• 제목/요약/키워드: Multi-Authority

검색결과 88건 처리시간 0.022초

공동주택단지 건설에 있어서 주거환경과 가구밀도에 관한 연구 -택지개발사업지구를 중심으로- (A Study on the Relationship between Dwelling Environment and Household Density in Multi-Family Housing Development)

  • 한상훈
    • 한국주거학회논문집
    • /
    • 제9권2호
    • /
    • pp.33-41
    • /
    • 1998
  • To accomodate increasing housing shortage in many cities, Korean Government has implemented various residental land development projects to provide more land for new housing construction. Most of the residential areas developed by these projects were used for multi-family housing units. Under this process, the size and location of the neighborhood service facilities in the development area were regulated by uniform standards. For this reason, the neighborhood service facilities were not able to be provided according to the household density but provided in minimum status required by these standards. Based on these considerations, this study aimed to evaluated residential land development project conducted by pubilc authority, one of the residential land development projects in Korea. Results of the case studies confirmed findings from literature review and proposed that existing regulations applied to these projects need to be amended not only to accomodata unique situation of each development area but also to enhance level of the dwelling environment. As ways to resolve these problems, this study suggests followings: (1) more flexible operation of the regulations, (2) inclusion of the socio-economic characteristics of the perspective resident in planning process, and (3) introduction of design techniques in the project. Finally, this study proposed future study directions in relation to this issue.

  • PDF

An Intelligent Multi-agent System for Efficient Gate Operation in a Container Terminal

  • Yoo, Dong-Ho;Choi, Hyung-Rim;Park, Byung-Joo;Kang, Moo-Hong
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2006년도 International Symposium on GPS/GNSS Vol.1
    • /
    • pp.371-376
    • /
    • 2006
  • Recently the container volume in the global trade is steadily increasing. In an effort to cope with this trend, major ports of the world are stepping up the introduction of high-tech equipments, trying to establish a highly efficient information system, and improving the internal work processes of their container terminals. For speedy and effective cargo handling, they are making every effort in the diverse fields. The purpose of this study aims at developing an intelligent multi-agent system for the gate work of a container terminal, which is the place of authority transfer in a container terminal. The agent system suggested in this study has made a comparison between COPINO information by TOS (Terminal Operating System) and information on containers and trucks recognized at the gate passage, checking up their efficiency, and performing the function of controlling outside truck's input-output. Also, based on the records of outside truck's gate passage, some gates can be operated flexibly, consequently enhancing the efficiency of the gate function. The results of job performance will immediately be notified to the customers and terminal managers, thus helping them make decisions speedily.

  • PDF

Designing a Vehicles for Open-Pit Mining with Optimized Scheduling Based on 5G and IoT

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.145-152
    • /
    • 2021
  • In the Recent times, various technological enhancements in the field of artificial intelligence and big data has been noticed. This advancement coupled with the evolution of the 5G communication and Internet of Things technologies, has helped in the development in the domain of smart mine construction. The development of unmanned vehicles with enhanced and smart scheduling system for open-pit mine transportation is one such much needed application. Traditional open-pit mining systems, which often cause vehicle delays and congestion, are controlled by human authority. The number of sensors has been used to operate unmanned cars in an open-pit mine. The sensors haves been used to prove the real-time data in large quantity. Using this data, we analyses and create an improved transportation scheduling mechanism so as to optimize the paths for the vehicles. Considering the huge amount the data received and aggregated through various sensors or sources like, the GPS data of the unmanned vehicle, the equipment information, an intelligent, and multi-target, open-pit mine unmanned vehicle schedules model was developed. It is also matched with real open-pit mine product to reduce transport costs, overall unmanned vehicle wait times and fluctuation in ore quality. To resolve the issue of scheduling the transportation, we prefer to use algorithms based on artificial intelligence. To improve the convergence, distribution, and diversity of the classic, rapidly non-dominated genetic trial algorithm, to solve limited high-dimensional multi-objective problems, we propose a decomposition-based restricted genetic algorithm for dominance (DBCDP-NSGA-II).

