• Title/Summary/Keyword: File system

Search Result 2,276, Processing Time 0.025 seconds

Urban Flood Simulation Considering Buildings Resistance Coefficient Based on GIS: Focused on Samcheok City (건물 저항계수에 따른 GIS기반의 밀집 시가지 침수모의 -삼척시가지를 중심으로-)

  • Ji, Juong-Hwan;Kang, Sang-Hyeok
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.2
    • /
    • pp.211-220
    • /
    • 2010
  • The objective of this paper presents the application of an "integrated urban flood modeling-runoff model, urban flood model and sewer system model-" in a highly urbanized area of Samcheok where is seriously inundated in 2002 and 2003. For this, we demonstrate how couple a 1-D hydrodynamic model of the river, a 2-D hydrodynamic model of the overland (surface) flow, and a sewer network model including each boundary conditions. In order to make data file for the model, topographic information like elevation and share rate of buildings are directly extracted from DEM or topographical source data without data exchange to avoid uncertainty errors. Furthermore, the research is to assess the impacts of Manning n and buildings influences to inundated depth by changing its share ratio from 10 % to 30 % in low-land urban area. As a results, we found out that the urban inundated depth was decreased by Manning n but increased by buildings ratio. The calculated results of inundation was similar with observed one in 2002 and 2003 flooding. Furthermore, the area was also inundated under not riverbank break case in 2002 flooding.

Study on the Korean Public Libraries under the period of the Japanese Rule (일제하의 공공도서관에 관한 연구)

  • Kim Po Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.6
    • /
    • pp.137-163
    • /
    • 1979
  • The Purpose of this study is analyzed that (l) How the public Libraries under the Japanese Rule since the end of the Yi-Dynasty were recepted and generated by the people and (2) How they were organiged and managed. (3) Also it examined that how they affected the development of the libraries of today. 1. The following are the analyzed results: Three types of the public Libraries under the Japanese Rule for a period of 36 years engaged busily in colonization were Private's Public Libraries, Local Self-Government's Libraries and the Central Governmental Libraries, and were in order established. 2. They were eatablished by individuals, Confucian School Foundation, Young Men's Clubs, School Associations, Korean brethren residing abroad, or The Press Centering around the Local Self-Governments and the Japanese Government-General. 3. In 1932 of the period of the Japanese Rule, the number of Libraies gained the summit and reached 80 Libraries. The Public Libraries including the Central Governmental Libraries remained in existence until the end of the War had been kept up the functions of the Libraries, but the Private Libraries operated by the Koreans were very small and poor. As a result, most of them were closed up and some Libraries transferred their controls to the public. Until the end of the war, only a little over 10 Private Libraries were Kept up. From the aspects of it's organization system, the most of their libraries replaced their chief librarians with non-professional county-headmen or Local supporters. From the aspect of collections, they wate mainly consists of Japanese books for the proper quidance of the public thought based on the ideology of Japanese Rule to Korea and on the industrial promotion rather than books about Koreanology or Western books. At that time, the Library users were with the jobless men and students as the central figures. And the next ranking by the social position of readers was children, farmers, merchants, industrialists, public servants, miscellaneous and educators. Their reading tendencies laid stress on linguistics and literature, physical sciences and medicine, While the reading trend of military sciences and medicine, while the reading trend of military sciences and engineering were very inactive. This was because the Japanese Government-General had not kept the military collections on file. Besides, they were reluctant to make Korean's learn the professional knowledge and so the main reference materials of technology not provited. Most of the Libraries put practiced in circulation services were very important circulation in withinder of the reading room rather than in outside of the Library building. On the other hand, their circulation services has above came with many limitations. As stated above, the public Libraries' managements and activitives under the period of Japanese Rule were the way and means to achive the colonial and imperialistic purpose of the Japanese Empire.

