• Title/Summary/Keyword: Key Words

Search Result 1,318, Processing Time 0.031 seconds

선사 CEO 대상 해양안전리더 교육사업 소개

  • Jeong, Chang-Hyeon;Kim, Hwa-Yeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.43-45
    • /
    • 2015
  • 선사 CEO에게 안전이 기업 경쟁력의 핵심임을 인식시켜 안전을 최우선으로 하는 경영문화가 업계에 정착되도록 유도하고자 목포해양대학교에서는 해양수산부의 위탁을 받아 선사 CEO를 대상으로 해양안전리더 교육을 시행하고 있다. 안전경영에 대한 선사 경영진의 의식전환과 가치정립은 해양사고 저감을 위한 전제요건이나, 해양종사자에 대한 교육만 이루어지고 있을 뿐 회사 경영층을 대상으로 한 교육은 아직까지 미미한 수준이다. 따라서 선사의 경영층을 대상으로 안전에 대한 이론과 실무, 타 회사의 안전경영 사례 등을 공유할 수 있는 교육기회를 제공함으로써 해양안전리더로서 선도적으로 안전경영을 해나가도록 유도하고, 추가적으로 선사 CEO가 생각하는 안전 Key Words가 무엇인지 델파이기법을 활용하여 도출해 보고자 한다.

  • PDF

Development of Transgenic Orchardgrass (Dactylis glomerata L.) Using Agrobacterium tumefaciens

  • Lee, Hyoshin;Lee, Byung-Hyun;Jinki Jo
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.20 no.2
    • /
    • pp.103-108
    • /
    • 2000
  • To produce of transgenic orchardgrass, the seed-derived calli of orchardgrass (Dactylis glomerata L.) co-cultivated with Agrobacterium turnefaciens EHAlOl harboring binary vector pIG121-Hm were selected with hygromycin and then transferred onto N6 regeneration medium containing 1 rngl l of NAA, 5 rngl l of kinetin, 250 rngl l of carbenicillin and 50 mg/ l of hygromycin. The efficiency of transformation was differed on cultivars, that is, 'Potomac' appeared 12% of transformation efficiency while 'Amba' did 5.5%. The addition of acetosyringone during co-cultivation was a key to successhl transformation of orchardgrass. Transgene fragments were identified by PCR analysis and the constitutive expression of GUS gene was confirmed by Northern blot analysis. (Key words : Acetosyringone, Agrobacterium tumefaciens, Orchardgrass (Dactylis glomerata L.), Transformation)

  • PDF

Development of a Database Program for the Management of Railroad Slopes (철도사면관리 프로그램 개발)

  • 송원경;한공창;천대성;신희순;신민호
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2000.11a
    • /
    • pp.151-158
    • /
    • 2000
  • A database program, named SLOPMAN, was developed to collect all the information on the slopes with potential hazard around railroad and to setup the effective management system. SLOPMAN is composed of three modules: data control, search and analysis. The program is able to store both text and image data and operated with tabs for the users' ability and convenience. Drop-down menu is equipped to reduce errors and the number of key strokes when inputting data. Searching data is made by codes automatically given to slopes or key words. In the analysis module, RMR and SMR values can be obtained to estimate the stability of slopes.

  • PDF

Technology Trend of Gasoline Electronic Control Engine (가솔린 전자제어 엔진의 기술동향)

  • Jang, Kyung-Uk
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2000.10a
    • /
    • pp.1-8
    • /
    • 2000
  • Automotive electronics as we know it today encompasses a wide variety of devices and systems. Key to them all, and those yet to come. is the ability to sense and measure accurately automotive control parameters. In other words, sensors and actuators are the heart of any automotive electronics application. The important of sensors and actuators cannot be overemphasized. The future growth of automotive electronics is arguably more dependent on sufficiently accurate and low-cost sensors and actuators than on computers, controls, displays, and other technologies. Without them, all of controls system - engine. transmission. cruise, braking, traction, suspension, steering, lighting, windshield wipers, air conditioner/hearter - would not be possible. Those controls, of course, are key to car operation and they have made cars over the years more drivable, safe, and reliable. In this lecture, the principle and future trends of electronic control gasoline engine will be discuss.

