• Title/Summary/Keyword: Or Rule

Search Result 2,044, Processing Time 0.026 seconds

Structural Safety Assessment of Piping Used in Offshore Plants According to Thermal Load and Motion (해양플랜트에 사용되는 배관의 열 하중과 구조물의 운동에 따른 구조안전성 평가)

  • Ryu, Bo Rim;Kang, Ho Keun;Duong, Phan Anh;Lee, Jin Uk
    • Journal of Navigation and Port Research
    • /
    • v.45 no.4
    • /
    • pp.212-223
    • /
    • 2021
  • The objective of this study was to evaluate structural safety according to environmental conditions acting on the piping of offshore structure and the motion of the structure. As for conditions acting on the piping, the maximum and minimum temperature conditions were used to analyze the design conditions of N2 generator. The motion of the structure was calculated and applied according to the DNV(Det Norske Veritas) rule. Each condition was combined and a total of 26 load combinations were constructed according to thermal load, motion load, and presence or absence of pipe support. Analysis was performed using a commercial program MSC Patran/Nastran. Thermal analysis was performed by applying the steady-state method, Sol 153. Thermal-structural coupled analysis was performed using Sol 101, a linear-static method. As a result of the analysis, the stress tended to increase when temperature inside the pipe was lower in Set 1 and Set 2, when temperature was higher in Set 3, and when the temperature difference between the inside and outside of the pipe in Set 4 was increased. However, the sum of stresses in the condition with only temperature load and the condition with only the kinetic load did not show the same value as the stress in the composite load condition of two loads. That is, the influence of the motion load varied depending on the direction of motion, the arrangement of pipes, and the position of the support. Therefore, it is necessary to comprehensively consider the size and direction of the motion load acting on the piping, the arrangement of the piping, and the location of the pipe supports during the design of piping.

The Records and Archives as the Conceptual Constructs and Sunglihak World View of Joseon Dynasty ('개념적 구성물로서의 기록'의 관점에서 보는 조선시대 성리학 세계관과 기록·기록관리)

  • Noh, Meung-Hoan
    • The Korean Journal of Archival Studies
    • /
    • no.51
    • /
    • pp.235-278
    • /
    • 2017
  • Then, why was the system so thorough and strict? How could that be possible? I approached this question by explaining the task of the Joseon Dynasty for the construction of a Confucian community based on Sunglihak. Sunglihak meant the metaphysics of human nature and universe order, or the rule of heaven. The people who opened the Joseon Dynasty aimed at constructing a Confucian community based on propriety as the principle of the society. The records and archives played an administrative function, for example, controlling royal power, as well as the role of constructing a national community identity based on Sunglihak. This kind of records and records management practices of the Joseon Dynasty can be seen as conceptual construction and conceptual constructs, although they were physical entities in reality. They reflected the Sunglihak value system as, in the words of Michel Focault, an "episteme" and played a social role based on it. In particular, I explained it in light of the constructivism of Sunglihak and the semiosis concept of Charles Sanders Peirce.

A Topic Analysis of Abstracts in Journal of Korean Data Analysis Society (한국자료분석학회지에 대한 토픽분석)

  • Kang, Changwan;Kim, Kyu Kon;Choi, Seungbae
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.2907-2915
    • /
    • 2018
  • Journal of the Korean Data Analysis Society founded in 1998 has played the role of a major application journal. In this study, we checked the objective of this journal by checking the abstracts for 10 years. Abstract data was crawled from the online journal site (kdas.jems.or.kr) and analyzed by topic model. As a result, we found 18 topics from 2680 abstracts that had several contents, for example, nursing, marketing, economics, regression, factor analysis, data mining and statistical inferences. Topic1 (regression) is most frequent with 460 documents and we found the usefulness of regression in the applied science area. We confirmed the significant 10 association rules using by Fisher's exact test. Also, for exploring the trend of topics, we conducted the topic analysis for two periods which are 2006-2011 period and 2012-2016 period. We found that the control study was more frequent than survey study over time and regression and factor analysis were frequent regardless of time.

A Study on the I-Ching of Lee Ik(李瀷) as a Member of South Faction near Seoul - Centering around "Shiguakao(「蓍卦攷」) (근기남인(近畿南人)으로서의 성호(星湖) 이익(李瀷)의 역학사상(易學思想) - 「시괘고(蓍卦攷)」를 중심으로 -)