미국 워싱턴주 시애틀시의 초등학교 특수교육시설에 관한 연구 (A Study on Special Education Facilities of the Elementary School in Seattle)

  • 김종영
    • 교육시설
    • /
    • 제17권3호
    • /
    • pp.13-20
    • /
    • 2010
  • Seattle Public School Authority implements Inclusive Education which allows handicapped children to study in ordinary schools. This research is to analyze Inclusive Education system and find characteristics of school network and school planning. Survey was performed on 9 school districts and 54 public schools. The found results are following; 1) 54 schools adopt special education programs and legal barrier free design. All handicapped children groups are divided into level I through Ⅳ including mild level (level I,II) at all schools and multi-handicapped(severe level, level III, IV) at schools specified by school district or Seattle City. 2) Each school groups are transformed into self-contained classroom, therapy room and general room as a set in consideration of user communication and special education program. Also, existing classrooms are rearranged into small study spaces by using partition system. It allows ordinary schools to accomodate Inclusive Education through school network, classroom rearrangement and space partitioning.

Approximate Wave Functions of Dynamic Infinite Elements for Multi-layered Halfspaces

  • Kim, J.M.;Yun, C.B.;Yang, S.C.
    • 한국전산구조공학회:학술대회논문집
    • /
    • 한국전산구조공학회 1993년도 가을 학술발표회논문집
    • /
    • pp.193-198
    • /
    • 1993
  • This paper presents a systematic procedure to obtain shape functions of the infinite elements for soil-structure interaction analysis. The function spaces are derived from the analytical solutions and appropriate assumptions based on physical interpretation. The function spaces are complete for the surface wave components, but approximate for the body wave components. Three different infinite elements are developed by using the wave functions of the derived function spaces. Numerical example analysis is presented for demonstrating the effectiveness of the present infinite elements.

  • PDF

ROSA/LSTF test and RELAP5 code analyses on PWR steam generator tube rupture accident with recovery actions

  • Takeda, Takeshi
    • Nuclear Engineering and Technology
    • /
    • 제50권6호
    • /
    • pp.981-988
    • /
    • 2018
  • An experiment was performed for the OECD/NEA ROSA-2 Project with the large-scale test facility (LSTF), which simulated a steam generator tube rupture (SGTR) accident due to a double-ended guillotine break of one of steam generator (SG) U-tubes with operator recovery actions in a pressurized water reactor. The relief valve of broken SG opened three times after the start of intact SG secondary-side depressurization as the recovery action. Multi-dimensional phenomena specific to the SGTR accident appeared such as significant thermal stratification in a cold leg in broken loop especially during the operation of high-pressure injection (HPI) system. The RELAP5/MOD3.3 code overpredicted the broken SG secondary-side pressure after the start of the intact SG secondary-side depressurization, and failed to calculate the cold leg fluid temperature in broken loop. The combination of the number of the ruptured SG tubes and the HPI system operation difference was found to significantly affect the primary and SG secondary-side pressures through sensitivity analyses with the RELAP5 code.

한국형 코드아담제도 도입을 위한 입법모델 연구 (Missing Children Policy in Korea: A Legislative Model for Korean Code Adam Alert)

  • 이성용;김학경
    • 한국콘텐츠학회논문지
    • /
    • 제12권12호
    • /
    • pp.179-191
    • /
    • 2012
  • 실종아동의 발생 시 가장 중요한 것은 초기수색을 통해 조속히 실종된 아동을 찾는 것이다. 1981년 미국에서 발생한 아담 월시 실종사건을 계기로 미국에서는 코드아담법을 제정, 모든 연방건물에서 실종아동 발생시 코드아담경보를 발령토록 하고 있고, 월마트를 비롯하여 다중이용 민간시설에서는 자발적으로 여기에 동참하고 있다. 우리나라에서도 최근 이러한 코드아담법의 도입이 논의되고 있으나 아직 선행연구가 전무한 상황에서 본 연구는 한국형 코드아담법의 입법모델을 제시하였다. 동 모델에 따라 대규모 점포나 놀이시설 등을 포함한 대규모 다중이용에서 의무적으로 '실종아동등의 예방 및 조기발견계획'을 수립 시행하도록 하고, 이를 위반할 경우 행정질서벌로서 과태료를 부과하고 명단을 공표하는 방식의 제재수단을 마련하도록 하는 것과, 자율적 참여를 유도하기 위해 인증제를 통해 실종아동예방 안전시설에서 인증로고를 상업적으로 이용할 수 있도록 하는 것을 제안한다.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델 (A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment)

