• Title/Summary/Keyword: Program Codes

Search Result 367, Processing Time 0.023 seconds

A Study on Development of New Assessment Method for the Energy Performance in G-SEED using Dynamic Building Energy Simulation Programs (동적 건물에너지 시뮬레이션을 이용한 G-SEED 에너지성능 평가지침 도입 방안에 관한 기초연구)

  • Kim, Kee Han;Chae, Chang-U;Cho, Dongwoo
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.34 no.10
    • /
    • pp.27-35
    • /
    • 2018
  • In this paper, a fundamental study for developing and introducing a new assessment method of the 'Energy Performance' in G-SEED that uses dynamic building energy simulations was conducted by comparing and analyzing the corresponding issues of domestic and foreign green building certification systems. The most significant part of the new assessment method to be developed was a development of a modeling guideline for a reference building using dynamic building energy simulations. In this paper, the composition and detailed contents of the guideline was created to comply with domestic energy codes. In addition, one of the most influential part of the result in the simulations, the 24-hour building operation schedule for a reference building, was created considering the equity with the ECO2 program that is the evaluation tool of one of the current assessment methods in the "Energy Performance". In order to improve the completeness of this guideline, it is necessary to continue the process of supplementation in the future, however, this paper is expected to be of great significance as the beginning of the research.

Analysis on a New Intrinsic Vulnerability to Keyboard Security (PS/2 키보드에서의 RESEND 명령을 이용한 패스워드 유출 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.177-182
    • /
    • 2011
  • This paper introduces a possibility for attackers to acquire the keyboard scan codes through using the RESEND command provided by the keyboard hardware itself, based on the PS/2 interface that is a dominant interface for input devices. Accordingly, a keyboard sniffing program using the introduced vulnerability is implemented to prove the severeness of the vulnerability, which shows that user passwords can be easily exposed. As one of the intrinsic vulnerabilities found on the existing platforms, for which there were little considerations on the security problems when they were designed, it is required to consider a hardware approach to countermeasure the introduced vulnerability.

Design of Aperiodic Multilayer Optical Filter Structure for using COVID-19 UV Sterilization (COVID-19의 UV 살균을 위한 비주기 다중층막 광학필터 구조의 설계)

  • Yeo, Jong-Bin
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.29 no.1
    • /
    • pp.67-70
    • /
    • 2022
  • In the present work, we have designed to optimize the optical filter structures of the 1-dimensional photonic quasicrystals (1D PQCs) characteristic for the COVID-19 UV sterilization. The simulator using MATLAB program and ourselves manufacturing calculation codes. After making the aperiodic (and complexed) multi-layer structure model, we establish the transfer matrix method (TMM) for model by the operator conversion. By the using the MATLAB, we derive a matrix for the designed complexed multi-layer structure by applying the equations to the model by obtaining the reflectance and transmittance from the matrix. We also prove the possibility of application in optical filter for UV sterilization.

Evacuation Safety Evaluation of Tourist Hotels with the Fire Alarm Method

  • Moon, Sung-Chun;Kong, Ha-Sung
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.363-375
    • /
    • 2021
  • The purpose of this study is to analyze the safety of evacuation using the Pathfinder program for the alert at once, the priority alarm method, the priority alarm method for the four floors above, and the sequential priority alarm method, which is a modification of the priority alarm method specified in the tourist hotel building. Currently, in Korea's National Fire Safety Codes (NFSC), fire alarm methods are compulsorily applied differently depending on the number of floors and total floor area of a building. Although the growth rate is getting faster due to the diversification of building structures, it is still an obstacle to improving evacuation safety to comply with the standardized fire alarm method in NFSC. As a result of the experiment, the evacuation time was found to be faster with the priority alarm method for the four floors above than the priority alarm method applied to the specific firefighting object. Compared to the priority alarm method applied to the tourist hotel, which is a specific firefighting target with 5 or more floors and a total floor area of more than 3,000m2, the time was shortened by 3.7 seconds when measured by applying the priority alarm method for the four floors directly above. This indicates that it is necessary to take measures to select a fire alarm method suitable for the structure and environmental conditions of the building rather than applying the uniform NFSC regulations.

