• Title/Summary/Keyword: 유출연결로

Search Result 282, Processing Time 0.035 seconds

Characteristics of Drainage Pervious Block Considering Urban Rainfall (도심지 강우 특성을 고려한 투수성 보도블록의 배수 특성)

  • Seo, Da-Wa;Yun, Tae-Sup;Youm, Kwang-Soo;Jeong, Sang-Seom;Mun, Sung-Ho
    • Journal of the Korean Geotechnical Society
    • /
    • v.31 no.1
    • /
    • pp.53-64
    • /
    • 2015
  • This study presents the experimental results of pervious blocks subjected to a series of unique inflow conditions in urban area. The measured properties include the strength, permeability, drainage capacity and runoff, and evaporation for blocks made of two different size of aggregates. Results revealed that the strength satisfies the Korean Standard regardless of aggregate size whereas the immediate runoff occurred for the block with small size aggregate. On the other hand, the block with large aggregates allowed the drainage upon the initial inflow condition, which became hampered to induce the runoff by subsequent inflow. It was attributed to the fact that the capillary water often served as the hydraulic barrier in partially saturated condition. The salient observation indicated that the runoff highly depended on the evaporation and pre-wetting condition as well as the porosity and pore connectivity. The bilinear evaporate rate that makes the degree of saturation vary also had great influence on deterining the time-dependent runoff.

Bilateral chylothorax with diffuse pulmonary Iymphangiomatosis (미만성 폐림프관종증과 동반된 양측성유미흉 -수술치험 1례 보고-)

  • 김경렬;최세영
    • Journal of Chest Surgery
    • /
    • v.29 no.3
    • /
    • pp.360-364
    • /
    • 1996
  • Chylothorax is denned by extravasation of the milky fluid to pleural cavity from the thoracic duct or it's main branches due to operative trauma, congenital lesions, diagnostic procedures, tumor, etc. Another rare cause is diffuse pulmonary Iymphangiomatosis which is uncommon and not well charact rized. We experienced a case of the bilateral chylothorax caused by the diffuse pulmonary Iymphangiomatosis. The patient was at years old girl with symptoms of coughing and febrile sensation, and the chest radiographs showed bilateral pleural effusion and interstitial infiltrates. The laboratory data of the pleural effusion was identified as chile. Uncontrollable with closed tube thoracostomy, division of tHe thoracic duct and biopsy were decided. Biopsy showed anastomosing endothelial lined spaces along the pulmonary Iymphatic routes especially in pleural and interlobar septum, and smooth muscle at the proliferative interstitium of the Iymphatic duct was observed. Postoperatively, chylothorax was controlled with several trial of chemical pleurodesis. Af'leer discharge from the hospital, she was well for ten months follow up.

  • PDF

An Empirical Research on Information Privacy and Trust Model in the Convergence Era (융복합 시대의 정보 프라이버시와 신뢰 모델에 대한 실증 연구)

  • Park, Cheon-Woong;Kim, Jun-Woo
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.219-225
    • /
    • 2015
  • There has been an exponential growth in the distribution and possession of sensitive information because of the emergence of various information channels such as smart devices, social media, etc. This enables the internet based web or mobile service operation institutions collecting the more personal information with ease, and in turn causes the issues of the privacy concerns. Followings are the results of this study: First, the information privacy concern has the negative effects upon the trust. Second, the information privacy concern has the negative effects upon the provision intention of personal information and the trust has positive effects upon the offering intention of personal information. At last, the offering intention of the personal information has the positive effects upon the behavior to provide the personal information.

A Study of External Storage Device File Outflow (외장형 저장장치의 파일유출에 관한 연구)

  • Song, Yu-Jin;Lee, Jae-Yong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.59-64
    • /
    • 2011
  • A lot of computer users use external memory device. But, same time file efflux incidents are also increasing. There are two ways people use for efflux file. One is moving it after checking file which is running on computer and the other is checking file name only. Checking from running file case, we can identify vestige with running information of applied program but, the case of moving as external device without running file there is no evidence running applied program. So there are a lot of difficulty with forensic investigation. In this paper we suggest the way to help forensic investigation which is method of getting external memory device information of volume and time through its awareness method and connection information and moving to external device without running file after compare the external memory device volume information through link file analysis and getting information of link file formation & access time from link file.

Development of Semi-Distributed TOPMODEL (준분포형 TOPMODEL 개발)

  • Bae, Deg-Hyo;Kim, Jin-Hoon
    • Journal of Korea Water Resources Association
    • /
    • v.38 no.10 s.159
    • /
    • pp.895-906
    • /
    • 2005
  • The diversity of observed hydrologic data and the development of geographic information system leads significant progress for developing distributed runoff models in the world. One of the typical examples is TOPMODEL, but the spatial coverage of its application Is limited on small headwater basins. The purpose of this study attempts to overcome its limitation and consequently develops a semi-distributed TOPMODEL. The developed model is composed of two components: a watershed runoff component for a lumped representation of hydrologic runoff process on the catchment scale and a kinematic wave type hydraulic channel routing component lot routing the catchment outflows. The application basin is the $2,703km^2$ upper Soyang dam site and several daily and hourly events are selected for model calibrations and verifications. The model parameters are estimated on 1990 daily event. The model performance on correlation coefficient between observed and computed flows are above 0.90 for the verification events. It is concluded that the developed model in this study can be used for flood analysis in large drainage basins.

