• Title/Summary/Keyword: 대처 기술

Search Result 1,825, Processing Time 0.03 seconds

Analyses of Mesh Selectivity in Trawl Cod - end for Priacanthus macracanthus (홍치에 대한 트롤 끝자루의 망목선택성 분석)

  • Kim, Sam-Kon;Youm, Mal-Gu;Park, Chang-Doo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.8 no.1
    • /
    • pp.41-47
    • /
    • 1996
  • The fishing experiment was carried out in order to analyses the mesh selectivity for trawl cod - end in the Southern Korean Sea and East China Sea from June,1991 through December, 1992. The mesh selectivity was examined for the five kinds with opening mesh size, of which having mesh s izes 51.2mm, 70.2mm, 77.6mm, 88.0mm and 111.2mm. In this report, mesh selectivity were taken analyses trawl cod - end for Priacanthus macracanthus. The main results obtained were as follows : 1. The relation equations between total length(TL) and body height(BH), body girth(BG) and body weight(BW) were BH=0.256 TL+2.963, BG=0.620 TL+8.650 and $BW=7.34{\times}10^{-5}TL^{2.6956}$, respectively. 2. 50% selection length and selection factor of trial cod - end with opening mesh size having 51.2mm, 70.2mm, 77.6mm, 88.0mm were 94.8mm, 1.85 ; 159mm, 2.27 ; 204mm, 2.09 ; 217.3mm, 2.18, respectively. 3. Range of opening mesh size from 51.2mm to 88.0mm, parameters of master curve were slope 2.70, intercept - 5.7 and selection factor 2.11.

  • PDF

The Legal Protection Scope and Limitation of Information (정보의 법적 보호범위와 한계)

  • Kim, Hyung-Man;Yang, Myung-Sub
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.691-699
    • /
    • 2012
  • "Information", which is circulated in society by information technology development represented by computer, has brought innovation not only to physical civilization, but also deep into our daily lives. This is to say that information has brought fundamental change to its form of existence, and value system through being faster regarding the circulation and the way of management being diverse. As time goes by, this kind of change would stimulate more changes to be made as the development of scientific civilization. Therefore, informatization is one of the important characteristic that defines modern society's essence, but on the other side, information has been taken advantage of that temperament and abused in a lot of different ways. "The Law Regarding Computer Network Diffusion Expansion and Usage Promotion"(1986), as a counterplan of informatization is our nation's first Act about informatization, which enacts national policy and system about this issue. Since then, many laws has been enacted down to "Private Information Protection Act"(2011), forming a comprehensive system. The basic background of these laws are based upon the premise that even if the place where the information is managed is virtual space, rules that are considered valid in the real world should be basically applied in the virtual space. Therefore, the violation of the law in the real world is also considered the violation in the virtual space. This direction of current law regarding information is shared with both the theories and the reality. However, current law system and notion are based upon the premise that the law regards material objects, thus the characteristic of the information, which is "Immaterial Being" is not reflected. Also, the management and approach to this issue is allopathic, exposing many problems. Thus, this paper examines the way of protecting information stipulated in the current law, contemplates its protection scope and limitation, and seeks the direction of the improvement, based on the critical mind explained above.

Construction of Management Performance Data-Mining System for CEO′s Efficient/Effective Decision Making (CEO의 효율적/유효적 의사결정을 위한 경영성과 데이터마이닝 시스템의 구축)

  • 조성훈;안동규;김제홍
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.41-47
    • /
    • 2000
  • In modern dynamic management environment, there is growing recognition that information & knowledge management systems are essential for CEO's efficient/effective decision making. As a key component to cope with this current, we suggest the management performance data-mining system based on IT(Information Technology). This system measures management performance that is considered with both VA(Value-Added), which represents stakeholder's point of view and EVA(Economic Value-Added), which represents shareholder's point of view. The relationship between management performance and 85 financial ratios is analyzed, and then important financial ratios are drawn out. In analyzing the relationship, we applied the explanation-based Gas(Genetic Algorithms) that consider predictability, understanability (lucidity) and reasonability factors simultaneously. To demonstrate the performance of the system, we conducted a case study using financial data over the 16-years from 1981 to 1996 of Korean automobile industry which is taken from database of KISFAS(Korea Investors Services Financial Analysis System).

