• Title/Summary/Keyword: 재작성

Search Result 767, Processing Time 0.029 seconds

A Study on Redesigning of School Library Facilities (학교도서관 시설 개선에 관한 연구)

  • 김병주
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.14 no.2
    • /
    • pp.141-158
    • /
    • 2003
  • The development of new technology and the change of educational environment are much influencing the primary and middle school education. The school library which is very important part of school education in order to perform its functions effectively and efficiently must be provided with professional staff, necessary resources and adequate facilities. It is necessary to redesign and renovate existing facilities to meet the growing needs of newly developed school library programs and to effectively manage and allocate physical space appropriately. The objective of this research is to study the theoretical background of the subject and to find out present conditions and future needs of school library facilities and environmental change in Korea through a predesigned questionnaire for a redesign proposal.

  • PDF

방사성폐기물 소각시설의 현황 및 안전지침

  • 박원재;이병수;이승행;김준형;서용칠
    • Nuclear Engineering and Technology
    • /
    • v.27 no.4
    • /
    • pp.603-618
    • /
    • 1995
  • 원자력 발전소 및 동위원소 사용기관에서 발생되는 가연성 고체 폐기물 및 유기폐액의 소각기술의 활용에 있어서 이의 안전성 확보를 위한 기술적 기준의 설정을 위한 고려인자들을 조사하였다. 국내외의 소각기술 활용현황을 알아보았고 본 기술의 국내 도입시 필요한 기술적 안전지침에 관한 외국의 사례를 조사하고 국내 관련 규정도 검토, 비교, 분석하여 주요 고려항목을 도출하였다. 안전성 확보를 위한 고려 항목을 크게 일반산업시설 적용항목, 원자력시설 상 안전조건, 소각시설의 기술적 요구사항, 기타 제반사항으로 나누어 제시할 수 있었다. 이들 내용은 기존 원자력 및 환경시설에 적용되는 안전성분석보고서 및 환경영향평가서로 작성될 수 있다고 보았으며 시설의 개요, 시설의 기술적 사항과 이에 따르는 안전을 위한 조건, 폐기물의 인수조건 등이 포함되며 기존 관련 법규의 적용 및 확인이 필요하였다. 기술적 사항에는 공정의 제염계수, 연소효율, 소각재의 형상, 배기가스의 방출농도, 작업자 및 인근주민의 피폭등이 확인되어야 하며 소각재의 처리방법 및 조건이 제시되어야 하고 소각재의 침출특성 등이 주요한 인자라고 보았다. 아울러 소각대상폐기물의 인수조건이 명시되어 소각성능에 따른 이의 안전성이 입증되어야 한다. 따라서 인허가 후 건설된 시설에서의 사용전 시험소각절차의 제시 및 이에 대한 관련 규제기관의 검사제도가 있어야 하며 품질보증절차 역시 관련지침에 따라 실시되어야 한다. 이와 같은 내용을 포함하는 안전기술지침의 설정이 절대적으로 필요하며 본 연구조사 결과의 활용이 기대된다.

  • PDF

An Artifact-sharing Method across Multiple Component-based Military Software Development Processes (컴포넌트 기반 국방 소프트웨어 개발 프로세스간 산출물 공유 기법)

  • Jo, Hye-Kyeong;Ko, In-Young;Lee, Jun-Ki;Park, Sung-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.28-32
    • /
    • 2007
  • RUP과 ADDMe는 국내 국방 도메인에서 가장 많이 사용되는 컴포넌트 기반 소프트웨어 개 프로세스이다. ADDMe는 RUP을 기반으로 만들어졌고 국방 컴포넌트 기반 소프트웨어 개발에 표준화되었다. 국방 도메인에서 소프트웨어 재사용 증진과 소프트웨어 이해를 돕기 위해서는 RUP과 ADDMe로 개발된 프로젝트 산출물 정보들의 검색 서비스를 제공해야 한다. 또한, 기존 이미 RUP로 개발된 것과 유사한 기능을 일부 제공하는 프로젝트를 ADDMe로 개발할 경우 현재 작성중인 ADDMe 산출물과 밀접히 연관된 기존 RUP 산출물을 검색한 후 재사용할 가능성이 크다. 이를 위해서는 RUP과 ADDMe 프로세스에 존재하는 산출물들 간의 상판관계 매핑이 먼저 요구된다. 그러나 이 두 프로세스들에 존재하는 산출물 연관성 매핑 연구가 현재 존재하지 않는다. 본 논문은 위의 두 프로세스들을 분석 비교하여 온톨로지 기반 산출물 분류를 수행한다. 그리하여, 본 연구는 두 프로세스 내의 산출물들이 의미적으로 서로 어떠한 연관 관계에 있는지 어떠한 정보를 포함하는지 파악할 수 있게 하여 산출물 검색을 통한 컴포넌트 재사용을 돕는다.

