• Title/Summary/Keyword: Data Paper

Search Result 56,607, Processing Time 0.086 seconds

Changes in residential patterns by the age composition in Cheongju city, Korea (年齡別 人口構成에서 본 淸州市의 居住패턴 變化)

  • ;Han, Ju-Seong
    • Journal of the Korean Geographical Society
    • /
    • v.30 no.1
    • /
    • pp.57-67
    • /
    • 1995
  • The study on the factorial ecology of the residential patterns is to provide one of the yardsticks for description and comparison of urban structures. Many Korean geographers have adopted this method to analyse the urban structure of Korean cities. According to these studies, one of the main factors in Korean cities in large and middle sizes is family status. The spatial pattern of family status is zonal, similar to the cases of Japanese and Western cities. The age is one of the principal indices of familyf status, hence the author chose the age composition to analyse the residential patten. This Paper is to describe the residential segreagation pattern due to age composition and recent pattern changes in the Cheongju city, and than to explain the reason for these changes. All data are derived from the Population Censuses of Korea for 1970, 1980 and 1990. Eighteen groups of age with five-year interval (0-4, 5-9, 10-14, 15-19, 20-24, 25-29, 30-34, 35-39, 40-44, 45-49, 50-54, 55-59, 60-64, 65-69, 70-74, 75-79, 80-84, 85- and- over) are adopted here. Unit area for this analysis is administrative district(Dong) within Cheonaju city. District are classified into smaller groups based on the similarity of age composition, using the method of cluster analysis. The main findings are summarized as follows: 1. Population have increased remarkably in the eastern reaion neighboring CBD of Cheongju city in 1970's. And in western region from CBD new residential area have developed in 1980's. 2. Spatial pattarns showed a concentric circle type in central district and its neighbor regions and a sector type in periphery regions in 1970; a cirele type in central district and a sector typesin neighbor regions and periphery regions in 1980 and 1990. Thess residential pattern play an important role in the population composition ratio of younger aged group (l5-34) and older aged group (65-and-over). 3. Spatial change of types by age composition showed the higher ratio of groups of 0-9 and 35-49, and lower ratio of group 20-24 in 1970's. Dominent groups are ratio of 0-14, 40-49, 55-64, 7O-79, and 85- and- over in 1980's. These changes mainly appeared in central district and periphery regions. 4. The reasons for the change of age composition was the development of msnufacturing industries with the increase of population and new construction of residential areas both in the neighbor regions of cnetral district and periphery regions. These phenomena were caused by immigration of younger aged groups and increasing of residents of aged groups in these regions.

  • PDF

Seismic wave propagation through surface basalts - implications for coal seismic surveys (지표 현무암을 통해 전파하는 탄성파의 거동 - 석탄 탄성파탐사에 적용)

  • Sun, Weijia;Zhou, Binzhong;Hatherly, Peter;Fu, Li-Yun
    • Geophysics and Geophysical Exploration
    • /
    • v.13 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • Seismic reflection surveying is one of the most widely used and effective techniques for coal seam structure delineation and risk mitigation for underground longwall mining. However, the ability of the method can be compromised by the presence of volcanic cover. This problem arises within parts of the Bowen and Sydney Basins of Australia and seismic surveying can be unsuccessful. As a consequence, such areas are less attractive for coal mining. Techniques to improve the success of seismic surveying over basalt flows are needed. In this paper, we use elastic wave-equation-based forward modelling techniques to investigate the effects and characteristics of seismic wave propagation under different settings involving changes in basalt properties, its thickness, lateral extent, relative position to the shot position and various forms of inhomogeneity. The modelling results suggests that: 1) basalts with high impedance contrasts and multiple flows generate strong multiples and weak reflectors; 2) thin basalts have less effect than thick basalts; 3) partial basalt cover has less effect than full basalt cover; 4) low frequency seismic waves (especially at large offsets) have better penetration through the basalt than high frequency waves; and 5) the deeper the coal seams are below basalts of limited extent, the less influence the basalts will have on the wave propagation. In addition to providing insights into the issues that arise when seismic surveying under basalts, these observations suggest that careful management of seismic noise and the acquisition of long-offset seismic data with low-frequency geophones have the potential to improve the seismic results.

