Ham, Tae-Gew;Cho, Sam-Deok;Yang, Kee-Sok;Yoo, Seung-Kyong
Journal of the Korean Geosynthetics Society
/
v.7
no.3
/
pp.41-49
/
2008
This study was carried out the model experiment in laboratory to evaluate the bearing capacity improvement of soft ground as altered constraint condition of reinforcements according to geotextile, georid, steel bar. As a results, the value of BCR was increased linearly as improvement of the stiffness of reinforcements, and the factor governed the increasement of BCR was the increasement of frictions between reinforcement and clay as far as the constrain conditions increased until T=85.6kg. Moreover, An angle of inclination, ${\theta}$, between reinforcement and horizontal surface was distributed from $38^{\circ}$ to $50^{\circ}$ for Geotextile, from $45^{\circ}$ to $50^{\circ}$ for Geogrid and from $14^{\circ}$ to $16^{\circ}$ for steel bar. A radius of heaving, r, of clay ground by vertical weight at side was distributed from 0.6m to 0.7m for Geotextile, from 0.5m to 0.8m for Geogrid, and from 2.4m to 3.0m for steel bar. In case of steel bar, r was 4 times that of Geotextile.
Pattern recognition of a cucumber were conducted to detect directly the binary images by using thresholding method, which have the threshold level at the optimum intensity value. By restricting conditions of learning pattern, output patterns could be extracted from the same and similar input patterns by the algorithm. The algorithm of pattern recognition was developed to determine the position of the cucumber from a real image within working condition. The algorithm, designed and developed for this project, learned two, three or four learning pattern, and each learning pattern applied it to twenty sample patterns. The restored success rate of output pattern to sample pattern form two, three or four learning pattern was 65.0%, 45.0%, 12.5% respectively. The more number of learning pattern had, the more number of different out pattern detected when it was conversed. Detection of feature pattern of cucumber was processed by using auto scanning with real image of 30 by 30 pixel. The computing times required to execute the processing time of cucumber recognition took 0.5 to 1 second. Also, five real images tested, false pattern to the learning pattern is found that it has an elimination rate which is range from 96 to 98%. Some output patterns was recognized as a cucumber by the algorithm with the conditions. the rate of false recognition was range from 0.1 to 4.2%.
Journal of the Earthquake Engineering Society of Korea
/
v.13
no.4
/
pp.67-76
/
2009
Recently, the active interaction control (AIC) system was proposed as a semi-active control system. The AIC system consists of a primary structure and an auxiliary structure. The objective of the AIC system is to control the response of the primary structure through engagement and disengagement between the primary and auxiliary structures. Previous switching control algorithms have been shown to be effective in reducing the response of the primary structure. However, they have the main drawback of requiring an excessive engagement-disengagement frequency and high interaction force. In this paper, the regions in which the switching is activated and the regions in which the switching is deactivated are described separately, to effectively determine the engagement or the disengagement. The general relationship between the switching regions and the deactivated switching regions selected according to the engagement-disengagement conditions is described within the newly-developed comprehensive switching framework. The proposed engagement-disengagement conditions are designed within a comprehensive switching framework, to reduce engagement-disengagement frequency and interaction force. Furthermore, the effect of a control sampling period on the AIC system is explained in terms of the engagement-disengagement frequency. The effectiveness of the proposed algorithms and the effect of the control sampling period are considered for a single degree of freedom model under free vibration. It is observed that increasing the duration of stay by using a large control sampling period prevents the AIC system from activating the possible chance of switching. The proposed algorithms are shown to be effective, both in restricting ineffective switching and in reducing interaction force.
The Transactions of the Korea Information Processing Society
/
v.13
no.2
/
pp.34-40
/
2024
Secret sharing is a cryptographic technique that involves dividing a secret or a piece of sensitive information into multiple shares or parts, which can significantly increase the confidentiality of a secret. There has been a lot of research on secret sharing for different contexts or situations. Tassa's conjunctive secret sharing method employs polynomial derivatives to facilitate hierarchical secret sharing. However, the use of derivatives introduces several limitations in hierarchical secret sharing. Firstly, only a single group of participants can be created at each level due to the shares being generated from a sole derivative. Secondly, the method can only reconstruct a secret through conjunction, thereby restricting the specification of arbitrary secret reconstruction conditions. Thirdly, Birkhoff interpolation is required, adding complexity compared to the more accessible Lagrange interpolation used in polynomial-based secret sharing. This paper introduces the multi-compartment secret sharing method as a generalization of the conjunctive hierarchical secret sharing. Our proposed method first encrypts a secret using external groups' shares and then generates internal shares for each group by embedding the encrypted secret value in a polynomial. While the polynomial can be reconstructed with the internal shares, the polynomial just provides the encrypted secret, requiring external shares for decryption. This approach enables the creation of multiple participant groups at a single level. It supports the implementation of arbitrary secret reconstruction conditions, as well as conjunction. Furthermore, the use of polynomials allows the application of Lagrange interpolation.
