• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.025초

급속여과공정에서 여과수질 저하원인 및 개선방안 (Cause of Filtrate Deterioration and Its Improvement in Rapid Filtration)

  • 김진근;이송희;김재원
    • 상하수도학회지
    • /
    • 제24권3호
    • /
    • pp.333-339
    • /
    • 2010
  • Particle removal is an important step taken at water treatment plants (WTPs) for the safety of tap water due to its proportionality to the pathogen inactivation. Government promulgated a treatment technique for the optimization of filtration including continuous turbidity monitoring using on-line turbidimeters. Based on the turbidity measurements of 460 filters at 31 WTPs operated by K-water, the evaluation of filtration performance and the investigation of major causes related to particle breakthrough were explored. 98.1 % of the filters had an effluent turbidity measurement which was less than 0.1 NTU, but turbidity breakthrough of more than 0.3 NTU was noticed occasionally which is in violation of AWWA 5-Star guidelines. It was shown that the optimization of coagulation, filter-to-waste, the observance of optimal filtration velocity and backwashing process based on filtrate turbidity were crucial for the improvement of filtrate.

엘리베이터 내에서 폭행의 검출 연구 (A Study on Extraction of Violation in Elevator)

  • 신성윤;신광성;이현창
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2015년도 제51차 동계학술대회논문집 23권1호
    • /
    • pp.45-46
    • /
    • 2015
  • 본 논문에서는 엘리베이터 내에서의 폭행 장면을 효율적으로 추출하기 위해 컬러-$x^2$ 히스토그램을 이용하였다. 컬러-$x^2$ 히스토그램은 컬러히스토그램의 장점과 $x^2$ 히스토그램의 장점을 결합한 추출 방법이다. 또한 기존의 컬러-$x^2$ 히스토그램을 이용하여 키 프레임을 찾아내기 위해 임계값을 찾아낼 때, 실제 폭행 장면 인지 아닌지를 판별하는 확률을 높이기 위해 20개의 샘플영상을 이용하여 통계적인 판단을 이용하였다.

  • PDF

Displacement and force control of complex element structures by Matrix Condensation

  • Saeed, Najmadeen M.;Kwan, Alan S.K.
    • Structural Engineering and Mechanics
    • /
    • 제59권6호
    • /
    • pp.973-992
    • /
    • 2016
  • A direct and relatively simple method for controlling nodal displacements and/or internal bar forces has been developed for prestressable structural assemblies including complex elements ("macro-elements", e.g., the pantographic element), involving Matrix Condensation, in which structural matrices being built up from matrices of elementary elements. The method is aimed at static shape control of geometrically sensitive structures. The paper discusses identification of the most effective bars for actuation, without incurring violation in bar forces, and also with objective of minimal number of actuators or minimum actuation. The advantages of the method is that the changes for both force and displacement regimes are within a single formulation. The method can also be used for adjustment of bar forces to either reduce instances of high forces or increase low forces (e.g., in a cable nearing slack).

The Phonetics and Phonology of English Schwa

  • Ahn, Soo-Woong
    • 한국영어학회지:영어학
    • /
    • 제1권2호
    • /
    • pp.311-329
    • /
    • 2001
  • This paper wanted to test the reality of English schwa by phonetic and phonological methods. Phonetically it wanted to see acoustic evidence of the relationship between the full vowels and their reduced vowels in the unstressed positions. Phonologically it wanted to prove how systematic the schwa sound is by the constraint-based grammar. As a result, the schwa phenomenon in English was supported both phonetically and phonologically. In the phonetic analysis no relationship Was found in the distribution of the F1 and F2 of the full vowels and their reduced vowels in the unstressed syllables of the derived words. The reduced vowels tended to converge into a target of F1 516 and F2 1815. The view that the schwa sounds have a target was supported. On the phonological side the constraint-based tableau produced the successful output by using FAITH (V), (equation omitted)V, FAITH V[-BACK+HiC], V[-Low, -TNS]#, REDUCE V[-STR, -TNS] as constraints. No ranking was found. Any violation of the constraints ousted the candidates.

  • PDF

지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법 (User Authentication Risk and Countermeasure in Intelligent Vehicles)

  • 김승환;이근호
    • 한국융합학회논문지
    • /
    • 제3권1호
    • /
    • pp.7-11
    • /
    • 2012
  • 지능형 자동차의 최종 목표는 사고 위험이 전혀 없는 무인 자동차이다. 지능형 자동차의 구현을 위해서는 무선 네트워크 데이터 통신 기술이 중요하다. 본 논문에서는 데이터 통신 기술이 구현이 되었을 때를 가정하여 네트워크 침입 기술에 대해 알아보고, 사용자 인증 및 데이터 위 변조시 그에 따른 보안 취약점과 그에 따른 대응기법을 생체인식 알고리즘 통해 적용하고자 한다. 확실한 사용자 인증 기법과 데이터 전송 기술에 대한 암호화를 통해 더욱 더 안전한 대응 기법을 제안하고자 한다.