Improvement in facies discrimination using multiple seismic attributes for permeability modelling of the Athabasca Oil Sands, Canada (캐나다 Athabasca 오일샌드의 투수도 모델링을 위한 다양한 탄성파 속성들을 이용한 상 구분 향상)

  • Kashihara, Koji;Tsuji, Takashi
    • Geophysics and Geophysical Exploration
    • /
    • v.13 no.1
    • /
    • pp.80-87
    • /
    • 2010
  • This study was conducted to develop a reservoir modelling workflow to reproduce the heterogeneous distribution of effective permeability that impacts on the performance of SAGD (Steam Assisted Gravity Drainage), the in-situ bitumen recovery technique in the Athabasca Oil Sands. Lithologic facies distribution is the main cause of the heterogeneity in bitumen reservoirs in the study area. The target formation consists of sand with mudstone facies in a fluvial-to-estuary channel system, where the mudstone interrupts fluid flow and reduces effective permeability. In this study, the lithologic facies is classified into three classes having different characteristics of effective permeability, depending on the shapes of mudstones. The reservoir modelling workflow of this study consists of two main modules; facies modelling and permeability modelling. The facies modelling provides an identification of the three lithologic facies, using a stochastic approach, which mainly control the effective permeability. The permeability modelling populates mudstone volume fraction first, then transforms it into effective permeability. A series of flow simulations applied to mini-models of the lithologic facies obtains the transformation functions of the mudstone volume fraction into the effective permeability. Seismic data contribute to the facies modelling via providing prior probability of facies, which is incorporated in the facies models by geostatistical techniques. In particular, this study employs a probabilistic neural network utilising multiple seismic attributes in facies prediction that improves the prior probability of facies. The result of using the improved prior probability in facies modelling is compared to the conventional method using a single seismic attribute to demonstrate the improvement in the facies discrimination. Using P-wave velocity in combination with density in the multiple seismic attributes is the essence of the improved facies discrimination. This paper also discusses sand matrix porosity that makes P-wave velocity differ between the different facies in the study area, where the sand matrix porosity is uniquely evaluated using log-derived porosity, P-wave velocity and photographically-predicted mudstone volume.

Fast Join Mechanism that considers the switching of the tree in Overlay Multicast (오버레이 멀티캐스팅에서 트리의 스위칭을 고려한 빠른 멤버 가입 방안에 관한 연구)

  • Cho, Sung-Yean;Rho, Kyung-Taeg;Park, Myong-Soon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.625-634
    • /
    • 2003
  • More than a decade after its initial proposal, deployment of IP Multicast has been limited due to the problem of traffic control in multicast routing, multicast address allocation in global internet, reliable multicast transport techniques etc. Lately, according to increase of multicast application service such as internet broadcast, real time security information service etc., overlay multicast is developed as a new internet multicast technology. In this paper, we describe an overlay multicast protocol and propose fast join mechanism that considers switching of the tree. To find a potential parent, an existing search algorithm descends the tree from the root by one level at a time, and it causes long joining latency. Also, it is try to select the nearest node as a potential parent. However, it can't select the nearest node by the degree limit of the node. As a result, the generated tree has low efficiency. To reduce long joining latency and improve the efficiency of the tree, we propose searching two levels of the tree at a time. This method forwards joining request message to own children node. So, at ordinary times, there is no overhead to keep the tree. But the joining request came, the increasing number of searching messages will reduce a long joining latency. Also searching more nodes will be helpful to construct more efficient trees. In order to evaluate the performance of our fast join mechanism, we measure the metrics such as the search latency and the number of searched node and the number of switching by the number of members and degree limit. The simulation results show that the performance of our mechanism is superior to that of the existing mechanism.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Quality Assurance of Leaf Speed for Dynamic Multileaf Collimator (MLC) Using Dynalog Files (Dynalog file을 이용한 동적다엽조준기의 Leaf 속도 정도관리 평가)

  • Kim, Joo Seob;Ahn, Woo Sang;Lee, Woo Suk;Park, Sung Ho;Choi, Wonsik;Shin, Seong Soo
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.26 no.2
    • /
    • pp.305-312
    • /
    • 2014
  • Purpose : The purpose of this study is to analyze the mechanical and leaf speed accuracy of the dynamic multileaf collimator (DMLC) and determine the appropriate period of quality assurance (QA). Materials and Methods : The quality assurance of the DMLC equipped with Millennium 120 leaves has been performed total 92 times from January 2012 to June 2014. The the accuracy of leaf position and isocenter coincidence for MLC were checked using the graph paper and Gafchromic EBT film, respectively. The stability of leaf speed was verified using a test file requiring the leaves to reach maximum leaf speed during the gantry rotation. At the end of every leaf speed QA, dynamic dynalog files created by MLC controller were analyzed using dynalog file viewer software. This file concludes the information about the planned versus actual position for all leaves and provides error RMS (root-mean square) for individual leaf deviations and error histogram for all leaf deviations. In this study, the data obtained from the leaf speed QA were used to screen the performance degradation of leaf speed and determine the need for motor replacement. Results : The leaf position accuracy and isocenteric coincidence of MLC was observed within a tolerance range recommanded from TG-142 reports. Total number of motor replacement were 56 motors over whole QA period. For all motors replaced from QA, gradually increased patterns of error RMS values were much more than suddenly increased patterns of error RMS values. Average error RMS values of gradually and suddenly increased patterns were 0.298 cm and 0.273 cm, respectively. However, The average error RMS values were within 0.35 cm recommended by the vendor, motors were replaced according to the criteria of no counts with misplacement > 1 cm. On average, motor replacement for gradually increased patterns of error RMS values 22 days. 28 motors were replaced regardless of the leaf speed QA. Conclusion : This study performed the periodic MLC QA for analyzing the mechanical and leaf speed accuracy of the dynamic multileaf collimator (DMLC). The leaf position accuracy and isocenteric coincidence showed whthin of MLC evaluation is observed within the tolerance value recommanded by TG-142 report. Based on the result obtained from leaf speed QA, we have concluded that QA protocol of leaf speed for DMLC was performed at least bimonthly in order to screen the performance of leaf speed. The periodic QA protocol can help to ensure for delivering accurate IMRT treatment to patients maintaining the performance of leaf speed.

