Lee, Joon H.;Choi, Hong L.;Heo, Yong J.;Chung, Yoon P.
Asian-Australasian Journal of Animal Sciences
/
v.29
no.5
/
pp.739-746
/
2016
A total of 152 pig farms were randomly selected from the five provinces in South Korea. During the experiment, the average temperature and relative humidity was $24.7^{\circ}C$ and 74% in summer and $2.4^{\circ}C$ and 53% in winter, respectively. The correlation between floor space allowance (FSA) and productivity index was analyzed, including non-productive sow days (NPD), number of weaners (NOW), survival rate (SR), appearance rate of A-grade pork (ARA), and days at a slaughter weight of 110 kg (d-SW) at different growth stages. The objectives of the present study were i) to determine the effect of FSA on the pig productivity index and ii) to suggest the minimum FSA for pigs based on scientific baseline data. For the pregnant sow, NPD could be decreased if pregnant sows were raised with a medium level (M) of FSA (3.10 to $3.67m^2/head$) while also keeping the pig house clean which improves hygiene, and operating the ventilation system properly. For the farrowing sows, the NOW tended to decrease as the FSA increased. Similarly, a high level of FSA (H) is significantly negative with weaner SR of farrowing sows (p-value = 0.017), indicating this FSA tends to depress SR. Therefore, a FSA of 2.30 to $6.40m^2/head$ (very low) could be appropriate for weaners because a limited space can provide a sense of security and protection from external interruptions. The opposite trend was observed that an increase in floor space (> $1.12m^2/head$ leads to increase the SR of growing pigs. For the fattening pigs, H level of FSA was negatively correlated with SR, but M level of FSA was positively correlated with SR, indicating that SR tended to increase with the FSA of 1.10 to $1.27m^2/head$. In contrast, ARA of male fattening pigs showed opposite results. H level of FSA (1.27 to $1.47m^2/head$) was suggested to increase productivity because ARA was most affected by H level of space allowance with positive correlation ($R^2=0.523$). The relationship between the FSA and d-SW of fattening pigs was hard to identify because of the low $R^2$ value. However, the farms that provided a relatively large floor space (1.27 to $1.54m^2/head$) during the winter period showed d-SW was significantly and negatively affected by FSA.
Journal of rehabilitation welfare engineering & assistive technology
/
v.10
no.2
/
pp.171-176
/
2016
By developing rider robot using omni wheel drive, a usability test for 6 people was conducted after finding out inconvenient factors and ways of improvement. The results of this research are as follows. First, we researched inconvenient factors captured by object of experiment using a rider robot who is living in the dormitory. It showed that the disabled showing 1.6 of satisfaction degree felt more inconvenient for normal people showing 4 of satisfaction degree. It was found that the height of seats is 10 centimeters higher, which caused inconvenience for moving. Second, each of the disabled and normal people showed 2.33 and 2.62 of satisfaction degree below the average for seats, back of a seat, armrest, footrest, security belts. However, for the revised design both of them showed 3.5 of satisfaction degree over the average. Third, most people felt this robot is quite expensive and said they would purchase it if subsidized by the government. Therefore, based on inconvenient factors and ways of improvement found in this research, further study needs to be conducted so as to improve the quality of life of the disabled.
Journal of Korean Society for Geospatial Information Science
/
v.22
no.4
/
pp.135-142
/
2014
As interest in social safety has recently increased at the national level, the various activities which can effectively prevent crimes are being carried out. Because the existing maps related to crimes provide the information about the present condition of crimes by administrative district for users, women and pedestrians who go by night could not actually grasp safe roads in advance. Therefore, this study developed the methodology that can easily extract dangerous areas due to crimes by the digital map 2.0. In the digital map 2.0, location and attribute information of center-lines of roads and building layers were used to find dangerous areas of crimes in these layers. Pavement materials and road width which are already built by the attribute information were used in the center-lines of roads. Crossing angles that roads and roads cross each other were additionally extracted and utilized. The attribute information about building types were input in the building layers of the digital map 2.0. The areas that are more the threshold values set by totaling up all the risk scores when considering pavement materials, road width, crossing angles of road, and building types in the center-lines of roads and road crossings were extracted as the dangerous areas that crimes can occur. Verification of the developed methodology was done by experiment. In the spatial apsect, the dangerous areas of crimes could be found by using the digital 2.0, roads, and building layers only through the experiment. In the administrative aspect to prevent crimes, additional installation of safety facilities such as street lights and security lights in the identified areas which are vulnerable for crimes is thought to be increasing safety of dangerous areas.