Primary versus revision total shoulder arthroplasty: comparing relative value and reimbursement trends

  • Carney, John Joseph;Gerlach, Erik;Plantz, Mark;Swiatek, Peter Raymond;Marx, Jeremy;Saltzman, Matthew;Marra, Guido
    • Clinics in Shoulder and Elbow
    • /
    • v.25 no.1
    • /
    • pp.42-48
    • /
    • 2022
  • Background: Total shoulder arthroplasty (TSA) has been demonstrated to be an effective treatment for multiple shoulder pathologies. The purpose of our study was to compare the relative value units (RVUs) per minute of surgical time for primary and revision TSA. Methods: The American College of Surgeons National Surgical Quality Improvement Program database was queried to identify patients that underwent primary TSA, one-component revision TSA, and two-component revision TSA between January 1, 2015 and December 31, 2017 using current procedure terminology codes. RVUs were divided by mean operative time for each procedure to determine the amount of revenue generated per minute. Rates were compared between the groups using a one-way analysis of variance with post-hoc Tukey test. Statistical significance was set at p<0.05. Results: When dividing compensation by surgical time, we found that two-component revision generated more compensation per minute compared to primary TSA (0.284±0.114 vs. 0.239±0.278 RVU per minute or $10.25±$4.11 vs. $8.64±$10.05 per minute, respectively; p=0.001). Conclusions: The relative value of revision TSA procedures is weighted to account for the increased technical challenges and time associated with these procedures. This study confirms that reimbursement is higher for revision TSA compared to primary TSA.

Estimation of yield strength due to neutron irradiation in a pressure vessel of WWER-1000 reactor based on the correction of the secondary displacement model

  • Elaheh Moslemi-Mehni;Farrokh Khoshahval;Reza Pour-Imani;M.A. Amirkhani-Dehkordi
    • Nuclear Engineering and Technology
    • /
    • v.55 no.9
    • /
    • pp.3229-3240
    • /
    • 2023
  • Due to neutron radiation, atomic displacement has a significant effect on material in nuclear reactors. A range of secondary displacement models, including the Kinchin-Pease (K-P), Lindhard, Norgett-Robinson-Torrens (NRT), and athermal recombination-corrected displacement per atom (arc-dpa) have been suggested to calculate the number of displacement per atom (dpa). As neutron elastic interaction is the main cause of displacement damage, the focus of the current study is to calculate the atomic displacement caused by the neutron elastic interaction in order to estimate the exact amount of yield strength in a WWER-1000 reactor pressure vessel. To achieve this purpose, the reactor core is simulated by MCNPX code. In addition, a program is developed to calculate the elastic radiation damage induced by the incident neutron flux (RADIX) based on different models using Fortran programming language. Also, due to non-elastic interaction, the displacement damage is calculated by the HEATR module of the NJOY code. ASME E-693-01 standard, SPECTER, NJOY codes, and other pervious findings have been used to validate RADIX results. The results showed that the RADIX(arc-dpa)/HEATR outputs have appropriate accuracy. The relative error of the calculated dpa resulting from RADIX(arc-dpa)/HEATR is about 8% and 46% less than NJOY code, respectively in the ¼ and ¾ vessel wall.

Android Malware Detection using Machine Learning Techniques KNN-SVM, DBN and GRU

  • Sk Heena Kauser;V.Maria Anu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.202-209
    • /
    • 2023
  • Android malware is now on the rise, because of the rising interest in the Android operating system. Machine learning models may be used to classify unknown Android malware utilizing characteristics gathered from the dynamic and static analysis of an Android applications. Anti-virus software simply searches for the signs of the virus instance in a specific programme to detect it while scanning. Anti-virus software that competes with it keeps these in large databases and examines each file for all existing virus and malware signatures. The proposed model aims to provide a machine learning method that depend on the malware detection method for Android inability to detect malware apps and improve phone users' security and privacy. This system tracks numerous permission-based characteristics and events collected from Android apps and analyses them using a classifier model to determine whether the program is good ware or malware. This method used the machine learning techniques KNN-SVM, DBN, and GRU in which help to find the accuracy which gives the different values like KNN gives 87.20 percents accuracy, SVM gives 91.40 accuracy, Naive Bayes gives 85.10 and DBN-GRU Gives 97.90. Furthermore, in this paper, we simply employ standard machine learning techniques; but, in future work, we will attempt to improve those machine learning algorithms in order to develop a better detection algorithm.

