Since composite structures are widely used in structural engineering, delamination in such structures is an important issue of research. Delamination is one of a principal cause of failure in composites. In This study the electrical potential (EP) technique is applied to detect and locate delamination in basalt fiber reinforced polymer (FRP) laminate composite pipe by using electrical capacitance sensor (ECS). The proposed EP method is able to identify and localize hidden delamination inside composite layers without overlapping with other method data accumulated to achieve an overall identification of the delamination location/size in a composite, with high accuracy, easy and low-cost. Twelve electrodes are mounted on the outer surface of the pipe. Afterwards, the delamination is introduced into between the three layers (0º/90º/0º)s laminates pipe, split into twelve scenarios. The dielectric properties change in basalt FRP pipe is measured before and after delamination occurred using arrays of electrical contacts and the variation in capacitance values, capacitance change and node potential distribution are analyzed. Using these changes in electrical potential due to delamination, a finite element simulation model for delamination location/size detection is generated by ANSYS and MATLAB, which are combined to simulate sensor characteristic. Response surfaces method (RSM) are adopted as a tool for solving inverse problems to estimate delamination location/size from the measured electrical potential changes of all segments between electrodes. The results show good convergence between the finite element model (FEM) and estimated results. Also the results indicate that the proposed method successfully assesses the delamination location/size for basalt FRP laminate composite pipes. The illustrated results are in excellent agreement with the experimental results available in the literature, thus validating the accuracy and reliability of the proposed technique.
Journal of the Korean Institute of Telematics and Electronics C
/
v.36C
no.4
/
pp.65-77
/
1999
There are two problems which will be processed to graft a continuous speech recognition results into natural language processing technique. First, the speaking's unit isn't consistent with text's spacing unit. Second, when it is to be pronounced the phonological alternation phenomena occur inside morphemes or among morphemes. In this paper, we implement the postprocessing system of a continuous speech recognition that above all, solve two problems using the eo-jeol generator and syllable recoveror and morphologically analyze the generated results and then correct the failed results through the corrector. Our system experiments with two kinds of speech corpus, i.e., a primary school text book and editorial corpus. The successful percentage of the former is 93.72%, that of the latter is 92.26%. As results of experiment, we verified that our system is stable regardless the sorts of corpus.
Kim, Ji Sung;Lee, Woo Mi;Kim, Il Ho;Kim, Kwang Soo
International Journal of Highway Engineering
/
v.15
no.5
/
pp.65-73
/
2013
PURPOSES : This study is to suggest future development direction and application of environmental noise barriers as multi-functional soundproof wall. METHODS : Based on the literature review, case study and patent search, research and patent trend were investigated. Patent search was conducted by Patent searching tools, 'Focust'. RESULTS : As environmental noise barriers, Vegetative soundproof wall, photovoltaic soundproof wall, and air-pollution reduction soundproof wall were investigated. First of all, In Korea, Vegetative soundproof wall is being developed mostly as soundproof wall that has vegetation foundation inside, to meet the domestic condition with 23 patent applications. Second, Photovoltaic soundproof wall is being developed mainly with efficiency of photovoltaic system rather than soundproofing. And it is limited to one generation solar cell technology, although Solar cell technology is developing at a rapid pace. On the other hand, for reducing air-pollutant by soundproof wall, a variety of methods are being suggested (filtration, adsorption, and photocatalytic oxidation), and one of them, adsorption are applied for developing air pollution reduction soundproof wall in Korea. CONCLUSIONS: The above soundproof wall is not simple structure, but road facility applied fusion technique. Therefore, as one system, it is difficult to harmonize due to various considerations for design factor. However, if it's possible that a benefits of one system apply to another system, Synergy effect may be created. In the foreseeable future, soundproof wall may be considered as a road system using fusion technique rather than just functional facility. Therefore, substantial studies for applying multi-functional soundproof wall on the road are needed for the future.
Journal of the Korean Society for Aeronautical & Space Sciences
/
v.49
no.6
/
pp.505-513
/
2021
We propose an autonomous mission management software design and verification technique for unmanned aerial vehicles to autonomously mitigate dynamic situation changes occurred in the inside and outside of an aircraft in compliance with the mitigation priority order. The proposed autonomous mission management software is designed in a modular architecture that consists of concurrently executing multiple threads. To verify it, we suggest three verification steps: 1) software integration by checking the expected request/response messages between the threads for all possible dynamic situation changes; 2) integration test to verify the software functionality; 3) performance test to verify the quantitative software performance. Especially, the software integration test environment is built and utilized to carry out the integration and performance tests.
