• Title/Summary/Keyword: 2차적 개념

Search Result 32, Processing Time 0.029 seconds

Behavior of Concrete-Filled Square Steel Tubular Column-H Beam Connections with Plates (강판보강 콘크리트충전 각형강관 기둥-H형강보 접합부의 거동)

  • Yoo, Yeong Chan;Shin, Kyung Jae;Oh, Young Suk;Moon, Tae Sup
    • Journal of Korean Society of Steel Construction
    • /
    • v.10 no.2 s.35
    • /
    • pp.161-175
    • /
    • 1998
  • The objective of this study is to investigate the structural behavior of Concrete-Filled Steel Tubular Column-H Beam connections with plate stiffeners. The first, we made experiment on the Column to H-beam flange connections stiffened with simple tensile loading. The paramaters of tensile experiment are the area of each plates. The simple tensile experiment is conducted to 5 kinds of specimens. Eestimating the load, displacement, and strain from each kind, we compared them with results of second experiment. The second, we made experiment on the Column to H-beam connections stiffened with the sames under monotonic and cyclic load. we made specimens of 5 for the second experiment. In analysis, comparing each strengthes and stiffnesses we estimated deformation capacity. Comparing and estimating each yielding strength ratios and maxium-strength ratios on the basis of Yield line theory, we suggested new Strength Formula of Beam-to-Column Connections.

  • PDF

A Study on the Positive Circle System in Managing Records and Archives by Value Analysis (가치분석에 의한 기록관리 선순환 체계의 모색)

  • Lim, Na Rae
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.263-306
    • /
    • 2007
  • In genaral appraisal is process of the determining the length of the time records should be retained, and is defined as selecting records with second value. However, appraisal in boroad term includes analysis which value records have as well as selecting archival records. It means that analysis of Records value is carried and reflected in every processes of maintenance, use and disposition of records. One of characteristic in records and archives management is that records process doesn't finish as one process, but it creates and manages records repeatedly. When another records are created again after the previous process in these system, it should creates records with better value than before. It pursues positive circle system which satisfy users whenever it starts. The study reviewed how analysis of records value is reflected in Records and archival system in Korea, and analysed Public Records and Archives Act to approve it. In results the study suggests having positive circle system finally.

Evaluation of conceptual rainfall-runoff models for different flow regimes and development of ensemble model (개념적 강우유출 모형의 유량구간별 적합성 평가 및 앙상블 모델 구축)

  • Yu, Jae-Ung;Park, Moon-Hyung;Kim, Jin-Guk;Kwon, Hyun-Han
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.2
    • /
    • pp.105-119
    • /
    • 2021
  • An increase in the frequency and intensity of both floods and droughts has been recently observed due to an increase in climate variability. Especially, land-use change associated with industrial structure and urbanization has led to an imbalance between water supply and demand, acting as a constraint in water resource management. Accurate rainfall-runoff analysis plays a critical role in evaluating water availability in the water budget analysis. This study aimed to explore various continuous rainfall-runoff models over the Soyanggang dam watershed. Moreover, the ensemble modeling framework combining multiple models was introduced to present scenarios on streamflow considering uncertainties. In the ensemble modeling framework, rainfall-runoff models with fewer parameters are generally preferred for effective regionalization. In this study, more than 40 continuous rainfall-runoff models were applied to the Soyanggang dam watershed, and nine rainfall-runoff models were primarily selected using different goodness-of-fit measures. This study confirmed that the ensemble model showed better performance than the individual model over different flow regimes.

Vulnerability Analysis in the Nakdong River Basin for the Utilization of Flood Risk Mapping (홍수위험지도 활용을 위한 낙동강 유역에서의 홍수취약도 분석)

  • Kim, Tae-Hyung;Han, Kun-Yeun;Cho, Wan-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.3
    • /
    • pp.203-222
    • /
    • 2011
  • The characteristics of flood damages have been increasingly strengthened and take the form of unpredictable and unusual weather phenomena caused by climate change and climate anomalies. To prevent inundation damage caused by breach of hydraulic structure such as dam or levee, and trouble of drainage of inner basin, the prediction necessity of flood inundation area, flood risk analysis, and drawing flood risk maps have been on the rise, and the national flood risk maps have been produced. In this study, the quantitative flood vulnerability analysis was performed, which represents population living within flood-affected areas, types of economic activities, facilities affected by flood, in order to extend flood risk mapping from simple hazard concept into risk based idea. By applying it to Nakdong River basin, the flood vulnerability indices were estimated to draw flood risk maps subdivided into administrative districts. The result of this study can be applied to establish the disaster prevention measures and priority decision of disaster prevention project.