The H.264 has been adopted as the video codec for various multimedia services such as DMB and next-generation DVD because of its superior coding performance. However, the reference codec of the standard, the joint model (JM) contains quite a few algorithms which are too complex to be used for the resource-constraint embedded environment. This paper introduces very low-complexity H.264 encoding algorithm which is applicable for the embedded environment. The proposed algorithm was realized by restricting some coding tools on the basis that it should not cause too severe degradation of RD-performance and adding a few early termination and bypass conditions during the motion estimation and mode decision process. In case of encoding of 7.5fps QCIF sequence with 64kbpswith the proposed algorithm, the encoder yields worse PSNRs by 0.4 dB than the standard JM, but requires only $15\%$ of computational complexity and lowers the required memory and power consumption drastically. By porting the proposed H.264 codec into the PDA with Intel PXA255 Processor, we verified the feasibility of the H.264 based MMS(Multimedia Messaging Service) on PDA.
Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.
Purpose - Prior research has suggested that consumers typically prefer to have a larger number of options. However, preference of assortment size may depend on how depleted resources in consumers' mind are. Reduced capacity for self-regulation by resource depletion makes people rely on more intuitive and less effortful decision processing. When they are mentally depleted, people are likely to focus on the choice difficulty from large assortment, which leads to preference for the small assortment when they make a decision. It could be an important question potentially how being in a depleted mode through effortful self-regulation will influence on the evaluation of assortment size. To answer this questioner, we hypothesized that being engaged in self-regulation, as compared with not being engaged in self-regulation, will influence on the evaluation of product assortment size such as attractiveness, difficulty of choice, and anticipated regret. Research design, data, and methodology - In this study, we first manipulated self-regulatory resource availability using a self-regulation task (i.e., instructing participants to solve Sudoku puzzle vs. to solve diagram cube by filling any diagrams that they prefer into cube instead of number) and asked to indicate the difficulty of the tasks available to them ("How much difficulty did you feel when you complete the task?") Next, participants were asked to imagine that they were planning to buy a laptop at one of the two stores (small assortment: 6 options vs. large assortment: 30 options), both offering good quality of products. After reading the product descriptions, participants were instructed to consider all the information and choose a store that they would like to shop. Finally we measured the choice difficulty, evaluation of product assortments, and anticipated regret on a 7-point scale. We conducted two-way ANOVA in testing the main hypothesis that depleted consumers will show poorer subsequent self-control than non-depleted consumers when they make a decision in large assortment. Results - Compared with non-depleted participants, depleted participants showed the bigger difference from the degree of choice difficulty and product attractiveness between large and small assortments, but the result revealed only a significant interaction effect of resource depletion and assortment size on choice difficulty. Also depleted participants showed the smaller difference from the degree of anticipated regret between large and small assortments than non-depleted participants. Conclusion - Depleted individuals by a prior task are relatively effortless and intuitive form of choosing products so that they try to avoid making effortful trade-offs among choice difficulty such as large assortment, compare with non-depleted individuals. However, for anticipated regret, non-depleted individuals in small assortment anticipate more regret by excluding or at least restricting the possibility of buying attractive items or another kind of potential items than depleted individuals, regardless less choice difficulty in small option. To sum up, it is important to note that individuals are influenced by self-regulatory resources and their self-regulatory conditions contribute to the overall positive or negative impact of product assortment on choice.
When a tracked vehicle travels off-road, shearing action and ground sinkage occur on the soil-track interface and severely affect tractive performance of the tracked vehicle. Especially, the ground sinkage, which is induced by vehicle's weight (hereinafter referred to as static sinkage) and longitudinal forces in the direction of travel producing slip (hereinafter referred to as slip sinkage), develops soil resistance, directly restricting the tractive performance of an off-road tracked vehicle. Thus, to assess the tractive performance of an off-road tracked vehicle, it is imperative to take both of static sinkage and slip sinkage into consideration. In this research, a series of model track experiments was conducted to investigate the slip sinkage which has not been clarified. Experiment results showed that the slip sinkage increased with increasing the slip ratio, but the increasing rate gradually decreased. Also, the slip sinkage was found to increase as relative density of soil decreased and imposed vertical load increased. From the experiment results, the normalized slip sinkage defined as slip sinkage to static sinkage calculated in the identical condition was investigated, and an empirical equation for the slip sinkage was developed in terms of slip ratio, which allows vehicle operators to predict the slip sinkage in a given soil and operating conditions.