  • PDF

Code Generation for Integrity Constraint Check in Objectivity/C++ (Objectivity/C++에서 무결성 제약조건 확인을 위한 코드 생성)

  • Kim, In-Tae;Kim, Gi-Chang;Yu, Sang-Bong;Cha, Sang-Gyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.416-425
    • /
    • 1999
  • 복잡한 무결성 제약 조건을 효율적으로 확인하기 위해 제약 조건들을 룰 베이스(rule base)에 저장하고 별도의 룰 관리 시스템과 제약 조건 관리 시스템을 통해 제약 조건을 확인하는 기법이 많은 연구자들에 의해 연구되고 발표되었다. 그러나 제약 조건 관리 시스템이 실행시간에 응용 프로그램을 항상 모니터링하고 있다가 데이타의 수정이 요청될 때마다 개입하여 프로세스를 중단시키고 관련 제약 조건을 확인하는 기존의 방법들은 처리 시간의 지연을 피할 수 없다. 본 논문은 컴파일 시간에 제약 조건 확인 코드를 응용 프로그램에 미리 삽입할 것을 제안한다. 응용 프로그램 자체 내에 제약 조건 확인 코드가 삽입되기 때문에 실행 시간에 다른 시스템의 제어를 받지 않고 직접 제약 조건의 확인 및 데이타베이스의 접근이 가능해져서 처리 시간의 지연을 피할 수 있을 것이다. 이를 위해 어떤 구문이 제약 조건의 확인을 유발하는 지를 추적하였고, 컴파일러가 그러한 구문을 어떻게 전처리 과정에서 검색하는지 그리고 그러한 구문마다 어떻게 해당 제약 조건 확인 코드를 삽입할 수 있는 지를 객체지향1) 데이타베이스 언어인 Objectivity/C++에 대해 gcc의 YACC 코드를 변경함으로써 보여 주었다.Abstract To cope with the complexity of handling integrity constraints, numerous researchers have suggested to use a rule-based system, where integrity constraints are expressed as rules and stored in a rule base. A rule manager and an integrity constraint manager cooperate to check the integrity constraints efficiently. In this approach, however, the integrity constraint manager has to monitor the activity of an application program constantly to catch any database operation. For each database operation, it has to check relevant rules with the help of the rule manager, resulting in considerable delays in database access. We propose to insert the constraints checking code in the application program directly at compile time. With constraints checking code inserted, the application program can check integrity constraints by itself without the intervention of the integrity constraint manager. We investigate what kind of statements require the checking of constraints, show how the compiler can detect those statements, and show how constraints checking code can be inserted into the program, by modifying the GCC YACC file for Objectivity/C++, an object-oriented database programming language.

An Action Information Management Method for Creating Adaptive NPC (적응형 NPC를 생성하는 행동 정보 관리 기법)

  • Kim, Na-Ra;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.8 no.1
    • /
    • pp.103-113
    • /
    • 2008
  • Although people have had more opportunities to enjoy various types of game, most of players have felt less satisfaction with the games. This is the reason that since most Non-player Characters (NPCs) are simple and uniform, they have some limitations for competing with a variety of players. Thus, technologies for creating intelligent NPCs that can compete with each player at a similar level are required. In this paper, we present an action information management method for creating adaptive NPCs based on the algorithm for calculating their action efficiency. This algorithm is useful to the adaptation method for saving and controlling player-appropriate action. In our method, adaptive NPCs observe the actions of players and collect the relationship data between status and action. The efficiency value of the action data is calculated and data of similar status are grouped, and finally stored at the action database. The game system of NPC updates the action database and stores diverse actions. Then, NPC selects action with high efficiency value. We have tested our algorithm on an action game. A random test subject performed a one-on-one game against an adaptive NPC in real-time. As a result, the action dispositions of both the subject and NPC are analyzed in a log file to determine whether or not the disposition of the subject is similar to that of the NPC. The statistics of the diverse test results shows that NPCs become adaptive to players with error rate within less than 6%.

