• Title/Summary/Keyword: Article 78

Search Result 126, Processing Time 0.02 seconds

Post-buckling analysis of imperfect nonlocal piezoelectric beams under magnetic field and thermal loading

  • Fenjan, Raad M.;Ahmed, Ridha A.;Faleh, Nadhim M.
    • Structural Engineering and Mechanics
    • /
    • v.78 no.1
    • /
    • pp.15-22
    • /
    • 2021
  • An investigation of the nonlinear thermal buckling behavior of a nano-sized beam constructed from intelligent materials called piezo-magnetic materials has been presented in this article. The nano-sized beam geometry has been considered based on two assumptions: an ideal straight beam and an imperfect beam. For incorporating nano-size impacts, the nano-sized beam formulation has been presented according to nonlocal elasticity. After establishing the governing equations based on classic beam theory and nonlocal elasticity, the nonlinear buckling path has been obtained via Galerkin's method together with an analytical trend. The dependency of buckling path to piezo-magnetic material composition, electro-magnetic fields and geometry imperfectness has been studied in detail.

Neurobiology of Anxiety (불안의 신경생물학)

  • Ryu, Seong Gon;Han, Chang Whan
    • Korean Journal of Biological Psychiatry
    • /
    • v.8 no.1
    • /
    • pp.71-78
    • /
    • 2001
  • The current understanding of the neurobiology of anxiety is generally based on experimental animal model, empirical effective psychopharmacological agents, chemical and naturalistic challenge paradigms, and psychoendocinological assessment. This article focuses on reviewing neuroanantomical, neuroendocinological and neurofunctional research of anxiety disorder. In the decade ahead, we anticipate that extension of current research and the new integrated approach promise novel insight into mechanism of anxiety.

  • PDF

Linear Programming Model and Forecasting for Financing Operation of civil Service Pension Fund (공무원 연금기금의 중장기전망과 재정운용 성현계확 모형)

  • 황현식;김지수
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.11 no.2
    • /
    • pp.69-78
    • /
    • 1986
  • The outlook for the Civil Service Pension (CSP) program in Korea indicates several problems. First, the balance of the benefit among the pension recipients is not well maintained. Second, the program is running out of funds as benefit increases exceed the growth in revenues. In this article, we analyze these problems by using linear programming model and discuss the alternatives. We propose an addition of the age limit to the benefit eligibility and a reconsideration of the government subsidy's level.

  • PDF

Automatic Construction of Class Hierarchies and Named Entity Dictionaries using Korean Wikipedia (한국어 위키피디아를 이용한 분류체계 생성과 개체명 사전 자동 구축)

  • Bae, Sang-Joon;Ko, Young-Joong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.492-496
    • /
    • 2010
  • Wikipedia as an open encyclopedia contains immense human knowledge written by thousands of volunteer editors and its reliability is also high. In this paper, we propose to automatically construct a Korean named entity dictionary using the several features of the Wikipedia. Firstly, we generate class hierarchies using the class information from each article of Wikipedia. Secondly, the titles of each article are mapped to our class hierarchies, and then we calculate the entropy value of the root node in each class hierarchy. Finally, we construct named entity dictionary with high performance by removing the class hierarchies which have a higher entropy value than threshold. Our experiment results achieved overall F1-measure of 81.12% (precision : 83.94%, recall : 78.48%).

A Study on the Enforcement and Characteristics of Environmental Criminal Law in the U.S.A. (미국 환경형법의 특성과 강제절차)

  • 이경호
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.5 no.1
    • /
    • pp.59-78
    • /
    • 1999
  • Although recently vigorous studies on environmental crime have contribute criminal respects to be advanced in our country, most of them are focused on German discussions about the theory of environmental crime or environmental criminal law. As each countries in criminal legislation for environmental protection have some distinctive characteristics not found in others, the study which is more helpful to regulate environmental crime can be extend to other country in the view of comparative law. Thus this Article overviews especially the environmental criminal enforcement program involving civil and administrative enforcement in the United States. Notwithstanding that enforcement is an evolving phenomenon that only recently appeared on the scene, there is widespread public support for it. Once viewed as mere economic or regulatory offence lacking an element of moral delict, environmental crimes now provoke moral outrage and prompt demands for severe sanction and strict enforcement. Many major provisions of modem environmental acts that imposed criminal liability have been added or significantly restructured during the last decade. Notable among them are the imposition of the felony penalties for federal environmental crimes and the enactment of the endangerment crime in federal environmental law. This Article approaches the characteristics of environmental criminal enforcement form introducing major federal environmental acts. It develops the result that, considering the difference that exist between Korea and United States in environmental criminal law, our proper environmental regulatory framework can be constituted.

