Journal of the Korea Academia-Industrial cooperation Society
/
v.13
no.12
/
pp.6089-6097
/
2012
This study suggested a method of detecting an incident inside tunnel by using camera that is installed within the tunnel. As for the proposed incident detection method, a static object, travel except vehicles, smoke, and contra-flow were detected by extracting the moving object through using the real-time background image differencing after receiving image from the camera, which is installed inside the tunnel. To detect the moving object within the tunnel, the positive background image was created by using the moving information of the object. The incident detection method was developed, which is strong in a change of lighting that occurs within the tunnel, and in influence of the external lighting that occurs in the entrance and exit of the tunnel. To examine the efficiency of the suggested method, the experimental images were acquired from Marae tunnel and Expo tunnel in Yeosu of Jeonnam and from Unam tunnel in Imsil of Jeonbuk. Number of images, which were used in experiment, included 20 cases for static object, 20 cases for travel except vehicles, 4 cases for smoke, and 10 cases for contra-flow. As for the detection rate, all of the static object, the travel except vehicles, and the contra-flow were detected in the experimental image. In case of smoke, 3 cases were detected. Thus, excellent performance could be confirmed. The proposed method is now under operation in Marae tunnel and Expo tunnel in Yeosu of Jeonnam and in Unam tunnel in Imsil of Jeonbuk. To examine accurate efficiency, the evaluation of performance is considered to be likely to be needed after acquiring the incident videos, which actually occur within tunnel.
Journal of the Korean Society of Propulsion Engineers
/
v.3
no.4
/
pp.93-103
/
1999
The steady-state performance analysis program for turboprop engine which was used for a small, middle industrial aircraft and a basic trainer aircraft was developed and linear Gas Path Analysis method was applied to Engine Health Monitoring for Turboprop engine. This program was compared with TURBOMARCH program which is well known with performance and power according to flight Mach No. at the standard atmospheric condition to prove a steady-state performance analysis program. From the result, inlet, exit temperature and pressure of each component had error within 3% and especially power according to flight Mach No. had error within 2.4% so that this program could be assured. To make sure if linear Gas Path Analysis is reasonable four cases were selected. The first is the case that fouling is occurred in compressor only. The second is the case that fouling is occurred in compressor and erosion is occurred in turbine. The third is the case that erosion is occurred in both compressor and turbine and power turbine at the same time. Finally, the case that fouling and erosion are occurred in compressor, compressor turbine and power turbine was selected. Different parameters were selected impartially among the independent parameters so that the effect of measurement parameter selection was observed. From the result, the more measurement parameters the smaller RMS error and even though the number of measurement parameters was the same, the RMS error was obtained differently according to which measurement parameters were selected. The case using eight instrument parameters of case IV-4 had small error comparably and was economic and it was important to select optimal number of measurement and optimal measurement parameters.
The present systematic review and meta-analysis was conducted to assess any association between breastfeeding and the risk of ovarian cancer. A systematic search of published studies was performed in PUBMED and EMBASE and by reviewing reference lists from retrieved articles through March 2013. Data extraction was conducted independently by two authors. Pooled relative risk ratios were calculated using random-effect models. Totals of 5 cohort studies and 35 case-control studies including 17,139 women with ovarian cancer showed a 30% reduced risk of ovarian cancer when comparing the women who had breastfed with those who had never breastfed (pooled RR = 0.70, 95% CI: 0.64-0.76; p = 0.00), with significant heterogeneity in the studies (p = 0.00; I2 = 76.29%). A significant decreasd in risk of epithelial ovarian cancer was also observed (pooled RR = 0.68, 95% CI: 0.61-0.76). When the participants were restricted to only parous women, there was a slightly attenuated but still significant risk reduction of ovarian cancer (pooled RR = 0.76, 95% CI: 0.69-0.83). For total breastfeeding duration, the pooled RRs in the < 6 months, 6-12 months and > 12 months of breastfeeding subgroups were 0.85 (95% CI: 0.77-0.93), 0.73 (95% CI: 0.65-0.82) and 0.64 (95%CI: 0.56-0.73), respectively. Meta-regression of total breastfeeding duration indicated an increasing linear trend of risk reduction of ovarian cancer with the increasing total breastfeeding duration (p = 0.00). Breastfeeding was inversely associated with the risk of ovarian cancer, especially long-term breastfeeding duration that demonstrated a stronger protective effect.
This paper describes a trans-admittance scanner for breast cancer detection. A FPGA-based sinusoidal waveform generator produces a constant voltage. The voltage is applied between a hand-held electrode and a scan probe placed on the breast. The scan probe contains an 8x8 array of electrodes that are kept at the ground potential. Multi-channel precision digital ammeters using the phase-sensitive demodulation technique were developed to measure the exit current from each electrode in the array. Different regions of the breast are scanned by moving the probe on the breast. We could get trans-admittance images of resistor and saline phantoms with an anomaly inside. The images provided the information on the depth and location of the anomaly. In future studies, we need to improve the accuracy through a better calibration method. We plan to test the scanner's ability to detect a cancer lesion inside the human breast.
