• Title/Summary/Keyword: Permits

Search Result 754, Processing Time 0.028 seconds

A Study on the Building Height Estimation and Accuracy Using Unmanned Aerial Vehicles (무인비행장치기반 건축물 높이 산출 및 정확도에 관한 연구)

  • Lee, Seung-weon;Kim, Min-Seok;Seo, Dong-Min;Baek, Seung-Chan;Hong, Won-Hwa
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.36 no.2
    • /
    • pp.79-86
    • /
    • 2020
  • In order to accommodate the increase in urban population due to government-led national planning and economic growth, many buildings such as houses and business building were supplied. Although the building law was revised and managed to manage the supplied buildings, for the sake of economic benefit, there have been buildings that are enlarged or reconstructed without declaring building permits. In order to manage these buildings, on-site surveys were conducted. but it has many personnel consumption. To solve this problem, a method of using a satellite image and a manned aircraft is utilized, but it is diseconomical and a renewal cycle is long. In addition, it is not utilized to the height, and although it is judged by the shading of the building, it has limitations that it must be calculated individually. In this study, height of the building was calculated by using the unmanned aerial vehicle with low personnel consumption, and the accuracy was verified by comparison with the building register and measured value. In this study, spatial information was constructed using a fast unmanned aerial vehicle with low manpower consumption and the building height was calculated based on this. The accuracy by comparing the calculated building height with the building register and the actual measurement.

Economic Analysis of Zero Energy Building in South Korea - focusing on Cost-Benefit analysis considering Social Cost - (공사비 변화에 따른 제로에너지건축물 경제성 분석 - 사회적비용을 고려한 비용편익 분석을 중심으로 -)

  • Kim, Jae-Moon
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.36 no.3
    • /
    • pp.147-157
    • /
    • 2020
  • With the increasing obligation to reduce greenhouse gas emissions to the building sector, the government has been gradually expanding its obligation to zero-energy buildings since 2020. Since the ZEB certification took effect in 2017, 48 preliminary and main certifications have been completed as of March 2019, and most of them are public buildings or even certified, but have earned Grade 5 of ZEB. This means that compared with the number of annual building permits registered in Korea, the figure is insignificant, and that it receives little if not mandatory. Therefore, this study investigated empirical cases of ZEB additional construction cost and conducted cost benefit analysis according to changes in ZEB additional construction cost based on a preliminary feasibility analysis project recently conducted by the KDI. In addition, considering the public buildings, the social costs were considered, and the cost-benefit analysis method was the same as the KDI's preliminary feasibility analysis method. The analysis shows that if the ratio of ZEB additional construction cost is more than 5 percent, it is analyzed that there is no economic feasibility, and considering that the ratio of additional construction cost in the cases of ZEB in Korea is 17 percent to 38 percent, it will not be easy to obtain ZEB certification in terms of cost. Finally, to narrow these differences in cost and economic aspects, the overseas low energy and ZEB incentive examples proposed measures such as the concept of subsidy payment in Illinois and the compensation of social costs to private ZEB.

Seismic progressive collapse mitigation of buildings using cylindrical friction damper

  • Mirtaheri, Masoud;Omidi, Zobeydeh;Salkhordeh, Mojtaba;Mirzaeefard, Hamid
    • Earthquakes and Structures
    • /
    • v.20 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • The occurrence of progressive collapse induced by the removal of the vertical load-bearing element in the structure, because of fire or earthquake, has been a significant challenge between structural engineers. Progressive collapse is defined as the complete failure or failure of a part of the structure, initiating with a local rupture in a part of the building and can threaten the stability of the structure. In the current study, the behavior of the structures equipped with a cylindrical friction damper, when the vertical load-bearing elements are eliminated, is considered in two cases: 1-The load-bearing element is removed under the gravity load, and 2-The load-bearing element is removed due to the earthquake lateral forces. In order to obtain a generalized result in the seismic case, 22 pair motions presented in FEMA p 695 are applied to the structures. The study has been conducted using the vertical push down analysis for the case (1), and the nonlinear time-history analysis for the second case using OpenSEES software for 5,10, and 15-story steel frames. Results indicate that, in the first case, the load coefficient, and accordingly the strength of the structure equipped with cylindrical friction dampers are increased considerably. Furthermore, the results from the second case demonstrate that the displacements, and consequently the forces imposed to the structure in the buildings equipped with the cylindrical friction damper substantially was reduced. An optimum slip load is defined in the friction dampers, which permits the damper to start its frictional damping from this threshold load. Therefore, the optimum slip load of the damper is calculated and discussed for both cases.