  • PDF

Determination of Baicalin and Baicalein Contents in Scutellaria baicalensis by NIRS (근적외선분광분석기를 이용한 황금(Scutellaria baicalensis)의 baicalin 및 baicalein 함량 분석)

  • Kim, Hyo-Jae;Kim, Se-Young;Lee, Young-Sang;Kim, Yong-Ho
    • Korean Journal of Plant Resources
    • /
    • v.27 no.4
    • /
    • pp.286-292
    • /
    • 2014
  • Near infrared reflectance spectroscopy (NIRS) is a rapid and accurate analytical method for determining the composition of agricultural products and feeds. This study was conducted to measure baicalin, baicalein, and wogonin contents in Scutellaria baicalensis by using NIRS system. Total 63 samples previously were analyzed by HPLC, which showed baicalin, baicalein, and wogonin contents ranging 4.56 to 13.59%, 0.28 to 5.54%, and 0.50 to 1.63% with an average of 9.66%, 2.09% and 0.52%, respectively. Each sample was scanned by NIRS and calculated for calibration and validation equation. A calibration equation calculated by modified partial least squares(MPLS) regression technique was developed in which the coefficient of determination for baicalin, baicalein, and wogonin content was 0.958, 0.944, and 0.709, respectively. Each calibration equation was applied to validation set that was performed with the remaining samples not included in the calibration set, which showed high positive correlation both in baicalin and baicalein content file. In case of wogonin, the prediction model was needed more accuracy because of low $R^2$ value in validation set. These results demonstrate that the developed NIRS equation can be practically used as a rapid screening method for quantification of baicalin and baicalein contents in Scutellaria baicalensis.

An APK Overwrite Scheme for Preventing Modification of Android Applications (안드로이드 앱 변조 방지를 위한 APK 덮어쓰기 기법)

  • Choi, Byungha;Shim, HyungJoon;Lee, ChanHee;Cho, Sangwook;Cho, Seong-Je
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.309-316
    • /
    • 2014
  • It is easy to reverse engineer an Android app package file(APK) and get its decompiled source code. Therefore, attackers obtains economic benefits by illegally using the decompiled source code, or modifies an app by inserting malware. To address these problems in Android, we propose an APK overwrite scheme that protects apps against illegal modification of themselves by using a new anti-reverse engineering technique. In this paper, the targets are the apps which have been written by any programmer. For a target app (original app), server system (1) makes a copy of a target app, (2) encrypts the target app, (3) creates a stub app by replacing the DEX (Dalvik Executable) of the copied version with our stub DEX, and then (4) distributes the stub app as well as the encrypted target app to users of smartphones. The users downloads both the encrypted target app and the corresponding stub app. Whenever the stub app is executed on smartphones, the stub app and our launcher app decrypt the encrypted target app, overwrite the stub app with the decrypted target one, and executes the decrypted one. Every time the target app ends its execution, the decrypted app is deleted. To verify the feasibility of the proposed scheme, experimentation with several popular apps are carried out. The results of the experiment demonstrate that our scheme is effective for preventing reverse engineering and tampering of Android apps.

The Role of Geographic Information System and Its Functional Intergration Strategy in the Conventional Transportation Planning Process (전통교통계획과정에 있어서 GIS의 역할 및 기능적 통합방안에 관한 연구)

  • Choi, Kee-Choo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.1 no.1 s.1
    • /
    • pp.127-140
    • /
    • 1993
  • The purpose of this paper is to examine the possible benefits of combining transportation planning models with geographic information systems (GIS) in the hope that intergrating these systems can alleviate the inherent problems of transportation planning models such as user unfriendliness, labor intensiveness, and theoretical limitations. Specially, this paper focuses on the issue of incompatiblity between GIS and the conventional transportation planning models in dealing with network topologies. Resolving this conflict in topologies is a conerstone for eliminating the user-unfriendliness and labor-intensiveness issues. This paper presents the development of an algorithm that converts GIS topology into transportation network topology. The FORTRAN-based topology conversion algorithm generates transportation networks from the GIS cartographic file and establishes a communication charmel between the two systems.

