In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.
During more than 20 years of practice, Civil Aviation Law has experienced three times of amendments since it was enacted in 1995. But these revisions are limited to the technical level. The problems and limitations have become increasingly prominent in its implementation. Firstly, the civil aviation law is the result of interests game among several departments and some legal issues was left behind and the regulation was very vague as a result. Secondly, the process of aviation legislation is the process that the country has undergone profound changes and social transformation. The 20 years is long enough for the society to undergo tremendous changes and 1995 version of civil aviation law does not keep pace of development of economy. There was a serious lag between reality and the law. In order to actively promote the development of the aviation industry and overcome implementation issues of the Civil Aviation Law, Civil Aviation Administration of China (CAAC) initiated modification procedure the law and published new draft of Civil Aviation Law in August 2016. The spirit of this modification is to learn and absorb new achievements of domestic and foreign legislation and the International Convention on civil aviation. Furthermore, the purpose of the revision is to provide favorable policy for the development of civil aviation industry and improve aviation safety and supervision, strengthen and protection of consumer rights and interests, to enhance the safety of civil aviation activities, and promote the development of general aviation. This revision concerned to the 78 articles which are revised or deleted and 24 articles added. The highlights of the draft include but not limited to the enhancement of security management, clarification of the main responsibility for production safety. And also it added the provisions related to the construction of effective tracking capability of public air transport enterprises and license system on the transport of dangerous goods. Compared with the existing civil aviation law, the draft has made a great improvements. But there are several deficiencies and limitations in the drafts. These problems need to be supplemented and perfected through further amendments in near future.
In this paper, we propose the development of embedded board for integrated radiation exposure protection fireman's life-saving alarm capable of location tracking and radiation measurement. The proposed techniques consist of signal processing unit, communication unit, power unit, main control unit. Signal processing units apply shielding design, noise reduction technology and electromagnetic wave subtraction technology. The communication unit is designed to communicate using the wifi method. In the main control unit, power consumption is reduced to a minimum, and a high performance system is formed through small, high density and low heat generation. The proposed techniques are equipment operated by exposure to poor conditions, such as disaster and fire sites, so they are designed and manufactured for external appearance considering waterproof and thermal endurance. The proposed techniques were tested by an authorized testing agency to determine the effectiveness of embedded board. The waterproof grade has achieved the IP67 rating, which can maintain stable performance even when flooded with water at the disaster site due to the nature of the fireman's equipment. The operating temperature was measured in the range of -10℃ to 50℃ to cope with a wide range of environmental changes at the disaster site. The battery life was measured to be available 144 hours after a single charge to cope with emergency disasters such as a collapse accident. The maximum communication distance, including the PCB, was measured to operate at 54.2 meters, a range wider than the existing 50 meters, at a straight line with the command-and-control vehicle in the event of a disaster. Therefore, the effectiveness of embedded board for embedded board for integrated radiation exposure protection fireman's life-saving alarm has been demonstrated.
Journal of the Korean Society of Fisheries and Ocean Technology
/
v.35
no.2
/
pp.161-169
/
1999
This paper describes the swimming and escaping behavior of amber fish, Seriola aureovittata released in the first bag net of the setnet and observed with telemetry techniques. The setnet used in experiment is composed of a leader, a fish court with a flying net and two bag nets having ramp net. The behavior of the fish attached an ultrasonic depth pinger of 50 KHz is observed using a prototype LBL fish tracking system. The 3-D underwater position ofthe fish is calculated by hyperbolic method with three channels of receiver and the depth of pinger. The results obtained are as follows: 1. The fish released on the sea surface was escaped down to 15 m depth and rised up to near the sea surface during 5 minutes after release. The average swimming speed of the fish during this time was 0.87 m/sec. 2. The swimming speed of the fish is decreased slowly in relation to the time elapsed and the fish showed some escaping behavior forward to the fish court staying 1 to 7 m depth layer near the ramp net. The average speed of the fish during this time was 0.52 m/sec. 3. During 25 minutes after beginning of hauling net, the fish showed a faster swimming speed than before hauling and an escaping behavior repeatedly from the first ramp net to the second one in horizontal. In vertical, the fish moved up and down between the sea surface and 20 m depth. After this time, the fish showed the escaping behavior forward to fish court after come back to the first ramp net in spite of the hauling was continued. It is found that the fish was escaped from the first ramp net to the fish court while the hauling was carried out. The average speed of the fish after beginning of hauling was 0.72 m/sec which increased 38.5 % than right before the hauling and showed 0.44 to 0.82 m/see of speed till escaping the first bag net. The average swimming speed during observation was 0.67 m/sec (2.2 times of body length).