  • PDF

Implementation of Pattern-Driven Web Test Automation Framework (패턴 중심의 웹 테스트 자동화 프레임워크의 구현)

  • Na, Jong-Chae;Jeong, Hyie-Soo;Ryoo, Seok-Moon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1239-1243
    • /
    • 2010
  • The web environment is evolving rapidly. Testing in the web based software is an essential process to improve stability and productivity. Testing of complex web contents and ill(user interface) is most important thing. Implemented test cases are efficient when they are automated and reusable. But, most of the testing automation tools are focused on technical accessibility and functions still. A collaboration of the persons concerned and reusability of implemented test case are ignored. In this paper we propose an efficient way to design automated test case in web environment, and to share and pattern automated test cases we introduce testing framework called NTAF(NHN Test Automation Framework.). The NTAF is based on open source framework. It provides integrated testing environment that web testing cane be automated and managed continuously.

Flood Damage Estimation causing Backwater due to the Blockage by Debris in the Bridges (교량에 집적된 유송잡물의 배수영향에 의한 홍수피해 분석)

  • Kim, Soo-Jun;Chung, Jae-Hak;Lee, Jong-Seol;Kim, Ji-Tae
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.7 no.4
    • /
    • pp.59-66
    • /
    • 2007
  • The bridge crossing river is the one of the major factors causing backwater level rising. Furthermore, the bridges in the mountainous areas increase the flood damage in the upstream of the bridge due to the blockage by debris. In this research, the effects of debris to the magnitude of flood damage in the study river basin were simulated by using HEC-RAS and HEC-GeoRAS models. With assumption that the backwater caused by debris blocking the space between bridge piers is the only factor causing inundation, the unsteady flow simulation was carried out with various case studies. The potential inundation area with the overflow locations and volumes could be estimated as the results of simulation. However, the simulation results also reveal the limitations of inaccurate estimation of inundation area and depth. To overcome these hindrances, DEM and satellite images were applied to the simulation. By readjusting the inundation area using digital maps and satellite images and calibrating overflow volume and depth using DEM, the accuracy of simulation could be increased resulting more accurate flood damage estimation.

A Three-Layered Ontology View Security Model for Access Control of RDF Ontology (RDF 온톨로지 접근 제어를 위한 3 계층 온톨로지 뷰 보안 모델)

  • Jeong, Dong-Won;Jing, Yixin;Baik, Dook-Kwon
    • Journal of KIISE:Databases
    • /
    • v.35 no.1
    • /
    • pp.29-43
    • /
    • 2008
  • Although RDF ontologies might be expressed in XML tree model, existing methods for protection of XML documents are not suitable for securing RDF ontologies. The graph style and inference feature of RDF demands a new security model development. Driven by this goal, this paper proposes a new query-oriented model for the RDF ontology access control. The proposed model rewrites a user query using a three-layered ontology view. The proposal resolves the problem that the existing approaches should generate inference models depending on inference rules. Accessible ontology concepts and instances which a user can visit are defined as ontology views, and the inference view defined for controling an inference query enables a controlled inference capability for the user. This paper defines the three-layered view and describes algorithms for query rewriting according to the views. An implemented prototype with its system architecture is shown. Finally, the experiment and comparative evaluation result of the proposal and the previous approach is described.