A Comparative Study on Reforming the Resident Registration Number (주민등록번호 개선방안 비교연구)

  • Kim, Seon-Ju;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.673-689
    • /
    • 2015
  • Resident Registration Number(RRN) has been used broadly by public institutions or civilian departments as a means of personal identification due to its effectiveness and convenience in managing the information. Recently, because of personal information leakage including resident registration number, the potential damage is increasing public anxiety. In this situation, there have been demands requiring systems that can end the link between the resident registration number and personal information. In order to solve the problem, multiple alternatives are under consideration. In this research, we will discuss limits, needs for change of the system, and the basic concepts or traits that new registration number require. Also, by comparing the alternatives being discussed, we will analyze personal information security level and the cost required for reorganizing the system to present alternative that has high effectiveness.

A Numerical Study on Characteristics of Flow in a Crossroad: Case of Crossroad Connected Symmetrically with Inclined Four Roads (도로 교차로에서의 흐름 특성에 관한 수치적 연구: 경사진 네 개의 도로가 대칭으로 연결된 교차로의 경우)

  • Jeong, Woo-Chang;Lee, Jin-Woo;Cho, Yong-Sik
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.6
    • /
    • pp.99-108
    • /
    • 2010
  • In this study, the characteristics of flow within and around a crossroad connected symmetrically with four roads are numerically analyzed by using a two-dimensional well-balanced HLLC finite volume model. As results of simulations and analyses, the numerical model employed in this study describes relatively well the complex water surface in a crossroad according to the conditions of inflow and road slope. Moreover, the predicted temporal and spatial variations of water depths in a crossroad and outflows at two downstream boundaries agree relatively well with laboratory measurements.

Analysis of Soil Water and Groundwater Interaction Using Improved SWAT-MODFLOW model (개선된 SWAT-MODFLOW 모형을 이용한 토양수-지하수 상호작용 해석)

  • Kim, Nam-Won;Lee, Jeong-Woo;Chung, Il-Moon;Won, Yoo-Seung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.1244-1248
    • /
    • 2008
  • 지표수-지하수 통합모형인 SWAT-MODLFOW는 토양수가 침루과정을 거쳐 지하수로 유입되는 일방향 구조를 갖고 있어 지하수위 상승 및 하강에 따른 토양수량, 침루량, 중간유출량 등 수문성분량의 변화를 고려할 수 없다. 따라서 본 연구에서는 지하수위 변화에 따른 토양수의 분포양상 변화를 고려할 수 있도록 토양수-지하수간의 연결 구조를 양방향으로 개선하여 두 영역간의 연결성을 강화하였다. 지하수위가 상승할 경우 토양대와 지하수대간의 중첩 영역이 생기게 되는데, 이 중첩 영역을 지하수대로 간주하여 영역 내 흐름거동이 지하수 유동 메커니즘을 따르는 토양수-지하수 결합루틴을 새롭게 제시하였다. 이 결합루틴은 지하수 상승, 하강에 따라 토양수대의 두께가 변하는 가변 토양층 방식(variable soil layer method)으로 계산을 수행할 수 있도록 코드를 구성하였다. 개선된 SWAT-MODLFOW 모형을 무심천 유역에 적용하여 토양수와 지하수간의 상호작용을 해석하고 하천저지대와 같이 지하수위 상승지역에서의 수문성분량의 분포를 보다 현실적으로 구현할 수 있음을 입증하였다.

  • PDF

Developed Optimizing File Delete Detection Model (최적화된 디지털 증거 파일삭제 탐지 모델)

  • Kim, Yong-Ho;Yoo, Jae-Hyung;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.111-118
    • /
    • 2008
  • Computer forensics have been used for verify a crime when industry secret information or cyber crime occurred. However, these methods are simple analysis which cannot find the problem of deleted files. Therefore these cannot be a trusty evidence in a law court. We studied with focus on connectivity principle because it has never tried yet. In this paper, we developed optimizing detection model through systemized analysis between user-delete method and operating system-delete method. Detection model has 3 cases; Firstly, case of deleted by a user, secondly, case of deleted by application. Thirdly case of deleted by operating system. Detection model guarantees optimized performance because it is used in actual field.

  • PDF

Study on Sebsea Pipeline Thermal Expansion (해저송유관의 열팽창 고찰)

  • 조철희;홍성근
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.11 no.1
    • /
    • pp.1-6
    • /
    • 1999
  • Nearshore and offshore pipelines are often applied to carry oil, gas, water and combined products. The thermal and pressure gradients of the fluid inside pipeline cause pipeline expansion. This expansion produces stress to connecting structures with pipeline. Should this stress exceeds the yield strength of connecting components or the allowable displacement of the system, a damage can occur. As most pipelines contain hazardous and toxic fluids, the damage usually leads to fatal accidents involving great economic loss as well. Even subsea pipelines can be easily applied to transport liquid type fluid without time and space constraint, they should be designed and maintained carefully to be functional safely during design lifetime. In this paper, various theories estimating pipeline thermal expansion are investigated and the effects of pipe components to expansion are studied.

  • PDF