The Impact of Shoulder Flexion Angle on Hand Grip Strength in Male and Female Undergraduate Students (견관절 굴곡 각도가 남·녀 대학생의 악력 변화에 미치는 영향)

  • Ha, Kyung-Jin;Kim, Dae-Kyeong;Hwang, Seon-Keon
    • PNF and Movement
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2012
  • Purpose : This study's purpose is consideration about change of the hand grip strength according to different posture and shoulder flexion angle. The shoulder joint permits the greatest mobility and carries out the important function of stabilization for hand use. Hand grip activity is important to evaluate while assessing loads of shoulder in hand mobilities. Methods : Thirty(15 male, 15 female) college students with unknown shoulder dysfunction participated subject in five different positions of elbow extension with sitting and standing posture, different positions is followed : (1) shoulder $0^{\circ}$ flexion (2) shoulder $45^{\circ}$ flexion (3) shoulder $90^{\circ}$ flexion (4) shoulder $135^{\circ}$ flexion (5) shoulder $180^{\circ}$ flexion. Results : On the average, in the hand grip strength, the standing posture is higher than sitting posture. Sitting posture showed a most high level at the man's $0^{\circ}$ and woman's $135^{\circ}$. And standing posture showed a most high level at the man's $135^{\circ}$ and woman's $90^{\circ}$. Conclusion : The paired t-test was used to determine the different in grip strength between sitting and standing posture by shoulder angle change. There was no significant difference between the five position by sitting and standing posture. In man, correlation analysis revealed significant connection for all five position by sitting and standing posture. And in woman, correlation analysis revealed connection for all five position by sitting and standing posture.

Smart card based three party key exchange protocol without server's aid (서버의 개입이 없는 스마트카드 기반의 3자간 키 교환 프로토콜)

  • Kim, Yong-Hun;Youn, Taek-Young;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.11-20
    • /
    • 2008
  • Three-party key exchange protocol is a cryptographic protocol which permits two clients share a common session key using different passwords by the help of a trusted server. In a three-party key exchange protocol, an user remember only one password which shared with a trusted server for establish a common key with another user. The trusted server should participate in an execution of the protocol between two clients. This impose heavy burden on the server when many users want to establish a session key using the protocol. In this paper, we propose a three-party key exchange protocol based on a smart card which reduce the computational complexity and communication overhead for the trusted server. In our protocol, the server does not participate in an key exchange procedure between two clients.

An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider (내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2010
  • In the paper, we proposed an IM-ACM(Insider Misuse-Access Control Model) for preventing illegal information leakage by insider who exploits his legal rights in the ubiquitous computing environment. The IM-ACM can monitor whether insider uses data rightly using misuse monitor add to CA-TRBAC(Context Aware-Task Role Based Access Control) which permits access authorization according to user role, context role, task and entity's security attributes. It is difficult to prevent information leakage by insider because of access to legal rights, a wealth of knowledge about the system. The IM-ACM can prevent the information flow between objects which have the different security levels using context role and security attributes and prevent an insider misuse by misuse monitor which comparing an insider actual processing behavior to an insider possible work process pattern drawing on the current defined profile of insider's process.