  • PDF

COMPARISON OF APICAL SEALING EFFICACIES USING DIFFERENT PLUGGING DEPTH IN CONTINUOUS WAVE OF OBTURATION TECHNIQUE (Continuous wave of obturation technique에서 플러거의 다양한 적용 깊이에 따른 근단부 폐쇄효율 비교)

  • Lee, Sang-Jin;Park, Jeong-Kil;Hur, Bock;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.32 no.6
    • /
    • pp.491-497
    • /
    • 2007
  • The purpose of this study was to compare apical sealing ability of continuous wave canal filling technique according to various heat source plugging depths. Eighty one extracted human premolars with straight root were cleaned and shaped to size 35 using .06 taper rotary NiTi file. After cleansing and shaping, the teeth were divided into 5 groups following the heat source probing depths from the apex; 3, 4, 5, 6 and 7 mm. All specimens were filled using E&Q plus with #35/.06 tapered gutta-percha cone. The positive control teeth were not filled. All teeth were coated with nail varnish except the apical 1 mm around the apical foramen. Negative control teeth were completely sealed include the apical foramen. All specimens were immersed in 1% methylene blue solution for 72 hours. Then the specimens were sectioned horizontally at 1, 2 and 3 mm from the root apex. Each sectioned surface was photographed using a digital camera attached to the stereomicroscope at $12.5{\times}2.5$ fold magnification. All points at 1, 2 and 3 mm were summed as final score of one specimen. Statistical analysis of the collected data was performed. Under the condition of this study. there was no significant difference between the heat source plugging depths of 3, 4, 5, 6 and 7 mm in apical sealing ability. All of apical heat source plugging depth from 3 to 7 mm including Buchanan's protocol -from 5 to 7 mm- seems to be acceptable in clinical application.

Study on roof tiles of Iksan featuring Stamped-Roof Tiles (인각와를 통해 본 익산의 기와에 대한 연구)

  • Lee, Da-Un
    • KOMUNHWA
    • /
    • no.70
    • /
    • pp.89-108
    • /
    • 2007
  • Stamped-Roof Tiles, the characteristics of Baekje Tiles are one of the most frequently excavated tiles in Iksan. Considering the types and amount of excavation of the Stamped-Roof Tiles unearthed in Iksan area, it seems that these are closely related with a Royal family. The tiles might be manufactured by a particular gorup of file maker since they are produced with same way. Referring the Ganji carved in the Stamped-Roof Tiles, I suppose that the tiles were produced and used in two time periods, the time around enthronement of The King Mu and the second quarter of the 7th century around Gichuk, AD. 629. In addition, Convex Tiles used in Wanggung-ri Site and Mireuk Site was also produced in same time as the Stamped-Roof Tiles, considering there pattern and the amount of excavation. The social background of tile production was analogized based on the technology and the time of the tile manufacture as well as the characteristics of the Stamped-Roof Tiles which represent the Obu and the Ohang. The production of the tiles was supported by Obu which aided the King Mu-oriented construction project the economic capacity of the Royal family was not enough to promote. The tile production system was totally controled by the Royal family and the inspector, neither producer nor donator, examined the quantitation of the tiles and generated the imprint of a seal with the Stamped-Roof Tiles.

  • PDF

Numerical Technique to Analyze the Flow Characteristics of a Propeller Using Immersed Boundary Lattice Boltzmann Method (가상경계 격자볼쯔만법을 이용한 프로펠러의 유동특성해석 방법에 관한 연구)

  • Kim, Hyung Min
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.7
    • /
    • pp.441-448
    • /
    • 2016
  • The thrust force created by a propeller depends on the incoming flow velocity and the rotational velocity of the propeller. The performance of the propeller can be described by dimensionless variables, advanced ratio, thrust coefficient, and power coefficient. This study included the application of the immersed boundary lattice Boltzmann method (IBLBM) with the stereo lithography (STL) file of the rotating object for performance analysis. The immersed boundary method included the addition of the external force term to the LB equation defined by the velocity difference between the lattice points of the propeller and the grid points in the domain. The flow by rotating a 4-blade propeller was simulated with various Reynolds numbers (Re) (including 100, 500 and 1000), with advanced ratios in the range of 0.2~1.4 to verify the suggested method. The typical tendency of the thrust efficiency of the propeller was obtained from the simulation results of different advanced ratios. It was also necessary to keep the maximum mesh size ratio of the propeller surface to a grid size below 3. Additionally, a sufficient length of the downstream region in the domain was maintained to ensure the numerical stability of the higher Re and advanced ratio flow.