• Title/Summary/Keyword: School security

Search Result 3,327, Processing Time 0.04 seconds

Application of steel equivalent constitutive model for predicting seismic behavior of steel frame

  • Wang, Meng;Shi, Yongjiu;Wang, Yuanqing
    • Steel and Composite Structures
    • /
    • v.19 no.5
    • /
    • pp.1055-1075
    • /
    • 2015
  • In order to investigate the accuracy and applicability of steel equivalent constitutive model, the calculated results were compared with typical tests of steel frames under static and dynamic loading patterns firstly. Secondly, four widely used models for time history analysis of steel frames were compared to discuss the applicability and efficiency of different methods, including shell element model, multi-scale model, equivalent constitutive model (ECM) and traditional beam element model (especially bilinear model). Four-story steel frame models of above-mentioned finite element methods were established. The structural deformation, failure modes and the computational efficiency of different models were compared. Finally, the equivalent constitutive model was applied in seismic incremental dynamic analysis of a ten-floor steel frame and compared with the cyclic hardening model without considering damage and degradation. Meanwhile, the effects of damage and degradation on the seismic performance of steel frame were discussed in depth. The analysis results showed that: damages would lead to larger deformations. Therefore, when the calculated results of steel structures subjected to rare earthquake without considering damage were close to the collapse limit, the actual story drift of structure might already exceed the limit, leading to a certain security risk. ECM could simulate the damage and degradation behaviors of steel structures more accurately, and improve the calculation accuracy of traditional beam element model with acceptable computational efficiency.

A Study on Risk and Safety measures of the Improved Explosive Device (사제폭발물의 위험성 및 안전대책에 관한 연구)

  • Han, Jae-Hoon;Choi, Min-Ki;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.193-202
    • /
    • 2014
  • Crimes with explosives is one of the mass-destructive crimes that involves the most victims. It is heavily punished under the Korean laws. Mid-eastern area is one of the leading places that are home to improvised explosive device attacks, in the form of religious or political terrorism because of its convenience of use, production and disguise. Improvised bombs are permeating into domestic crimes in Korea as their tools. Use of explosive substances are strictly restricted in this country, but it is not impossible to find its information online and to create private explosives with a bit of interest. And they are being traded in the grey market. For this reason, this thesis offers the method of an efficient safety control of explosive substances, which can be used as raw materials for improvised explosive devices, in order to protect citizens' lives and properties and to promote national security down the road.

Analysis of Diversity Management on Organizational Performance: Focused on Japanese Companies Employing the Elderly and Persons with Disabilities (다이버시티 경영의 조직성과에 관한 분석 -일본의 고령자 및 장애인고용기업을 중심으로-)

  • Kim, Moon-Jung;Kim, Hong-Gi
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.591-599
    • /
    • 2016
  • This study has examined and compared the Organizational performance of the Diversity management focusing on Japanese Companies Employing the Elderly and persons with disabilities. To achieve the research objectives, I performed T-test. The total number of the date used in this study is 1,704. The findings from the t-tests are: the Organizational Productivity and Organizational security of companies employing the Elderly and persons with disabilities are better than those of companies managing Gender Diversity or not carrying out at all.

Influence on the Use Intention of Alipay Payment Service by Chinese Tourists Visiting Korea

  • HE, Ming-Guang;KIM, Hwa-Kyung;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.11
    • /
    • pp.7-13
    • /
    • 2019
  • Purpose: In the past, the South Korean government made various efforts to attract Chinese tourists, resulting in gradually more inbound tourists. In 2016, the number of Chinese tourists to South Korea peaked at 8.06 million and became the top source market. Nevertheless, increasing numbers of consumers choose to adopt the mobile payment tool instead of cash and credit cards in modern times with developed IT services. Research design, data, and methodology: IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used to analyze the data, which was collected from hotel employees in China from March 25 to May 10. Results: First, Interactivity, security, convenience, local information supply and user interface had positive effects on satisfaction and reliability. Second, it was believed that the convenience of Alipay played a positive role in increasing reliability and satisfaction through verification. Third, the role of use rate was found to be important in the development of Alipay functions. Conclusions: Based on the result, an analysis on the development of the Alipay market and the use of Alipay in South Korea is warranted. Furthermore, this paper will serve as a basis for flexible strategic plans for the development of Alipay and SMEs in South Korea.

