• 제목/요약/키워드: Sub-division method

Search Result 852, Processing Time 0.027 seconds

A generation method of ASF mapping by the predicted ASF with the measured one in the Yeongil Bay (ASF 예측모델과 실측치를 이용한 영일만 해상 ASF 맵 생성기법)

  • Hwang, Sang-Wook;Shin, Mi Young;Choi, Yun Sub;Yu, Donghui;Park, Chansik;Yang, Sung-Hoon;Lee, Chang-Bok;Lee, Sang Jeong
    • Journal of Navigation and Port Research
    • /
    • v.37 no.4
    • /
    • pp.375-381
    • /
    • 2013
  • In order to establish eLoran system it needs the betterment of a receiver and a transmitter, the add of data channel to loran pulse for loran system information and the differential Loran for compensating Loran-c signal. Precise ASF database map is essential if the Loran delivers the high absolute accuracy of navigation demanded at maritime harbor entrance. In this study we developed the ASF mapping method using predicted ASFs compensated by the measured ASFs for maritime in the harbor. Actual ASF is measured by the legacy Loran signal transmitted from Pohang station in the GRI 9930 chain. We measured absolute propagation delay between the Pohang transmitting station and the measurement points by comparing with the cesium clock for the calculation of the ASFs. Monteath model was used for the irregular terrain along the propagation path in the Yeongil Bay. We measured the actual ASFs at the 12 measurement points over the Yeongil Bay. In our ASF-mapping method we estimated that the each offsets between the predicted and the measured ASFs at the 12 spaced points in the Yeongil. We obtained the ASF map by adjusting the predicted ASF results to fit the measured ASFs over Yeungil bay.

Effect Assessment and Derivation of Ecological Effect Guideline on CO2-Induced Acidification for Marine Organisms (이산화탄소 증가로 인한 해수 산성화가 해양생물에 미치는 영향평가 및 생태영향기준 도출)

  • Gim, Byeong-Mo;Choi, Tae Seob;Lee, Jung-Suk;Park, Young-Gyu;Kang, Seong-Gil;Jeon, Ei-Chan
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.17 no.2
    • /
    • pp.153-165
    • /
    • 2014
  • Carbon dioxide capture and storage (CCS) technology is recognizing one of method responding the climate change with reduction of carbon dioxide in atmosphere. In Korea, due to its geological characteristics, sub-seabed geological $CO_2$ storage is regarded as more practical approach than on-land storage under the goal of its deployment. However, concerns on potential $CO_2$ leakage and relevant acidification issue in the marine environment can be an important subject in recently increasing sub-seabed geological $CO_2$ storage sites. In the present study effect data from literatures were collected in order to conduct an effect assessment of elevated $CO_2$ levels in marine environments using a species sensitivity distribution (SSD) various marine organisms such as microbe, crustacean, echinoderm, mollusc and fish. Results from literatures using domestic species were compared to those from foreign literatures to evaluate the reliability of the effect levels of each biological group and end-point. Ecological effect guidelines through estimating level of pH variation (${\delta}pH$) to adversely affect 5 and 50% of tested organisms, HC5 and HC50, were determined using SSD of marine organisms exposed to the $CO_2$-induced acidification. Estimated HC5 as ${\delta}pH$ of 0.137 can be used as only interim quality guideline possibly with adequate assessment factor. In the future, the current interim guideline as HC5 of ${\delta}pH$ in this study will look forward to compensate with supplement of ecotoxicological data reflecting various trophic levels and indigenous species.

Geomagnetic Paleosecular Variation in the Korean Peninsula during the First Six Centuries (기원후 600년간 한반도 지구 자기장 고영년변화)

  • Park, Jong kyu;Park, Yong-Hee
    • The Journal of Engineering Geology
    • /
    • v.32 no.4
    • /
    • pp.611-625
    • /
    • 2022
  • One of the applications of geomagnetic paleo-secular variation (PSV) is the age dating of archeological remains (i.e., the archeomagnetic dating technique). This application requires the local model of PSV that reflects non-dipole fields with regional differences. Until now, the tentative Korean paleosecular variation (t-KPSV) calculated based on JPSV (SW Japanese PSV) has been applied as a reference curve for individual archeomagnetic directions in Korea. However, it is less reliable due to regional differences in the non-dipole magnetic field. Here, we present PSV curves for AD 1 to 600, corresponding to the Korean Three Kingdoms (including the Proto Three Kingdoms) Period, using the results of archeomagnetic studies in the Korean Peninsula and published research data. Then we compare our PSV with the global geomagnetic prediction model and t-KPSV. A total of 49 reliable archeomagnetic directional data from 16 regions were compiled for our PSV. In detail, each data showed statistical consistency (N > 6, 𝛼95 < 7.8°, and k > 57.8) and had radiocarbon or archeological ages in the range of AD 1 to 600 years with less than ±200 years error range. The compiled PSV for the initial six centuries (KPSV0.6k) showed declination and inclination in the range of 341.7° to 20.1° and 43.5° to 60.3°, respectively. Compared to the t-KPSV, our curve revealed different variation patterns both in declination and inclination. On the other hand, KPSV0.6k and global geomagnetic prediction models (ARCH3K.1, CALS3K.4, and SED3K.1) revealed consistent variation trends during the first six centennials. In particular, the ARCH3K.1 showed the best fitting with our KPSV0.6k. These results indicate that contribution of the non-dipole field to Korea and Japan is quite different, despite their geographical proximity. Moreover, the compilation of archeomagnetic data from the Korea territory is essential to build a reliable PSV curve for an age dating tool. Lastly, we double-check the reliability of our KPSV0.6k by showing a good fitting of newly acquired age-controlled archeomagnetic data on our curve.