  • PDF

A Research on Extension Device of Korea Private Security Market (한국 민간경비 시장의 과제와 활성화 도입방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.173-198
    • /
    • 2008
  • As we took a look at above, this researcher suggest following device to extend Korea's private security industry's area. First, it is necessary to extend private investigation law's area grafting private security together. Second, it is necessary it is necessary to think of private security's role related key figure law, corresponding terror law, Presidential Security Service Guard law. Third, as a draft of a proposed law related prevention flowing out of industry techniques among industry security related law, passed, it is necessary private security's diversity, subdivision, composition through an enterprise security, and private security industry area's grafting together. Fourth, a research about private security company's investment and professional area's bringing up as well as business's extension device should be groped for the security consulting though total system management service. Fifth, there are no big difference education course and purpose, duty about a security police man law and security law's unification, so it is necessary to drive forward actively unification through government organization's cooperation. Sixth, a paradigm shift should be occured about private security service among policeman, citizen, and private security guards. Seventh, it is considered the role of security association is important. Lastly about a matter communication between the National Police Agency, and Security Association, not only look at from an authority's angle, collecting information, corresponding ability but now it is considered to grope each other cooperation device together among organizations not only the National Police Agency but also, National Organization, National Intelligence Service, the prosecution, Presidential Security Service Guard, Army etc.

  • PDF

A Study for Autonomous Intelligence of Computer-Generated Forces (가상군(Computer-Generated Forces)의 자율지능화 방안 연구)

  • Han, Chang-Hee;Cho, Jun-Ho;Lee, Sung-Ki
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.69-77
    • /
    • 2011
  • Modeling and Simulation(M&S) technology gets an attention from various parts such as industry and military. Especially, military uses the technology to cope with a different situation from the one in the Cold War and maximize the effect of training against the cost in the new environment. In order for the training based on M&S technology to be effective, the situations of a battlefield and a combat must be more realistically simulated. For this, a technique development on Computer-Generated Forces(CGF) which represents a unit's simulation logic and a human's simulated behaviors is focused. The CGF simulating a human's behaviors can be used in representing an enemy force, experimenting behaviors in a future war, and developing a new combat idea. This paper describes a methodology to accomplish Computer-Generated Forces' autonomous intelligence. It explains the process of applying a task behavior list based on the METT+T element onto CGFs. On the other hand, in the domain knowledge of military field manual, fuzzy facts such as "fast" and "sufficient" whose real values should be decided by domain experts can be easily found. In order to efficiently implement military simulation logics involved with such subjectivity, using a fuzzy inference methodology can be effective. In this study, a fuzzy inference methodology is also applied.

The Convergent Effect of Stress, Social support, and Self-esteem on Depression in Female Students (여대생의 스트레스, 사회적 지지, 자아존중감이 우울에 미치는 융복합적 영향)

  • Lee, Sun-young;Lee, Jeong-sook
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.335-344
    • /
    • 2016
  • The purpose of the study was to investigate the effect of stress, social support, and self-esteem on depression in female students. A self-reported questionnaire was completed by 249 females students from November to December 2015. The study instruments comprised stress, social support, self-esteem, and depression. The data were analyzed by descriptive statistics, t-test, ANOVA, Pearson's correlation coefficients, and hierarchial multiple linear regression using SPSS/WIN 18.0 program. Depression was closely related to school year(F=7.03, p<.001), health status(F=15.19, p<.001), major satisfaction(F=18.02, p<.001), and student activity(t=1.98, p=.049). The significant factors influencing depression were stress(${\beta}=.45$, p<.001), self-esteem(${\beta}=-.34$, p<.001), social support(${\beta}=-.14$, p=.004), major satisfaction(${\beta}=-.11$, p=.018). To decrease depression, it is necessary to develop a program coping with stress and increasing the self-esteem and social support. Thus, it will be able to enhance the mental health of female students.