Correlation analysis between cerebral activation status and blood type (대뇌 활성화 상태 변화와 혈액형간의 상관성 분석)

  • Park, Yeon-Tae;Shin, Jeong-Hoon
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.1097-1099
    • /
    • 2017
  • 본 논문은 대뇌 활성화 상태 변화와 혈액형간의 상관성 분석을 목적으로 한다. 혈액은 인체의 혈관을 통하여 몸 전체로 순환하는 액체 성 물질이다. 이 혈액을 구성하는 물질의 이질적 차이를 나타내는 차별적 유형을 혈액형이라 하며, 혈액형은 멘델의 법칙에 따라 부모에서 자식으로 유전된다. [1] 최근 들어 혈액형이 가지는 유전적 특징을 통한 질병 진단 및 치료, 예방을 위한 연구가 진행되고 있으나, 대부분의 연구는 육체적인 질병과 관련되어 있는 실정이다. 그러나, 혈액형의 경우 유전적 특성을 가지고 있으며, 신경 전달 망에 영향을 끼칠 것으로 추정 되는바 육체적 질병뿐만 아닌 정신적인 질환에도 혈액형에 따른 치료 및 예방방법을 차별화 하여, 보다 효율적인 치료 및 예방을 수행 할 수 있을 것으로 판단된다. 본 논문에서는 이를 위하여, 외부자극에 따른 대뇌 활성화 상태 변화를 분석하며, 특히 혈액형에 따른 상태변화의 상관성을 분석하고자 한다. 본 논문에서 활용하는 외부 자극은 청각 자극을 활용하며, 먼저 혈액형에 따른 피험자 군의 분류를 수행하여 동일 군 내 공통반응 및 상이한 군 간의 특이반응을 분석하여, 혈액형이 대뇌 활성화 상태 변화 및 정신질환에 따른 증상발현 등과 유관함을 검증하고자 한다.

Smart Windows and Doors Platform for Providing Optimized Inner Environment (최적의 실내 환경을 제공하기 위한 스마트 창호 플랫폼)

  • Cho, Yong-Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.5
    • /
    • pp.464-469
    • /
    • 2015
  • This paper presents the smart system platform for remotely controlling the windows and doors system(WDS), which gathers and analyzes the state of WDS and the environmental data for preventing crimes and keeping a pleasant indoor. In particular, standard API between the smart WDS platform and the smart home platform has been presented to be easy to a home services, such as security, safety, and home appliance control. The private gateway of wire and wireless communication interfaces has been developed to remotely control and monitor the WDS for anytime and anyplace solving the crime prevention and ventilation problem. Web-and App-based user interface in order to detect the opening and shutting states and remotely control WDS have also been developed to support the mobile environment, respectively.

Threats and countermeasures of malware (악성코드의 위협과 대응책)

  • Lim, Dong Yul
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • The malware, as hackers generic name of executable code that is created for malicious purposes, depending on the presence or absence of a self-replicating ability infected subjects, and are classified as viruses, worms, such as the Trojan horse. Mainly Web page search and P2P use, such as when you use a shareware, has become penetration is more likely to occur in such a situation. If you receive a malware attack, whether the e-mail is sent it is automatically, or will suffer damage such as reduced system performance, personal information leaks. While introducing the current malware, let us examine the measures and describes the contents related to the malicious code.

  • PDF

Efficient Method of Detecting Blurry Images

  • Tsomko, Elena;Kim, Hyoung-Joong;Paik, Joon-Ki;Yeo, In-Kwon
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.27-39
    • /
    • 2008
  • In this paper we present a simple, efficient method for detecting the blurry photographs. Recently many digital cameras are equipped with various auto-focusing functions to help users take well-focused pictures as easily as possible. In addition, motion compensation devices are able to compensate motion causing blurriness in the images. However, digital pictures can be degraded by limited contrast, inappropriate exposure, imperfection of auto-focusing or motion compensating devices, unskillfulness of the photographers, and so on. In order to decide whether to process the images or not, or whether to delete them or not, reliable measure of image degradation to detect blurry images from sharp ones is needed. This paper presents a blurriness/sharpness measure, and demonstrates its feasibility by using extensive experiments. This method is fast, easy to implement and accurate. Regardless of the detection accuracy, the proposed measure in this paper is not demanding in computation time. Needless to say, this measure can be used for various imaging applications including auto-focusing and astigmatism correction.

  • PDF

Authentication Method for Safe Internet of Things Environments (안전한 사물 인터넷 환경을 위한 인증 방식)

  • Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.1
    • /
    • pp.51-58
    • /
    • 2015
  • Internet of Thing is a collection of various technical components, and the interworking among heterogeneous devices, networks, applications is expected to be accelerated through the openness of IoT platform. For this reason, many technical and administrative security threats will occur in IoT environments. In this paper, authentication methods of recent researches are analyzed for safe IoT services, and new mutual authentication protocol is proposed to provide more secure communication. The proposed protocol prevents an impersonation as malicious gateway or illegal device providing mutual authentication between gateway and IoT device. The performance analysis and evaluation of proposed authentication protocol are performed.

Trends for Secure Authentication of Risk-related Remote Metering System (위험 관련 원격 검침 시스템의 보안 인증 기술 동향)

  • Kim, Hyo-Jin;Kim, Hyun-Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.752-754
    • /
    • 2016
  • Power is compared to the overall share of energy continues to increase, so as a way for efficient demand management and value added according to the AMR system was introduced. But there is a risk in a variety of external attack, such as when you use the remote meter reading system, cyber attacks and hacking. It is considered that the measures sought, which can be used to prevent or pre safer urgent. In this paper, I want to point out the current research trends and issues of security authentication technology of remote meter reading system.

  • PDF