  • Seo, Geun Sik
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.161-183
    • /
    • 2011
  • Lee Ik(李瀷) had put emphasis on the achievements by self-regulated academic learning through doubts, and at the same time that it was all-embracing. His academic attitude had set an example among the members of Seongho school(星湖學派), and his disciples had strived to emulate his style. The greatness of Seongho(星湖)'s study had been revealed by development of Seongho school(星湖學派) right after his death. He had argued that the six strokes of I-Ching should be read having it divided into inward and outward divine signs. He had stated his view clearly that the divine signs ranging from one stroke to six strokes were not connected, same as Shao yong(邵雍)'s method, but, the three strokes of inward divine sign as well as the three strokes of outward divine signs were independent from each other. Seongho(星湖) also had raised many questions about Shifa(筮法), and Bianyao(變爻) and Zhuzi(朱子)'s Shifa(筮法), or Yixueqimeng("易學啓蒙") "Kaobianzhan("考變占")". In view of the Shifa(筮法), Seongho(星湖) had helped Dasan(茶山) to present 'Shiguafa(蓍卦法)' by proposing different divination rule from Zhuzi(朱子)'s Method of Divination by Shiyi("筮儀"). Seongho(星湖) had not professed something significantly different from Zhuzi(朱子) in his I-xue. His study on I-xue had been accomplished under his goal of achievements by self-regulated academic learning through doubts. "Shiguakao("蓍卦攷")" is also same. I-xue of Seongho(星湖) had made a great contribution to form Dasan(茶山)'s I-xue in the later years.

Between Regime Change and Political Development: Myanmar's Defective Democracy and the Task for the Political Development (체제 전환과 정치발전의 사이에서: 미얀마의 결손민주주의와 정치발전의 과제)

  • JANG, Junyoung
    • The Southeast Asian review
    • /
    • v.28 no.4
    • /
    • pp.161-196
    • /
    • 2018
  • The major object of this study is to analyze the political development of Myanmar's civilian government on the concept of defective democracy, and to investigate the main actors who delayed or stymied political development and their interrelation. In doing so, this study suggests the tasks required for political development overcoming the current political structure and behavior. The civilian government, which was launched in 2016, failed to achieve positive political development by following the behavior of military authoritarianism in terms of exercise of power and decision making structure. On the perspective of the government, delegative democracy and domain democracy have been strengthening since one person has taken over all political power and hesitate to take horizontal accountability for each power organizations. The military, which is responsible for national defence and security seeks illiberal democracy and exclusive democracy, keeping on an undemocratic constitution by the military and Burman ethnocentrism. The reasons why defective democracy has been occurred are that the lack of a group to run a democratic institutions and the limitation of power structure that fails to adhere to the principle of civilian control to the military due to long-term military rule. Therefore, there is a need for military's come back to barracks and transform the power structure to democratic of the civilian government which is tamed an authoritarian order for the political development in Myanmar. In order to achieve this, this study concludes that setting up a empowered democratic government is required.

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

Doubly-robust Q-estimation in observational studies with high-dimensional covariates (고차원 관측자료에서의 Q-학습 모형에 대한 이중강건성 연구)

  • Lee, Hyobeen;Kim, Yeji;Cho, Hyungjun;Choi, Sangbum
    • The Korean Journal of Applied Statistics
    • /
    • v.34 no.3
    • /
    • pp.309-327
    • /
    • 2021
  • Dynamic treatment regimes (DTRs) are decision-making rules designed to provide personalized treatment to individuals in multi-stage randomized trials. Unlike classical methods, in which all individuals are prescribed the same type of treatment, DTRs prescribe patient-tailored treatments which take into account individual characteristics that may change over time. The Q-learning method, one of regression-based algorithms to figure out optimal treatment rules, becomes more popular as it can be easily implemented. However, the performance of the Q-learning algorithm heavily relies on the correct specification of the Q-function for response, especially in observational studies. In this article, we examine a number of double-robust weighted least-squares estimating methods for Q-learning in high-dimensional settings, where treatment models for propensity score and penalization for sparse estimation are also investigated. We further consider flexible ensemble machine learning methods for the treatment model to achieve double-robustness, so that optimal decision rule can be correctly estimated as long as at least one of the outcome model or treatment model is correct. Extensive simulation studies show that the proposed methods work well with practical sample sizes. The practical utility of the proposed methods is proven with real data example.

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.

A Non-annotated Recurrent Neural Network Ensemble-based Model for Near-real Time Detection of Erroneous Sea Level Anomaly in Coastal Tide Gauge Observation (비주석 재귀신경망 앙상블 모델을 기반으로 한 조위관측소 해수위의 준실시간 이상값 탐지)

  • LEE, EUN-JOO;KIM, YOUNG-TAEG;KIM, SONG-HAK;JU, HO-JEONG;PARK, JAE-HUN
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.26 no.4
    • /
    • pp.307-326
    • /
    • 2021
  • Real-time sea level observations from tide gauges include missing and erroneous values. Classification as abnormal values can be done for the latter by the quality control procedure. Although the 3𝜎 (three standard deviations) rule has been applied in general to eliminate them, it is difficult to apply it to the sea-level data where extreme values can exist due to weather events, etc., or where erroneous values can exist even within the 3𝜎 range. An artificial intelligence model set designed in this study consists of non-annotated recurrent neural networks and ensemble techniques that do not require pre-labeling of the abnormal values. The developed model can identify an erroneous value less than 20 minutes of tide gauge recording an abnormal sea level. The validated model well separates normal and abnormal values during normal times and weather events. It was also confirmed that abnormal values can be detected even in the period of years when the sea level data have not been used for training. The artificial neural network algorithm utilized in this study is not limited to the coastal sea level, and hence it can be extended to the detection model of erroneous values in various oceanic and atmospheric data.