• Title/Summary/Keyword: protection technique.

Search Result 910, Processing Time 0.137 seconds

Laboratory Observations of Nearshore Flow Patterns Behind a Single Shore-Parallel Submerged Breakwater (해안선에 평행한 단일 잠제 후면 연안 흐름패턴 관측 수리실험)

  • Choi, Junwoo;Roh, Min
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.29 no.3
    • /
    • pp.139-146
    • /
    • 2017
  • In order to understand the efficacy of submerged breakwater constructed for the beach protection, laboratory experiments were carried out by observing the characteristics of flow around a single shore-parallel submerged breakwater. The velocity field near the shoreline was measured by utilizing the LSPIV (Large-Scale Particle Image Velocimetry) technique, and mean surface and wave height distributions were observed around the submerged breakwater, according to various combinations of incident waves and submerged breakwaters. In this experiment, it was found that the mean flow pattern behind the submerged breakwater was determined by the balance among the gradients of mean water surface and excess wave-momentum flux (i.e., radiation stress tensors) which interact with the wave-induced current developed by the gradients on the rear and the side of the submerged breakwater. The divergent and convergent flow patterns behind the submerged breakwater (i.e., accretion and erosion response) of the numerical study of Ranasinghe et al.(2010) were observed in the measured velocity distributions, and their empirical formula mostly agreed with the experimental results. However, for some cases in this experiment, it was difficult to say that the flow pattern was one of them and was agreed with the empirical formula.

Evaluation of Major Projects of the 5th Basic Forest Plan Utilizing Big Data Analysis (빅데이터 분석을 활용한 제5차 산림기본계획 주요 사업에 대한 평가)

  • Byun, Seung-Yeon;Koo, Ja-Choon;Seok, Hyun-Deok
    • Journal of Korean Society of Forest Science
    • /
    • v.106 no.3
    • /
    • pp.340-352
    • /
    • 2017
  • In This study, we examined the gap between supply and demand of forest policy by year through big data analysis for macroscopic evaluation of the 5th Basic Forest Plan. We collected unstructured data based on keywords related to the projects mentioned in the news, SNS and so on in the relevant year for the policy demand side; and based on the documents published by the Korea Forest Service for the policy supply side. based on the collected data, we specified the network structure through the social network analysis technique, and identified the gap between supply and demand of the Korea Forest Service's policies by comparing the network of the demand side and that of the supply side. The results of big data analysis indicated that the network of the supply side is less radial than that of the demand side, implying that various keywords other than forest could considerably influence on the network. Also we compared the trends of supply and demand for 33 keywords related to 27 major projects. The results showed that 7 keywords shows increasing demand but decreasing supply: sustainable, forest management, forest biota, forest protection, forest disease and pest, urban forest, and North Korea. Since the supply-demand gap is confirmed for the 7 keywords, it is necessary to strengthen the forest policy regarding the 7 keywords in the 6th Basic Plan.

A Study on the Safety Characterization Grounding Design of the Inner Photovoltaic System (태양광 발전단지 내부 그리드의 안전 특성화 접지 설계에 관한 연구)

  • Kim, Hong-Yong;Yoon, Suk-Ho
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.2
    • /
    • pp.130-140
    • /
    • 2018
  • Purpose: In this paper, we propose a design technique for the safety characterization grounding in the construction of the photovoltaic power generation complex which can be useful and useful as an alternative power energy source in our society. In other words, we will introduce the application of safety grounding for each application, which can improve and optimize the reliability of the internal grid from the cell module to the electric room in the photovoltaic power generation complex. Method: We analyze the earth resistivity of the soil in the solar power plant and use the computer program (CDEGS) to analyze the contact voltage and stratospheric voltage causing the electric shock, and propose the calculation and calculation method of the safety ground. In addition, we will discuss the importance of semi-permanent ground electrode selection in consideration of soil environment. Results: We could obtain the maximum and minimum value of ground resistivity for each of the three areas of the data measured by the Wenner 4 - electrode method. The measured data was substituted into the basic equation and calculated with a MATLAB computer program. That is, it can be determined that the thickness of the minimum resistance value is the most favorable soil environment for installing the ground electrode. Conclusion: Through this study, we propose a grounding system design method that can suppress the potential rise on the ground surface in the inner grid of solar power plant according to each case. However, the development of smart devices capable of accumulating big data and a monitoring system capable of real-time monitoring of seismic changes in earth resistances and grounding systems should be further studied.

