• Title/Summary/Keyword: Violation

Search Result 858, Processing Time 0.031 seconds

Cause of Filtrate Deterioration and Its Improvement in Rapid Filtration (급속여과공정에서 여과수질 저하원인 및 개선방안)

  • Kim, Jin-Keun;Lee, Song-Hee;Kim, Jae-Won
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.24 no.3
    • /
    • pp.333-339
    • /
    • 2010
  • Particle removal is an important step taken at water treatment plants (WTPs) for the safety of tap water due to its proportionality to the pathogen inactivation. Government promulgated a treatment technique for the optimization of filtration including continuous turbidity monitoring using on-line turbidimeters. Based on the turbidity measurements of 460 filters at 31 WTPs operated by K-water, the evaluation of filtration performance and the investigation of major causes related to particle breakthrough were explored. 98.1 % of the filters had an effluent turbidity measurement which was less than 0.1 NTU, but turbidity breakthrough of more than 0.3 NTU was noticed occasionally which is in violation of AWWA 5-Star guidelines. It was shown that the optimization of coagulation, filter-to-waste, the observance of optimal filtration velocity and backwashing process based on filtrate turbidity were crucial for the improvement of filtrate.

A Study on Extraction of Violation in Elevator (엘리베이터 내에서 폭행의 검출 연구)

  • Shin, Seong-Yoon;Shin, Kwang-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.45-46
    • /
    • 2015
  • 본 논문에서는 엘리베이터 내에서의 폭행 장면을 효율적으로 추출하기 위해 컬러-$x^2$ 히스토그램을 이용하였다. 컬러-$x^2$ 히스토그램은 컬러히스토그램의 장점과 $x^2$ 히스토그램의 장점을 결합한 추출 방법이다. 또한 기존의 컬러-$x^2$ 히스토그램을 이용하여 키 프레임을 찾아내기 위해 임계값을 찾아낼 때, 실제 폭행 장면 인지 아닌지를 판별하는 확률을 높이기 위해 20개의 샘플영상을 이용하여 통계적인 판단을 이용하였다.

  • PDF

Displacement and force control of complex element structures by Matrix Condensation

  • Saeed, Najmadeen M.;Kwan, Alan S.K.
    • Structural Engineering and Mechanics
    • /
    • v.59 no.6
    • /
    • pp.973-992
    • /
    • 2016
  • A direct and relatively simple method for controlling nodal displacements and/or internal bar forces has been developed for prestressable structural assemblies including complex elements ("macro-elements", e.g., the pantographic element), involving Matrix Condensation, in which structural matrices being built up from matrices of elementary elements. The method is aimed at static shape control of geometrically sensitive structures. The paper discusses identification of the most effective bars for actuation, without incurring violation in bar forces, and also with objective of minimal number of actuators or minimum actuation. The advantages of the method is that the changes for both force and displacement regimes are within a single formulation. The method can also be used for adjustment of bar forces to either reduce instances of high forces or increase low forces (e.g., in a cable nearing slack).

The Phonetics and Phonology of English Schwa

  • Ahn, Soo-Woong
    • Korean Journal of English Language and Linguistics
    • /
    • v.1 no.2
    • /
    • pp.311-329
    • /
    • 2001
  • This paper wanted to test the reality of English schwa by phonetic and phonological methods. Phonetically it wanted to see acoustic evidence of the relationship between the full vowels and their reduced vowels in the unstressed positions. Phonologically it wanted to prove how systematic the schwa sound is by the constraint-based grammar. As a result, the schwa phenomenon in English was supported both phonetically and phonologically. In the phonetic analysis no relationship Was found in the distribution of the F1 and F2 of the full vowels and their reduced vowels in the unstressed syllables of the derived words. The reduced vowels tended to converge into a target of F1 516 and F2 1815. The view that the schwa sounds have a target was supported. On the phonological side the constraint-based tableau produced the successful output by using FAITH (V), (equation omitted)V, FAITH V[-BACK+HiC], V[-Low, -TNS]#, REDUCE V[-STR, -TNS] as constraints. No ranking was found. Any violation of the constraints ousted the candidates.

