• Title/Summary/Keyword: Program Codes

Search Result 367, Processing Time 0.021 seconds

Development of Green Template for Building Life Cycle Assessment Using BIM (건축물 LCA를 위한 BIM 친환경 템플릿 개발에 관한 연구)

  • Lee, Sung Woo;Tae, Sung Ho;Kim, Tae Hyoung;Roh, Seung Jun
    • Spatial Information Research
    • /
    • v.23 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • The purpose of this study is to develope BIM Template according to major building material for efficiently and quantitatively evaluating greenhouse gas emission at the design stage. Template users consider various environmental impacts without connecting simulation tools for analyzing environmental impact and Template users who have no prior knowledge can Life Cycle Assessment by using The green template. For this study, Database which was reflected in template was constructed considering environmental performance. and 6 kinds of environmental impact categories and PPS standard construction codes were analyzed by major building material derived from literature. Based on this analyzed data, The major Material Family according to the main building material was developed. When users conduct modeling by utilizing Family established, evaluating result can be confirmed in the Revit BIM Modeling program by using the schedule function of the Revit. Users through the modeling, the decision-making environment performance possible. In addition, we propose to create a guideline for the steps required to build an additional established family.

Epigenetic Responses Programmed by Prenatal Stress : $F_1$ Male Rat Model (출생 전 스트레스에 의해 프로그램된 후생학적 반응 : $F_1$ 수컷 흰쥐 모델)

  • Lee, Sung-Ho
    • Development and Reproduction
    • /
    • v.12 no.2
    • /
    • pp.117-124
    • /
    • 2008
  • The efficient strategies to cope with unpredictable and/or harmful environmental changes have been developed by every organism in order to ensure its survival and continuity of it's own species. As a results, all living things on earth maintain dynamically internal stability via a process termed 'homeostasis' among physiological parameters despite of external environment changes. Stress is an emotional and physical response to threat homeostasis. Stress may have not only transient but rather permanent effect on the organism; recent evidence clearly show that prenatal stress could organize or imprint permanently physiological systems without any change in genetic codes, a process known as 'epigenetic programming'. In this review, a series of reproduction-associated events occurred in prenatally stressed male rats such as alteration in the structure of sexually dimorphic brain regions, modification of neurotransmitter metabolism, changes in reproductive endocrine status, and finally, disorders of sexual behavior will be introduced. The fetal brain is highly sensitive to prenatal programming and glucocorticoids in particular have powerful brain-programming properties. The chronic hyperactivation of fetal brain by maternal stress-induced glucocorticoid input will provide new program via increasing the neuroplasticities. This 'increased neuroplasticities' will be the basis for the 'increased phenotypic plasticities' rendering the organism's better adaptation to environmental challenges. In conclusion, organism who experienced 'harsh' environment in his fetal life seems to give up a certain portion of reproductive competence to make good chance of survival in his future life by epigenetic (re)programming.

  • PDF

A Hierarchical Group-Based CAVLC Decoder (계층적 그룹 기반의 CAVLC 복호기)

  • Ham, Dong-Hyeon;Lee, Hyoung-Pyo;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.26-32
    • /
    • 2008
  • Video compression schemes have been developed and used for many years. Currently, H.264/AVC is the most efficient video coding standard. The H.264/AVC baseline profile adopts CAVLC(Context-Adaptive Variable Length Coding) method as an entropy coding method. CAVLC gives better performance in compression ratios than conventional VLC(Variable Length Coding). However, because CAVLC decoder uses a lot of VLC tables, the CAVLC decoder requires a lot of area in terms of hardware. Conversely, since it must look up the VLC tables, it gives a worse performance in terms of software. In this paper, we propose a new hierarchical grouping method for the VLC tables. We can obtain an index of codes in the reconstructed VLC tables by simple arithmetic operations. In this method, the VLC tables are accessed just once in decoding a symbol. We modeled the proposed algorithm in C language, compiled under ARM ADS1.2 and simulated it with Armulator. Experimental results show that the proposed algorithm reduces execution time by about 80% and 15% compared with the H.264/AVC reference program JM(Joint Model) 10.2 and the arithmetic operation algorithm which is recently proposed, respectively.

