• 제목/요약/키워드: Expose

검색결과 649건 처리시간 0.042초

농촌지역 기후변화 취약성 평가에 관한 연구 - 서천군을 대상으로 - (Climate Change Vulnerability Assessment in Rural Areas - Case study in Seocheon -)

  • 이경진;차정우
    • 농촌계획
    • /
    • 제20권4호
    • /
    • pp.145-155
    • /
    • 2014
  • Since greenhouse gas emissions increase continuously, the authorities have needed climate change countermeasure for adapting the acceleration of climate change damages. According to "Framework Act on Low Carbon, Green Growth", Korean local governments should have established the implementation plan of climate change adaptation. These guidelines which is the implementation plan of climate change adaptation should be established countermeasure in 7 fields such as Health, Digester/Catastrophe, Agriculture, Forest, Ecosystem, Water Management and Marine/Fisheries. Basically the Korean local governments expose vulnerable financial condition, therefore the authorities might be assessed the vulnerability by local regions and fields, in order to establish an efficient implementation plan of climate change adaptation. Based on this concepts, this research used 3 methods which are LCCGIS, questionnaire survey analysis and analysis of existing data for the multiphasic vulnerable assessment. This study was verified the correlation among 7 elements of climate change vulnerability by 3 analysis methods, in order to respond climate change vulnerability in rural areas, Seocheon-gun. If the regions were evaluated as a vulnerable area by two or more evaluation methods in the results of 3 methods' comparison and evaluation, those areas were selected by vulnerable area. As a result, the vulnerable area of heavy rain and flood was Janghang-eup and Maseo-myeon, the vulnerable area of typhoon was Janghang-eup, Masan-myeon and Seo-myeon. 3 regions (i.e. Janghang-eup, Biin-myeon, Seo-myeon) were vulnerable to coastal flooding, moreover Masan-myeon, Pangyo-myeon and Biin-myeon exposed to vulnerability of landslide. In addition, Pangyo-myeon, Biin-myeon and Masan-myeon was evaluated vulnerable to forest fire, as well as the 3 sites; Masan-myeon, Masan-myeon and Pangyo-myeon was identified vulnerable to ecosystem. Lastly, 3 regions (i.e. Janghang-eup, Masan-myeon and Masan-myeon) showed vulnerable to flood control, additionally Janghang-eup and Seo-myeon was vulnerable to water supply. However, all region was evaluated vulnerable to water quality separately. In a nutshell this paper aims at deriving regions which expose climate change vulnerabilities by multiphasic vulnerable assessment of climate change, and comparing-evaluating the assessments.

비체를 통해 드러난 전쟁과 폭력의 허구 -린 노티지의 『망가진 여인들』에 나타난 비체의 힘 (Exposing the Falsehood of War and Violence: Power of the Abject in Lynn Nottage's Ruined)

  • 최석훈
    • 영어영문학
    • /
    • 제60권2호
    • /
    • pp.365-389
    • /
    • 2014
  • The essay focuses on the relationship between the soldiers and the oppressed women in Lynn Nottage's Ruined (2009) in terms of Julia Kristeva's abject to show how the abjected Congolese women expose the falsehood of the order and identity that the military forces try to construct and maintain by war and violence. According to Kristeva, the abject is something that is rejected for the repulsion and horror it arouses but constantly draws the subject to it at the same time. Physically impaired and socially stigmatized, sexually abused Congolese women find a shelter in Mama Nadi's bar, the only place where they can continue their lives as the abject since the place, like the women themselves, lies outside the symbolic order occupied and corrupted by the men of DRC. Although the men involved in the armed conflict have abjected the women in pursuit of their own system and order, the women are not simply the objects of abuse and oppression. The men have to rely on Mama Nadi and her women not only to reaffirm their identity and power by suppressing them but also to fulfill their biological needs. In addition, the women's resistance against the soldiers demonstrates their power to challenge the men's symbolic order and expose its frailty. Apropos of the abject's resistance, various artistic genres such as poetry, music and dance appear in the play as an escape from the grim reality and a means of challenging and transcending the symbolic order. Bringing all these artistic elements together into a powerful piece of theatre-often considered as an 'abject' genre nowadays, Nottage demonstrates both the power of theatre as well as the tenacious Congolese women.

수종수복용 Pin의 유지력에 관한 실험적 연구 (AN EXPERIMENTAL STUDY ON RETENTIVE PROPERTIES OF VARIOUS PINS IN DENTIM)

  • 이명종
    • 대한치과의사협회지
    • /
    • 제15권11호
    • /
    • pp.763-766
    • /
    • 1977
  • The Purpose of this study was to observe force required to remove some kinds of pin from dentin. The teeth were embedded within a resin cylinder and the occlusal surface was sectioned at a right angle to the axis of the cylinder to expose dentin surface. Thread mate system pin (minim and regular), friction Iocked pin and cemented pin were tested Pin holes were drilled by handpiece and depths of pin holes were tested 1,2 and 3mm. After insertion of the pins into pinhole, tensile loading was performed on the Instron testing machine at the speed of 0.5 inch/min. Results were follewed: 1. In retention, the cemented pins are the least, the friction locked pins intermediate and the self threading pins the greatest in all pins. In self threading pins, regalar pin has greater retention than minim pin 2. The deeper the depth of the pin hole is, the more the retention of the pin increases.

