• Title/Summary/Keyword: 재사용 가능

Search Result 2,783, Processing Time 0.031 seconds

Initial Stiffness of Beam Column Joints of PCS Structural Systems (PCS 구조 시스템 접합부의 초기 강성에 대한 연구)

  • Park, Soon-Kyu;Kim, Moo-Kyung
    • Journal of the Korea Concrete Institute
    • /
    • v.20 no.3
    • /
    • pp.271-282
    • /
    • 2008
  • Specific joint devices composed of end-plates and through bolts are under development to assemble steel beams to PC columns efficiently by dry construction method for the PCS structural system, of which major structural components are precast concrete columns and steel beams. Seismic performance of the joint devices had been evaluated by experimental tests in the previous studies and it was showed that all the performance requirements regarding to strength deterioration, stiffness degradation and energy dissipation capacity were satisfied to the criteria of ACI requirements, but the initial stiffness was not. In order to find out possible causes of the insufficient rigidity of the joint devices and provide the proper measures to improve the performance of the joint accordingly, numerical analyses were carried out by using ABAQUS. Parameters, such as thickness of neoprene pad, conditions of surface between PC column and end-plate, magnitude of pretension forces of through bolts, stiffness of end-plate were taken into consideration. As the result, it was found that the rigidity of the PCS system was negatively affected by the magnitude of initial gaps between PC columns and end-plates, and insufficient stiffness of neoprene fillers and end plates. In order to improve the initial stiffness performance of the joints, measures such as increase of the magnitude of pretension forces on through bolts and increase of the stiffness of end-plate by reducing the bolt pitch and providing adequate stiffeners are recommended.

Low-Gate-Count 32-Bit 2/3-Stage Pipelined Processor Design (소면적 32-bit 2/3단 파이프라인 프로세서 설계)

  • Lee, Kwang-Min;Park, Sungkyung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.59-67
    • /
    • 2016
  • With the enhancement of built-in communication capabilities in various meters and wearable devices, which implies Internet of things (IoT), the demand of small-area embedded processors has increased. In this paper, we introduce a small-area 32-bit pipelined processor, Juno, which is available in the field of IoT. Juno is an EISC (Extendable Instruction Set Computer) machine and has a 2/3-stage pipeline structure to reduce the data dependency of the pipeline. It has a simple pipeline controller which only controls the program counter (PC) and two pipeline registers. It offers $32{\times}32=64$ multiplication, 64/32=32 division, $32{\times}32+64=64$ MAC (multiply and accumulate) operations together with 32*32=64 Galois field multiplication operation for encryption processing in wireless communications. It provides selective inclusion of these algebraic logic blocks if necessary in order to reduce the area of the overall processor. In this case, the gate count of our integer core amounts to 12k~22k and has a performance of 0.57 DMIPS/MHz and 1.024 Coremark/MHz.

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

A study on linguistic the validity of characteristics and picture test inventories to persons with developmental disabilities (발달장애인의 언어적 특성과 그림검사의 타당도 연구)

  • Lee, Dal-Yob;Noh, Im-Dae;Lee, Seung-Wook
    • 한국사회복지학회:학술대회논문집
    • /
    • 2002.04a
    • /
    • pp.497-531
    • /
    • 2002
  • It is very important for rehabilitation to deal with psychological aspects of persons with disabilities, as well as efforts improving the institutional and environmental conditions. A majority of persons with severe disabilities in the situation of Korea have difficulty in having and maintaining a job. Work should and would be a source of self-respect and material well-being in this modern society. Therefore, Vocational rehabilitation services are measures in restoration of family functions and social participation of persons with disabilities. This study aims at investigating linguistic characteristics and the validity of constructional concepts of picture interest test Inventories that have been utilized for the segregated groups of people such as persons with developmental disabilities. Picture interest test inventories seemed to be valid for measuring psychological traits and characteristics of people with mental retardation, and this finding can be extended to the group of other developmental disabilities, such as learning disabilities and mild/moderate behavioral deficits. The Holland classification system seemed to be best fitted for developing a comprehensive and accurate vocational interest inventory.

  • PDF

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Design and Implementation of Open GIS OLE DB Component Using RDBMS (RDBMS를 이용한 개방형 GIS OLE DB 제공자 컴포넌트의 설계 및 구현)

