• Title/Summary/Keyword: Cyber University

Search Result 2,838, Processing Time 0.029 seconds

The Numerical Analysis on the Behaviour of Combined Sheet Pile in the Reclaimed Ground Mixed by Sandy Soil and Clayey Soil (사질토와 점성토가 혼재하는 해안 매립지반에서 조합형 Sheet Pile의 거동에 관한 해석적 연구)

  • Kim, Byung-Il;Kim, Young-Sun;Han, Sang-Jae;Park, Eon-Sang
    • Journal of the Korean Geosynthetics Society
    • /
    • v.19 no.3
    • /
    • pp.9-21
    • /
    • 2020
  • In this study, the design method of the combined sheet pile was considered in the coastal landfill where sandy and clayey soils are mixed, and the behavior in excavation was analyzed. It was confirmed from the elasto-plastic analysis that the predicted behavior of the temporary facilities of earth retaining differs according to the type of the combined sheet pile method (Built up, Interlocking, Welding) and the analysis method (soldier pile method, continuous wall method). In the case of sheet pile member force, the results of the continuous wall analysis method predicted the most conservative results. When the stress ratio (calculation/allowance) of each member was analyzed based on the maximum member force of the combined sheet pile method, the maximum value was obtained for bending moment in the side pile and combined stress in the case of the strut. As a result of finite element analysis, the member force of the side pile was the largest in the short-term effective stress analysis condition, while the compressive force of the strut was large in the consolidation analysis. When comparing the results of the elasto-plastic analysis and the finite element analysis, the shear force of the side pile and the axial force of the strut were greatly evaluated in the elasto-plastic analysis, and the bending moment of the side pile was the largest in the short-term effective stress condition of the finite element analysis. In addition, the displacement of the side pile was predicted to be greater in the finite element analysis than in the elasto-plastic analysis.

Frequency of grammar items for Korean substitution of /u/ for /o/ in the word-final position (어말 위치 /ㅗ/의 /ㅜ/ 대체 현상에 대한 문법 항목별 출현빈도 연구)

  • Yoon, Eunkyung
    • Phonetics and Speech Sciences
    • /
    • v.12 no.1
    • /
    • pp.33-42
    • /
    • 2020
  • This study identified the substitution of /u/ for /o/ (e.g., pyəllo [pyəllu]) in Korean based on the speech corpus as a function of grammar items. Korean /o/ and /u/ share the vowel feature [+rounded], but are distinguished in terms of tongue height. However, researchers have reported that the merger of Korean /o/ and /u/ is in progress, making them indistinguishable. Thus, in this study, the frequency of the phonetic manifestation /u/ of the underlying form of /o/ for each grammar item was calculated in The Korean Corpus of Spontaneous Speech (Seoul Corpus 2015) which is a large corpus from a total of 40 speakers from Seoul or Gyeonggi-do. It was then confirmed that linking endings, particles, and adverbs ending with /o/ in the word-final position were substituted for /u/ approximately 50% of the stimuli, whereas, in nominal items, they were replaced at a frequency of less than 5%. The high rates of substitution were the special particle "-do[du]" (59.6%) and the linking ending "-go[gu]" (43.5%) among high-frequency items. Observing Korean pronunciation in real life provides deep insight into its theoretical implications in terms of speech recognition.

The Design of Manufacturing Simulation Modeling Based on Digital Twin Concept (Digital Twin 개념을 적용한 제조환경 시뮬레이션 모형 설계)

  • Hwang, Sung-Bum;Jeong, Suk-Jae;Yoon, Sung-Wook
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.2
    • /
    • pp.11-20
    • /
    • 2020
  • As the manufacturing environment becomes more complex, traditional simulation models alone are having a lot of difficulties in reflecting real-time manufacturing situations. Although the Digital Twin concept is actively discussed as an alternative to overcome theses issues, many studies are being carried out only in the product design phase. This research presents a Digital Twin-based manufacturing environment framework for applying the Digital Twin concept to the manufacturing process. Twin model that is operated in virtual space, physical system and databases describing the actual manufacturing environment, are proposed as detailed components that make up the framework. To check the applicability of proposed framework, a simple Digital Twin-based manufacturing system was simulated in a conveyor system using Arena software and Excel VBA. Experiment results have shown that the twin model is transmitted real time data from the physical system via DB and were operating in the same time unit. The Excel VBA fitted parameters defined by cycle time based on historical data that real-time and training data are being accumulated together. This study proposes operating method of digital twin model through the simple experiment examples. The results lead to the applicability of Digital twin model.