Study for Analyzing Defense Industry Technology using Datamining technique: Patent Analysis Approach (데이터마이닝을 통한 방위산업기술 분석 연구: 특허분석을 중심으로)

  • Son, Changho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.101-107
    • /
    • 2018
  • Recently, Korea's defense industry has advanced highly, and defense R&D budget is gradually increasing in defense budget. However, without objective analysis of defense industry technology, effective defense R&D activities are limited and defense budgets can be used inefficiently. Therefore, in addition to analyzing the defense industry technology quantitatively reflecting the opinions of the experts, this paper aims to analyze the defense industry technology objectively by quantitative methods, and to make efficient use of the defense budget. In addition, we propose a patent analysis method to grasp the characteristics of the defense industry technology and the vacant technology objectively and systematically by applying the big data analysis method, which is one of the keywords of the 4th industrial revolution, to the defense industry technology. The proposed method is applied to the technology of the firepower industry among several defense industrial technologies and the case analysis is conducted. In the process, the patents of 10 domestic companies related to firepower were collected through the Kipris in the defense industry companies' classification of the Korea Defense Industry Association(KDIA), and the data matrix was preprocessed to utilize IPC codes among them. And then, we Implemented association rule mining which can grasp the relation between each item in data mining technique using R program. The results of this study are suggested through interpretation of support, confidence lift index which were resulted from suggested approach. Therefore, this paper suggests that it can help the efficient use of massive national defense budget and enhance the competitiveness of defense industry technology.

Uncertainty Management on Human Intrusion Scenario Assessment of the Near Surface Disposal Facility for Low and Intermediate-Level Radioactive Waste: Comparative Analysis of RESRAD and GENII (중저준위방사성폐기물 표층처분시설의 인간침입 시나리오 평가에 대한 불확실성 관리: RESRAD와 GENII의 비교분석)

  • Kim, Minseong;Hong, Sung-Wook;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.15 no.4
    • /
    • pp.369-380
    • /
    • 2017
  • In order to manage the uncertainty about the evaluation and analysis of the human intrusion scenario of the Gyeongju Low and Intermediate Level Radioactive Waste(LILW) disposal facility, the calculation result by the GENII code was assessed using the RESRAD code, which was developed to evaluate the radiation effects of contaminated soil. The post-drilling scenario was selected as a human intrusion scenario into the near-surface disposal facility to analyze the uncertainty of the modeling by identifying any limitations in the simulation of each code and comparing the evaluation results under the same input data conditions. The results revealed a difference in the migration of some nuclides between the codes, but confirmed that the dose trends at the end of the post-closure control period were similar for all exposure pathways. Based on the results of the dose evaluation predicted by RESRAD, sensitivity analysis on the input factors was performed and major input factors were derived. The uncertainty of the modeling results and the input factors were analyzed and the reliability of the safety evaluation results was confirmed. The results of this study can be applied to the implementation 'Safety Case Program' for the Gyeongju LILW disposal facility.

Attacking OpenSSL Shared Library Using Code Injection (코드 주입을 통한 OpenSSL 공유 라이브러리의 보안 취약점 공격)

  • Ahn, Woo-Hyun;Kim, Hyung-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.226-238
    • /
    • 2010
  • OpenSSL is an open-source library implementing SSL that is a secure communication protocol. However, the library has a severe vulnerability that its security information can be easily exposed to malicious software when the library is used in a form of shared library on Linux and UNIX operating systems. We propose a scheme to attack the vulnerability of the OpenSSL library. The scheme injects codes into a running client program to execute the following attacks on the vulnerability in a SSL handshake. First, when a client sends a server a list of cryptographic algorithms that the client is willing to support, our scheme replaces all algorithms in the list with a specific algorithm. Such a replacement causes the server to select the specific algorithm. Second, the scheme steals a key for data encryption and decryption when the key is generated. Then the key is sent to an outside attacker. After that, the outside attacker decrypts encrypted data that has been transmitted between the client and the server, using the specified algorithm and the key. To show that our scheme is realizable, we perform an experiment of collecting encrypted login data that an ftp client using the OpenSSL shared library sends its server and then decrypting the login data.

A Comparative Study on Total Payment of Mental and Behavioral Disorders Patients Admitted through the Emergency Room: Focusing on Main & Sub Sick (응급실 경유 정신 및 행동장애 입원환자들의 총진료비 비교 : 주상병과 부상병 환자 중심으로)

  • Choi, Hyun-Sik;Lee, Hyun-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.562-569
    • /
    • 2014
  • The purpose of this study was to investigate the determinants of total payment for mental and behavioral disorders patients admitted through the emergency room. Study data was selected from the Korean National Health Insurance sample data in 2009. This data was consisted of 753 inpatients who are 331 inpatients with only main sick(F31-F39) and 422 inpatients with main sick codes(F31-F39) and sub sick(F00-F99) admitted through the emergency room. SPSS v.18 was used for the statistical analysis such as descriptive analysis, t-test, ANOVA, and multiple regression analysis. In multiple regression analysis, significant variables affecting total payment of main sick patients were gender(p<.01), treatment result(p<.001), path of the emergency room(p<.001), and length of stay(p<.001). Also, main sick patients with sub sick were gender(p<.01), age(p<.001), treatment result(p<.001), path of the emergency room(p<.001), and length of stay(p<.001). These findings implied that it is necessary to build short, middle, and longterm program and system for high risk mental and behavioral disorders groups.

