• 제목/요약/키워드: Breaching

검색결과 39건 처리시간 0.028초

DEM에서의 Sink와 Flat Area 처리 알고리즘에 대한 비교 검토 (Examination of the Algorithms for Removing Sink and Flat Area of DEM)

  • 김경탁;최윤석
    • 한국지리정보학회지
    • /
    • 제8권4호
    • /
    • pp.91-101
    • /
    • 2005
  • DEM을 이용하여 하천망을 생성하고 유역을 분할하기 위해서는 DEM에 존재하는 sink나 flat area와 같은 오류를 합리적인 방법으로 제거하는 과정이 필요하다. DEM의 sink를 제거하기 위한 방법으로는 filling 알고리즘과 breaching 알고리즘 등이 있으며, flat area에서 흐름방향을 결정하기 위한 방법으로는 Jenson과 Domingue 알고리즘, relief 알고리즘 및 combined gradient 알고리즘 등이 있다. 본 연구에서는 이들 알고리즘에 대한 검토를 수행하고 breaching 알고리즘이 포함된 filling 알고리즘과 combined gradient 알고리즘을 적용하여 DEM의 오류를 제거하는 프로그램을 개발하였으며, 이와 Arc/Info에서 채택하고 있는 filling 알고리즘과 Jenson과 Domingue 알고리즘을 적용한 DEM의 오류 제거 결과와 비교 검토하였다. 추출된 하천망의 특성을 분석하고, 그 결과를 수치지도에서 추출한 하천망과 형태석 측면 및 하천차수별 특성 비교를 통해 본 연구결과의 유용성을 검토하였다.

  • PDF

LISFLOOD 모형을 이용한 파제에 의한 범람면적 비교 평가 (Comparison and Evaluation of the Inundation Areas by Levee Breaching using LISFLOOD)

  • 최천규;최윤석;김경탁
    • 한국습지학회지
    • /
    • 제16권3호
    • /
    • pp.383-392
    • /
    • 2014
  • 본 연구의 목적은 LISFLOOD 모형을 이용하여 범람해석을 수행하고, 그 결과를 FLUMEN 모형에 의해 작성된 홍수범람도와 비교함으로써 국내하천에 대한 LISFLOOD 모형의 적용성을 평가하는 것이다. 이를 위해서 파제 시나리오를 작성하여 LISFLOOD 모형을 이용한 범람해석에 적용하였으며, 파제 시나리오별 범람해석 결과를 평가하였다. LISFLOOD 모형을 이용한 파제 시나리오별 범람해석 결과, FLUMEN 모형에 의해 작성된 홍수범람도와의 각 파제 구간별 범람면적의 상대오차가 0.2% ~ 42% 정도로 파제 지점에 따라서 다소 상이한 결과를 나타내었다. 그러나 홍수위험지도 제작방법과 같이 파제 시나리오의 범람해석 결과를 중첩하여 작성된 두 모형의 최대 범람면적에서는 약 1.2%의 상대오차를 보임으로써 서로 유사한 결과를 나타내었다. 한편 LISFLOOD 모형은 입력자료의 구축이 용이한 격자형태의 DEM과 상류단 경계조건인 수문곡선만을 활용하여 범람해석을 할 수 있으며, 범람해석에 소요되는 시간이 FLUMEN 모형보다 짧은 것으로 나타났다. 그러므로 신속한 범람해석이 필요한 지역에 대해서는 LISFLOOD 모형의 활용이 가능할 것으로 판단된다.