  • 최정희;이상호
    • 정보보호학회논문지
    • /
    • 제29권2호
    • /
    • pp.261-273
    • /
    • 2019
  • 최근 IT 기술이 발전하면서 휴대폰, 테블릿 등 다양한 이동 장치를 사용하는 사용자가 증가하면서 클라우드 서비스에 대한 관심이 증가하고 있다. 그러나, 사용자의 서비스 요구가 증가하면서 데이터에 접근하는 다양한 방법을 제어하거나 통제하는 기술들이 요구되고 있다. 본 논문에서는 클라우드 환경에서 제공하는 다양한 서비스에 접근하는 사용자의 접근 권한을 2개의 키(비밀키와 접근제어키)를 이용하여 사용자의 인증 효율성을 향상시킨 2중 키 기반 사용자 인증 모델을 제안한다. 제안 모델에서는 2개의 키를 이중으로 사용자의 접근 권한을 제어하기 위한 알고리즘 (키 생성, 사용자 인증, 권한 등급 허용 등)을 시퀀스 다이어그램을 통해 동작과정 및 기능을 세분화하고 있다. 또한, 제안 모델에서는 2개의 키를 사용자 인증과 서비스 권한 등급에 사용하여 클라우드 서비스에서 문제되고 있는 다양한 보안 문제들을 해결하고 있다. 특히, 제안 모델에서는 사용자의 접근제어를 담당하는 알고리즘에서 권한에 따른 사용자의 서비스 등급을 결정하게 함으로써 클라우드 관리자가 사용자의 서비스 접근 허용 정보를 관리할 수 있도록 관리 프로세스를 단축시킨 것이 가장 큰 특징 중에 하나이다.

주행 시뮬레이션을 이용한 차량간 상호작용에 따른 사고발생가능성 분석 (Analysis of Crash Potential by Vehicle Interactions Using Driving Simulations)

  • 김윤종;오철;박수빈;최새로나
    • 한국ITS학회 논문지
    • /
    • 제17권2호
    • /
    • pp.98-112
    • /
    • 2018
  • 공격운전은 상대방 운전자에 대한 공격 의지를 가지고 위협을 가하는 매우 위험한 운전행태이다. 기존 연구의 경우 공격운전자에 대한 주행특성 및 유발요인 등 공격운전자를 초점으로 한 연구가 대부분인 것으로 나타났다. 그러나 공격운전을 안전성 관점에서 분석하기 위해서는 공격운전 가해자와 피해자간의 상호작용에 대한 분석이 필요하다. 따라서 본 연구에서는 Multi-Agent 주행시뮬레이션 환경을 구축하여 공격운전 가해자와 공격운전 피해자간의 차량간격 및 상대속도를 통해 상호작용을 분석하였다. 공격운전 가해자와 피해자의 가감속 패턴을 파악하고 차간거리를 통해 TTC(Time-to-Coillison)를 도출하였다. 또한 도출된 TTC를 EDF(Exponential Decay Function)를 통해 사고발생가능성으로 전환하여 일반운전과 공격운전의 사고발생가능성을 분석하였다. 분석결과, 공격운전 시 일반운전에 비해 사고발생가능성이 높은 것으로 나타났다. 본 연구결과를 통해 공격운전의 위험성을 경고하며, 공격운전 관리방안 수립을 위한 기초연구로 활용될 수 있을 것으로 기대된다.