Numerical models for seepage analysis are useful tools to analyze problems and design protection techniques that are related to seepage through a levee. Though every model may have its own limitations and shortcomings, there were no generalized verifications or calibrations for the commercial models. It means that users can run the model and get the result without understanding nor taking any enough training. This paper Investigates applicability and suitability of some seepage numerical models by comparing analytical solutions with experiments in the user's viewpoint. The results showed that it is more desirable to use analyses with unsaturated-unsteady condition rather than those with saturated-steady conditions, since seepage phenomenon of real levees are changed according to water level and soil property. This study also compared the calculated unsteady solutions with the calculated steady solutions for the levee at Koa of the Nakdong River The comparison revealed that as the result, the safety factor of $2.0{\sim}3.5$ has the same effects for seepage protection techniques when they are designed on the basis of steady-state analysis.
Background : Ephedra (Ephedra sinica) has been widely used to treat respiratory disease in traditional medicine of East Asia for over a hundred years. Despite safety concerns raised by some, the use of ephedra in traditional medicine is documented over more than 1,800 years. It is well established that ephedra is one of the central medicines in Korean 'Seseng constitution' medicine. In Sasang constitution medicine, all humans can be divided into one of four types: Soeumin, Soyangin, Taeumin or Taeyangin, and each constitution type has their own typical characteristics. Accordingly, it is hypothesized that the adverse effects of ephedra differ depending on the Sasang constitution classification. Objectives : The aim of this study was to determine adverse effects of ephedra which is classified as a Taeumin herb, and to observe whether the response differs or not. according to Sasang constitution classification. Methods : The study design was a double-blind randomized controlled trial. The subjects were healthy adults 20 - 50 years old who agreed to participate in this study. They were allocated through randomization to either ephedra group (N=55) or placebo group (N=24). where ephedra extract (6 g of dried ephedra) and placebo with similar opaque capsules were given twice for one day. To compare the adverse events of ephedra according to Sasang constitution classification, we analyzed blood pressure (systolic and diastolic), pulse rate, the morning questionnaire, and patient's global assessment scale score for well known adverse events: palpitation, headache, sweating, tiredness, dyspepsia, and dry mouth. Results : After ingestion of ephedra, the pulse rate had a significant increase in all constitution types. The changes of diastolic pressure in Soeumin and the changes of pulse rate in Soeumin, Soyangin and Taeumin had a significant increase in the ephedra over the control group. In the ephedra group, the palpitation and dyspepsia score of the patients' global assessment scale had a significant increase in Soeumin, with palpitation and sweating score increasing in Soyangin. Others observations were insignificant results. Conclusion : The results of this study may confirm that the physical responses or adverse effects of herbs differ for each type of Sasang constitution. Future studies using other herbs will be required to ascertain the herbal drug reaction of Sasang constitutions.
Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
Journal of Internet Computing and Services
/
v.17
no.6
/
pp.81-91
/
2016
VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.
Journal of the Korea Academia-Industrial cooperation Society
/
v.17
no.9
/
pp.401-406
/
2016
When measuring live cable faults and their location based on reflectometry, a coupler is placed between the cable and the test system. This coupler prevents damage to the test circuits by indirectly measuring the live voltage of the cable using reflectometry. It also provides a coupling path that allows the transmission and receive signal to pass into the cable. In this study, we design and construct a contact coupler to locate faults in both dead and live cables using reflectometry. The proposed coupler is of the inductive coupling type and is constructed after the calculation of the signal transmission loss by simulation. The performance of the developed coupler is tested by measuring the transmission loss and frequency flatness. The results showed that the transmission signal loss is less than -1.98dB in the frequency bandwidth above 1 Mhz. The reflectometry system was designed based on sequence time domain reflectometry (STDR) and spread spectrum time domain reflectometry (SSTDR) in order to apply it to the detection of faults and their location in live cables and tests on live cables were performed. The test results showed that the proposed coupler can be used in a reflectometry system for live cable fault detection.
Purpose - A lot of preceeding studies have focused on the pains that might be felt in spending money, that is an important role in getting psychological safety. Money and social resources can be all for consumers, and they are likely to form a substituting relationship with one another. Being motivated by the idea that spending money for others can come with joy if one's objective is accomplished by social support, this paper aimed to explore the mediating role of the perceived money importance and gratitude in the relationship between social support and pleasure in spending for other-gift. Research Design, Data, and Methodology - In this empirical study, the experimental group is expected to receive social support while the control group is composed of those who are usually indulged in reminiscences of their sweethearts. From the college students, 160 experiment participants were selected and 80 participants of them were assigned to control group as well as to experimental group respectively at random. Empirical study for each of the two groups was performed respectively by means of questionnaire survey. Experimental group data and control group data were combined together to be used for testing hypotheses. Linear structural equation model in Amos was used to verify the hypotheses, and Bootstrap was also used to examine whether there were the mediating roles of the perceived money importance and gratitude or not. Results - From the empirical study, following conclusions could be drawn: First, social support of others makes one perceive the importance of money less; Second, social support of others makes one perceive gratitude to others; Third, less perceived importance of money and gratitude to others can make one feel pleasure in spending for other-gift; and Fourth, less perceived importance of money and gratitude to others can partially mediate the effect of social support from others on the pleasure in spending for other-gift. Conclusions - The outcomes of this study might offer theoretic and managerial implications as follow: Even though many hitherto studies have asserted that spending money usually comes with pains, this study discovered that social support might reduce perceived the importance of money but make others feel gratitude and, thus, one would feel joy in spending money to buy gift for others, and made a contribution to the progress of the theory of pleasure in spending for other-gift. This paper also made contributions toward the development of emotion marketing theory by showing that the effect of social support on the pleasure in spending for other-gift could be partially mediated by the perceived the importance of money and gratitude to others. Based on the above conclusions, it may be affirmed that marketers should help consumers perceive the importance of money less, and help feel gratitude to others by pointing up the support of others to consumers in an attempt to accelerate spending for other-gift.