This work aims to introduce the concept of microcomputer aided port design simulation methodology including the analysis of the mathematical models to be implemented and apply it to the Third Stage Busan Port Development Project. In the Busan case study, the size of the proposed turning basin of the new terminal, together with the operational strategies of berthing and unberthing, was examined, In addition, the safety on ship's entry and exit through the projected new breakwaters was ascertained. From the application of simulation to the Busan project, it was found that the proposed dredging area was not sufficiently wide enough for the modelled container ship to perform A time unberthing (in which the ship turns to port as she manoeuvres away from N.1. Berth with the assistance of tugs), especially in a strong easterly wind. It is therefore, recommended that Busan pilots should be advised to sue B type unberthing strategy, in which the ship goes astern from no.1 berth tot he turning area in front of No.2 berth(where the ship turns 180 degrees clockwise), especially when the wind is very strong, It is also recommended that a sea buoy be placed outside the new breakwaters, as this was found to improve the safety of ship manoeuvres through the breakwaters significantly . Another recommendation is that the Korean hydrodynamic Office carry out a detailed survey of the currents in the water area near the new breakwaters once they have been constructed. In addition, it is to be recommended that a current meter be placed at the recommended sea buoy to improve the safety of ship manoeuvres which could otherwise be jeopardised by eeroneos current information.
We describe a technique for automatically proving compiler optimizations sound, meaning that their transformations are always semantics-preserving. As is well known, IR (Intermediate Representation) optimization is an important step in a compiler backend. But unfortunately, it is difficult to detect and debug the IR optimization errors for compiler developers. So, we introduce a C level error check system for detecting the correctness of these IR transformation techniques. In our system, we first create an IR-to-C converter to translate IR to C code before and after each compiler optimization phase, respectively, since our technique is based on the Memory Comparison-based Clone(MeCC) detector which is a tool of detecting semantic equivalency in C level. MeCC accepts only C codes as its input and it uses a path-sensitive semantic-based static analyzer to estimate the memory states at exit point of each procedure, and compares memory states to determine whether the procedures are equal or not. But MeCC cannot guarantee two semantic-equivalency codes always have 100% similarity or two codes with different semantics does not get the result of 100% similarity. To increase the reliability of the results, we describe a technique which comprises how to generate C codes in IR-to-C transformation phase and how to send the optimization information to MeCC to avoid the occurrence of these unexpected problems. Our methodology is illustrated by three familiar optimizations, dead code elimination, instruction scheduling and common sub-expression elimination and our experimental results show that the C level error check system is highly reliable.
Journal of the Korean Society of Groundwater Environment
/
v.6
no.2
/
pp.95-100
/
1999
Hydrocarbon compounds in vadose zone soils caused by adsorption onto the surfaces of solid particles are generally considered to show retardation effect. In this study, we investigated the retardation effect on the transport of Benzene in a sandy soil by conducting batch and column tests. The batch test was conducted by equilibrating dry soil mass with Benzene solutions of various initial concentrations. and by analyzing the concentrations of Benzene in initial and equilibrated solutions using HPLC. The column test consisted of monitoring the concentrations of effluent versus time known as a breakthrough curve (BTC). We used KCl and Benzene solutions with the concentration of 10 g/L and 0.88 g/L as a tracer, and injected them into the inlet boundary of the soil sample as a square pulse type respectively, and monitored the effluent concentrations at the exit boundary under a steady state condition using an EC-meter and HPLC. From the batch test, we obtained a distribution coefficient assuming that a linear adsorption isotherm exists and calculated the retardation factor based on the bulk density and porosity of the column sample. We also predicted the column BTC curve using the retardation factor obtained from the distribution coefficient and compared with the measured BTC of Benzene. The results of the column test showed that i) the peak concentration of Benzene was much smaller than that of KCl and ⅱ) the travel times of peak concentrations for the two tracers were more or less identical. These results indicate that adsorption of Benzene onto the sand panicles occurred during the pulse propagation but the retardation of Benzene caused by adsorption was not present in the studied soil. Comparison of the predicted with the measured BTC of Benzene resulted in a poor agreement due to the absence of the retardation phenomenon. The only way to describe the absolute decrease of Benzene concentration in the column leaching experiment was to introduce a decay or sink coefficient in the convection-dispersion equation (CDE) model to account for an irreversible sorption of Benzene in the aqueous phase.