A Study on the Spatial Control Effect of Panjang in Donggwoldo (동궐도(東闕圖) 판장(板墻)의 공간통제 효과에 관한 연구)

  • HA Yujeong;KIM Choongsik
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.4
    • /
    • pp.196-209
    • /
    • 2022
  • This study compared and analyzed the spatial division function and role of partitions by comparing the entire space and the spatial changes before and after the installation of partitions in <Donggwoldo>, which was manufactured in the late Joseon Dynasty. As a research method, a set standard was prepared to decompose the space of <Donggwoldo> into a unit space, and the standard was set according to the role and height of the space by classifying it into a main space, sub space, and transition space. Two convex maps were prepared according to before and after the installation of the Panjang, and the values of connectivity, control, and integration, which are spatial syntax variables, were calculated and analyzed. The results of the study are as follows. First, the partition in <Donggwoldo(東闕圖)> did not affect the overall spatial arrangement and control or connection of Donggwol, but the movement and access of space is limited to specific areas. Second, the partition was a facility intensively distributed in Naejeon(內殿) and Donggung(東宮) to be used actively in the way of space utilization. It shows that the unit space increased rapidly due to the installation of the partition. Since the partition was installed in the spaces that were open and under high control in the case of Naejeon(內殿), it helped to secure private spaces as closed ones under low control. On the other hand, for Donggung(東宮), the spaces were compartmented and divided with the partition to guide the movement path through narrow gates of the partition and increase the depth of the space. This helped to create spaces that are free and can be hidden as it increased the number of spaces coming through. Third, In addition to the functions of "eye blocking, space division, and movement path control" revealed in prior research, the partition has created a "space that is easy to control" within a specific area. The installation of the partition reduced the scale through the separation of spaces, but it occurred the expansion of the movement path and space. Also, the partition functioned to strengthen hiding and closure or increase openness as well through space division. This study is significant in that it revealed the value of the spatial control function of panjang through the analysis of spatial control and depth by analyzing the function of the partition with a mathematical model in addition to the analysis and study of the function and role of panjang. In addition, it is valuable in that it has prepared a framework for analysis tools that can be applied to traditional residential complexes similar to palaces by applying space syntax to <Donggungdo> to create convex spaces according to unit space division and connection types of palace architecture and landscape elements.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

An Effect of Uplift Pressure Applied to Concrete Gravity Dam on the Stress Intensity Factor (중력식 콘크리트 댐에 작용하는 양압력이 응력확대계수에 미치는 영향)

  • Lee Young-Ho;Jang Hee-Suk;Kim Tae-Wan;Jin Chi-Sub
    • Journal of the Korea Concrete Institute
    • /
    • v.16 no.6 s.84
    • /
    • pp.841-850
    • /
    • 2004
  • The modeling of uplift pressure within dam, on the foundation on which it was constructed, and on the interface between the dam and foundation is a critical aspect in the analysis of concrete gravity dams, i.e. crack stability in concrete dam can correctly be predicted when uplift pressures are accurately modelled. Current models consider a uniform uplift distribution, but recent experimental results show that it varies along the crack faces and the procedures for modeling uplift pressures are well established for the traditional hand-calculation methods, but this is not the case for finite element (FE) analysis. In large structures, such as dams, because of smaller size of the fracture process zone with respect to the structure size, limited errors should occur under the assumptions of linear elastic fracture mechanics (LEFM). In this paper, the fracture behaviour of concrete gravity dams mainly subjected to uplift Pressure at the crack face was studied. Triangular type, trapezoidal type and parabolic type distribution of the uplift pressure including uniform type were considered in case of evaluating stress intensity factor by surface integral method. The effects of body forces, overtopping pressures are also considered and a parametric study of gravity dams under the assumption of LEFM is performed.

