• Title/Summary/Keyword: Korea Design Standard

Search Result 3,774, Processing Time 0.053 seconds

A Study on Negligence of Data Modeling Fundamentals at the University Job Information System (대학 취업정보시스템에서 데이터모델링 기본이론 경시에 관한 연구)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.8
    • /
    • pp.139-150
    • /
    • 2014
  • In this essay, we hoped to see how the operational university job database systems perform badly, since there are a lot of signs that they fall short of data design fundamentals. Fortunately, we are able to choose a university employment support database(UESD) application as a candidate for our study. We have taken UESD system as it is and we have developed an enhanced version of the UESD system, which strictly followed the basic fundamentals in data modeling and named it as NewUESD system. Then, we have conducted a comparison to see how much UESD system is deviated from the standard balancedness found in NewUESD. From the perspective of data obesity, we computed how much UESD contains unnecessary data. The NewUESD contained no unnecessary data at all, which implies that it has only data that is necessary to form a data model. But the data obesity of UESD system is found to be more than 50%. Therefore, it is significantly higher, 37% higher in this case, than the obesity judged to be normal, which is 19% in NewUESD system.

A Study on the Structural Behavior of the Composite Slab with New-Shaped Deckplate (신형상 데크플레이트를 이용한 합성슬라브의 구조적인 거동에 대한 연구)

  • Huh, Choong;Moon, Tae Sup
    • Journal of Korean Society of Steel Construction
    • /
    • v.9 no.3 s.32
    • /
    • pp.341-350
    • /
    • 1997
  • The objective of this study is to investigate the structural behavior of the composite slabs with the new metal deckplate. The new deckplate can be used as structural member with topping concrete. So several experiments of this structural test and the fire resistance test were done. From this experiments. slabs with new metal deckpklate were verified as composite slabs. In this paper, this verifications were compared with the international design methods. For experiment. 49 specimens were made. the main parameters are deckplate thickness (1.2mm. 1.6mm) depth of topping concrete(85mm. 90mm). support condition(simple, 2-span), shear reinforcment(studs), span(2.7m, 3.0m, 3.3m. 3.6m. 3.9m) and shear span(L/3, L/4, L/7). We analyzed the structural behavior of composite slab throughout the moment-curvature relationship which is obtained with the program using the computer language. Turbo C. From this development for slab system, the reinforced concrete or steel structure building may be easy, economical for construction, And informations about the structural behavior of composite slabs will be utilized to established korea standard.

  • PDF

A Design of Transceiver for 13.56MHz RFID Reader using the Peak Detector with Automatic Reference Voltage Generator (자동 기준전압 생성 피크 검출기를 이용한 13.56 MHz RFID 리더기용 송수신기 설계)

  • Kim, Ju-Seong;Min, Kyung-Jik;Nam, Chul;Hurh, Djyoung;Lee, Kang-Yun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.3
    • /
    • pp.28-34
    • /
    • 2010
  • In this paper, the transceiver for RFID reader using 13.56MHz as a carrier frequency and meeting International Standard ISO 14443 type A, 14443 type B and 15693 is presented. The receiver is composed of envelope detector, VGA(Variable Gain Amplifier), filter, comparator to recovery the received signal. The proposed automatic reference voltage generator, positive peak detector, negative peak detector, and data slicer circuit can adjust the decision level of reference voltage over the received signal amplitudes. The transmitter is designed to drive high voltage and current to meet the 15693 specification. By using inductor loading circuit which can swing more than power supply and drive large current even under low impedance condition, it can control modulation rate from 30 percent to 5 percent, 100 perccnt and drive the output currents from 5 mA to 240 mA depending on standards. The 13.56 MHZ RFID reader is implemented in $0.18\;{\mu}m$ CM08 technology at 3.3V single supply. The chip area excluding pads is $1.5mm\;{\times}\;1.5mm$.

Design of High-Performance Motion Estimation Circuit for H.264/AVC Video CODEC (H.264/AVC 동영상 코덱용 고성능 움직임 추정 회로 설계)

  • Lee, Seon-Young;Cho, Kyeong-Soon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.7
    • /
    • pp.53-60
    • /
    • 2009
  • Motion estimation for H.264/AVC video CODEC is very complex and requires a huge amount of computational efforts because it uses multiple reference frames and variable block sizes. We propose the architecture of high-performance integer-pixel motion estimation circuit based on fast algorithms for multiple reference frame selection, block matching, block mode decision and motion vector estimation. We also propose the architecture of high-performance interpolation circuit for sub-pixel motion estimation. We described the RTL circuit in Verilog HDL and synthesized the gate-level circuit using 130nm standard cell library. The integer-pixel motion estimation circuit consists of 77,600 logic gates and four $32\times8\times32$-bit dual-port SRAM's. It has tile maximum operating frequency of 161MHz and can process up to 51 D1 (720$\times$480) color in go frames per second. The fractional motion estimation circuit consists of 22,478 logic gates. It has the maximum operating frequency of 200MHz and can process up to 69 1080HD (1,920$\times$1,088) color image frames per second.

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

Implementation of Wired Sensor Network Interface Systems (유선 센서 네트워크 인터페이스 시스템 구현)

  • Kim, Dong-Hyeok;Keum, Min-Ha;Oh, Se-Moon;Lee, Sang-Hoon;Islam, Mohammad Rakibul;Kim, Jin-Sang;Cho, Won-Kyung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.10
    • /
    • pp.31-38
    • /
    • 2008
  • This paper describes sensor network system implementation for the IEEE 1451.2 standard which guarantees compatibilities between various wired sensors. The proposed system consists of the Network Capable Application Processor(NCAP) in the IEEE 1451.0, the Transducer Independent Interface(TII) in the IEEE 1451.2, the Transducer Electronic Data Sheet(TEDS) and sensors. The research goal of this study is to minimize and optimize system complexity for IC design. The NCAP is implemented using C language in personal computer environment. TII is used in the parallel port between PC and an FPGA application board. Transducer is implemented using Verilog on the FPGA application board. We verified the proposed system architecture based on the standards.