  • PDF

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

A Study on Traffic analysis for System Optimization of CDMA base station and repeaters (CDMA 기지국과 중계기의 시스템 최적화를 위한 Traffic 분석 기법)

  • Jo, Ung;Chin, Yong-Ohk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.333-341
    • /
    • 2002
  • This article is written to make a foundation for effective radio network engineering by enabling the accurate traffic assumption between Base Station (BTS : Base Station Transceiver Subsystem) md Repeater through the scientific and systematic analysis of mobile traffic dealt within CDMA Base Station. Among these, Repeater, having direct physical connection with BTS, simply does the remote relay function but the volume of the traffic flowed into the repeater is not accountable. The total BTS traffic is the sum of traffic dealt by the BTS and multiple Repeaters. In this article, we tried traffic analysis of this kind by adopting RTD (Round Trip Delay) which is specially designed to measure distribution of the distance between the Base Station and the Mobile station by differentiating the traffic dealt by BTS from traffic dealt by Repeaters. The fact that the connection between mobile station and BTS via Repeater (which is located remotely) yields far more delay than the direct connection between mobile station and BTS is the clue of this article. Based on this fact, Time Delay equipment was put at the receiving side of the Repeater to add certain amount of delay to the traffic to BTS and the result showed that the 99.78% of the traffic can be identified.

A Study on the Legal Explanation and Cases of the Buyer's Obligation to Pay the Price for the Goods under CISG (CISG하에서 매수인의 물품대금지급 의무에 관한 법적 기준과 판결례에 관한 고찰)

  • Shim, Chong-Seok
    • International Commerce and Information Review
    • /
    • v.15 no.3
    • /
    • pp.199-224
    • /
    • 2013
  • Section I of Chapter III ('Obligations of the Buyer') in Part III ('Sale of Goods') of the CISG consists of six articles addressing one of the fundamental buyer obligations described in article 53 of the CISG: the obligation to pay the price. Although the amount of the price that the buyer must pay is usually specified in the contract, two articles in Section I contain rules governing the amount of the price in particular special circumstances: article 55 specifies a price when one is not fixed or provided for in the contract, and article 56 specifies the way to determine the price when it is 'fixed according to the weight of the goods'. The remaining four provisions in Section I relate to the manner of paying the price: they include rules on the buyer's obligation to take steps preparatory to and to comply with formalities required for paying the price (article 54); provisions on the place of payment (article 57) and the time for payment (article 58); and an article dispensing with the need for a formal demand for payment by the seller (article 59). Especially article 53 states the principal obligations of the buyer, and serves as an introduction to the provisions of Chapter III. As the CISG does not define what constitutes a 'sale of goods', article 53, in combination with article 30, also sheds light on this matter. The principal obligations of the buyer are to pay the price for and take delivery of the goods 'as required by the contract and this CISG'. From this phrase, as well as from article six of the CISG, it follows that, where the contract provides for the performance to take place in a manner that differs from that set forth in the CISG, the parties' agreement prevails.

  • PDF

Security Trends for Autonomous Driving Vehicle (자율주행 자동차 보안기술 동향)

  • Kwon, H.C.;Lee, S.J.;Choi, J.Y.;Chung, B.H.;Lee, S.W.;Nah, J.C.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.78-88
    • /
    • 2018
  • As the traffic environment gradually changes to autonomous driving and intelligent transport systems, vehicles are becoming increasingly complicated and intelligent, and their connectivity is greatly expandinged. As a result, attack vectors of such vehicles increasing, and security threats further expanding. Currently, various solutions for vehicle security are being developed and applied, but the damage caused by cyber attacks is still increasing. In recent years, vehicles such as the Tesla Model S and Mitsubishi Outlander have been hacked and remotely controlled by an attacker. Therefore, there is a need for advanced security technologies to cope with increasingly intelligent and sophisticated automotive cyber attacks. In this article, we introduce the latest trends of autonomous vehicles and their security threats, as well as the current status and issues of security technologies to cope with them.

Recent R&D Trends of Anti-Drone Technologies (안티 드론 기술 동향)

  • Choi, S.H.;Chae, J.S.;Cha, J.H.;Ahn, J.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.3
    • /
    • pp.78-88
    • /
    • 2018
  • As the unmanned aerial vehicle industry and its related technologies grow each year, the number of abuse cases caused by drones is increasing. In addition to the invasion of privacy caused by indiscriminate photography, terrorism using unmanned aerial vehicles, which have a low detection probability, high location accuracy, and the capability of targeting people or places, as well as carrying chemicals, radiation materials, and small bombs, is becoming a significant problem around the world. Accordingly, many companies are developing anti-drone solutions that consist of various technologies such as radar, EO/IR cameras, and RF jammers to detect and disable unmanned aerial vehicles. This article briefly introduces the recent R&D trends and technical levels of anti-drone technologies.