Journal of the Korea Institute of Information and Communication Engineering
/
v.26
no.4
/
pp.598-604
/
2022
The academic information system of a university is the core system of the university, and since it has to manage all the various activities in the university, such as student academic records, it becomes complicated every year and the data increases indiscriminately. As a result, the reliability of the data of the academic information system is lowered, which causes communication problems with users and may cause a major failure in the system. Therefore, in this paper, column attribute analysis, allowable value list analysis, string pattern analysis, date type analysis, and unique value analysis methods were designed for the academic information system using the data profiling technique of data quality management. In the implementation stage, the script was implemented using the above five analysis methods, and by executing the script, errors by type of the academic information system were found, the cause of the error was found and corrected inside the system, and the probability of internal system failure was lowered.
Journal of the Korean Society for Nondestructive Testing
/
v.34
no.3
/
pp.254-259
/
2014
A pressurized heavy water reactor (PHWR) core has 380 fuel channels contained and supported by a horizontal cylindrical vessel known as the calandria, whereas a pressurized water reactor (PWR) has only a single reactor vessel. The pressure tube, which is a pressure-retaining component, has a 103.4 mm inside diameter ${\times}$ 4.19 mm wall thickness, and is 6.36 m long, made of a zirconium alloy (Zr-2.5 wt% Nb). This provides support for the fuel while transporting the $D_2O$ heat-transfer fluid. The simple tubular geometry invites highly automated inspection, and good approach for all inspection. Similar to all nuclear heat-transfer pressure boundaries, the PHWR pressure tube requires a rigorous, periodic inspection to assess the reactor integrity in accordance with the Korea Nuclear Safety Committee law. Volumetric-based nondestructive evaluation (NDE) techniques utilizing ultrasonic and eddy current testing have been adopted for use in the periodic inspection of the fuel channel. The eddy current testing, as a supplemental NDE method to ultrasonic testing, is used to confirm the flaws primarily detected through ultrasonic testing, however, eddy current testing offers a significant advantage in that its ability to detect surface flaws is superior to that of ultrasonic testing. In this paper, effectiveness of flaw detection and the depth sizing capability by eddy current testing for the inside surface of a pressure tube, will be introduced. As a result of this examination, the ET technique is found to be useful only as a detection technique for defects because it can detect fine defects on the surface with high resolution. However, the ET technique is not recommended for use as a depth sizing method because it has a large degree of error for depth sizing.
The purpose of this study was to evaluate the ability of several intracoronal base materials to prevent cervical leakage of a bleaching agent into the dentinal tubules and along the root canal. In this study, thirty-two anterior teeth were used. After lingual access was prepared in each tooth, tooth was instrumented with a step-back technique to a Nos. 40-50 using K-type files. All teeth were obturated with a lateral condensation technique. Excess gutta percha was removed with a warm instrument to the facial level of the CEJ. Teeth were divided into four groups : Teeth in control group were not filled with base material. Teeth in groups 1, 2, and 3 had 2mm of gutta percha removed with a warm instrument, then Dycal, Fuki II LC and Z-100 were filled with palstic instruments on the top of the gutta percha respectively. All teeth were bleached for 7 days, fresh bleach was added for another 7 days, then a 10 % methylene blue dye was placed inside the access preparation. They were stored at $37^{\circ}C$ and $100^{\circ}C$ humidity for 5 days. Each tooth was sectioned perpendicular to the long axis using a diamond disk. Initial cuts were made at the most coronal level of facial and lingual CEJ's, then another cuts continued appically in the levels of 0.5mm, 1.5mm, and 2.0mm respectively. The amount of dye leakage through the dentinal tubules was determined at each cut section. In addition, when the cut specimen was determined to be last penetration of any dye, this level was recorded as depth of apical leakage from the coronal terminus of the gutta percha, Dycal, Fuji II LC and Z-100. The acquired data were analyzed by Tukey's Multiple Range Test adn Cochran-Mantel-Haenszel Test to see if there was any statistically significant difference in dye penetration and linear apical leakage among the groups. The results were as follows : 1. Control group at levels of CEJ and 0.5mm, group 3 at level of 1.5mm, and group 2 AND 3 at level of 2.0mm showed the least dye penetration through the facial or lingual dentinal tubules, but there were no significant difference among three groups. 2. Group 2 at levels of CEJ and 0.5mm, group 3 at level of 1.5mm, and group 2 and 3 at level of 2.0mm showed the least dye penetration through the proximal dentinal tubules, but there were no significant difference among control group, group 2, and group 3. 3. Group 1 showed the greatest dye penetration through the facial or lingual and proximal dentinal tubules at all levels, and there were significant difference with other three groups. 4. Control group and group 1 showed 2mm apical dye leakage at facial or lingual and proximal aspects, group 2 showed 1.5mm, and group 3 showed 0.5mm.
