• Title/Summary/Keyword: 흔적

Search Result 863, Processing Time 0.029 seconds

Studies on river otter habitat use pattern on Hongchun river in Gangwon province (강원도 홍천강 유역에 서식하는 수달의 서식지이용에 관한 연구)

  • Park, Bo-Hyun;Lee, Sangdon
    • Journal of Wetlands Research
    • /
    • v.14 no.3
    • /
    • pp.413-418
    • /
    • 2012
  • In this study, both habitat use analysis by rumen contents of Eurasian river otter (Lutra lutra) were carried out to investigate the preference of habitat environment and diet using their fecal samples. As the target sites, two streams (the Naechon-cheon and the Koonup-cheon) were selected in the upstream of the Hongcheon river, Hongcheon County, Gangwon Province. A total of 478 track samples (e.g., feces, scent and footprint) were found during the survey periods (May to November, 2009 and November, 2010). The dominant points, where the tracks of river otters were observed, were areas with the low depth(0.5-1m) and the slow flow velocity (5m/sec). Also, both rocks and rock-beds were preferred but artificial facilities were avoided. This ecological study of river otters using habitat use analysis and diet analysis by rumen contents will be useful fundamental information to conserve the river otter populations, and to protect their habitats.

The cause analysis of explosion on junction termination of 345kV cable (345 kV 케이블 종단접속부에서의 폭발사고 원인분석)

  • Shong, Kil-Mok;Bang, Sun-Bae;Kim, Chong-Min;Kim, Young-Seok;Choi, Myeong-Il
    • Congress of the korean instutite of fire investigation
    • /
    • 2010.12a
    • /
    • pp.63-79
    • /
    • 2010
  • It is found to the arc trace on the junction termination of 345kV cable. According to the analysis of the cable material is judged to be good. Manufacturing and design problems are not considered. In construction defects, it was estimated to the low level of insulation oil. In the majority of the arc trace appeared XLPE is found. However, there is no Soots mark, yellow band has not been confirmed, not associated with a radial arc of the spider leg is not evidence. In other opinions, void, contamination or jut are not found on the inside of XLPE. Thus, by the attachment of the impurities in surface of XLPE insulation is judged to the breakdown.

  • PDF

Analysis of the Tsunami Inundation Trace and it's Expectation Area in Coast Using GIS (GIS를 이용한 지진해일시 연안의 침수 흔적 및 예상 지역 분석)

  • Lee Hyung-Seok
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.24 no.2
    • /
    • pp.175-182
    • /
    • 2006
  • The efficient management for minimum losses and demage precautions of fragile region against coastal disasters such as seismic waves and seawater overflows is proceeding continually. This study is to analyze inundation trace and extract expected damage areas with historic records of tsunami using Geographic Information System. Creating a digital elevation model of the Mangsang and the Nobong region in the east coast, we marked inundation record of tsunami and forecasted the flood area with a seismic wave height between 3 m and 5 m. The inundation trace layers and the expected damage areas on the cadastral map layer were superimposed individually. Consequently, the range and lot numbers of inundation expected area were calculated and inundation areas of 5 m tsunami were increased by 2.8 times than 3 m tsunami in case of subject regions. Analyzed results are expected to use evacuation work in case of seismic waves and to predict the compensation of the damaged area. And this study is expected to use suitable countermeasure for prevention from natural disasters.

Change of Epicuticular Waxes by Formulation of Fungicides in 'Campbell Early' Grapes (살균제 제형에 따른 포도의 과분 변화)

  • Shin, Kyoung-Hee;Park, Hee-Seung
    • Horticultural Science & Technology
    • /
    • v.28 no.5
    • /
    • pp.762-767
    • /
    • 2010
  • This study was conducted to investigate the influence of formulation of fungicides on epicuticular waxes in 'Campbell Early' grapes. Non-bagged and bagged berries were treated with wettable powder, suspension concentrate and emulsifiable concentrate 15 days after full bloom (DAFB) and 48 DAFB (veraison), respectively. Fruit skin was observed by naked eye and scanning electron microscope (SEM) at harvest. Remarkable white blots were observed on the berries treated 48 DAFB in the order of wettable powder, suspension concentrate, and emulsifiable concentrate. The observation by SEM showed all formulations of fungicides damaged the ultra-structure of epicuticular waxes; also, an unknown substance was observed on treatment with wettable powder and suspension concentrate. Moreover epicuticular wax appeared to be melting on the grapes treated with emulsifiable concentrate. Also, non-bagged grapes showed serious contamination of epicuticular wax by some unknown substance, but bagged grapes had only fungicides' traces.