The Present State and Solutions for Archival Arrangement and Description of National Archives & Records Service of Korea (국가기록원의 기록물 정리기술의 현황과 개선방안)

  • Yoon, Ju-Bom
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.4 no.2
    • /
    • pp.118-162
    • /
    • 2004
  • Archival description in archives has an important role in document control and reference service. Archives has made an effort to do archival description. But we have some differences and problems about a theory and practical processes comparing with advanced countries. The serious difference in a theory is that a function classification, maintenance of an original order, arrangement of multi-level description are not reflected in practical process. they are arranged in shelves after they are arranged by registration order in a unit of a volume like an arrangement of book. In addition, there are problems in history of agency change or control of index. So these can cause inconvenience for users. For improving, in this study we introduced the meaning and importance of arrangement of description, the situation and problem of arrangement of description in The National Archives, and a description guideline in other foreign countries. The next is an example for ISAD(G). This paper has chapter 8, the chapter 1 is introduction, the chapter 2 is the meaning and importance of arrangement of description, excluding the chapter 8 is conclusion we can say like this from the chapter 3 to the chapter 7. In the chapter 3, we explain GOVT we are using now and description element category in situation and problem of arrangement of description in Archives. In the chapter 4, this is about guideline from Archives in U.S.A, England and Australia. 1. Lifecycle Date Requirement Guide from NARA is introduced and of the description field, the way of the description about just one title element is introduced. 2. This is about the guideline of the description from Public Record Office. That name is National Archives Cataloguing Guidelines Introduction. We are saying "PROCAT" from this guideline and the seven procedure of description. 3. This is about Commomon Record Series from National Archives of Australia. we studied Registration & description procedures for CRS system. In the chapter 5, This is about the example which applied ISAD to. Archives introduce description of documents produced from Appeals Commission in the Ministry of Government Administration. In the chapter 6, 7. These are about the problems we pointed after using ISAD, naming for the document at procedure section in every institution, the lack of description fields category, the sort or classification of the kind or form, the reference or identified number, the absence description rule about the details, function classification, multi-level description, input format, arrangement of book shelf, authority control. The plan for improving are that problems. The best way for arrangement and description in Archives is to examine the standard, guideline, manual from archives in the advanced countries. So we suggested we need many research and study about this in the academic field.

Small-Scale Pond Effects on Reducing Pollutants Load from a Paddy Field (논의 양분유출 저감을 위한 저류지 효과)

  • Kim, Min-Kyeong;Kwon, Soon-Ik;Jung, Goo-Bok;Hong, Seong-Chang;Chae, Mi-Jin;Yun, Sun-Gang;So, Kyu-Ho
    • Korean Journal of Environmental Agriculture
    • /
    • v.32 no.4
    • /
    • pp.355-358
    • /
    • 2013
  • BACKGROUND: Water-born pollution loads by agricultural non-point source (NPS) pollution are expected to become intensified due to ongoing precipitation change. Therefore, it is essential to develop a best management practice (BMP) that is suitable to agricultural environments in Korea. This study aimed to develop an environmental-friendly BMP to reduce NPS pollution load by agricultural activities. An eco-friendly way, small drainage pond, was suggested in this study to avoid direct drainage of agricultural runoffs and eventually reduce the amount of pollutants discharged into the surrounding aqua-environment. METHODS AND RESULTS: A small pond ($12m^2$) was constructed at the corner of a rice paddy field ($1,715m^2$) located in Suwon, Korea. Water was allowed to drain only via a small drainage pond. Sampling was repeatedly made at two locations, one from an entrance and the other from an exit of a pond, during the rice cultivation period (May to October, 2012). Generally, sampling was made only when runoff water drained through a pond, such as during and/or after rain (irrigation). The water quality analysis showed that all quality parameters (SS, $COD_{Mn}$, T-N, and T-P) were improved as water passed through the pond. The amount of runoff water was reduced by 96~100%. Suspended solids and COD concentrations was reduced by 79.3% and 45.6%, respectively. In case of T-N and T-P concentrations, the reduction rates were 52.2% and 60.5%, respectively and the amount of T-N and T-P were reduced by 16.3~73.0% and 15.4~70.1%, respectively. CONCLUSION(S): Our data implies that agricultural NPS pollution from rice paddy fields can be effectively managed when an appropriate drainage water management practice is imposed. In this paper, it was suggested that an installation of a small drainage pond can be effective to prevent not only the nutrient loss from rice fields but also pollutant discharge to surrounding water environments.