A Study on the IT R&D Emerging Technology Detection through Knowledge Map: Focus on Access Network Field (지식맵을 활용한 IT R&D 유망영역 탐색: 가입자망 분야를 중심으로)

  • Lee, Woo-Hyoung;Jung, Ji-Bum;Lee, Seong-Hwi
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.1-19
    • /
    • 2008
  • The purpose of this research is to schematize and suggest the new trends of study and changing aspects of science and technology hidden in a bibliographical phenomenon of documentation to researchers and policy-makers all through the Knowledge Map. The field of study to be analyzed in this research is the Access Network field. The reason why this field has been selected as the main target of study is that the Access Network field is economically important and characterized by its wide sphere where a variety of fields are interconnected. In addition, it is important to measure the applied as well as fundamental aspects of technology by using bibliographical method and technique. Knowledge Map successfully visualizes the inter-relations of the keywords and sub-fields of Access Network. The importance of visualizing methods in the convincing presentation of results has not been sufficiently understood in the past. Knowledge Map opens a new opportunity for cartography of science and information visualization. The Knowledge Map results have produced a great deal more than statistical artifact. We aimed to exploit the visualization effect of the Knowledge Maps to the aid of searchers in Access Network domain, and the results are quite encourging.

A Study on Improvement Plan for Selecting Boundary Areas to Respond to Chemical Accidents and Terrorism (화학물질 사고·테러 대응을 위한 경계구역 선정 개선방안 연구)

  • Jeon, Byeong-Han;Kim, Hyun-Sub;Lee, Hyun-Seung;Park, Choon-Hwa
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.60-66
    • /
    • 2020
  • This paper presents a method for improving the selection of boundary areas suitable for Korea's situation based on domestic and foreign case studies on the establishment of boundary areas to protect people and the environment from chemical substances in response to chemical accidents and chemical terrorism. Currently, various related ministries are divided into hot zones, warm zones, and cold zones in common, but in specific areas, they are used in different ways in terms of terminology utilization. Therefore, it was suggested that the boundary areas be divided into four zones: hot zone, warm zone, cold zone, and safety zone. In addition, the terms warm zone and safety zone should be re-established. The existing ERPG acute exposure standard does not take into account various exposure times. Therefore, it is unsuitable for long-term exposure, so the priority of application should be AEGL, ERPG, PAC, and IDLHs. The CARIS information provision method is classified into substances that can or cannot be diffused or classified as indoor leaks. In addition, the wind direction trust line and the ERG's initial separation distance and protective action distance are expressed together so that they can be used for accident responses.

Estimation of Forest Growing Stock by Combining Annual Forest Inventory Data (연년 산림자원조사 자료를 이용한 임목축적 추정)

  • Yim, Jong Su;Jung, Il Bin;Kim, Jong Chan;Kim, Sung Ho;Ryu, Joo Hyung;Shin, Man Yong
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.2
    • /
    • pp.213-219
    • /
    • 2012
  • The $5^{th}$ national forest inventory (NFI5) has been reorganized to annual inventory system for providing multi-resources forest statistics at a point in time. The objective of this study is to evaluate statistical estimators for estimating forest growing stock in Chungcheongbuk-Do from annual inventory data. When comparing two estimators; simple random sampling (SRS) and double sampling for post-stratification (DSS), for estimating mean forest growing stock ($m^3/ha$) at each surveyed year, the estimate for DSS in which a population of interest is stratified into three sub-population (forest cover types) was more precise than that for SRS. To combine annual inventory field data, three estimators (Temporally Indifferent Method; TIM, Moving Average; MA, and Weighted Moving Average; WMA) were compared. Even though the estimated mean for TIM and WMA is identical, WMA-DSS is preferred to provide more smaller variance of estimated mean and to adjust for catastrophic events at a surveyed year (so-called "lag bias") by annual inventory data.

Performance Analysis of MC-DS/CDMA System with Phase Error and Hybrid SC/MRC-(2/3) Diversity (위상 에러와 하이브리드 SC/MRC-(2/3)기법을 고려한 MC-DS/CDMA 시스템의 성능 분석)

  • Kim Won-Sub;Park Jin-Soo
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.835-842
    • /
    • 2004
  • In this paper, we have analyzed the MC-DS/CDMA system with input signal synchronized completely through adjustment of the gain in the PLL loop, by using the hybrid SC/MRC-(2/3) technique, which is said to one of the optimal diversity techniques under the multi-path fading environment, assuming that phase error is defined to the phase difference between the received signal from the multi-path and the reference signal in the PLL of the receiver. Also, assuming that the regarded radio channel model for the mobile communication is subject to the Nakagami-m fading channel, we have developed the expressions and performed the simulation under the consideration of various factor, in the MC/DS-CDMA system with the hybrid SC.MRC-(2/3) diversity method, such as the Nakagami fading index(m), $the\;number\;of\;paths\;(L_p),$ the number of hybrid SC.MRC-(2/3) $diversity\;branches\;(L,\;L_c),$ the number of users (K), the number of subcarriers (U), and the gain in the PLL loop. As a result of the simulation, it has been confirmed that the performance improvement of the system can be achieved by adjusting properly the PLL loop in order for the MC/DS-CDMA system with the hybrid SC/MRC-(2/3) diversity method to receive a fully synchronized signal. And the value of the gain in the PLL loop should exceed 7dB in order for the system to receive the signal with prefect synchronization, even though there might be a slight difference according to the values of the fading index and the spread processing gain of the subcarrier.