Interpretation of Wood Processing Method by Tool Trace Analysis for Wooden Artifacts Excavated from Imdang-dong Site, Gyeongsan, Korea (경산 임당 유적 출토 목제유물의 도구흔적 분석을 통한 목재 가공 방법의 해석)

  • Lee, Kwang-Hee;Han, Gyu-Seong
    • Journal of the Korean Wood Science and Technology
    • /
    • v.46 no.3
    • /
    • pp.260-269
    • /
    • 2018
  • The purpose of this study is to interpretate the tools and the method of making wooden artifacts by analyzing the trace of tools on the surface of wooden artifacts estimated to be from the 2nd to the 4th century. As a result of analyzing the trace of tools on the surface of 97 items of wood artifacts, it was confirmed that various tools such as rhizome, chisel, claw, hand knife and ax were used to make these artifacts. Particularly, the marks of the turning knife and the turning lathe were confirmed, and it was found that the method of turning operation was used at this time. In addition, it was confirmed that both the Nunjil (tangential process) and the Seonjil (longitudinal process) were used to produce the wooden container artifacts by turning operation. It observes that proper processing method operation was applied to manufacture wooden container artifact depending on its form and intended use.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

A Study of Trace for Data Wiping Tools (완전삭제 도구 사용 흔적에 관한 연구)

  • Kim, Yeon-Soo;Bang, Je-Wan;Kim, Jin-Kook;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.159-164
    • /
    • 2010
  • The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.

The 2D flood plain analysis using Tuflow Model (Tuflow 모형을 이용한 2차원 홍수범람 분석)

  • Park, Jong Young;Suk, Jong Young;Kim, Han Kyu;Kim, Dae Ha
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.341-345
    • /
    • 2015
  • 최근 기존의 SMS(Surface Modeling System) 모형에 Tuflow모듈이 추가된 형태로 새로운 버전이 출시되면서 윈도우버전에서 2차원 홍수범람모의가 가능하게 되었다. 따라서, 본 연구에서는 Tuflow모형이 추가된 SMS ver.11.2.7을 활용하여 2차원 홍수범람 분석을 실시하고 이에 따른 2012년에 발생한 실제 침수구간과의 비교를 통하여 Tuflow모형의 실제 적용성을 검토하고자 하였다. 적용대상유역은 2012년도 침수가 발생하였으며, 전제 침수 지역 21개 중 하천내 수문을 통하여 침수가 발생한 지역, 내수침수가 발생한 지역 등을 제외한 순수하게 하천의 범람으로 인한 침수구역인 2개 지역을 대상으로 하여 하천범람모형의 재현성을 검토하였다. 검토결과, 2개 지역에 대한 공간적인 홍수범람의 재현성은 침수면적으로 판단해 볼 때 우수한 것으로 판단되었으며, 침수심으로는 침수조사의 자료가 미흡한 상황으로 명확하게 판단하기는 어려운 것으로 나타났다. Mesh작성의 숙련도, GRID의 크기 등과 같은 기술적 요인과 더불어 침수흔적의 정확한 구획선의 결여 등으로 인하여 비교적 정확한 비교는 불가하였으나, 지형자료를 활용하여 2차원적 접근을 시도한 결과 침수흔적과 홍수범람의 재현성은 다소 우수한 것으로 평가할 수 있는 것으로 나타났다. 다만, 향후 보다 정확한 침수흔적이나 침수자료의 구축을 통하여 보정, 검정 등을 실시한 후 홍수범람의 재현성을 신뢰할 만한 추가적인 연구가 지속적으로 이루어져야 할 것으로 판단된다.

  • PDF