KIPS Transactions on Computer and Communication Systems
/
v.5
no.4
/
pp.79-86
/
2016
About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.15
no.2
/
pp.36-49
/
2016
A subway system is one of the major transportation modes at a metropolitan area. When it meets the other lines, the metro station, so-called transferring station, is usually threatened by severe pedestrian congestion and safety issue of transit users including the transportation vulnerable. Although transportation planners forecast travel demand at the beginning, it is not easy to predict pedestrian flows precisely for a long term if land use plans have dramatically changed. Due to expensive costs, structural extension of metro stations is limited. Therefore, it requires efficient and technical improvements as meeting the demand of pedestrian and physical characteristics. In this study, the core mechanism of pedestrian movement-based simulation model was introduced and evacuation scenarios were analyzed with the developed model. As a result, the multiple optimal routes for unexpected events at the solid space of the multiple stories are easily searched through the simulator and in the case of Sadang Station, travel time can be reduced by 60% when the evacuation information and intuitive design are provided.
Park, Joonam;Jin, Dahee;Kim, Dohwan;Bae, Kyung Taek;Lee, Kang Taek;Lee, Yong Min
Journal of the Korean Electrochemical Society
/
v.22
no.4
/
pp.139-147
/
2019
Lithium-ion battery (LiB) with high energy density and efficiency has been utilized for the electric vehicle (EV) and energy storage system (ESS) as well as portable devices. However, as explosion accidents have frequently happened till lately, all-solid-state lithium secondary battery (ALSB) began to get in a spotlight because it can secure a very high safety and energy density by substituting flammable organic liquid electrolyte to nonflammable inorganic solid electrolyte. In spite of ALSB's certain merits, it has shown much poorer performance of cells than one of LiB due to some challenges, which have been small or never dealt with in the LiB system. Hence, although plenty of studies made progress to solve them, an approach about design of all-solid-state electrode (ASSE) has been limited on account of difficulty of ALSB's experiments. That is why the virtual 3D structure of an all-solid-state electrode has to be built and used for the prediction of cell performance. In this study, we elucidate how to form the 3D ASSE structure and what to be needed for the simulation of characteristics on ALSB. Furthermore, the ultimate orientation of 3D modeling and simulation for the study of ALSB are briefly suggested.
International Journal of Naval Architecture and Ocean Engineering
/
v.10
no.2
/
pp.129-140
/
2018
A residual stress generated in the steel structure is broadly categorized into initial residual stress during manufacturing steel material, welding residual stress caused by welding, and heat treatment residual stress by heat treatment. Initial residual stresses induced during the manufacturing process is combined with welding residual stress or heat treatment residual stress, and remained as a final residual stress. Because such final residual stress affects the safety and strength of the structure, it is of utmost importance to measure or predict the magnitude of residual stress, and to apply this point on the design of the structure. In this study, the initial residual stress of steel structures having thicknesses of 25 mm and 70 mm during manufacturing was measured in order to investigate initial residual stress (hereinafter, referred to as initial stress). In addition, thermal elastic plastic FEM analysis was performed with this initial condition, and the effect of initial stress on the welding residual stress was investigated. Further, the reliability of the FE analysis result, considering the initial stress and welding residual stress for the steel structures having two thicknesses, was validated by comparing it with the measured results. In the vicinity of the weld joint, the initial stress is released and finally controlled by the weld residual stress. On the other hand, the farther away from the weld joint, the greater the influence of the initial stress. The range in which the initial stress affects the weld residual stress was not changed by the initial stress. However, in the region where the initial stress occurs in the compressive stress, the magnitude of the weld residual compressive stress varies with the compression or tension of the initial stress. The effect of initial stress on the maximum compression residual stress was far larger when initial stress was considered in case of a thickness of 25 mm with a value of 180 MPa, while in case of thickness at 70 mm, it was 200 MPa. The increase in compressive residual stress is almost the same as the initial stress. However, if initial stress was tensile, there was no significant change in the maximum compression residual stress.
What is particularly noteworthy from Korean and foreign railway tunnel disaster prevention standards is that for the sake of rapid evacuation, more stringent standards for provision of evacuation passages, which require high cost, are being applied. Korean standards stipulate that passage installation should be determined in accordance with the level of risk through a QRA analysis of each tunnel with 1km or longer length. As, however, detailed application criteria as fire occurrence probability, fire occurrence scenario, size of fires and evaluation criteria for level of social risk are not available, additional costs may be incurred due to excessive design. Thus, standards of an appropriate level need to be established. With this backdrop, this study selects detailed application conditions of a reasonable and appropriate level through a study and analysis of relevant documents and analyzes the maximum length of tunnels to which the application of evacuation passages, or the application major evacuation promotion facilities, can be relaxed, together with a QRA analysis of model tunnels (for high speed rail) with different tunnel lengths. In addition, the QRA results on tunnels, including those on the Honam high-speed rail, and analysis results for the model tunnels, are compiled, ; the ultimate results are compared with Korean and other countries' standards related to evacuation promotion facilities, As a result, The appropriateness of application standards are reviewed. These results are expected to be utilized as basic material for establishing a reasonable disaster prevention plan that will consider safety and economies.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.