  • PDF

Effect of Cigarette Design and Physical Variance on the Combustibility, Pressure Drop and Smoke Ingredient (궐련의 형태와 물리성 변화에 의한 연소성, 흡인저항 및 연기성분의 변화)

  • Kim, Cheon-Suk;An, Key-Young;Kim, Ki-Hwan
    • Journal of the Korean Society of Tobacco Science
    • /
    • v.17 no.2
    • /
    • pp.170-176
    • /
    • 1995
  • Effect of circumference, net weight, and moisture content on the physicochemical propesties of cigarette were investigated. At the same net weight of cigarette, the pressure drop(E.P.D) of cigarette was increased as the circumference was decreased. Loseend and firmness were improved by reduction of circumference. In this condition, tar, nicotine, and carbon monoxide deliveries were decreased, and the puff count was significantly increased. When the moisture content of the cigarette were decreased, firmness and loseend were increased. Also in this condition nicotine and carbon monoxide tend to be increased. Key words : cigarette design, circumference, net weight.

  • PDF

An anisotropic ultrasonic transducer for Lamb wave applications

  • Zhou, Wensong;Li, Hui;Yuan, Fuh-Gwo
    • Smart Structures and Systems
    • /
    • v.17 no.6
    • /
    • pp.1055-1065
    • /
    • 2016
  • An anisotropic ultrasonic transducer is proposed for Lamb wave applications, such as passive damage or impact localization based on ultrasonic guided wave theory. This transducer is made from a PMNPT single crystal, and has different piezoelectric coefficients $d_{31}$ and $d_{32}$, which are the same for the conventional piezoelectric materials, such as Lead zirconate titanate (PZT). Different piezoelectric coefficients result in directionality of guided wave generated by this transducer, in other words, it is an anisotropic ultrasonic transducer. And thus, it has different sensitivity in comparison with conventional ultrasonic transducer. The anisotropic one can provide more information related to the direction when it is used as sensors. This paper first shows its detailed properties, including analytical formulae and finite elements simulations. Then, its application is described.

Addressing the issues on Architectural Plagiarism through the Analysis of Discourses (담론 분석을 통한 건축계 표절 관련 쟁점 도출)

  • Kim, Youngsun;Choi, Jaepil
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.12
    • /
    • pp.3-12
    • /
    • 2019
  • The purpose of this study is to address the Issues on Architectural Plagiarism through the analysis of the discourses written in texts form. This study selected 60 texts of 20 suspected pairs of architectural plagiarism to derive key-words and key-passages to understand the Issues on Architectural Plagiarism. As a result, the Issues on Architectural Plagiarism are categorized into six different topics; Prototype, Archetype, Motif, Expression of Idea, Commodification, and Westernized-modernization. Meanwhile, the six issues were not discussed independently, but several issues were considered simultaneously in individual cases. This study is the first step to establish the objective guideline to judge Architectural Plagiarism and to be a basis in Architectural Plagiarism research.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

A Design of KDPC(Key Distributed Protocol based on Cluster) using ECDH Algorithm on USN Environment (USN 환경에서 ECDH 알고리즘을 이용한 KDPC(Key Distribution Protocol based on Cluster) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.856-858
    • /
    • 2013
  • The data which is sensed on USN(Ubiquitous Sensor Network) environment is concerned with personal privacy and the secret information of business, but it has more vulnerable characteristics, in contrast to common networks. In other words, USN has the vulnerabilities which is easily exposed to the attacks such as the eavesdropping of sensor information, the distribution of abnormal packets, the reuse of message, an forgery attack, and denial of service attacks. Therefore, the key is necessarily required for secure communication between sensor nodes. This paper proposes a KDPC(Key Distribution Protocol based on Cluster) using ECDH algorithm by considering the characteristics of sensor network. As a result, the KDPC can provide the safe USN environment by detecting the forgery data and preventing the exposure of sensing data.

  • PDF

Comparison and Analysis of Motion Capture and Key Animation - Focused on Animation of Countenance - (모션 캡처와 키 애니메이션의 비교분석 - 얼굴표정애니메이션을 중심으로 -)

  • Jang, Wook;Choi, Sung-Kyu;Lee, Tae-Gu
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.160-169
    • /
    • 2007
  • Main problem in the domestic motion capture type production is that motion data are used even in the case when the human sensibility is needed. In other words it fails to give human images to the work, and production method only use motion capture data unconditionally and impetuously. Even though motion capture is effective and are various and applicable to various areas, it would cause enormous lose of capital and manual labor if these problems are not solved. In the present study, we compare motion capture with key animation production and analyze the merits and short comings of them. Also, we analyze them through the actual production and present the efficient method of key animation production when the expensive motion capturing devices are not available.