Comparison of Chemical Composition of Particulate Matter Emitted from a Gasoline Direct Injected (GDI) Vehicle and a Port Fuel Injected (PFI) Vehicle using High Resolution Time of Flight Aerosol Mass Spectrometer (HR-ToF-AMS)

  • Lee, Jong Tae;Son, Jihwan;Kim, Jounghwa;Choi, Yongjoo;Yoo, Heung-Min;Kim, Ki Joon;Kim, Jeong Soo;Park, Sung Wook;Park, Gyutae;Park, Taehyun;Kang, Seokwon;Lee, Taehyoung
    • Asian Journal of Atmospheric Environment
    • /
    • v.10 no.1
    • /
    • pp.51-56
    • /
    • 2016
  • Particulate matter (PM) in the atmosphere has wide-ranging health, environmental, and climate effects, many of which are attributed to fine-mode secondary organic aerosols. PM concentrations are significantly enhanced by primary particle emissions from traffic sources. Recently, in order to reduce $CO_2$ and increase fuel economy, gasoline direct injected (GDI) engine technology is increasingly used in vehicle manufactures. The popularization of GDI technique has resulted in increasing of concerns on environmental protection. In order to better understand variations in chemical composition of particulate matter from emissions of GDI vehicle versus a port fuel injected (PFI) vehicle, a high time resolution chemical composition of PM emissions from GDI and PFI vehicles was measured at facility of Transport Pollution Research Center (TPRC), National Institute of Environmental Research (NIER), Korea. Continuous measurements of inorganic and organic species in PM were conducted using an Aerodyne high-resolution time-of-flight aerosol mass spectrometer (HR-ToF-AMS). The HR-ToF-AMS provides insight into non-refractory PM composition, including concentrations of nitrate, sulfate, hydrocarbon-like and oxygenated organic aerosol, and organic mass with 20 sec time resolution. Many cases of PM emissions during the study were dominated by organic and nitrate aerosol. An overview of observed PM characteristics will be provided along with an analysis of comparison of GDI vehicle versus PFI vehicle in PM emission rates and oxidation states.

Reconstruction of Bone Defects Caused by Tumor Resection Using Recycled Autograft Augmented with VFG (재생 자가골과 생비골 이식술을 이용한 종양절제 후 골 결손의 재건)

  • Chung, Yang-Guk;Kang, Yong-Koo;Bark, Won-Jong;Rhee, Seung-Koo;Lee, An-Hi;Park, Jeong-Mi;Park, Bo-Youn
    • The Journal of the Korean bone and joint tumor society
    • /
    • v.15 no.2
    • /
    • pp.93-103
    • /
    • 2009
  • Purpose: We evaluated the outcomes of surgical reconstructions using recycled autograft augmented with VFG for bone defects caused by tumor resections. Materials and Methods: Ten patients with a malignant or locally aggressive bone tumor who were managed with recycled autograft augmented with VFG and followed up minimum 1 year were evaluated for bone union, functional result and complications. The influence of various factors on bone union and functional outcomes were also analyzed. Results: Bone unions were obtained at 13 of 20 junctions. Average union time was 3.7 months at metaphyseal junctions and 8 months at diaphyseal junctions (P<0.05). At diaphyseal junctions, younger aged group and intramedullary location group showed earlier bone union (P<0.05). The mean functional score was 81%. There were 3 nonunions, 4 delayed unions and 2 recycled bone resorption combined with fractures. Conclusion: To obtain excellent results, proper microvascular technique, sufficient length of VFG bridging both junctions, stable internal fixation and protection of reconstructed bone until union are necessary.

  • PDF

Who has to take legal responsibility for retailer brand foods, manufacturers or retailers?

