• Title/Summary/Keyword: 구성원 인식

Search Result 956, Processing Time 0.027 seconds

Tracking Propagation Mechanism on the Surface of Polyvinyl-Chloride-Sheathed Flat Cord based on Electric Field Analysis and Gas Discharge Physics (전계해석과 기체방전 이론을 기반으로 한 Polyvinyl-Chloride-Sheathed Flat Cord 표면의 트래킹 진전 메커니즘)

  • Lim, Dong-Young;Park, Herie;Jee, Seung-Wook
    • Fire Science and Engineering
    • /
    • v.33 no.2
    • /
    • pp.30-38
    • /
    • 2019
  • Tracking, which is one of the main causes of electrical fires, is perceived as a physical phenomenon of electrical discharge. Hence tracking should be explained based on electric field analysis, conduction path by electron generation, and gas discharge physics. However, few papers have considered these details. This paper proposes a tracking mechanism including their effects on tracking progress. In order to prove this mechanism, a tracking experiment, an electric field analysis for the carbonization evolution model, and an explanation of the tracking process by gas discharge physics were conducted. From the tracking experiment, the current waveforms were measured at each stage of the tracking progress from corona discharge to tracking breakdown. The electric field analysis was carried out in order to determine the electric field on the surface of a dry-band and the high electric field region for electron generation during the generation and progress of carbonization. In this paper, the proposed tracking mechanism consisted of six stages including electron avalanche by corona discharge, accumulation of positive ions, expansion of electron avalanche, secondary electron emission avalanche, streamer, and tracking by conductive path. The pulse current waveforms measured in the tracking experiment can be explained by the proposed tracking mechanism. The results of this study will be used as the technical data to detect tracking phenomenon, which is the cause of electric fire, and to improve the proof tracking index.

Design and Development of IoT-based Indoor Environment Management Platform (IoT 기반의 실내환경 관리 플랫폼 설계 및 개발)

  • Lee, Wan-Jik;Kim, Se-Jin;Yoon, Jun-Keun;Jeong, Ja-Woon;Heo, Seok-Yeol
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.654-661
    • /
    • 2021
  • Air pollution caused by industrial development has become a level that can seriously threaten human health. In general, indoor air pollution is considered to be lower than outdoors, but modern people live indoors most of the time, thus it is essential to keep the indoor air quality comfortable in order to take care of one's own health and improve the quality of life. Therefore, the development of an indoor environment management platform using Internet of Things and data processing technology, which is currently drawing attention, is considered a very meaningful study. In this paper, we designed an IoT-based management platform that can remotely monitor and control indoor environments. In addition, the functions of the IoT terminal, gateway, and data server constituting the platform were implemented using open source and open libraries, and all functional operations were also verified. In particular, the IoT terminal and the gateway in this paper exchange data using BLE communication, so they can operate with relatively low power and since the gateway uses the BLE Advertising mode, it has the advantage of automatically recognizing IoT terminals that have not been previously configured.

Exploring the Applicability of Protocol to Improve Curriculum Literacy for Special Education Pre-Teachers (예비특수교사들의 특수교육교육과정 문해력 향상을 위한 프로토콜 적용 가능성 탐색)

  • Lee, Okin;Park, Eun-Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.179-185
    • /
    • 2021
  • We performed to explore the applicability of protocol to improve the curriculum literacy for special education pre-teachers. For this, protocol of Park et al (2018), which can be used in the educational field, was partially modified and applied to enhance the special education curriculum expertise of pre-teachers. The literacy protocol of the special education curriculum was applied as Protocols 1 and 2, and Protocol 1 was focused on adaptation the 2015 special education curriculum and understanding literacy. Protocol 2 consisted of reorganizing the subject level centering on the five subjects presented in the special education curriculum, and establishing an integrated theme setting and reorganization plan. We applied the research design during a total of 15 weeks of special education curriculum subjects. The class format was flipped learning (e.g, pre-video lectures, theory lectures (E-Sheets), and learner-led activities (W-Sheets) for each topic was carried out. We found that pre-teachers' thought that the academic achievement and satisfaction of students with disabilities could be increased by adaptation the curriculum. Pre-teachers reported that the experience of reorganizing each subject/intersection helped improve their literacy but found it difficult.

A Case Study on the Investor-State Dispute Relevant a Public Policy and the Domestic Implications (공공정책 관련 ISD 소송의 국내적 시사점 연구 -우리나라 관련 ISD사건을 중심으로-)

  • Kim, In-Sook
    • Journal of Legislation Research
    • /
    • no.55
    • /
    • pp.193-237
    • /
    • 2018
  • The recent surge in the ISD lawsuit filed against the Korean government is likely to cause major domestic confusion. This is because in most cases, foreign investors have claimed billions of won in damages filed against Korea in the ISD lawsuit. Public opinion will be generated to abolish the ISD lawsuit system, which is included in the international investment agreement, when a decision comes out in the Elliott/Mason case or Lone Star case, which has already been completed by the hearing. It is clear that the ISD clause, which is commonly included in most of the BITs, FTAs, can be a limiting factor in the government's public policy, as shown by many investment disputes. However, it is not necessary to have a negative view of the ISD clause itself, given that it is a system that can protect Korean investors from illegal and inappropriate actions by local governments. Since Korea already allows the system of ISD lawsuits with many countries through FTAs and BITs, and negotiations are underway to sign FTAs with new countries, the possibility that foreign investors will refer to the ISD proceeding further to our government's public policy will increase. In order to prepare for an ISD lawsuit, the Korean government has launched a response team consisting of government practitioners, private scholars, and legal professionals in the central government ministries to review major legal issues that are controversial in the cases of the ISD. In particular, local governments and public institutions, which fail to recognize the importance of international investment regulations and ISD clause, need to share and train relevant information so that all processes for public policy planning and implementation comply with international investment rules such as BITs and FTAs.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