The Comparison of the Physical Characteristics between Boys and Girls at Puberty (사춘기 남녀 청소년의 인체 특징에 관한 비교 - 만 $10{\sim}14$세를 중심으로 -)

  • Jeong, Hwa-Yeon;Kim, Kyung-A;Suh, Mi-A
    • The Research Journal of the Costume Culture
    • /
    • v.15 no.1 s.66
    • /
    • pp.37-57
    • /
    • 2007
  • The purpose of this study was to analyze the body measurements of boys and girls at puberty and to provide the fundamental data for pubescent apparel manufacturers to produce clothing that reflect their physical characteristics. A total of 549 boys and 529 girls aged between 10 and 14 were measured in the capital area from March 4 to April 3, 2004. Data were collected from 35 anthropometric items and 12 photographic items per a person. SPSS Ver. 12 program was used in data analysis including means, standard deviation, t-test and Duncan test. The main results of this study were as follows. They showed the significant difference of their growth in accordance with the increase of their ages. There were also the difference between boys and girls. As for height and length items, boys showed a slow growth at the age of $10{\sim}11\;and\;12{\sim}13$. Those at the age of $11{\sim}12\;and\;13{\sim}14$ showed rapid growth. That is, an active growth was followed by a slow growth and that phenomenon repeatedly occurred. On the other hand, girls showed remarkable growth at the age $10{\sim}11$ and the growth rate gradually slowed down afterward. Regarding circumference items, boys at the age of $11{\sim}12\;and\;13{\sim}14$ showed remarkable growth. This results showed that boys at the age of $11{\sim}12$ had vertical growth and horizontal growth at the same time and for those at the age of $13{\sim}14$, growth was more conspicuous in horizontal direction. Meanwhile, for girls, the growth rate was high at the age of $11{\sim}12$, somewhat later than the age of the growth of height and length. As for breadth-related items and depth-related items, for both sexes two items grew steadily throughout the ages, breadth-related items showed a higher growth rate than that of depth-related items. This study analyzed the body measurements of pubescent boys and girls and the results showed that, for boys, an active physical growth took place at the age of 13 according to previous studies, but the findings of this study suggested that the phenomenon now occurred at the age of $11{\sim}12$, which proved that physical growth took place earlier than before. Also, an active growth was followed by a slow growth. Girls at puberty showed remarkable growth of height at the age of $10{\sim}11$ that is consistent with previous studies and then showed horizontal growth at the age of around 12, having a voluminous body shape.

  • PDF

The Effects of Information Transfer of Personal Information Security Breaches (개인정보 유출의 정보전이 효과)

  • Park, Sang-Soo;Lee, Hyun-Chul
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

An Analysis of Panel Data on the Web-accessibility Policies of Local Governments in Korea (우리나라 웹 접근성 정책 영향요인 분석 - 16개 광역자치단체 패널데이터를 중심으로 -)

  • JIN, Sangki;HYUN, Joonho
    • Informatization Policy
    • /
    • v.18 no.4
    • /
    • pp.42-58
    • /
    • 2011
  • This paper starts from one question: what are the key factors of the web accessibility policy, which is significant for realizing equity in the web and enhancing human dignity in the information society. To find significant factors for complying with web accessibility, this paper analyzes panel data of 16 Korean local governments (for five years: 2004-2009) according to the research design which is based on the demand and supply balance model and consists of four variables : 'legal and institutional environment (including legal infrastructure)', 'financial foundation (fiscal self-reliance ratio)', 'policy inputs (amount of imformatization budget, employee of information experts)'and 'policy demand (internet usage rate, the number of disabled people and elderly people)'. From the results of this study, this paper can explain the mechanism and impact factors on the web accessibility policy of Korean local governments. Some factors are critical to improve web accessibility: (1) the importance of policy demand, (2) the importance of policy inputs, (3) the importance of legal and institutional environment. Finally, this paper concludes with some suggestions to enhance the web accessibility capacity for Korean local governments: (1) improve awareness on web accessibility, (2) develop a standard and invest R&D on web accessibility, (3) foster experts in web accessibility.

  • PDF

A Study on the Analysis of the Error Rate of Mixed Mortar Panel for Implementation Free-form Shape (비정형 형상구현을 위한 혼합모르타르 패널의 오차율 분석 연구)

  • Oh, Young-Geun;Jeong, Kyeong-Tae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.2
    • /
    • pp.155-162
    • /
    • 2020
  • Since the third industrial revolution has been started in the 1980s, the form of buildings has been varied and atypical by the development of building technology. Such free-form building has a curved shape unlike the existing standard buildings, and to realize this, it is necessary to manufacture the free-from panel. The shape of the free-form panel must satisfy a limited error ratio compared with the design shape, and the technology to produce free-form panels is very difficult. However, there are many problems such as enormous cost and construction waste generation when implementing free-from construction. Therefore, the development of free-form panel manufacturing technology should be made to solve the problems caused by the free-form construction. In this study, the error rate analysis of the mixed mortar panel was conducted by selecting the proper mixing ratio of the mixed mortar for the shape of the free-form panel.