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

The Effect of the Cognitive Thinking Trait between Counselor and Client on the Intimacy, Empathy, and Communication Level in the Military Counseling Process (또래상담병을 대상으로 상담자-내담자의 인지사고 특성이 친밀감, 공감, 소통 수준에 미치는 영향)

  • Lee, Jung Won
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.47-57
    • /
    • 2017
  • The purpose of this study was to investigate the difference of counselor-client's intimacy, empathy, and communication level when cognitive thinking trait between counselor and client is the same or not. For this purpose, 70 peer counselors of the S division conducted counseling training for 10 hours with 6 hours of education and 4 hours of practice. All counseling sessions were preceded by APL cognitive test, divided into two cognitive trait, followed by counseling with the same cognitive trait for two hours, and with a different cognitive for two hours. After each session, questionnaires were conducted. The results of this study showed that intimacy, empathy and communication level were significantly higher in counseling with the same trait as counselors than different. The results of this study are verifying the difference of the cognitive trait of the counselor and the client among the variables of the counselors influencing effect in the counseling process. Suggesting the importance of a counseling plan that takes into account the self-understanding of counselor and the trait of the client. Finally, the points of this study were discussed.

Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network (인지무선네트워크를 위한 회전자 기반 적응형 보안프레임워크 설계)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.165-172
    • /
    • 2013
  • Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. Especially, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio (CR) is a convergence technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. The main purpose of this research is focused on devising an adaptive security framework based on carousel for CR networks as a distinct telecommunication convergence application, which are still at the stage of being developed and standardized with the lack of security concerns. The framework uses a secure credential, named as carousel, initialized with the location related information from objects position, which is used to design security mechanisms for supporting privacy and various securities based on it. The proposed adaptive security framework could be used as a security building block for the CR network standards and various convergence applications.

A exploratory study for Influential factors of smartphone over-dependence in elder and older Group (장·노년층의 스마트폰 과의존 영향요인에 대한 탐색적 연구)

  • Bae, Sung-Man;Koh, Young-Sam
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.111-121
    • /
    • 2017
  • Smartphone use has become a part of everyday life, not only for adolescents but also for elderly and older people. Thus, this study explored the effect of demographic variables, the amount of smartphone usage, type of smartphone use and psychosocial variables on smartphone dependence of the elder group. We analyzed the data of 5627 (50s and 60s) of the Internet overdependence survey data of the Korea Information Society Agency in 2016. As a result of hierarchical multiple regression analysis, More frequency of smartphone use of weekday and weekend, and usage time of smartphone of weekday were related to greater smartphone dependence. More smartphone use for information seeking and games were associated with greater smartphone dependence. And, as loneliness and anxiety increased, smartphone dependence increased, while smartphone dependence decreased, as social capital increased. Through this study, it is necessary to understand characteristics related to smartphone dependence of elder and older group, and to use this knowledge to solve their smartphone dependence. Future studies also need to identify the causal relationship between predictors of smartphone dependence in elderly and older people.

The Impact of Spiritual Commitment, Social Support and Self-esteem on Deviant Behavior of Middle-aged Man (중년기 남성의 영성지향도, 사회적 지지, 자아존중감이 일탈행동에 미치는 영향)

  • Ko, Ki-Sook
    • Korean Journal of Social Welfare
    • /
    • v.57 no.4
    • /
    • pp.197-223
    • /
    • 2005
  • The purpose of this study is to examine the impact of spiritual commitment, social support and self-esteem for the deviant behaviors of middle-aged men from 40 to 59 years old. Further, this study seeks for providing basic data for designing social welfare service programs to intervene and prevent such deviant behaviors The findings of this study can be summarized as follows: The relationship among variables are as follows. First, spiritual commitment could directly affect the mid-life deviant behavior, and could cause influence indirectly through the self-esteem. Second, social support could not directly affect the mid-life deviant behavior, but could cause negative influence indirectly through the self-esteem. The significant is that this study triggered off interest in deviant behavior of middle-aged men. Especially, this study realized to us interest in spiritual commitment which has been not interested in the social work. This implicated that social support and self-esteem might effect to be deviant behavior of middle-aged men as well as deviant behavior of youth.

  • PDF

Design of the Copyright Protection for ePub e-Book System using Certification Information (인증 정보를 이용한 전자책 ePub의 저작권 보호 시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2197-2204
    • /
    • 2015
  • In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.

Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students (인터넷 윤리의식의 실태 분석 및 교육 효과 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1257-1269
    • /
    • 2010
  • The internet which is fast spread over all areas of our lives provides us with benefits of efficiency, productivity, and amusement; however, its features as an anonymous and non-face-to-face medium have raised a serious social issue of the collapse of internet ethics due to the abuse of it. Thereupon, the importance of internet ethics education has been highlighted to prevent side effects resulted from the internet and cultivate human-centered internet culture. In this paper, we suggests desirable methods for internet ethics education based on the investigation and analysis of the status of university freshmen's internet ethics. This research conducted a survey and analyzed its result after categorizing the status of internet ethics into the invasion of private information, invasion of intellectual property rights, harmful information, internet communication culture, cyber violence, internet addiction, and internet fraud. And based on the result of analyzing their internet ethics, this paper suggests desirable methods for internet ethics education. Next, internet ethics education was conducted by applying the proposed methods for internet ethics education, and its educational effect was evaluated. According to the result of verifying the educational effect measured statistically, it has proved that the suggested internet ethics education is effective to improve undergraduates' internet ethics.