A Study on the Quality Model and Metrics for Evaluating the Quality of Information Security Products (정보보호제품 품질평가를 위한 품질 모델 및 메트릭에 관한 연구)

  • Yun, Yeo-Wung;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.131-142
    • /
    • 2009
  • While users of information security products require high-quality products that are secure and have high performance, there are neither examples for evaluating the quality of information security products nor studies on the quality model and metrics for the quality evaluation. In this paper, information security products are categorized into three different types and the security and performance of various information security products are analyzed. Through this process and after consideration of information security products' security and performance, a new quality model that possesses 7 characteristics and 24 sub-characteristics has been defined. In addition, metrics consisting of 62 common and 45 extended metrics that can be used to evaluate the quality of information security products are introduced, and a proposition for a method of generating the quality evaluation metrics for specific information security products is included. The method of generating metrics proposed in this paper can be extended in order to be applied to a variety of information security products, and by generating and verifying the quality evaluation metrics for firewall, intrusion detection systems and fingerprint systems it is shown that it applicable on a variety of information security products.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Detection of Zebra-crossing Areas Based on Deep Learning with Combination of SegNet and ResNet (SegNet과 ResNet을 조합한 딥러닝에 기반한 횡단보도 영역 검출)

  • Liang, Han;Seo, Suyoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.3
    • /
    • pp.141-148
    • /
    • 2021
  • This paper presents a method to detect zebra-crossing using deep learning which combines SegNet and ResNet. For the blind, a safe crossing system is important to know exactly where the zebra-crossings are. Zebra-crossing detection by deep learning can be a good solution to this problem and robotic vision-based assistive technologies sprung up over the past few years, which focused on specific scene objects using monocular detectors. These traditional methods have achieved significant results with relatively long processing times, and enhanced the zebra-crossing perception to a large extent. However, running all detectors jointly incurs a long latency and becomes computationally prohibitive on wearable embedded systems. In this paper, we propose a model for fast and stable segmentation of zebra-crossing from captured images. The model is improved based on a combination of SegNet and ResNet and consists of three steps. First, the input image is subsampled to extract image features and the convolutional neural network of ResNet is modified to make it the new encoder. Second, through the SegNet original up-sampling network, the abstract features are restored to the original image size. Finally, the method classifies all pixels and calculates the accuracy of each pixel. The experimental results prove the efficiency of the modified semantic segmentation algorithm with a relatively high computing speed.

Gender Inequality in Equality Presented in Utopian Literature Looking Backward: 2000-1887 (유토피아 문학 『뒤를 돌아보며』에 제시된 평등 속 젠더 불평등)

  • Ryu, Da-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.502-510
    • /
    • 2021
  • This study examines gender inequality in the Utopian literature through Bellamy's novelLooking Backward: 2000-1887. Boston, USA, in 2000 is an equal society in which production and distribution are performed efficiently, and everyone can work with an equal opportunity without discrimination. But a closer look at the social structure shows that housework and parenting are predominantly women's duties, and the jobs that women and men can have are differentiating. Therefore, it is hard to say that true gender equality has been achieved. In addition, we could see that there were still remnants of gender inequality, such as showing the notion of beauty judged by male standards. However, Bellamy's Looking Backward: 2000-1887 is meaningful in that it improved women's status and suggested the direction and hope of social development in the 19th century. This study further examined whether these gender inequality factors have disappeared in modern society and confirmed that there remain many gender inequality factors. Therefore, we should all work together to improve the perception of members of society and make changes in social policies so that there is no discrimination between women and men so that we can truly become a gender-equal society.

Protective Effects of Traditional Korean Medicine Preparations, Herbs, and Active Compounds on the Blood-brain Barrier in Ischemic Stroke Models (허혈성 뇌졸중 모델에서 혈액-뇌 장벽에 보호효과를 나타내는 한약처방, 한약재 및 활성화합물)

  • Shin, Su Bin;Jang, Seok Ju;Lee, Na Gyeong;Choi, Byung Tae;Shin, Hwa Kyoung
    • Journal of Life Science
    • /
    • v.32 no.7
    • /
    • pp.550-566
    • /
    • 2022
  • Stroke is among the leading causes of death and long-term physical and cognitive disabilities worldwide, affecting an estimated 15 million people annually. The pathophysiological process of stroke is complicated by multiple and coordinated events. The breakdown of the blood-brain barrier (BBB) in people with stroke can significantly contribute to the development of ischemic brain injury. Therefore, BBB disruption is recognized as a hallmark of stroke; thus, it is important to develop novel therapeutic strategies that can protect against BBB dysfunction in ischemic stroke. Traditional medicines are composed of natural products, which represent a promising source of new ingredients for the development of conventional medicines. Indeed, several studies have shown the effectiveness of Korean medicine on stroke, highlighting the value of Korean medicinal treatment for ischemic stroke. This review summarizes the current information and underlying mechanisms regarding the ameliorating effects of the formula, decoction, herbs, and active components of traditional Korean medicine on cerebral ischemia-induced BBB disruption. These traditional medicines were shown to have protective effects on the BBB in many cellular and animal ischemia models of stroke, and experiments in various animal species, such as mice and rats. In addition, they showed brain-protective effects by protecting the BBB through the regulation of tight junction proteins and matrix metalloproteinase-9, reducing edema, neuroinflammation, and neuronal cell death. We hope that this review will help promote further investigation into the neuroprotective effects of traditional Korean medicines and stimulate the performance of clinical trials on Korean herbal medicine-derived drugs in patients with stroke.