Analysis of Penalties Imposed on Organisations for Breaching Safety and Health Regulations in the United Kingdom

  • Arewa, Andrew Oyen;Theophilus, Stephen;Ifelebuegu, Augustine;Farrell, Peter
    • Safety and Health at Work
    • /
    • 제9권4호
    • /
    • pp.388-397
    • /
    • 2018
  • Background: The study analyzes penalties imposed on organizations for breaching safety and health regulations. The research questions are as follows: what are the commonly breached safety and health regulations? How proportional are penalties imposed on organizations for breaching health and safety regulations in the United Kingdom? Methods: The study employed sequential explanatory mixed research strategies for better understanding of health and safety penalties imposed on organizations. Actual health and safety convictions and penalties data for 10 years (2006 to 2016) were obtained through the United Kingdom Health and Safety Executive (HSE) public register for convictions. Overall, 2,217 health and safety cases were analyzed amounting to total fines of £37,179,916, in addition to other wide-ranging penalties. For thorough understanding, eight interviews were conducted with industry practitioners, lawyers, and HSE officials as part of the study qualitative data. Results: Findings show that the Health and Safety at Work (HSW) Act accounted for 46% of all HSE prosecution cases in the last decade. This is nearly half of the total safety and health at work prosecutions. Moreover, there is widespread desire for organizations to comply with the HSW Act, but route fines are seen as burdensome and inimical to business growth. Conclusion: A key deduction from the study reveal significant disproportionality concerning penalties imposed on organizations for breaching safety and health regulations. On aggregate, small companies tend to pay more for health and safety offenses in a ratio of 1:2 compared to large companies. The study also reveals that the HSW Act accounted for nearly half of the total safety and health at work prosecutions in the last decade.

Internal pressure in a low-rise building with existing envelope openings and sudden breaching

  • Tecle, Amanuel S.;Bitsuamlak, Girma T.;Aly, Aly Mousaad
    • Wind and Structures
    • /
    • 제16권1호
    • /
    • pp.25-46
    • /
    • 2013
  • This paper presents a boundary-layer wind tunnel (BLWT) study on the effect of variable dominant openings on steady and transient responses of wind-induced internal pressure in a low-rise building. The paper presents a parametric study focusing on differences and similarities between transient and steady-state responses, the effects of size and locations of dominant openings and vent openings, and the effects of wind angle of attack. In addition, the necessity of internal volume correction during sudden breaching, i.e., a transient response experiment was investigated. A comparison of the BLWT data with ASCE 7-2010, as well as with limited large-scale data obtained at a 'Wall of Wind' facility, is presented.

A Breaching of Electromagnetic Shielding by Narrow Aperture in Metal Film

  • Park, Doo Jae;Chu, Hong;Kyoung, Jisoo;Choi, Soo Bong
    • Journal of the Optical Society of Korea
    • /
    • 제20권5호
    • /
    • pp.563-566
    • /
    • 2016
  • We report a theoretical research for the condition of electromagnetic shield breaching when a narrow aperture is punctured in thin metal film. To calculate electromagnetic field transmission through a narrow slit, a Rayleigh wave expansion has been applied for free standing, thin metal film. We found that the DC electric field allows perfect transmission when the length of the slit is infinite, regardless of the other geometrical factors such as slitwidth and thickness. Slitwidth dependent transmission spectra as a function of frequency shows a cutoff frequency that decreases almost linearly to the slitwidth, giving that almost successful shielding is only possible when the slitwidth is smaller than 1 micron.

프라이버시 보호 데이터 배포를 위한 모델 조사 (Models for Privacy-preserving Data Publishing : A Survey)

  • 김종선;정기정;이혁기;김수형;김종욱;정연돈
    • 정보과학회 논문지
    • /
    • 제44권2호
    • /
    • pp.195-207
    • /
    • 2017
  • 최근 다양한 분야에서 데이터들이 활발하게 활용되고 있다. 이에 따라 데이터의 공유나 배포를 요구하는 목소리가 높아지고 있다. 그러나 공유된 데이터에 개인과 관련된 민감한 정보가 있을 경우, 개인의 민감한 정보가 드러나는 프라이버시 유출이 발생할 수 있다. 개인 정보가 포함된 데이터를 배포하기 위해 개인의 프라이버시를 보호하면서 데이터를 최소한으로 변형하는 프라이버시 보호 데이터 배포(privacy-preserving data publishing, PPDP)가 연구되어 왔다. 프라이버시 보호 데이터 배포 연구는 다양한 공격자 모델을 가정하고 이러한 공격자의 프라이버시 유출 공격으로부터 프라이버시를 보호하기 위한 원칙인 프라이버시 모델에 따라 발전해왔다. 본 논문에서는 먼저 프라이버시 유출 공격에 대해 알아본다. 그리고 프라이버시 모델들을 프라이버시 유출 공격에 따라 분류하고 각 프라이버시 모델들 간의 차이점과 요구 조건에 대해 알아본다.