  • Cho, Young-Sang
    • Journal of Distribution Science
    • /
    • v.9 no.2
    • /
    • pp.97-109
    • /
    • 2011
  • As a marketing vehicle to survive in intensified retailing competition, retailer brand development has been adopted by retailers in Korea. As evidence, the retailer brand share of a major retailer, Tesco Korea, has grown from 20% in 2007 to 22.8% in the first half of 2008. It means that retailers have provided more and more retailer brand foods for customers. With the growing accessibility to retailer brand foods, it would be expected that the number of retailer brand food claims will increase. Customers have increasingly exposed to a variety of marketing activities conducted by retailers. When buying the retailer brand foods, customers tend to be affected by marketing activities of retailers. Despite the fact that customers trust retailers and then, buy their brand foods, in case of food accidents caused by production process, customers have to seek compensation from a retailer brand supplier. Of course, a retailer tends to shift its responsibility to its suppliers. Accordingly, it is not easy for customers to solve food claims. The research, therefore, aims at exploring the relationship between the buying-decision processes of retailer brand customers and which side takes legal responsibility for food claims. To effectively achieve the research aim, the author adopted a quantitative and a qualitative research technique, in order to supplement the disadvantages of each method. Before field research, based on the developed research model, the author pre-tested questionnaire with 10 samples, amended, and handed out to 400 samples. Amongst them, 316 questionnaires are available. For a focus group interview, 9 participants were recruited, who are students, housewives, and full-time workers, aged from 20s to 40s. Through the focus group interview as well as the questionnaire results, it was found that most customers were influenced by a retailer or store image in a customer's mind, retailer reputation and promotional activities. Surprisingly, customers think that the name of a retailer is a more important factor than who produces retailer brand foods, even though many customers check a retailer brand supplier, when making a buying-decision. Rather than retailer brand suppliers, customers trust retailers. That is why they purchase retailer brands. Nevertheless, production-related food claims is not involved with retailers. In fact, it would be difficult for customers to distinguish whether a food claim is related to selling or manufacturing processes. Based on research results, from a customer perspective, the research suggests that the government should require retailers to take the whole responsibility for retailer brand food claims, preventing retailers from passing the buck to retailer brand suppliers. In case of food claims, in order for customers to easily get the compensation, it is necessary to reconsider the current system. If so, retailers have to fully get involved in retailer brand production stage, and further, the customer awareness of retailer brands will be improved than ever before. Retailers cannot help taking care of the whole processes of retailer brand development, because of responsibility. As a result, the process to seek compensation for food claims might become easier, and further, the protection of customer right might be improved.

  • PDF

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

Evaluation of Bio-Control Efficacy of Trichoderma Strains against Alternaria alternata Causing Leaf Blight of Ashwagandha [Withania somnifera (L.) Dunal]

  • Rahman, Md. Ahsanur;Rahman, Md. Arifur;Moni, Zakiah Rahman;Rahman, Mohammad Anisur
    • Journal of Forest and Environmental Science
    • /
    • v.36 no.3
    • /
    • pp.207-218
    • /
    • 2020
  • Ashwagandha is an important ancient medicinal crops, being affected with many diseases, among which leaf blight caused by Alternaria alternata has become the constraint resulting in huge yield losses. Continuous usage of chemical methods leads to environment, soil and water pollution. Whereas biological control of diseases is long lasting, inexpensive, eco-friendly and harmless to target organisms. In this context, it is aimed to evaluate five Trichoderma strains viz. Trichoderma virens IMI-392430, T. pseudokoningii IMI-392431, T. harzianum IMI-392432, T. harzianum IMI-392433 and T. harzianum IMI-392434 as bio-control efficacy against A. alternata and growth promoting effect in Ashwagandha. All the Trichoderma strains had varied antagonistic effects against the pathogen. In dual culture technique, the strain T. harzianum IMI-392433 showed maximum percentage inhibition of mycelial growth (54.89%) followed by T. harzianum IMI-392432 (53.83%), T. harzianum IMI-392434 (48.94%) and T. virens IMI-392430, (43.62%) against the pathogen, while the least inhibition percentage was observed with the T. pseudokoningii IMI-392431 (36.60%). The culture filtrate of the Trichoderma strain, T. harzianum IMI-392433 recorded highest inhibition on the mycelial growth (39.05%) and spore germination (80.77%) of pathogen and the lowest was recorded in T. pseudokoningii IMI-392431 (20.45 and 50%). Moreover, seeds treated with spore suspension of the strain T. harzianum IMI-392433 reduced the percentages of disease severity index significantly. The strain T. harzianum IMI-392433 also significantly increased seed germination %, seedling vigor and growth of Ashwagandha. The correlation matrix showed that root yield per plant of Ashwagandha had significant and positive correlation with plant height (r=0.726⁎⁎), number of leaf (r=0.514⁎⁎), number of primary branch (r=0.820⁎⁎), number of secondary branch (r=0.829⁎⁎), fresh plant weight (r=0.887⁎⁎), plant dry weight (r=0.613⁎⁎), root length (r=0.824⁎⁎), root diameter (r=0.786⁎⁎), root dry weight (r=0.739⁎⁎) and fresh root weight (r=0.731⁎⁎). The significant and negative correlation (r=-0.336⁎⁎) was observed with the root yield and percentages of disease severity index. The study recognized that the T. harzianum IMI-392433 strain performed well in inhibiting the mycelial growth and reduced the percentages of disease severity index of pathogen as well as increased the plant growth in Ashwagandha.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.