  • Kim, Min-Soo;Lee, Ki-Won;Lee, Jong-Hun
    • Annual Conference of KIPS
    • /
    • 2000.10a
    • /
    • pp.67-70
    • /
    • 2000
  • 최근 네트워크 서비스 및 분산 컴퓨팅 환경의 급격한 발전과 더불어 인터넷 기반 지리정보 시스템과 이 기종 시스템간에 상호 운용성을 지원하는 분산 지리정보시스템의 기술이 혁신적으로 발전하게 되었다. 현재 이러한 상호 운용성과 더불어 기 구축된 시스템의 재 사용성을 극대화하기 위하여 개방형 컴포넌트 소프트웨어 기술이 발표[1]되었으며, 최근 발표되는 지리정보시스템들도 이러한 개방화와 컴포넌트화 기술을 채택하여 개발되고 있다. 이러한 개방형 컴포넌트 소프트웨어 기술은 컴퓨터 소프트웨어 산업 전반에 커다란 파급 효과를 끼치고 있다. 지리정보시스템 분야에서는 OpenGIS Consortium(OGC)을 주축으로 하여 개방형 컴포넌트 지리정보시스템을 위한 표준 구현 사양을 발표하고 있으며, 이러한 표준 사양을 수용한 제품들이 개발되고 있는 실정이다. 본 논문에서는 분산 환경에서 다양한 관계형 데이터베이스시스템을 이용하여 OGC가 제시한 OLE/COM 기반의 데이터 제공자 컴포넌트의 설계 및 구현에 중점을 두고 있다. 본 시스템의 데이터 제공자 컴포넌트는 순수한 관계형 데이터베이스시스템 기반 위에서 구성되므로, 우선 OGC에서 요구하는 GIS 관련 핵심 기능들을 제공하기 위해서 우선 관계형 데이터베이스와 ODBC를 이용하여 공간엔진을 구성하고 있다. 본 공간 엔진은 OGC 사양을 충족하기 위해서 이용되는 최소한의 기능-공간데이터 관리 기능, 공간 연산 처리, 공간 색인 기능 그리고 클라이언트와 통신하기 위한 기능-들을 포함하고 있다. 그러므로 본 논문에서는 이러한 공간 엔진의 기반 위에서 OGC OLE DB 제공자 컴포넌트의 설계 및 구현 방법에 대해서 자세히 살펴보고 실제 SQL Server 7.0 환경에서 구축된 공간 엔진 및 OLE DB 제공자 컴포넌트의 구현 예에 대하여 살펴볼 것이다. 혈액내방사선 조사량이 안전용량 범위(200rad)에 속하며 48시간 후 체내잔류량은 서양인과 큰 차이가 없었다.비출현의 소견을 보이는 악성종양 환자의 골 신티그람 53개중 44개 (83.0%)에서 척추 및 늑골에 미만성, 또는 다발성 침습이 관찰되었다. 또 골전이 부위를 두개골, 척추, 견대부, 늑골, 골반, 사지의 근위부 장골의 6개 부위로 나누어 분석할 경우 49개(92.5%)에서 3부위 이상에 전이가 발견되었고, 35개(66.0%)에서 4부위 이상에 전이가 발견되었으며, 5부위 이상, 6개 부위에 모두 전이가 발견된 것은 각각 20개 (37 7%), 11개(20.8%)이었다. 이상의 성적으로 보아 악성종양 환자의 골 신피그라피에서 신장 영상의 비출현은 종양의 광범위한 골전이를 간접적으로 시사하는 소견으로 생각된다. 여러 악성종양중 전립선암에서 신장 영상 비출현의 빈도가 가장 높았으며, 특히 위암에서 골전이 및 신장 영상 비출현의 빈도가 높음은 주목할 만한 것이라 하겠다.출한 결과 인,규소 증가와 자가영양성 미소플랑크톤(ANP)증가에 미치는 요인이 해안과 외해에서 동일하게 가장 큰 설명력을 보였다. N:P 비도 해안에서 36.4, 외해에서 32.6을 보이고 있어 인이 상당히 부족한 것으로 나타났다. 따라서 조사해역은 인이 식물플랑크톤 성장에 중요한 제한요인으로 작용하고 있다고 판단된다.의 회전. 전위력의 강도, 적용시점, 그리고 키, 체중등의 신체적 요인 등이 있으나 능숙한 기계사용과 정확한 슬관절 위치에서 검사할 때 전방 십자 인대 파열에 대한 진단에 유용한 기구이다.태라고 하였다. 본 연구에서는 이러한 근거를 바탕으로 개방형 문제의 유형을 다양한 답이 존재하는 문제, 다양한 해결 전략이 가능한 문제, 답이 없는 문제, 문제 만들기, 일반화가 가능한 문제 등으로 보고, 수학적 창의성 중

  • PDF

Isolation of Human and Mouse Orthologue HPRT Genes by Transformation-Associated Recombination (TAR) cloning (TAR cloning 법에 의한 인간 및 마우스의 상동성 HPRT 유전자의 분리)