Monitoring of Moisture Content and Sediment Fineness as Predictors of Shoal Breaching in an Estuary

  • Lee, Seulki;Park, Sungjae;Lee, Chang-Wook
    • 한국측량학회지
    • /
    • 제36권1호
    • /
    • pp.25-32
    • /
    • 2018
  • Namdae-cheon in Gangwon-do Province, Korea, is a valuable well-preserved lagoon. The estuary of Namdae-cheon Stream is closed because of the surrounding natural sand shoal. Thus, during the dry season, river water cannot easily flow to the ocean and therefore stagnates. River water congestion causes environmental deterioration of estuaries, often by eutrophication. In this study, we examined wall disintegration in the estuary area and used it to determine appropriate measures for the conservation of estuary water quality in the future. A total of 24 sites were selected, with 13 sites on the west side and 11 sites on the east side of the estuary study area. Samples were collected and analyzed for particle size and moisture content both vertically and horizontally. Sedimentary deposition rate was measured, and subsidence analysis was performed. Particle size, water content, sedimentary deposition, and subsidence analyses indicated that flow shifted to the west during the study period. In conjunction with other variables that may affect changes in flow, these parameters can be used in future research to predict shoal breaches and associated changes in water flow direction.

국제물품매매계약(國際物品賣買契約)에 관한 UN협약상(協約上) 이자지급규정(利子支給規定)의 적용범위(適用範圍)에 관한 연구(硏究) (A Study on the Sphere of Application of the Provision for Interest under the CISG)

  • 배준일
    • 무역상무연구
    • /
    • 제13권
    • /
    • pp.235-253
    • /
    • 2000
  • As to the sphere of application, Article 78 CISG undoubtedly applies to interest on the purchase price. Furthermore, the provision also applies to "any other sum that is in arrears". This language has been interpreted to encompass expenses that one party had on behalf of the other as well as reimbursements when the purchase price is reduced according to Article 50 CISG. However, it is questionable whether this language also extends to claims for damages. Legal scholars seem to agree that one has a right to interest on damage claims under Article 78 if the amount in question has been liquidated vis-a-vis the other party. Whether this right to interest also applies to unliquidated sums, is controversial, however. In this study, as a result of taking into account the puspose of Article 78, we could find the fact that regardless of whether the exact amount of damages has been specified yet, the breaching party still owes compensation to the other party from the time of the breach and, accordingly, the non-breaching party should be entitled to interest payments on the loss from that time. Consequently, Article 78 applies not only to liquidated but also to unliquidated damages.

  • PDF

Alternative Breaching Methods of the TRISO Fuels

  • Lee Jong-Hyeon;Shim Joon-Bo;Ahn Byung-Gil;Kwon Sang-Woon;Kim Eung-Ho;Yoo Jae-Hyung;Park Seong-Won
    • 한국방사성폐기물학회:학술대회논문집
    • /
    • 한국방사성폐기물학회 2005년도 Proceedings of The 6th korea-china joint workshop on nuclear waste management
    • /
    • pp.92-106
    • /
    • 2005
  • The head-end processes of spent TRISO fuel have been reviewed to understand the current status and the limitations of the reported processes. The main concerns in the TRISO treatment are to effectively breach and separate the carbon and SiC layers composing the TRISO particles. The crush-bum scheme which was considered in the early stages of the development has been replaced by the crush-leach or $CO_2$ burning and the succeeding CO decomposition process because of a sequestration problem of $CO_2$ containing $^{14}C$. However there are still many obstacles to overcome in the reported processes. Hence, innovative thermomechanical and pyrochemical concepts to breach the coating layers of the TRISO particle with a minimized amount of second waste are proposed in this paper and their principles are described in detail.

  • PDF