This study is to analyze the physical environment and conduct spatial data for bicycle road system in changwon. Index for evaluation index was developed based on literatures. Then the level of importance and weight have been modified through experts review. Finally, index with eight categories such as greenness(40% over), bicycle road connectivity(1.8, 9.8%), road type bike(bicycle lane, 24.4%), pave type(asphalt 72.5%), illegal parking(none, 93.9%), bike road surface visibility(exist, 46.8%), vehicle speed limits(30km, under), vehicle traffic(500/hr under, 44.3%) have been applied to empirical investigation. Collected data has been hierarchically classification by ArcGIS Program. The Highest grades(score 31-35, level 1) occupied 35% of target destination. High level of greenness and load type has contributed to high score. In addition, average level of greenness of those destination was 35% and higher, which provide high degree of security and freshness for bicycle riding. Meanwhile, lowest level(level 5, which earned 15 point or less) occupied 24.5%. illegal parking, low level of greenness, and no surface sign caused low score.
Recently, the utilization of geospatial open platforms has been constantly increased and the interest in 3D geospatial data such as terrain, building and shopping mall has been increased significantly. In particular, rather than simplified 3D geospatial data, interest in high-precision 3D geospatial data which similarly represents the real world objects has increased significantly. In order to satisfy the demand for such the high-precision 3D geospatial data, various kinds of 3D geospatial open platforms has been developed and has provided services on the web. However, most of the 3D geospatial open platforms have been used plug-in module in order to ensure a fast 3D rendering performance on the web, despite the many problems such as difficulty of the installation, no supporting of cross browser/operating system and security issues. In addition, recently, the existing 3D geospatial open platforms based on plug-in module are facing a serious problem, by declaring the NPAPI service interruption in Chrome and Firefox browsers. In this study, we presents the design and implementation of a new 3D geospatial open platform based on HTML5/WebGL technology without the use of plug-ins. Such the new 3D geospatial open platform based on HTML5/WebGL may support cross browsers such as IE, Chrome, Firefox, Safari and cross OS platforms such as Windows, Linux, Mac and mobile OS platforms.
Journal of the Korean Association of Geographic Information Studies
/
v.14
no.4
/
pp.1-12
/
2011
There has been the increasing concern with the safety of seven major urban infrastructure such as road, electricity, water supply, sewerage and so on due to urban expansion and new town development. However, high technology development for the common duct which can be an alternative for the safety issue has not been completed due to the law of the national security area. Existing management method of the common duct by people could not respond to the urgent accidents adequately and immediately since it is impossible for us to get access to that in case of fire or gas leak. This study suggests to the method of installing monitoring devices and processing CCTV images with a water supply in a TestLab(a variety of the USN(Ubiquitous Sensor Network) equipment was tested in the TestLab in KICT). The suggested management method of common duct facilities make it possible to do real-time monitoring and prompt access and response to an accident inside the common duct.
On June 29th, 2010, a cross-straits "Economic and Cooperation Framework Agreement" (ECFA) is signed between China and Taiwan. This pact seems to be the greatest step forward on cooperation between the two sides, reflecting China-Taiwan thaw. As these countries are especially economically interdependent, great economic incomes and security benefits are expected for both sides after cooperation. this development of enlightened cooperation between China and Taiwan, gives many implications for Korea, the two divided countries. Recently, relation between north and south Korea is developing in an entirely different situation compared to the former Kim Dae-Jung or Roh Moo-hyun administrations. But exchange between north and south Korea has not been stopped, though reduced. This reflects the necessity of exchange of the north and the south, and this means that making preparation for the efficient conduct of exchange is needed. So in this study, we consider the China-Taiwan exchange and cooperation development carefully as a model for exchange and cooperation of the north and south Korea, and sought realizable ways to exchange and cooperate between the north and south Korea, which is also a win-win strategy for northeast Asia.