A Study on Correlation between Age and Information Ethics Using Information Culture Index

  • Jun, Woochun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권2호
    • /
    • pp.81-85
    • /
    • 2016
  • Information ethics is very essential for everyone in the current knowledge-based society. Every citizen in modern society can enjoy various benefits of recent internet technologies. In the meanwhile, everyone also is exposed to the various side effects of information and communication technologies. The typical side effects include copyright violation, cyber crimes, cyber bullying, internet addiction, and so on. The purpose of this paper is to identify correlation between age and information ethics. For this purpose, 3-year national survey works Information Culture Index are analyzed. After thorough statistical analysis work, it is concluded that there is a meaningful correlation between age and information ethics. In other words, the older people are, the higher information ethics they recognize and observe.

기업 보안을 위한 융합보안 컴플라이언스 관리 모델에 관한 연구 (A Study on A Model of Convergence Security Compliance Management for Business Security)

  • 김민수
    • 융합보안논문지
    • /
    • 제16권5호
    • /
    • pp.81-86
    • /
    • 2016
  • 최근 지속적으로 발생하는 보안위협은 기업의 비즈니스 연속성을 저해할 뿐만 아니라 사회적 국가적 차원에서도 그 심각성이 높아지고 있는 실정이다. 이러한 보안위협은 기업과 국가 간 경쟁력이 심화 되면서 기업의 지적 재산권 침해가 지속적으로 증가함에 따라, 기업들은 다양한 IT 컴플라이언스(compliance) 법제들에 대하여 의무적 준수와 더불어 엄격한 법적 책임을 부담하여야 한다. 따라서 본 연구에서는 기업의 능동적인 IT 컴플라이언스 활용을 위해 머신러닝(machine learning) 기술을 이용한 융합보안 컴플라이언스 관리 모델을 제안하고자 한다.

멀티코어 시스템의 안정성 향상을 위한 피크파워 제어 알고리즘 (Peak Power Control for Improvement of Stability in Multi-core System)

  • 박성환;김재환;안병규;정일종;이석희;정정화
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.747-748
    • /
    • 2008
  • In this paper, we propose a new algorithm for task scheduling consisting of subtask partitioning and subtask priority scheduling steps in order to keep the peak power under the system specification. The subtask partitioning stepis performed to minimize the idle operation time for processors by dividing a task into multiple subtasks using the least square method developed with power consumption pattern of tasks. In the subtask priority scheduling step, a priority is assigned to a subtask based on the power requirement and the power variation of subtask so that the peak power violation can be minimized and the task can be completed within the execution time deadline.

  • PDF

IC 밀집화를 위한 최적기술에 대한 연구 (A Study on the Optimization Technique for IC Compaction Problem)

  • 이천희
    • 대한전자공학회논문지
    • /
    • 제26권6호
    • /
    • pp.115-123
    • /
    • 1989
  • 본 논문은 사용자가 정의한 stick도형으로부터 혼합된 정수 선형프로그래밍 문제를 공식화시키는 새로운 mask compaction 방법을 제시하였는데 이 혼합된 정수 프로그램을 풀므로써 밀집화되고 디자인 rule에 맞는 layout을 얻을 수 있다. 또한 constraint graph에서 최장경로 문제를 풀 수 있는 새로운 효율적인 알고리듬도 기술하였다.

  • PDF

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

  • Wei, Liang-Cheng;Hsu, Carol;Wang, Kai
    • Asia pacific journal of information systems
    • /
    • 제26권1호
    • /
    • pp.163-188
    • /
    • 2016
  • Compliance with information security policies has been an important managerial concern in organizations. Unlike traditional general deterrent theory, this study proposes whistle-blowing as an alternative approach for reducing internal information security policy violations. We build on the theories of planned behavior and rational choice as well as develop a theoretical model to understand the factors that influence whistle-blowing attitudes and intention at both the organizational and individual levels. Our empirical results reveal that altruistic and egoistic concerns are involved in the development of whistle-blowing attitudes. The results not only extend our understanding of whistle-blowing motivation but also offer directions to managers in promoting internal disclosure of information security breaches.