  • PDF

User Authentication Risk and Countermeasure in Intelligent Vehicles (지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법)

  • Kim, Seung-Hwan;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.7-11
    • /
    • 2012
  • Intellgent Vehles network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data are on the increase. In this paper, we propose a security module which has user authentication and encryption functionalities and can be used for vehicle network system.

A Study on Correlation between Age and Information Ethics Using Information Culture Index

  • Jun, Woochun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.81-85
    • /
    • 2016
  • Information ethics is very essential for everyone in the current knowledge-based society. Every citizen in modern society can enjoy various benefits of recent internet technologies. In the meanwhile, everyone also is exposed to the various side effects of information and communication technologies. The typical side effects include copyright violation, cyber crimes, cyber bullying, internet addiction, and so on. The purpose of this paper is to identify correlation between age and information ethics. For this purpose, 3-year national survey works Information Culture Index are analyzed. After thorough statistical analysis work, it is concluded that there is a meaningful correlation between age and information ethics. In other words, the older people are, the higher information ethics they recognize and observe.

A Study on A Model of Convergence Security Compliance Management for Business Security (기업 보안을 위한 융합보안 컴플라이언스 관리 모델에 관한 연구)

  • Kim, Minsu
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.81-86
    • /
    • 2016
  • Recently, increasing security threats are not only interfering with business continuity of companies but they are al so causing serious problems on social and national levels. As violation of intellectual property rights increases due to growing competition between different companies and countries, companies are now required to follow various IT compliance regulations, under relevant legal obligations. This study proposed a model of convergence security compliance management by using machine learning, in order to help companies actively utilize IT compliance.

Peak Power Control for Improvement of Stability in Multi-core System (멀티코어 시스템의 안정성 향상을 위한 피크파워 제어 알고리즘)

  • Park, Sung-Hwan;Kim, Jae-Hwan;Ahn, Byung-Gyu;Jung, Il-Jong;Lee, Seok-Hee;Chong, Jong-Wha
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.747-748
    • /
    • 2008
  • In this paper, we propose a new algorithm for task scheduling consisting of subtask partitioning and subtask priority scheduling steps in order to keep the peak power under the system specification. The subtask partitioning stepis performed to minimize the idle operation time for processors by dividing a task into multiple subtasks using the least square method developed with power consumption pattern of tasks. In the subtask priority scheduling step, a priority is assigned to a subtask based on the power requirement and the power variation of subtask so that the peak power violation can be minimized and the task can be completed within the execution time deadline.

  • PDF

A Study on the Optimization Technique for IC Compaction Problem (IC 밀집화를 위한 최적기술에 대한 연구)

  • Yi, Cheon-Hee
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.6
    • /
    • pp.115-123
    • /
    • 1989
  • This paper describes a new method of mask compaction to formulate a mixed integer linear programming problem from a user defined stick diagram. By solving this mixed integer program, a compacted and design rule violation free layout is obtained. Also, a new efficient algorithm is given which solves the longest problem in the constraint graph.

  • PDF

Intentions of Employees to Whistleblow Information Security Policy Violations in the Organization

  • Wei, Liang-Cheng;Hsu, Carol;Wang, Kai
    • Asia pacific journal of information systems
    • /
    • v.26 no.1
    • /
    • pp.163-188
    • /
    • 2016
  • Compliance with information security policies has been an important managerial concern in organizations. Unlike traditional general deterrent theory, this study proposes whistle-blowing as an alternative approach for reducing internal information security policy violations. We build on the theories of planned behavior and rational choice as well as develop a theoretical model to understand the factors that influence whistle-blowing attitudes and intention at both the organizational and individual levels. Our empirical results reveal that altruistic and egoistic concerns are involved in the development of whistle-blowing attitudes. The results not only extend our understanding of whistle-blowing motivation but also offer directions to managers in promoting internal disclosure of information security breaches.