An amendment to Medical Law allowing permanent face-to-face treatment has been proposed in the 21st National Assembly, with five different bills introduced. However, each proposed amendment focuses on different aspects, and the issue is currently in a state of 'ongoing review' due to factors such as opposition from the medical profession and political considerations. However, from the perspective that the introduction of non-face-to-face treatment should be institutionalized and legislated prioritizing patient safety, certain directions are proposed. These include focusing on returning patients as the primary target, chronic diseases as the focal conditions, outpatient medical institutions as the implementing agencies, restricting non-face-to-face means primarily to video systems, and legally exempting healthcare professionals from responsibility for incidents beyond their control. The proposed directions also emphasize establishing the right to demand face-to-face treatment. It is suggested to legislate initial standards that ensure a minimum level of safety and gradually expand the scope of non-face-to-face treatment through future research, evaluation, and similar step-by-step approaches.
The expansion of air transport on a global scale with ever increasing traffic densities has brought about problems that must be solved through new multilateral mechanisms. Looking to the immediate future, air transport will require new forms of international cooperation in technical and economic areas. Air transport by its very nature should have been a counterforce to nationalism. Yet, the regulatory system in civil aviation is still as firmly rooted in the principle of national sovereignty as when it was first proclaimed at t-11e Paris Convention of 1919 and reaffirmed in the Chicago Convention. Sovereignty over the airspace has remained the cornerstone of relations between states in all respects of air transport. The importance of sovereignty over air space embodied in article 1 of the Chicago Conrenton also is responsible for restricting the authority of ICAO as an intergovernmental regulatory agency. The Orgenization, for all its extensive efforts, has only limited authority. ICAO sets standards but cannot enforce them; it devises solutions but cannot impose them. To implement its rules ICAO most rely not so much on legal requirements as on the goodwill of states. It has been forty-eight years since international community set the foundations of the international system in civil aviation action. Profound political, economic and technological changes have taken place in air transport. The Chicago Convention is living proof that staes can work together to make air transport a safe mode of travel. The law governing international civil auiation is principally based on international treaties and on other regulation agreed to by governments, for the most part through the mechanism of ICAO. The role of ICAO international standards and recommended practices and procedures dealing with a broad range of technical matters could hardly be overestimated. The organization's ability to develop these standards and procedures, to adapt them continuously to the rapid sate of change and development of air transport, should be particularly stressed. The role of ICAO in the area of the development of multilateral conventions on international air law has been successful but to a certain degree. From the modest starting-point of the Tokyo Convention, we have seen more adequate international instruments prepared within the scope of ICAO activities, adopted: the Hague Convention of 1970 for the suppression of Unlawful Seizure of Aircraft and the Montreal Convention of 1971 for the Suppression of Unlawful Acts against the Safety of Civil Aviation. The work of ICAO in the new domain of international law conventions concerning what has been loosely termed above as the criminal problems connected with international air transport, in particular the problem of armed aggression against aircraft, should be positively appreciated. But ICAO records in the domain of developing a uniform legal system of international carriage by air are rather disappointing. The problem of maintaining and developing the uniformity of this regulation exceeds the scope of interest and competence of governmental transport agencies. The expectations of mankind linked to it are too great to give up trying to restore the uniform legal system of international air carriage that would create proper conditions for its further growth. It appears that ICAO has, at present, a good opportunity for doing this. The hasty preparation of ICAO draft conventions should be definitely excluded. Every Preliminary draft convention ought to be sent to Governments of all member-States for consideration, So that they could in form ICAO in due time of their observation. The problom of harmonizing a uniform law of international air carriage with that of other branches of international transport should demand more and more of its attention. ICAO cooperation with other international arganization, especially these working in the field of international transport, should be strengthened. ICAO is supposed to act as a link and a mediator among, at times the conflicting interests of member States, serving the happiness and peace of all of the world. The transformation of the contemporary world of developing international relations, stimulated by steadily growing international cooperation in its various dimensions, political, economic, scientific, technological, social and cultural, continuously confronts ICAO with new task.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.