Discussions on the Distribution and Genesis of Mountain Ranges in the Korean Peninsular (I) : The Identification Mountain Ranges using a DEM and Reconsideration of Current Issues on Mountain Range Maps (한국 산맥론(I) : DEM을 이용한 산맥의 확인과 현행 산맥도의 문제점 및 대안의 모색)

  • Park Soo Jin;SON ILL
    • Journal of the Korean Geographical Society
    • /
    • v.40 no.1 s.106
    • /
    • pp.126-152
    • /
    • 2005
  • In recent years, there are some confusions related to the definition and existence of mountain ranges, which have been described in current geography text books. We contend that these confusions came from the lack of understanding on the geomorphological processes that form the mountain system in Korea. This research attempts to clarify the definition of mountain ranges and offer geological and geomorphological explanations about the formation of them. Based on the analyses of the social and cultural causes underlying the recent debates on the existence of mountain ranges, we tried to identify the relationships among the definition of mountain ranges, geological structure of Korea, and the forming processes of mountain ranges. The current and past mountain range maps were compared with geological structures, geological maps, surface curvature, and hill shade maps. The latter two maps were derived from a Digital Elevation Model of the Korean Peninsular. The results show that we are able to prove the existence of most mountain ranges, which provides a useful framework to understand the geological evolution of Korean peninsular and formation of mountainous landscape of Korea. In terms of their morphological continuity and genesis, however, we identified five different categories of mountain ranges: 1) Uplift mountain ranges(Hamkyeong Sanmaek, Nangrim Sanmaek, Taebaek Sanmaek), which were formed by the uplift processes of the Korean Peninsular during the Tertiary; 2) Falut mountain ranges(Macheonryeong Sanmaek, Sobaek Sanmaek, Buksubaek Sanmaek), whirh were directly related to the uplift processes of the Korean Peninsular during the Tertiary; 3) Trust mountain ranges(Jekyouryeong Sanmaek, Kwangju Sanmaek, Charyeong Sanmaek, Noryeong Sanmaek), which were formed by the intrusion of granite and consequent orogenic processes during the Mesozoic era; 4) Drainage divide type mountain ranges, which were formed by the erosion processes after the uplift of Korean Peninsular; 5) Cross-drainage basin type mountain ranges (Kangnam Sanmaek, Eunjin Sanmaek, Myelak sanmaek), which were also formed by the erosion processes, but the mountain ranges cross several drainage basins as connecting mountains laterally We believe that the current social confusions related to the existence of mountain ranges has partly been caused by the vague definition of mountain ranges and the diversity of the forming processes. In order to overcome theses confusions, it is necessary to characterize the types of them according the genesis, the purpose of usages and also the scale of maps which will explains the mountain systems. It is also necessary to provide appropriate educational materials to increase the general public's awareness and understanding of geomorphological processes.