A Case Study on Venture and Small-Business Executives' Use of Strategic Intuition in the Decision Making Process (벤처.중소기업가의 전략적 직관에 의한 의사결정 모형에 대한 사례연구)

  • Park, Jong An;Kim, Young Su;Do, Man Seung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.1
    • /
    • pp.15-23
    • /
    • 2014
  • A Case Study on Venture and Small-Business Executives' Use of Strategic Intuition in the Decision Making Process This paper is a case study on how Venture and Small-Business Executives managers can take advantage of their intuitions in situations where the business environment is increasingly uncertain, a novel situation occurs without any data to reflect on, when rational decision-making is not possible, and when the business environment changes. The case study is based on a literature review, in-depth interviews with 16 business managers, and an analysis of Klein, G's (1998) "Generic Mental Simulation Model." The "intuition" discussed in this analysis is classified into two types of intuition: the Expert Intuition which is based on one's own experiences, and Strategic Intuition which is based on the experience of others. Case study strategic management intuition and intuition, the experts were utilized differently. Features of professional intuition to work quickly without any effort by, while the strategic intuition, is time-consuming. Another feature that has already occurred, one expert intuition in decision-making about the widely used strategic intuition was used a lot in future decision-making. The case study results revealed that managers were using expert intuition and strategic intuition differentially. More specifically, Expert Intuition was activated effortlessly, while strategic intuition required more time. Also, expert intuition was used mainly for making judgments about events that have already happened, while strategic intuition was used more often for judgments regarding events in the future. The process of strategic intuition involved (1) Strategic concerns, (2) the discovery of medium, (3) Primary mental simulation, (4) The offsetting of key parameters, (5) secondary mental simulation, and (6) the decision making process. These steps were used to develop the "Strategic Intuition Decision-making Model" for Venture and Small-Business Executives. The case study results further showed that firstly, the success of decision-making was determined in the "secondary mental simulation' stage, and secondly, that more difficulty in management was encountered when expert intuition was used more than strategic intuition and lastly strategic intuition is possible to be educated.

  • PDF

A Study on the Safety of Evacuation according to Evacuation Delay Time and Fire Door Openness: Based on Residence Types (피난 지연시간의 적용과 방화문 개방 정도에 따른 피난 안전성 확보에 관한 고찰 : 주거형태를 중심으로)

  • Seo, Dong-Gil;Kim, Mi-Seon;Gu, Seon-Hwan;Song, Young-Joo
    • Fire Science and Engineering
    • /
    • v.34 no.2
    • /
    • pp.156-165
    • /
    • 2020
  • In this paper, the application of evacuation delay time (Cognition time + initiation time) and examine the degree of opening of fire doors in households for evaluating evacuation safety and suggest a realistic alternative. In order to proceed with this study, first of all, the preliminary investigation on evacuation safety evacuation of residential-type buildings (Apartment, urban living houses, etc.) among the performance-oriented design targets of Gwangju Metropolitan City, which was implemented until June 2018. Then, for the two representative types that are commonly used among the previously surveyed buildings, evacuation delay time is applied to W1, W2, and respectively simulating the opening of the doors is applied to th full open, 1/4 open, the leakage gap and evacuation safety evaluation was performed. As a result of evaluating evacuation safety was found that it is difficult to secure evacuation safety regardless of evacuation delay time W1 and W2 when the fire door is fully open and 1/4 open, Only when the leakage gap is applied evacuation safety was ensured even if evacuation delay time W2 was applied. Therefore, when a residential building is subject to performance-oriented design, evaluating the application of W2 rather than W1 is considered for evacuation delay time to reflect concern about privacy infringement due to CCTV installation, etc. In order to secure the Smoke blocking performance of the fire door and to improve the performance-oriented design, I would like to propose to consider the method of applying a leak gap to the degree of opening of the fire door. Through this, it is expected that the performance-oriented design will be a step further by performing evacuation safety evaluation with more realistic data.