• Title/Summary/Keyword: Key Change

Search Result 1,926, Processing Time 0.029 seconds

Quantitative Analysis of Human Impact on River Runoff in the Laohahe Basin through the Conceptual Xin'anjiang Model

  • Ren, Liliang;Vu, Van Nghi;Yuan, Fei;Li, Chunhong;Wang, Jixin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.15-21
    • /
    • 2007
  • Due to a decreasing tendency of river runoff in the Laohahe River basin in North China, quantitative analysis was made with the aid of the conceptual Xinanjiang model under the background of nature climate variability as well as human-induced climate change according to the long-term observational hydrometeorological data. In the past, the human effect on surface water resources was estimated by investigating the impact of human activities on each item in the equation of water balance, so as to calculate water quantity of each item in the original natural status. It seems to be clear conceptually. It is appropriate just for the case of direct impact, such as water transfer from one basin to another, water storage by various scales of hydraulic projects, besides a huge amount of investigation and indeterminate statistics data when applied in practice. It is difficult for us to compute directly water consumption due to the implementation of measures for soil conservation, the improvement of farming techniques in agriculture, the growth of population in towns and villages, and the change of socioeconomic structure. In view of such situation, the Xinanjiang model was used to separate human impact from the climatic impact on water resources. Quantitatively human activity made river runoff decrease by 1.02, 50.67, 58.06 mm in 1960's, 1970's, 1980's, respectively, while by 97.2 mm in 1990's in the sense of annual average in the Laohahe River basin.

  • PDF

Teachers' Perceptions and Applications of Key Competency-Based Learning and Instruction in Mathematics Classrooms (수학과 교수.학습 과정에 핵심역량의 반영 정도와 그 가능성에 대한 교사들의 인식조사)

  • Kim, Hae Yoon;Huh, Nan;Noh, Ji Hwa;Kang, Ok Ki
    • Journal of the Korean School Mathematics Society
    • /
    • v.15 no.4
    • /
    • pp.605-625
    • /
    • 2012
  • This study examined how 132 teachers of different grade levels incorporate the key competencies identified by Korea Institute for Curriculum and Evaluation into their mathematics teaching and how they perceive of its full potential of the competency-based learning and teaching in mathematics classroom. Survey and semi-structured interview methods were used to collect data for the study. It was found that in their instruction teachers emphasized competencies such as problem-solving, literacy, creativity, communication and information-processing skills in order. Inter-personal skills, self-management, citizenship, global understanding and career-development appeared to be challenging competencies for teachers to reflect in their instruction with the reasons such as no direct connections to mathematics and insufficient instruction. Findings of the study suggest that various instructional methods, development and dissemination of related curricula materials, change of evaluation method, and change teachers' perceptions may be needed for incorporating KICE's key competencies in K-12 mathematics education.

  • PDF

A Study on Vulnerability Assessment to Climate Change in Regional Fisheries of Korea (국내 수산 부문의 지역별 기후변화 취약성 평가 연구)

  • Lee, Beo-Dul;Kim, Bong-Tae;Cho, Yong-Sung
    • The Journal of Fisheries Business Administration
    • /
    • v.42 no.1
    • /
    • pp.57-70
    • /
    • 2011
  • Fisheries are subject to unexpected weather condition. While some change of it may be positive for some fisheries, the current state suggests that the effects will be undesirable for many fisheries. The aim of this study is to assess the vulnerability to climate change in 11 regional fisheries of Korea using the framework of IPCC. The vulnerability assessment depends upon the interrelation of three key elements; exposure, sensitivity and adaptive capacity, which were derived from Analytical Hierarchy Process method in this study. These elements would contribute to comprehend relative importance at the regional characteristics of fisheries. We compared the vulnerability index of 11 regional fisheries so as to look for strategies and adaptation methods to the impacts of potential climate change. Jeoun-Nam, Kyeong-Nam, and Jeju are identified as the most vulnerable provinces to climate change on their fisheries because they have high level of sensitivity to predicted climate change and relatively low adaptive capacity. The relatively low vulnerability of Ulsan, Gyeonggi reflects high financial independence, well-equipped infrastructure, social capital in these regions. Understanding of vulnerability to climate change suggests future research directions. This paper will provide a guide to local policy makers and fisheries managers about vulnerability and adaptation planning to climate change.

The Study for Impact Strength change of Microcellular foamed Recycled ABS (초미세 발포 플라스틱의 재생 후 강도변화에 대한 연구)

  • 성갑제;차성운;윤재동
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.896-899
    • /
    • 2002
  • Microcellular foaming Process has several merits, impact strength elevation, thermal insulation, noise insulation, and raw material saving etc. This method make the glass transition temperature of polymers low, and diminish the residual stress of polymers. This characteristics of Microcellular foaming process influences the physical properties of recycled polymers. This paper describes about the impact strength change of Microcellular foamed recycled ABS.