Journal of the Institute of Electronics Engineers of Korea SD
/
v.42
no.1
/
pp.57-67
/
2005
Fast scalar multiplication of points on elliptic curve is important for elliptic curve cryptography applications. In order to vary field sizes depending on security situations, the cryptography coprocessors should support variable length finite field arithmetic units. To determine the effective variable length finite field arithmetic architecture, two well-known curve scalar multiplication algorithms were implemented on FPGA. The affine coordinates algorithm must use a hardware division unit, but the projective coordinates algorithm only uses a fast multiplication unit. The former algorithm needs the division hardware. The latter only requires a multiplication hardware, but it need more space to store intermediate results. To make the division unit versatile, we need to add a feedback signal line at every bit position. We proposed a method to mitigate this problem. For multiplication in projective coordinates implementation, we use a widely used digit serial multiplication hardware, which is simpler to be made versatile. We experimented with our implemented ECC coprocessors using variable length finite field arithmetic unit which has the maximum field size 256. On the clock speed 40 MHz, the scalar multiplication time is 6.0 msec for affine implementation while it is 1.15 msec for projective implementation. As a result of the study, we found that the projective coordinates algorithm which does not use the division hardware was faster than the affine coordinate algorithm. In addition, the memory implementation effectiveness relative to logic implementation will have a large influence on the implementation space requirements of the two algorithms.
Compared to other countries, cloud computing in Korea is not popular especially in the government sector. One of the reasons for the current not-fully-blossomed situation is partly by early investment in huge government datacenters under Korea's e-government initiative; let alone, there was no strong control tower as well as no enforcing law and ordinances for driving such cloud computing initiative. However, in 2015 March 'Cloud Computing and Privacy Security Act' (hereinafter, Cloud Act) had been passed in the Parliament and from September 2015 Cloud Act was deployed in Korea. In U.S., FedRAMP (Federal Risk Assessment and Management Program) along with Obama Adminstration's 'Cloud First' strategy for U.S. federal institutions is the key momentum for federal cloud computing adoption. In 2015 January, U.S. Congressional Research Service (CRS) has published an extensive monitoring report for cloud computing in U.S. federal institutions. The CRS report which monitored U.S. government cloud computing implementation is indeed a good guideline for Korean government cloud computing services. For this reason, the purpose of the study is to (1) identify important aspects of the enacted Korean Cloud Act, (2) describe recent U.S. federal government cloud computing status, (3) suggest strategy and key strategy factors for facilitating cloud adoption in public organizations reflecting SDLC strategy, wherein.
Ieodo is a submerged rock within a Korea's Exclusive Economic Zone(EEZ) in the East China Sea with its most shallow part about 4.6m below the sea level which has no specific rights for the EEZ delimitation. The United Nations Convention on the Law of the Sea (UNCLOS) stipulates that any coastal state has the rights to claim an EEZ that stretches up to 200 nautical miles from its shore, except where there is an overlap with a neighboring country's claims. Korea claims that Ieodo is within its EEZ as it sits on the Korean side of the equidistant line and the reef is located on the Korea section of the continental shelf. China does not recognize Korea's application of the equidistance principle and insists that Ieodo lies on its continental shelf. According to UNCLOS, Ieodo is located in international waters, rather than one country's EEZ as the two countries have failed to reach a final agreement over the delimitation of the maritime border. This study seeks to understand the evolution of the People's Liberation Army Navy(PLAN) strategy as main obstacles for the EEZ delimitation between Korea and China. PLAN's Strategy evolves from "coastal defense" to "offshore defence", since the late 1980s from a "coastal defence" strategy to an "offshore defence" strategy which would extend the perimeter of defence to between 200 nm and 400 nm from the coast. China's economic power has increased It's dependence on open trade routes for energy supplies and for its own imports and exports. China want secure Sea Lane. PLAN's "offshore defence" strategy combines the concept of active defence with the deployment of its military forces beyond its borders. China's navy try to forward base its units and to achieve an ocean going capability. China's navy expects to have a 'Blue Water' capability by 2050. China insists that coastal states do have a right under UNCLOS to regulate the activities of foreign military forces in their EEZs. China protests several times against US military forces operating within It's EEZ. The U.S. position is that EEZs should be consistent with customary international law of the sea, as reflected in UNCLOS. U.S. has a national interest in the preservation of freedom of navigation as recognized in customary international law of the sea and reflected in UNCLOS. U.S. insists that coastal states under UNCLOS do not have the right to regulate foreign military activities in their EEZs. To be consistent with its demand that the U.S. cease performing military operations in china's EEZ, China would not be able to undertake any military operations in the waters of South Korea's EEZ. As such, to preserve its own security interests, China prefers a status quo policy and used strategic ambiguity on the Ieodo issue. PLAN's strategy of coastal defence has been transformed into offensive defence, Korea's EEZ can be a serious limitation to PLAN's operational plan of activities. Considering China'a view of EEZs, China do not want make EEZ delimitation agreement between Korea and China. China argues that the overlapping areas between EEZs should be handled through negotiations and neither side can take unilateral actions before an agreement is reached. China would prefer Ieodo sea zone as a international waters, rather than one country's EEZ.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.