A Narrative Research on Occupational Identity of a TVET Teacher Using the Project Method in Programming Fields (프로젝트법을 활용하는 프로그래밍분야 직업능력개발훈련교사의 직업정체성 내러티브 연구)

  • Lee, Sungock;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1348-1354
    • /
    • 2020
  • The purpose of this study is to discover the occupational identity by examining the narrative of the life of a TVET teacher using the project method in programming fields. Teacher S, a participant in the study, started as a part-time lecturer at university and has been teaching programs for the past 20 years. As a result, six kinds of occupational identities of a programming teacher who teach by project method were found. S experienced pride and pride as a teacher through the project method. The project method served as a motive for continuous self-development to lead S to an expert. His experience as a positive teacher made him wish to maintain this life and live as a teacher as long as his health permits, even after retirement. This study has significance in exploring the structure of the occupational identity of a TVET teacher using the project method in programming fields, which have not been studied yet.

Internet of Things-Based Command Center to Improve Emergency Response in Underground Mines

  • Jha, Ankit;Verburg, Alex;Tukkaraja, Purushotham
    • Safety and Health at Work
    • /
    • v.13 no.1
    • /
    • pp.40-50
    • /
    • 2022
  • Background: Underground mines have several hazards that could lead to serious consequences if they come into effect. Acquiring, evaluating, and using the real-time data from the atmospheric monitoring system and miner's positional information is crucial in deciding the best course of action. Methods: A graphical user interface-based software is developed that uses an AutoCAD-based mine map, real-time atmospheric monitoring system, and miners' positional information to guide on the shortest route to mine exit and other locations within the mine, including the refuge chamber. Several algorithms are implemented to enhance the visualization of the program and guide the miners through the shortest routes. The information relayed by the sensors and communicated by other personnel are collected, evaluated, and used by the program in proposing the best course of action. Results: The program was evaluated using two case studies involving rescue relating to elevated carbon monoxide levels and increased temperature simulating fire scenarios. The program proposed the shortest path from the miner's current location to the exit of the mine, nearest refuge chamber, and the phone location. The real-time sensor information relayed by all the sensors was collected in a comma-separated value file. Conclusion: This program presents an important tool that aggregates information relayed by sensors to propose the best rescue strategy. The visualization capability of the program allows the operator to observe all the information on a screen and monitor the rescue in real time. This program permits the incorporation of additional sensors and algorithms to further customize the tool.

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

Assessment of seismic stability of finite slope in c-ϕ soils - a plasticity approach

  • Shibsankar, Nandi;G., Santhoshkumar ;Priyanka, Ghosh
    • Geomechanics and Engineering
    • /
    • v.31 no.5
    • /
    • pp.439-452
    • /
    • 2022
  • A forecast of slope behavior during catastrophic events, such as earthquakes is crucial to recognize the risk of slope failure. This paper endeavors to eliminate the significant supposition of predefined slip surfaces in the slope stability analysis, which questions the relevance of simple conventional methods under seismic conditions. To overcome such limitations, a methodology dependent on the slip line hypothesis, which permits an automatic generation of slip surfaces, is embraced to trace the extreme slope face under static and seismic conditions. The effect of earthquakes is considered using the pseudo-static approach. The current outcomes developed from a parametric study endorse a non-linear slope surface as the extreme profile, which is in accordance with the geomorphological aspect of slopes. The proposed methodology is compared with the finite element limit analysis to ensure credibility. Through the design charts obtained from the current investigation, the stability of slopes can be assessed under seismic conditions. It can be observed that the extreme slope profile demands a flat configuration to endure the condition of the limiting equilibrium at a higher level of seismicity. However, a concurrent enhancement in the shear strength of the slope medium suppresses this tendency by offering greater resistance to the seismic inertial forces induced in the medium. Unlike the traditional linear slopes, the extreme slope profiles mostly exhibit a steeper layout over a significant part of the slope height, thus ensuring a more optimized solution to the slope stability problem. Further, the susceptibility of the Longnan slope failure in the Huining-Wudu seismic belt is predicted using the current plasticity approach, which is found to be in close agreement with a case study reported in the literature. Finally, the concept of equivalent single or multi-tiered planar slopes is explored through an example problem, which exhibits the appropriateness of the proposed non-linear slope geometry under actual field conditions.