RIE기반 저결함 결정질실리콘 표면 Texturing패턴 연구

  • Jeong, Ji-Hui;Yun, Gyeong-Sik;Lee, Byeong-Chan;Park, Gwang-Muk;Lee, Myeong-Bok
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.283-283
    • /
    • 2010
  • 17~18% 대역의 고효율 결정질실리콘 태양전지를 양산하기 위하여 국내외에서 다양한 연구개발이 수행되고 있으며 국내 다결정실리콘 태양전지 양산에서도 새로운 구조와 개념에 입각한 공정기술과 관련 장비의 국산화에 집중적인 투자를 진행하고 있다. 주지하는 바와 같이, 태양전지의 광전효율은 표면에 입사되는 태양광의 반사를 제외하면 흡수된 광자에 의해 생성되는 전자-정공쌍의 상대적인 비율인 내부양자효율에 의존하게 된다. 실제 생성된 전자-정공쌍은 기판재료의 결정상태와 전기광학적 물성 등에 의해 일부가 재결합되어 2차적인 광자의 생성이나 열로서 작용하고 최종적으로 전자와 정공이 완전히 분리되고 전극에 포집되어 실질적인 유효전류로 작용한다. 16% 이상의 고효율 결정질 실리콘 태양전지 양산이 요구되고 있는 현실에서 광전효율 개선 위해 가장 우선적으로 고려되어야 할 변수는 입력 태양광스펙트럼에 대한 결정질 실리콘 표면반사율을 최소화하여 광흡수를 극대화하는 것이라 할 수 있다. 현재까지 다결정 실리콘 표면을 화학적으로 혹은 플라즈마이온으로 50-100nm 직경의 바늘형 피라미드형상으로 texturing 함으로 단파장대역에서 광반사율의 감소를 기대할 수 있기 때문에 결정질실리콘 태양전지효율 개선에 긍정적인 영향을 미치는 것으로 알려져 있다. 고효율 다결정실리콘 태양전지 양산공정에 적용하기 위해 마스크를 사용하지 않는, RIE기반 건식 저반사율 결정질실리콘 표면 texturing 패턴연구를 수행하였다. 마스크없이 표면 texturing이 완료된 시료들에 대하여 A1.5G 표준태양광스펙트럼의 300-1100nm 파장대역에서 반사율과 minority carrier들의 life time 분포를 측정하고 검토하여 공정조건을 최적화 하였다. 저반사율의 건식 결정질실리콘 표면 texturing에 가장 적합한 플라즈마파워는 100W 내외로 낮았고 $SF_6/O_2$ 혼합비율은 0.8~0.9 범위엿다. 본 연구에서 확인된 최적의 texturing을 위한 플라즈마공정 조건은 이온에 의한 Si표면원자들의 스퍼터링과 화학반응에 의한 증착이 교차하는 상태로서 확인된 최저 평균반사율은 ~14% 내외였고 p-형 결정질실리콘 표면 texturing 패턴과 minority carrier의 life time 상관는 단결정이 16uS대역에서 14uS대역으로 감소하는 반면에서 다결정은 1.6uS대역에서 1.7uS대역으로 오히려 미세한 증가를 보여 다결정 웨이퍼생산과정에서 발생하는 saw-damage 제거의 긍정적 효과와 texturing공정의 표면 결함발생에 의한 부정적 효과가 상쇄되어 큰 변화를 보이지 않는 것으로 해석된다.

  • PDF

Three dimensional GPR survey for the exploration of old remains at Buyeo area (부여지역 유적지 발굴을 위한 3차원 GPR 탐사)

  • Kim Jung-Bo;Son Jeong-Sul;Yi Myeong-Jong;Lim Seong-Keun;Cho Seong-Jun;Jeong Ji-Min;Park Sam-Gyu
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.49-69
    • /
    • 2004
  • One of the important roles of geophysical exploration in archeological survey may be to provide the subsurface information for effective and systematic excavations of historical remains. Ground Penetrating Radar (GPA) can give us images of shallow subsurface structure with high resolution and is regarded as a useful and important technology in archeological exploration. Since the buried cultural relics are the three-dimensional (3-D) objects in nature, the 3-D or areal survey is more desirable in archeological exploration. 3-D GPR survey based on the very dense data in principle, however, might need much higher cost and longer time of exploration than the other geophysical methods, thus it could have not been applied to the wide area exploration as one of routine procedures. Therefore, it is important to develop an effective way of 3-D GPR survey. In this study, we applied 3-D GPR method to investigate the possible historical remains of Baekje Kingdom at Gatap-Ri, Buyeo city, prior to the excavation. The principal purpose of the investigation was to provide the subsurface images of high resolution for the excavation of the surveyed area. Besides this, another purpose was to investigate the applicability and effectiveness of the continuous data acquisition system which was newly devised for the archeological investigation. The system consists of two sets of GPR antennas and the precise measurement device tracking the path of GPR antenna movement automatically and continuously Besides this hardware system, we adopted a concept of data acquisition that the data were acquired arbitrary not along the pre-established profile lines, because establishing the many profile lines itself would make the field work much longer, which results in the higher cost of field work. Owing to the newly devised system, we could acquire 3-D GPR data of an wide area over about $17,000 m^2$ as a result of the just two-days field work. Although the 3-D GPR data were gathered randomly not along the pre-established profile lines, we could have the 3-D images with high resolution showing many distinctive anomalies which could be interpreted as old agricultural lands, waterways, and artificial structures or remains. This case history led us to the conclusion that 3-D GPR method can be used easily not only to examine a small anomalous area but also to investigate the wider region of archeological interests. We expect that the 3-D GPR method will be applied as a one of standard exploration procedures to the exploration of historical remains in Korea in the near future.