Applying a Two-channel Video Streaming Technology Front and Rear Vehicle Wireless Video Monitoring System (2채널 영상 스트리밍 기술을 적용한 차량용 전. 후방 무선 영상 모니터링 시스템)

  • Na, HeeSu;Won, YoungJin;Yoon, JungGeun;Lee, SangMin;Ahn, MyeongIl;Kim, DongHyun;Moon, JongHoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.210-216
    • /
    • 2014
  • In this paper, it was proposed to develop front and rear image monitoring system for vehicle that help a driver to cope with urgent situation about a dangerous element. When parking a vehicle, the risk factors to be formed by the dead zone can be resolved by using anterior and posterior cameras of the vehicle. In embedded system environment, a SoC(System on Chip) and two high-resolution CMOS (Complementary metal-oxide-semiconductor) image sensors were used to transfer two high-resolution image data through he TCP/ IP-based network. To transfer image data through he TCP/ IP-based network, the images received by two cameras were compressed by using H.264 and they were transmitted with wireless method(Wi-Fi) by using real-time transport protocol (Real-time Transport Protocol). Transmission loss, transmission delay and transmission limit were solved in wireless (Wi-Fi) environment and the bit-rate of two image data compressed by H.264 was adjusted. And the system for the optimal transmission in wireless (Wi-Fi) environment was materialized and experimented.

The Inplementation of Fault-Tolerant Dual System Using the Hot-Standby Sparing Technique (핫 스탠바이 스페어링 기법을 이용한 고장 감내 이중화 시스템 설계)

  • Shin Jin wook;Park Dong sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10A
    • /
    • pp.1113-1122
    • /
    • 2004
  • This paper is basically to achieve the high-availability and high-reliability of the control system from the implementation of the fault-tolerant system using the hot-standby sparing technique. To meet the objective, we design and implement a board with fault tolerance I/O bus to detect the fault. Warm-standby sparing technique is the fault tolerance technique usually used for switching control system in present. This technique can be easily implemented, but can not detect the fault quickly and can malfunction because of the hardware fault. The hot-standby sparing fault tolerant technique implemented in this paper is consists of dual processor modules and a I/O processor using fault tolerant I/O bus. The proposed method can find the faults as soon as possible, so it can prevent from wrong operation. Also it is possible to normal re-service due to the short recovering time. To implement the fault-tolerant dual system with fault detection be, two daughter, called FTMA and FTIA, boards designed and implemented are applied to the system. And we also simulated the proposed method to verify the high-availability and high-reliability of the control system using Markov process.

Development of Automated 3D Modeling System to Construct BIM for Railway Bridge (철도 교량의 BIM 구축을 위한 3차원 모델 생성 자동화 시스템 개발)

  • Lee, Heon-Min;Kim, Hyun-Seung;Lee, Il-Soo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.31 no.5
    • /
    • pp.267-274
    • /
    • 2018
  • For successful BIM settlement, it is a key technic for engineer to design structures in the 3-dimensional digital space and to work out related design documents directly. Lately many BIM tool has been released and each supports their 3-dimensional object libraries. But it is not easy to apply those libraries to design transportation infra structures that were placed along the route(3-dimensional line). Moreover, in case of design changes, it is so difficult to reflect those changes with the integrated model that was assembled by them. Because of they were developed without consideration for redundancy of parameters between objects that were placed nearby or were related each other. In this paper, a method to develop module for modeling and placing 3-dimensional object for transportation infra structures is presented. The modules are employed by a parametric method and can deal with design changes. Also, for a railroad bridge, through developing user interface of the integrated 3-dimensional model that was assembled by those modules the applicability of them was reviewed.

Utilization and Excavation Practices of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 활용 및 적용사례 발굴)

  • Choi, Gap Yong;Chang, Eun Mi;Kim, Seong Gon;Cho, Kwang-Hyun
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.79-87
    • /
    • 2014
  • In order to foster rapid disaster response and public life protection, National Emergency Management Agency has been trying to spread 'Emergency Rescue Standard System' on a national scale since 2006. The agency has also intensified management of firefighter's safety on disaster site by implementing danger predication training, specialized training and education and safety procedure check as a part of safety management officer duties. Nevertheless, there are limitations for effective fire fighting steps, such as damage spreading and life damage due to unawareness of illegal converted structure, structure transformation by high temperature and nearby hazardous material storage as well as extemporary situation handling endangered firefighter's life. In order to eliminate these limitations there is a need for an effort and technology application to minimize human errors such as inaccurate situational awareness, wrong decision built on experience and judgment of field commander and firefighters. The purpose of this study is to propose a new disaster response model which is applied with geospatial information. we executed spatial contextual awareness map analysis using fire-fighting vulnerable zone model to propose the new disaster response model and also examined a case study for Dalseo-gu in Daegu Metropolitan City. Finally, we also suggested operational concept of new proposed model on a national scale.