Association of body weight and urinary tract infections during infancy: a nationwide comparative matched cohort study

  • Peong Gang Park;Ji Hyun Kim;Yo Han Ahn;Hee Gyung Kang
    • Childhood Kidney Diseases
    • /
    • v.27 no.2
    • /
    • pp.111-116
    • /
    • 2023
  • Purpose: This article was to investigate the association between urinary tract infections (UTIs) and high weight status in infancy. Methods: We conducted a nationwide matched cohort study from January 2018 to December 2020 using data from the Korean National Health Insurance System and the Korean National Health Screening Program for Infants and Children. We analyzed the association between UTI diagnosis codes and high weight status (which was defined as being in the 90th percentile or higher of weight-for-age). Results: We found that 22.8% of infants with UTIs exhibited high weight status, compared to 20.0% of non-UTI infants (P<0.001). Per our multivariable analyses, the adjusted odds ratio for high weight status was 1.09 (95% confidence interval, 1.06-1.13). Conclusions: UTI in the first 12 months of life was associated with a weight-for-age percentile of ≥90. Our findings corroborate those of previous single-center studies and emphasize the importance of careful monitoring for this at-risk group.

Effects of Digital Shadow Work on Foreign Users' Emotions and Behaviors during the Use of Korean Online Shopping Sites

  • Pooja Khandagale;Joon Koh
    • Asia pacific journal of information systems
    • /
    • v.33 no.2
    • /
    • pp.389-417
    • /
    • 2023
  • Social distancing required the use of doorstep delivery for nearly all purchases during the COVID-19 pandemic. Foreign users in Korea are forced to participate in superfluous tasks, leading to an increase in their anxiety and fatigue while online shopping. This study examines how digital shadow work stemming from the language barrier can affect the emotions and behaviors of foreign shoppers that use Korean shopping sites. By interviewing 37 foreign users in Korea, this draft examined their experiences, behaviors, and emotional output, classifying them into 14 codes and seven categories. Using grounded theory, we found that online shoppers' emotions, feelings, experiences, and decision making may be changed in the stages of the pre-use, use, and post-use activities. User responses regarding shadow work and related obstacles can be seen with the continue, discontinue, and optional (occasional use) of Korean online shopping sites. Pleasure and satisfaction come from high efficiency and privileges, whereas anger and disappointment come from poor self-confidence and pessimism. Furthermore, buyer behavior and product orientation are identified as intervening conditions, while the online vs. offline shopping experiences are identified as contextual conditions. In conclusion, language barriers and other factors make online shopping difficult for foreign shoppers, which negatively affects their psychological mechanisms and buying behaviors. The implications from the study findings and future research are also discussed.

A Study on the Critical Viewpoint of Elementary School Teachers for Science Class (초등학교 교사의 과학 수업 비평관점에 관한 연구)

  • Kim, Jae-Bin;Chung, Jung-In
    • Journal of The Korean Association For Science Education
    • /
    • v.30 no.8
    • /
    • pp.1084-1096
    • /
    • 2010
  • In this study, class criticism by elementary school teachers was analyzed on the subject of science classes by beginner teachers. And then the viewpoints and characteristics of the class criticism were investigated. Teachers for class criticism consisted of six members, including two each of low- and high-career teachers. The viewpoints were analyzed in comparison with all the teachers. The subject of class criticism was 'Activity of leaves in plants', which is in the seventh unit of the science textbook for fifth grade elementary students of the first semester. The result of this study was as follows. Teachers criticized the science class mainly with three codes of viewpoints: motivation, inquiry focused on student, and summary of the results, where viewpoints consisted of 18 codes. They criticized the class by factors on a standard checklist and their criticism was characterized by partial situation and context. Low-career teachers criticized the class with the viewpoint in sympathy with the beginner teachers and criticized the class with the viewpoint of recollecting their teaching experience as beginners. While high-career teachers criticized the class mainly overall situations rather than specific matters. The result of this study can be used as basic data for a program of professional development and teacher education for science classes.