-6}$, $1.66{\times}10^{-6}$, $4.12{\times}10^{-7}$ respectively. Therefore, gamma radiation is effective in microorganism control from the perspective of disinfection and electron beam has the advantage of sterilizing with little DNA damage and bacterial mutation.

A study on the Curriculum Perspectives of Secondary School Home Economics Teachers and the Home Economics Teacher Efficacy (기술.가정(실과) 교사의 교육과정 관점과 교사 효능감에 관한 연구 - 가정 분야를 중심으로 -)

  • Choi, You-Jung;Chae, Jung-Hyun;Park, Mi-Jeong
    • Journal of Korean Home Economics Education Association
    • /
    • v.21 no.1
    • /
    • pp.89-106
    • /
    • 2009
  • The purpose of this study was to investigate the perspectives on curriculum of secondary school home economics(HE) teachers, the HE teacher efficacy level, and the correlation between their perspectives on HE curriculum and the HE teacher efficacy. A questionnaire survey was carried out to the 500 HE teachers from middle and high schools across the nation, 215 questionnaires were used in the final analysis. The findings of this study were as follows: First, most of HE teachers had the biggest interest in interpretative perspective and some teachers had a interest in critical perspective. On the other hand, a few teachers only had a interest in technical curriculum perspective. Second, HE teachers who worked in the big cities tended to be more interested in interpretative perspective than those who worked in small cities. HE teachers from 25 to 40 years olds tended to be more interested in critical perspective than those who were more than 50 years old. Also, HE teachers with less than 15 years of experience tended to be more interested in critical perspective than those who had worked for more than 15 years. Third, the average of the HE teacher efficacy level was 3.69. The efficacy level of studying support was the highest. Then came class support, environment support, instruction strategy, and demands alternation in order. Fourth, there was moderate correlation between the interpretative perspective on curriculum of middle and high school HE teachers and teacher efficacy level in comparison with other curriculum perspectives.

  • PDF

Proposal on the Creation of a New Space Organization for the Moon and Celestial Bodies' Exploitation (달과 천체 개발을 위한 새로운 우주기구의 창설에 관한 제안)

  • Kim, Doo-Hwan
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.1
    • /
    • pp.161-198
    • /
    • 2014
  • The idea of creating an International Space Exploitation Agency (tentative title: hereinafter referred to ISEA) is only my academic and theoretical opinion. It is necessary for us to establish ISEA as an international organization for the efficient and rapid exploitation of natural resources in the moon and other celestial bodies. The creation of ISEA as a new international organization is based on the Article 11, 5 and Article 18 of the 1979 Moon Agreement. In order to create it as a preliminary procedure, it needs to make the Draft for the Convention on the Establishment an ISEA among the space-faring countries. The main contents of this paper is composed of (1) introduction, (2) joint exploitation of the natural resources (Heliumn-3, etc.) in the moon and ISEA, (3) activities for the exploitation of moon and other celestial bodies by the space-faring powers, (4) legal problems and Solution for the exploitation and mining rights of the natural resources in the moon, mars and celestial bodies, (5) procedure of creating an ISEA, (6) the principal points that need to be included in the draft for the ISEA convention, (7) conclusion. The creation of an ISEA would lead to a strengthening of the cooperation among the States deemed essential by the global community towards joint undertakings in space and would act as a catalyst for the efforts on the exploitation of the natural resources moon, mars, Venus, Mercury and other celestial bodies and allow resources, technology, manpower and finances to be centrally managed in an independent fashion to the benefit of the space-faring countries. It is desirable and necessary for us to create ISEA in order to promote cooperation in the field of space policy, law, science technology and industry etc. among the space-faring countries. The creation of the ISEA will be promoted the international cooperation among the space-faring countries in exploration and exploitations of the natural resources in the moon, Mars, Venus, Mercury and other celestial bodies. Finally, it should be noted that the political drive will be necessary not only to set up the organization ISEA, but also study a subsequent measures. It is also necessary for us to create the ISEA in order to develop the space industry, to strengthen friendly relations and to promote research cooperation among the space-faring countries based on the new ideology and creative ideas. If the heads (president or prime minister) of the space super-powers including the UNCOPUOS will be agreed to establish ISEA at a summit conference, 1 believe that it is possible to establish an ISEA in the near future.

The Effect of Patent Citation Relationship on Business Performance : A Social Network Analysis Perspective (특허 인용 관계가 기업 성과에 미치는 영향 : 소셜네트워크분석 관점)

  • Park, Jun Hyung;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.127-139
    • /
    • 2013
  • With an advent of recent knowledge-based society, the interest in intellectual property has increased. Firms have tired to result in productive outcomes through continuous innovative activity. Especially, ICT firms which lead high-tech industry have tried to manage intellectual property more systematically. Firm's interest in the patent has increased in order to manage the innovative activity and Knowledge property. The patent involves not only simple information but also important values as information of technology, management and right. Moreover, as the patent has the detailed contents regarding technology development activity, it is regarded as valuable data. The patent which reflects technology spread and research outcomes and business performances are closely interrelated as the patent is considered as a significant the level of firm's innovation. As the patent information which represents companies' intellectual capital is accumulated continuously, it has become possible to do quantitative analysis. The advantages of patent in the related industry information and it's standardize information can be easily obtained. Through the patent, the flow of knowledge can be determined. The patent information can analyze in various levels from patent to nation. The patent information is used to analyze technical status and the effects on performance. The patent which has a high frequency of citation refers to having high technological values. Analyzing the patent information contains both citation index analysis using the number of citation and network analysis using citation relationship. Network analysis can provide the information on the flows of knowledge and technological changes, and it can show future research direction. Studies using the patent citation analysis vary academically and practically. For the citation index research, studies to analyze influential big patent has been conducted, and for the network analysis research, studies to find out the flows of technology in a certain industry has been conducted. Social network analysis is applied not only in the sociology, but also in a field of management consulting and company's knowledge management. Research of how the company's network position has an impact on business performances has been conducted from various aspects in a field of network analysis. Social network analysis can be based on the visual forms. Network indicators are available through the quantitative analysis. Social network analysis is used when analyzing outcomes in terms of the position of network. Social network analysis focuses largely on centrality and structural holes. Centrality indicates that actors having central positions among other actors have an advantage to exert stronger influence for exchange relationship. Degree centrality, betweenness centrality and closeness centrality are used for centrality analysis. Structural holes refer to an empty place in social structure and are defined as efficiency and constraints. This study stresses and analyzes firms' network in terms of the patent and how network characteristics have an influence on business performances. For the purpose of doing this, seventy-four ICT companies listed in S&P500 are chosen for the sample. UCINET6 is used to analyze the network structural characteristics such as outdegree centrality, betweenness centrality and efficiency. Then, regression analysis test is conducted to find out how these network characteristics are related to business performance. It is found that each network index has significant impacts on net income, i.e. business performance. However, it is found that efficiency is negatively associated with business performance. As the efficiency increases, net income decreases and it has a negative impact on business performances. Furthermore, it is shown that betweenness centrality solely has statistically significance for the multiple regression analysis with three network indexes. The patent citation network analysis shows the flows of knowledge between firms, and it can be expected to contribute to company's management strategies by analyzing company's network structural positions.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.