A Basic Study of Stage-discharge Rating Stabilization at the Ssang-chi Gauging Station (쌍치 수위관측소의 수위-유량관계곡선 안정화를 위한 기초 연구)

  • Lee, Jeong-Ju;Kwon, Hyun-Han
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.1B
    • /
    • pp.81-87
    • /
    • 2010
  • On the SSang-chi gauging station, the discharge had been measured by the rod float method for the past twelve years. However the shifts of the rating curves are too big to be accepted. The major factors of rating curve variation were reviewed for shift analysis. To estimate the discharge measured by rod float method, two cross sections and their stages are generally required. But, the rating curves had been derived only with the observed depth of gauging station since the cross sections were not available. To correct the errors, the reference rating curve was developed. In this study, the water surface slopes of the curve were simulated by RMA2 model. The historical rating curves were re-developed by the calculated discharges on the base of the water surfaces. The results show that the range of fluctuation decreased and rating curves in recent years are physically reasonable.

CompGenX: Component Code Generation System based on GenVoca and XML (CompGenX: GenVoca와 XML 기반의 컴포넌트 코드 생성 시스템)

  • Choi Seung-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.4 no.3
    • /
    • pp.57-67
    • /
    • 2003
  • Software product lines are to attain the rapid development of qualify applications by concretizing the general components populated in software assets and assembling them according to the predefined architectures. For supporting the construction of the software product lines, this paper proposes a component code generation techniques based on GenVoca architecture and XML/XSLT technologies, In addition, CompGenX(Component Generator using XML), a component code generation system, is proposed on the basis of this techniques. By providing reconfigurability of component at the time of code generation, CompGenX allows the reusers to create the component source code that is appropriate to their purpose, In this system, the process of the component development is divided into two tasks which are the component family construction task and the component reuse task, For the component family construction, CompGenX provides the feature modeling tool for domain analysis and the domain architecture definition tool. Also, it provides the tool for building the component configuration know1edge specification and the code templates, For the component reuse task, it offers the component family search tool. the component customizing tool and the component code generator. Component code generation techniques and system in this paper should be applicable as basic technology to build the component-based software product lines.

  • PDF

JMP+RAND: Mitigating Memory Sharing-Based Side-Channel Attack by Embedding Random Values in Binaries (JMP+RAND: 바이너리 난수 삽입을 통한 메모리 공유 기반 부채널 공격 방어 기법)

  • Kim, Taehun;Shin, Youngjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.5
    • /
    • pp.101-106
    • /
    • 2020
  • Since computer became available, much effort has been made to achieve information security. Even though memory protection defense mechanisms were studied the most among of them, the problems of existing memory protection defense mechanisms were found due to improved performance of computer and new defense mechanisms were needed due to the advent of the side-channel attacks. In this paper, we propose JMP+RAND that embedding random values of 5 to 8 bytes per page to defend against memory sharing based side-channel attacks and bridging the gap of existing memory protection defense mechanism. Unlike the defense mechanism of the existing side-channel attacks, JMP+RAND uses static binary rewriting and continuous jmp instruction and random values to defend against the side-channel attacks in advance. We numerically calculated the time it takes for a memory sharing-based side-channel attack to binary adopted JMP+RAND technique and verified that the attacks are impossible in a realistic time. Modern architectures have very low overhead for JMP+RAND because of the very fast and accurate branching of jmp instruction using branch prediction. Since random value can be embedded only in specific programs using JMP+RAND, it is expected to be highly efficient when used with memory deduplication technique, especially in a cloud computing environment.

Implementation of an Indoor Mobile Robot and Environment Recognition using Line Histogram Method (실내 자율주행 로봇의 구현 및 라인 히스토그램을 이용한 환경인식)

  • Moon, Chan-Woo;Lee, Young-Dae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.45-50
    • /
    • 2009
  • The environment exploration is an essential process for indoor robots such as clean robot and security robot. Apartment house and office building has common frame structure, but internal arrangement of each room may be slightly different. So, it is more convenient to use a common frame map than to build a new map at every time the arrangement is changed. In this case, it is important to recognize invariant features such as wall, door and window. In this paper, an indoor mobile robot is implemented, and by using the laser scanner data and line segment histogram with respect to segment orientation and distance, an environment exploration method is presented and tested. This robot is fitted with a laser scanner, gyro sensor, ultra sonic sensor and IR sensor, and programed with C language.

  • PDF