This study was carried out to investigate the branch and distribution of Nervus facialis of the Korean native goat. The observation was made by dissection of embalmed cadavers of ten Korean native goats. The results were as follows; 1. N. facialis arose from the ventrolateral surface of the medulla oblongata. 2. In the facial canal, N. facialis gave off N. petrosus major, N. stapedius and Chorda tympani. 1) N. petrosus major arose from Ganglion geniculi, passed through the pterygoid canal and terminated in Ganglion pterygopalatinum. 2) Chorda tympani joined N. lingualis at the lateral surface of the internal pterygoid muscle. 3. At the exit of the stylomastoid foramen, N. facialis gave off N. caudalis auricularis, Ramus auricularis internus, Ramus stylohyoideus and Ramus digastricus. 1) N. caudalis auricularis arose by two branches in 6 cases and by a single branch in 4 cases. N. caudalis auricularis gave off branches to the caudoauricuIar muscles and the internal surface of the conchal cavity. 2) Ramus auricularis internus arose by a single branch except in 2 cases in which it arose in common with N. caudalis auricularis. It penetrated the caudolateral surface of the tragus and distributed in the skin of the scapha. 3) Ramus stylohyoideus and Ramus digastricus arose separately from N. facialis. 4. In the deep surface of the parotid gland, N. facialis divided into N. auriculopalpebralis, Ramus buccalis dorsalis and Ramus buccalis ventralis. In 6 cases, N. facialis gave off Ramus buccalis ventralis and then divided into N. auriculopalpebralis and Ramus buccalis dorsalis. In 3 cases, N. facialis trifurcated into Ramus buccalis ventralis, Ramus buccalis dorsalis and N. auriculopalpebralis. In one case, N. facialis gave off N. auriculopalpebralis and then divided into Ramus buccalis dorsalis and Ramus buccalis ventralis. 1) Ramus buccalis ventralis ran along the ventral border of the masseter muscle and distributed to the buccinator and depressor labii inferioris muscles. Ramus buccalis ventralis communicated with a branch of Ramus buccalis dorsalis and N. buccalis. In 2 cases, it also communicated with N. mylohyoideus. 2) Ramus buccalis dorsalis communicated with Ramus transverses faciei, N. buccalis, N. infraorbitalis and a branch of Ramus buccalis ventralis. Ramus buccalis dorsalis distributed to the orbicularis oris, caninus, depressor labii inferioris, levator labii superioris, buccinator, malaris, nasolabialis and zygomaticus muscles. 3) N. auriculopalpebralis gave off Rami auriculares rostrales, which supplied the zygomaticoauricularis muscle, the frontoscutularis muscle and the skin of the base of the ear. N. auriculopalpebralis then continued as Ramus zygomaticus, which innervated the frontal muscle, the lateral surface of the base of the horn, the orbicularis oculi muscle and the adjacent skin of the orbit. N. auriculopalpebralis communicated with Nn. auriculares rostrales and Ramus zygomaticotemporalis. In 7 cases, it also communicated with N. infratrochlearis.
Wornen's lahor market participation as well as the policy concern for wider utilization of married women, have continuously grown up. However, research efforts on the determinants of women's labor market participation, in the context of the relationship hetween life courses and active entry into lahor market, has been far behind the growing interest in this field. This study has conducted an event histoiry analysis of women's labor market transition utilizing personal occupational history data collected by the Korea Institute for Women's Development in 1991. The analysis is divided into tow parts: First part introduces logit regression to analyze the determinants of women's labor market participation and exit. The second part employs Cox regression to see the variation of transition rate between employment and non-employment. The result shows that there is a wide variation in women's labor market participation according to age, cohort, and family formation. Special note is needed for the significantly negative effect of marriage and child birth on labor market participation. The transition pattern of lower class women with less education fits well to the prediction of neo-classical economics; but the tendency of highly educated women's regression to non-employment reveals the strong influence of the unfavorable labor market structure, which can be better explained by the neo-structuralist perspective. There is a strong trade-off between productive and reproductive labor of women, which can only be corrected by strong policy implementation, such as extended child care facilities, abolition of discriminatory employment practices, and expansion of flexible part-time employment.
KSCE Journal of Civil and Environmental Engineering Research
/
v.34
no.4
/
pp.1279-1287
/
2014
The purpose of this study is to develop the U-turn accident model at signalized intersections in urban areas. The characteristics of the accidents which are associated with U-turn operation at 3 and 4-legged signalized intersections was analyzed and the U-turn accident model was developed by regression analysis in Changwon city. First, in order to analyze the effectiveness on traffic accidents by U-turn installation, the difference of mean of traffic accident number are measured between two groups which are composed by whether or not U-turn installation the groups by Mann-Whitney U test. The result of significance test showed that intergroup comparison on mean by accident types made difference except rear-end accident type and by accident locations exit section only showed difference in significance level at 4-legged intersections, so the accident number have more where the U-turn is permitted than not. Response measures about the number of accidents were classified by whether accidents occurred and accident model were constructed using binomial logistic regression analysis method. The developed models show that the variables of conflict traffic, number of opposing lane are adopted as independent variable for both intersections. The variables of longitudinal grade for 3-legged signalized intersection and number of crosswalk for 4-legged signalized intersection at which the U-turn is permitted is adopted as independent variable only. These study results suggest that U-turn would be permitted at the intersection where the number of opposing lane is more than 3.5 each, the longitudinal grade of opposing road is upward flow and there is need to establish the U-turn traffic sign at signalized intersections.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.