  • Do, Eun-Ju;Kim, Jae-Woo;Chung, Chung-Nam;Park, In-Ho;Leem, Sun-Hee
    • Journal of Life Science
    • /
    • v.16 no.6
    • /
    • pp.1036-1043
    • /
    • 2006
  • The transformation-associated recombination (TAR) cloning technique allows selective isolation of chromosome regions or genes from complex genome. The procedure requires knowledge of relatively small genomic sequences that reside adjacent to the chromosome region of interest. This method involves homologous recombination during spheroplast transformation between genomic DNA and a TAR vector that has 5' and 3' gene targeting sequences (hooks). To examine whether TAR cloning can be applied to the isolation of gene homologues, we chose the HPRT genes from human and mouse genome. As results, the yield of positive clones for HPRT gene from human and mouse genome when using a TAR vector containing mHPRT hook or hHPRT hook was almost same level. Analysis of the gap regions in mHPRT revealed that they contain abnormalities that could result in instability of the sequences. In conclusion, we were able to use the TAR cloning technology to isolate gene homologue (orthologue) from nonidentical genome. Moreover, the use of the TAR cloning system may accelerate work on closing the remaining gaps in mammalian genome to achieve the goal of annotation of all mammalian genes.

Flame Retardant and Weather Proof Characteristic of Dan-Chung Treated Wooden by Flame Retardant Performance (방염처리 방법에 따른 단청목재의 방염 및 내후특성)

  • Park, Cheul-Woo;Hong, Sang-Wan;Lee, Jong-Kyun;Lim, Nam-Gi
    • Journal of the Korea Institute of Building Construction
    • /
    • v.13 no.2
    • /
    • pp.122-130
    • /
    • 2013
  • One of recent methods to protect wooden cultural assets from fire, there is the flame retardation which is applied directly to wood and it is to prevent fire through securing flame resistance for the material and delaying combustion when failed fire in advance and then to gain time for people in the room to evacuate and it has same goal with the Korean Fire Service Act by protecting life and property. However, in case of spraying flame retardant on the colored surface of the wooden cultural assets, there are continuous problems of decoloration, efflorescence and water absorbtion after sometime and accordingly there increases danger of damages of cultural assets. So when treating with flame retardant on wooden cultural assets, there has to be no problems on dancheong after sometime and securing sustainable methods for flmae retardation should be preceded. Accordingly, this study aims to provide basic sources for selecting proper flame retardation methods by evaluating and analyzing flame retardation capabilities according to types of flame retardants which are frequently used nowadays and spraying them on the dancheong-painted surface and confirming if there is no problem on the dancheong and wood after sometime and if flame retardation effect is sustainable with its quality and capability through precise analysis.

Experimental Study on Interaction of Water Sprayed Curtain on Hot Surface of a Window Glass and its Effects on Glass Surface Temperature in Room Fires (구획화재 시 국부복사열에 노출된 유리면의 수막접촉에 따른 급냉파열특성 관한 실험적 연구)

  • 박형주;지남용
    • Fire Science and Engineering
    • /
    • v.17 no.4
    • /
    • pp.124-130
    • /
    • 2003
  • This research focuses on analysis of a interaction fracture of various glasses due to contact of water sprayed curtain on hot glass surface with high temperature produced from convective heat source near glass wall. A large scaled experimental test was done in order to find the range of the glass surface temperature to be able to cause the breakage of the glasses when water droplets reach on the hot surface. This paper shows the allowable temperature of the glass surface for prevention of the cooling down breakage before water curtain droplets contact the surface. Allowable Temperature if $250^{\circ}C$ for the tempered glass but general glass is very relatively low. Therefore if the water curtain spray system was adequately activated by a thermal detector installed below ceiling adjacent glass wall with water curtain nozzle system, all hot glass would not break out by cooling water droplet's contact on the hot surface due to convective heat released by adjacent fire source near the glass wall.

A Key Management Scheme without Re-encryption for Home-domain Contents Distribution in Open IPTV Environments (Open IPTV 환경에서 재암호화 과정 없는 댁내 컨텐츠 분배를 위한 키관리 기법)

  • Jung, Seo-Hyun;Roh, Hyo-Sun;Lee, Hyun-Woo;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.57-66
    • /
    • 2010
  • Due to the advancement of IPTV technologies, open IPTV services are a step closer to becoming reality. In such service environment, users are able to enjoy IPTV services using a variety of devices available at their home domain. However, it is impossible to get such flexible services at their convenience unless each of devices is individually connected to Set-Top-Box (STB) because of Conditional Access System (CAS) or service providers otherwise allow STB to freely distribute decoded contents to every user devices attached to STB. In this paper, we propose a key management scheme for securely distributing contents from STB to multiple user devices at home domain. The proposed scheme also makes the service providers be able to control the access rights to each of user devices without installing individual STBs. It is achieved by computationally dividing a private key of RSA signature scheme into three parts and thus makes possible to distribute the contents scrambled through a underlying CAS mechanism without re-encrypting them that the existing scheme should employ. It improves significantly computation and communication complexities, maintaining it as secure as the existing schemes. Additionally, it prevents misbehaving users from illegally distributing the contents from STB to their devices available at home domain.