This study was undertaken to document the clinical results and technical aspects of arthroscopic repair including popliteus tendon as a post for the treatment of complex lateral meniscus in young people indicated as total meniscectomy. From June 2004 to May 2006, we prospectively studied arthroscopic repairs on 32 young people knees with symptomatic complex lateral meniscus that was treated by all inside repair technique using Popliteus tendon as a post. Clinical results were evaluated using Lysholm knee scores preoperatively and at final follow-up. 2nd look arthroscopy or MRI was taken at final follow-up. 80% of patients carried out MRI or 2nd look arthroscopy under permission. Most patients who follow up were able to return to their previous life activities with little or no limitation, and no reoperation was required after an average follow-up of 42.8 months. Mean Lysholm knee scores improved from 65.4 (range, 55 to 75) preoperatively to 93.9 (range, 79 to 100) at the final follow-up (P<.001). 80% meniscus healing was found on arthroscopic or MRI follow up. Conclusively, arthroscopic repair using Popliteus tendon as a post is effective for treating young people with complex lateral meniscus tear as a salvage procedure.
City of Gyeongju's referendum finally offered the long-waited low-level radioactive waste disposal site in November 2005. Gyeongju's positive decision was due to the various economic rewards and incentives the national government promised to the city. 300 million won for an accepting bonus, 8.5 billion won, annual revenue fro the entry quantity of waste into the city's disposal site, the location of the headquarter building of the Korean Hydro and Nuclear Power Co., and the accelerator research center. All of the above will affect the city's infrastructure and the citizens' economic and cultural lives. Population, land use, economic structure, environment and quality of life will be affected. Some will be very positive, and some will be positive. This research project will see the future of the city and forecast the demographic, economic, physical and environmental changes of the city via computer simulation's system dynamics technique. This kind of simulation will help City of Gyeongju's what to prepare for the future. The population forecasting of the year 2026 will be 289,069 with the waste disposal site, and 279,131 without the waste disposal site in Gyeongju. The waste disposal site and the relocation of the company headquarters and location of the accelerator research center will attract 9,938 individuals more with 511 manufacturing shops and 1944 service jobs. The population increase will bring 3,550 more houses constructed in the city. Land use will also be affected. More land will be developed. However, mad, water plant and waste water plant will not be expanded as much. The city's financial structure will be expanded, due to the increased revenues from the waste disposal site, and property tax revenues from the middle-class employees of the company, and the high-powered scientists and technologists from the accelerator research center. All in an, the future of the city will be brighter after operating the nuclear waste disposal site inside the city.
Security threats occur from the outside, but more often from the inside. In particular, since the internal user knows about the information service, the security threat damage caused by the internal user is greater. In this environment, the actions of all users accessing information services should be monitored and recorded in real-time. However, the current operating system records only the logs of system and application execution, so there is a limit to monitoring user behavior in real-time. In such a security environment, damage may occur due to user's unauthorized actions. To solve this problem, this study proposes an architecture that monitors user behavior in real-time in a Linux environment. As a result of verifying the function to confirm the effectiveness of the proposed architecture, the console input values and output angles of all users who have access to the operating system are monitored in real-time and stored. Although the performance of the proposed architecture is somewhat slower than the identification and authentication functions provided by the operating system, it was confirmed that the performance was not at a level that users would recognize, and thus it was judged to be sufficiently effective. However, since this study focuses on monitoring the console behavior, it is impossible to monitor the behavior of user applications running in the background, so additional research is needed.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.