  • PDF

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

Retrieval System Adopting Statistical Feature of MPEG Video (MPEG 비디오의 통계적 특성을 이용한 검색 시스템)

  • Yu, Young-Dal;Kang, Dae-Seong;Kim, Dai-Jin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.5
    • /
    • pp.58-64
    • /
    • 2001
  • Recently many informations are transmitted ,md stored as video data, and they are on the rapid increase because of popularization of high performance computer and internet. In this paper, to retrieve video data, shots are found through analysis of video stream and the method of detection of key frame is studied. Finally users can retrieve the video efficiently. This Paper suggests a new feature that is robust to object movement in a shot and is not sensitive to change of color in boundary detection of shots, and proposes the characterizing value that reflects the characteristic of kind of video (movie, drama, news, music video etc,). The key frames are pulled out from many frames by using the local minima and maxima of differential of the value. After original frame(not de image) are reconstructed for key frame, indexing process is performed through computing parameters. Key frames that arc similar to user's query image arc retrieved through computing parameters. It is proved that the proposed methods are better than conventional method from experiments. The retrieval accuracy rate is so high in experiments.

  • PDF

Characterization of the effect of He+ irradiation on nanoporous-isotropic graphite for molten salt reactors

  • Zhang, Heyao;He, Zhao;Song, Jinliang;Liu, Zhanjun;Tang, Zhongfeng;Liu, Min;Wang, Yong;Liu, Xiangdong
    • Nuclear Engineering and Technology
    • /
    • v.52 no.6
    • /
    • pp.1243-1251
    • /
    • 2020
  • Irradiation-induced damage of binderless nanoporous-isotropic graphite (NPIG) prepared by isostatic pressing of mesophase carbon microspheres for molten salt reactor was investigated by 3.0 MeV He+ irradiation at room temperature and high temperature of 600 ℃, and IG-110 was used as the comparation. SEM, TEM, X-ray diffraction and Raman spectrum are used to characterize the irradiation effect and the influence of temperature on graphite radiation damage. After irradiation at room temperature, the surface morphology is rougher, the increase of defect clusters makes atom flour bend, the layer spacing increases, and the catalytic graphitization phenomenon of NPIG is observed. However, the density of defects in high temperature environment decreases and other changes are not obvious. Mechanical properties also change due to changes in defects. In addition, SEM and Raman spectra of the cross section show that cracks appear in the depth range of the maximum irradiation dose, and the defect density increases with the increase of irradiation dose.

Key Management and Recovery Scheme over SCADA System Using ID-based Cryptosystem (ID 기반 암호 기법을 이용한 SCADA 시스템에서 비밀 키 관리 및 복구 방안)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Na, Eun-Sung;Kim, Sang-Chul;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.427-438
    • /
    • 2012
  • The SCADA(Supervisory Control and Data Acquisition) systems are used to control some critical national infrastructures such as electricity, gas, and water distribution systems. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. We propose a new key management method which is established on ID-based cryptosystem using pairing on MTU(Master Terminal Unit), Sub-MTU, and RTU(Remote Terminal Unit). Furthermore, we present a redistribution protocol of private key of each device and a system recovery protocol as a countermeasure of exposure of KMS(Key Management System) master key which is occurred by some unexpected accidents or malicious attacks.

Dynamic mechanism of rock mass sliding and identification of key blocks in multi-fracture rock mass

  • Jinhai Zhao;Qi Liu;Changbao Jiang;Zhang Shupeng;Zhu Weilong;Ma Hailong
    • Geomechanics and Engineering
    • /
    • v.32 no.4
    • /
    • pp.375-385
    • /
    • 2023
  • There are many joint fissures distributed in the engineering rock mass. In the process of geological history, the underground rock mass undergoes strong geological processes, and undergoes complex geological processes such as fracture breeding, expansion, recementation, and re-expansion. In this paper, the damage-stick-slip process (DSSP), an analysis model used for rock mass failure slip, was established to examine the master control and time-dependent mechanical properties of the new and primary fractures of a multi-fractured rock mass under the action of stress loading. The experimental system for the recemented multi-fractured rock mass was developed to validate the above theory. First, a rock mass failure test was conducted. Then, the failure stress state was kept constant, and the fractured rock mass was grouted and cemented. A secondary loading was applied until the grouted mass reached the intended strength to investigate the bearing capacity of the recemented multi-fractured rock mass, and an acoustic emission (AE) system was used to monitor AE events and the update of damage energy. The results show that the initial fracture angle and direction had a significant effect on the re-failure process of the cement rock mass; Compared with the monitoring results of the acoustic emission (AE) measurements, the master control surface, key blocks and other control factors in the multi-fractured rock mass were obtained; The triangular shaped block in rock mass plays an important role in the stress and displacement change of multi-fracture rock mass and the long fissure and the fractures with close fracture tip are easier to activate, and the position where the longer fractures intersect with the smaller fractures is easier to generate new fractures. The results are of great significance to a multi-block structure, which affects the safety of underground coal mining.

Improved Coded Mark Inversion for the Passive Radio Frequency Transmission System of the Electronic Time Fuze

  • Xiong, Dong;Zeng, Xiaoping;Zhao, Xiaogang
    • ETRI Journal
    • /
    • v.31 no.3
    • /
    • pp.348-350
    • /
    • 2009
  • To fit the limited volume and power consumption of the passive radio frequency transmission system of the electronic time fuze, an improved coded mark inversion (CMI) is proposed in this letter. From the performance analysis, the energy transmission efficiency of this encoding method is at least 50% higher than that of CMI and NRZ. Finally, the experiment results show that by adopting this improved CMI, the change of DC voltage through magnetic coupling is lower than 0.2 V when the accuracy of data transmission is above 99.5%.

  • PDF