  • PDF

성능 시그네쳐를 이용한 서비스 거부 공격 침입탐지 시스템 설계 (Intrusion Detection System for Denial of Service Attack using Performance Signature)

  • 김광득;이상호
    • 한국정보처리학회논문지
    • /
    • 제6권11호
    • /
    • pp.3011-3019
    • /
    • 1999
  • Denial of service is about knocking off services, without permission for example through crashing the whole system. This kind of attacks are easy to launch and it is hard to protect a system against them. The basic problem is that Unix assumes that users on the system or on other systems will be well behaved. This paper analyses system-based inside denial of services attack(DoS) and system metric for performance of each machine provided. And formalize the conclusions results in ways that clearly expose the performance impact of those observations. So, we present new approach. It is detecting DoS attack using performance signature for system and program behavior. We present new approach. It is detecting DoS attack using performance signature for system and program behavior. We believe that metric will be to guide to automated development of a program to detect the attack. As a results, we propose the AIDPS(Architecture for Intrusion Detection using Performance Signature) model to detect DoS attack using performance signature.

  • PDF

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

아연 매염제를 이용한 뽕잎, 커피 천연염재의 염색특성 (The Characteristic of Natural Dyeing with Mulberry Leaf and Coffee Powder using Zinc Mordant)

  • 이종관;고재훈
    • 한국염색가공학회지
    • /
    • 제28권2호
    • /
    • pp.118-123
    • /
    • 2016
  • The use of natural organic dyes obtained from renewable resources such as plants and trees has the potential for not only preserving petrochemicals but also all-endangered environment for coming next generations. In spite of inferior fastness, natural dyes can be employed in the colouration of natural as well as synthetic fibers. Recently, the potentiality of using natural dyes in colouration with additional UV-protection and antimicrobial properties has been reported. This study is aimed to investigate the effect of Zinc compounds compared to another metallic compounds as mordants on the dyeing properties of natural dye extracted from mulberry leaves and coffee. In this study, the results showed Zinc compounds was expose that is more similar than other mordants in washing fastness through a repeated experiment. Also, Zinc is the environmental impact is less material compared with other mordants, essential edibility minerals ingredient that is necessary in human body.

영어교육과 정보화 시대 (English Education and the Information Age)

  • 최숙희;김성헌;김인철
    • 영어어문교육
    • /
    • 제12권1호
    • /
    • pp.239-256
    • /
    • 2006
  • With the rapid development in computer hardware and software in recent years, the contents and methods of teaching English have been altered greatly. The use of multimedia and the Internet as a means of language teaching is increasing as information technology accelerates. Using multimedia and the Internet in language teaching allows teachers to have more time to devote to interacting with their students. Above all, it arouses in students the motivation for learning and enables each student to study with the speed commensurate to his/her own ability. Both teachers and students can choose their own style that is most efficient for their classes. When students are efficiently stimulated through visual and auditory materials, they can be more easily motivated to utilize and develop creative techniques by using multimedia and the Internet. Thus, in the information age, it would be desirable to innovate the existing concepts of lineal education and allow more student-centered lessons to more readily expose students to contents and experiences according to their own demands.

  • PDF

전파정류 방식을 사용한 의료용 X선 장치의 성능평가

  • 김영표;김태곤;이호식;천민우;박용필
    • 한국전기전자재료학회:학술대회논문집
    • /
    • 한국전기전자재료학회 2009년도 추계학술대회 논문집
    • /
    • pp.248-248
    • /
    • 2009
  • Diagnostic X-ray system has been contributed to wiping out disease to get a good quality images from patients. But, X-ray radiation could be exposed to patient and it is very harmful to the patient. In order to reduce being bombed, the many research and development is now advanced. This research has produced the high voltage occurrence system of full-wave rectification method by using the LC resonance inverter, and evaluated the irradiation reproducibility in order to use it in diagnosis of the patient.

  • PDF

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

SONOS 플래시 메모리용 저전력 고성능 Sense amplifier 설계 (High performance and low power sense amplifier design for SONOS flash memory)

  • 정진교;정영욱;정종호;곽계달
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 하계종합학술대회 논문집(2)
    • /
    • pp.469-472
    • /
    • 2004
  • In this paper a current mode sense amplifier suitable for 30nm SONOS flash memories read operation is presented. The proposed sense amplifier employs cross coupled latch type circuit and current mirror to amplify signal from selected memory cell. This sense amplifier provides fast response in low voltage and low current dissipation. Simulation results show the sensing delay time and current dissipation for power supply voltages Vdd to expose limitations of the sense amplifier in various operating conditions.

  • PDF