The Identification Framework for source code author using Authorship Analysis and CNN (작성자 분석과 CNN을 적용한 소스 코드 작성자 식별 프레임워크)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Hong, Sung-sam;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.33-41
    • /
    • 2018
  • Recently, Internet technology has developed, various programs are being created and therefore various codes are being made through many authors. On this aspect, some author deceive a program or code written by other particular author as they make it themselves and use other writers' code indiscriminately, or not indicating the exact code which has been used. Due to this makes it more and more difficult to protect the code. In this paper, we propose author identification framework using Authorship Analysis theory and Natural Language Processing(NLP) based on Convolutional Neural Network(CNN). We apply Authorship Analysis theory to extract features for author identification in the source code, and combine them with the features being used text mining to perform author identification using machine learning. In addition, applying CNN based natural language processing method to source code for code author classification. Therefore, we propose a framework for the identification of authors using the Authorship Analysis theory and the CNN. In order to identify the author, we need special features for identifying the authors only, and the NLP method based on the CNN is able to apply language with a special system such as source code and identify the author. identification accuracy based on Authorship Analysis theory is 95.1% and identification accuracy applied to CNN is 98%.

An Availability Analysis on the Gap K-Joints using High Strength Circular Hollow Section Members (고강도 원형강관 갭K형 접합의 사용성 해석)

  • Ahn, Kwan-Su;Choi, Byong-Jeong;Oh, Young-Suk;Kim, Jae-Woon
    • Journal of Korean Society of Steel Construction
    • /
    • v.22 no.2
    • /
    • pp.109-119
    • /
    • 2010
  • There are many restrictions in the application of high-strength HSSs, including yield strength and yield ratio for the 600-MPa steel. The AISC and Canadian codes recommend that the yield strength and yield ratio of HSS members be 360 MPa and 80%, respectively. It is important to understand the true buckling behaviors of HSSs using high-strength steel at the limit states. There are many experimental data regarding the rectangular HSSs, and the circular ones are not enough for high-strength steel. Therefore, this study was conducted to create a better understanding of the buckling behaviors of the 600- and 400-MPa steels based on the results of the finite-element analysis that was done before the experiment. To understand the structural behaviors of the aforementioned steels, the width-to-thickness ratios, the angle of the web members, the yield strength, and the gap of the web members were selected as the main parameters in this study, and ABAQUS, a general finite-element program, was used.As a result, the compression web member reached elastic buckling in the 600-MPa steel and inelastic buckling in the 400-MPa steel. A brittle fracture occurred in the case where the yield ratio was greater than 80%. At the same time, it was found that the limit strength determined via FEM analysis had a higher value compared to the code evaluation with the variation of the width-to-thickness ratio in the main code member. The change in the connection load in high-strength steels was not identified by the other factors.

Experimental Evaluation of Seismic Column Splice with Partial Joint Penetration Welds (부분용입용접 내진기둥 이음부의 강도평가)

  • Lee, Cheol Ho;Kim, Jae Hoon;Kim, Jung Jae;Oh, Sang Hoon
    • Journal of Korean Society of Steel Construction
    • /
    • v.20 no.6
    • /
    • pp.817-827
    • /
    • 2008
  • The seismic performance of a column splice fabricated with PJP (partial joint penetration) welds for special moment frames was experimentally evaluated in this study. The steel materials that were used for the specimens included SHN490 and SN490 steel, or the newly developed structural steel for seismic application. Fabricating the column splice with PJP welds is highly attractive from the perspective of reducing the welding cost and the construction time. PJP welds in column splices are viewed apprehensively, however, because several tests have shown that PJP welds in thick members tend to become brittle under tensile loads. The column splices in this testing program were designed for the expected plastic moment of the column that current seismic codes typically require. The design strength of partial-penetration welded joints was determined according to the 2005 AISC-LRFD Specification. Three-point loading was applied monotonically, using a universal testing machine, such thatthe column splice joints were subjected to pure tension. The test results showed that the PJP welded splices, if designed properly, can develop a strength exceeding that of the actual plastic moment of the column. The specimen made of the SM490 rolled section, however, showed a brittle fracture at the splice soon after achieving the actual plastic moment of the column. The tensile coupon test results also showed that the material properties of SM490 steel are more unpredictable. Overall, although the test data are limited, the SHN490 and SN490 steel specimens showed a superior and reliable performance.