  • PDF

A study on the school health education curriculum development focused on the health education course in primary school (국민학교 보건교육 교과과정의 개선방안에 대한 연구)

  • Kim, Hwa-Joong;Lee, In-Sook
    • Journal of the Korean Society of School Health
    • /
    • v.5 no.1
    • /
    • pp.36-63
    • /
    • 1992
  • The purpose of this study was development of school health education curriculum in primary school based on analysis of the textbooks published in 1991. 1) The health education curriculum in primary school consisted of four major components such as health education aspects of the healthful school environments, health education aspects of school health services, health education course, and health instruction in related subjects. However, health instruction taught by physical education, biology, and other health related subjects was not systematic organization for health care. 2) A considerable amount of health knowledge and attitude, and some health practices was learned as the result of experiences in other courses, where there was little or no reference to health. It must be developed health edcation course separated from health related subjects. 3) Direct health insruction was represented by the health education course. The health education courses must be considered to be heart of the school health education curriculum. 4) The health education course developed by this study was consisted of eight health units and problems in the early elementary grade or health classes in the higher years. 5) The health education course developed by this study provided the opportunity for acquring new knowledge, attitude, and practice, for discarding the unhealtful attitude and strengthening the healthful attitude and practices of primary school students.

  • PDF

Experimental Study on Combined Failure Damage of Bi-directional Prestressed Concrete Panel under Impact-Fire Loading (충돌 후 화재에 대한 이방향 프리스트레스트 콘크리트 패널부재의 복합 파괴손상에 관한 실험적 연구)

  • Yi, Na-Hyun;Lee, Sang-Won;Choi, Seung-Jai;Kim, Jang-Ho Jay
    • Journal of the Korea Concrete Institute
    • /
    • v.26 no.4
    • /
    • pp.429-440
    • /
    • 2014
  • Since the World Trade Center and Pentagon attacks in 2001, terror, military attack, or man-made disaster caused impact, explosion, and fire accident have frequently occured on civil infrastructures. However, structural behavior researches on major Prestressed Concrete (PSC) infrastructures such as bridges, tunnels, Prestressed Concrete Containment Vessel (PCCVs), and LNG tanks under extreme loading are significantly lacking. Especially, researches on possible secondary fire scenarios after terror, bombing, collision of vehicles and vessels on concrete structures have not been performed domestically where most of the past researches related to extreme loadings on structures focused on an independent isolated extreme loading scenario. Due to the outcry of public concerns and anxiety of potential terrorist attacks on major infrastructures and structures, a study is urgently needed at this time. Therefore, in this study, the bi-directional prestressed concrete $1400{\times}1000{\times}300mm$ panels applied with 430 kN prestressing force using unbonded prestressing thread bars were experimentally evaluated under impact, fire, and impact-fire combined loadings. Due to test site restrictions, impact tests were performed with 14 kN impactor with drop heights of 10m and 3.5 m to evaluate impact resistance capacity. Also, fire and impact-fire combined loading were tested using RABT fire loading curve. The measured residual strength capacities of PSC and RC specimens applied with impact, fire, impact-fire combined loadings were compared with the residual strength capacity of undamaged PSC and RC specimens for evaluation. The study results can be used as basic research data for related research areas such as protective design and numerical simulation under extreme loading scenarios.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.