Chang, Yeon S.;Ahn, Kyungmo;Hwang, Jin H.;Park, Young-Gyu
Journal of Korean Society of Coastal and Ocean Engineers
/
v.25
no.6
/
pp.374-385
/
2013
Sediment particle motions have been numerically simulated over a sinusoidal ripple. Turbulent boundary layer flows are generated by Large Eddy Simulation, and the sediment particle motions are simulated using Lagrangian particle tracking method. Two unsteady flow conditions are used in the experiment by employing two different wave amplitudes while keeping other conditions such as wave period same. As expected, the amount of suspended sediment particles is clearly dependent on the wave amplitude as it is increasing with increasing flow intensity. However, it is also observed that the pattern of suspension may be different as well due to the only different condition caused by wave amplitude. Specially, the time of maximum sediment suspension within the wave period is not coincident between the two cases because sediment suspension is strongly affected by the existence of turbulent eddies that are formed at different times over the ripple between the two cases as well. The role of these turbulent eddies on sediment suspension is important as it is also confirmed in previous researches. However, it is also found the time of these eddies' formation may also dependent on the wave amplitude over rippled beds. Therefore, it has been proved that various flow as well as geometric conditions under waves has to be considered in order to have better understanding on the sediment suspension process over ripples. In addition, it is found that high turbulent energy and strong upward flow velocities occur during the time of eddy formation, which also supports high suspension rate at these time steps. The results indicate that the relationship between the structure of flows and bedforms has to be carefully examined in studying sediment suspension at coastal regions.
Migratory birds use a variety of breeding and wintering sites, and it is particularly important to understand more information on breeding and feeding sites for the conservation and management of endangered species. Black-faced spoonbills (Platalea minor) are an international endangered species distributed in East Asia. The majority of black-faced spoonbills breed on uninhabited islets off the west coast of the Korean Peninsula during the breeding season, and they are distributed in East Asia such as Taiwan, Hong Kong, southern China, Japan, and Jeju island during the winter season. In this study, we used a wild animal location tracking system to analyze and compare home ranges of three black-faced spoonbills spending the post-fledging stage in Gujido islet in Incheon and Chilsando islet in Yeonggwang each in 2015. The tree black-faced spoonbills in Guji islet showed a home range in coastal areas in Hwanghaenam-do and Gangneung-gun. The home range size (mean±SD) was estimated to be 425.49±116.95 ㎢ using 100% MCP, 43.61±18.51 ㎢ using KDE 95%, and 7.46±3.68 ㎢using KDE 50%. The tree black-faced spoonbills in Chilsando islet showed a home range in the Baeksu tidal flat and the Buan Saemangeum area with a size of 99.38±55.29 ㎢ using 100% MCP, 19.87±6.05 ㎢ using KDE 95%, and 1.16±0.53 ㎢ using KDE 50%. The figured indicated that the tree black-faced spoonbills breeding in Gujido islet had a wider home range than those breeding in Chilsando islet. During the post-fledging stage, the home ranges of black-faced spoonbills were mostly breeding in mudflats. Therefore, it is necessary to minimize human intervention, such as the construction of roads and structures and the human access, to protect the habitats during the period.
Purpose: Reduction of respiratory motion artifacts in PET images was studied using respiratory-gated PET (RGPET) with moving phantom. Especially a method of generating simulated helical CT images from 4D-CT datasets was developed and applied to a respiratory specific RGPET images for more accurate attenuation correction. Materials and Methods: Using a motion phantom with periodicity of 6 seconds and linear motion amplitude of 26 mm, PET/CT (Discovery ST: GEMS) scans with and without respiratory gating were obtained for one syringe and two vials with each volume of 3, 10, and 30 ml respectively. RPM (Real-Time Position Management, Varian) was used for tracking motion during PET/CT scanning. Ten datasets of RGPET and 4D-CT corresponding to every 10% phase intervals were acquired. from the positions, sizes, and uptake values of each subject on the resultant phase specific PET and CT datasets, the correlations between motion artifacts in PET and CT images and the size of motion relative to the size of subject were analyzed. Results: The center positions of three vials in RGPET and 4D-CT agree well with the actual position within the estimated error. However, volumes of subjects in non-gated PET images increase proportional to relative motion size and were overestimated as much as 250% when the motion amplitude was increased two times larger than the size of the subject. On the contrary, the corresponding maximal uptake value was reduced to about 50%. Conclusion: RGPET is demonstrated to remove respiratory motion artifacts in PET imaging, and moreover, more precise image fusion and more accurate attenuation correction is possible by combining with 4D-CT.
Recently, as competition in the market evolves from the competition among companies to the competition among their supply chains, companies are struggling to enhance their supply chain management (hereinafter SCM). In particular, as blockchain technology with various technical advantages is combined with SCM, a lot of domestic manufacturing and distribution companies are considering the adoption of blockchain-oriented SCM (BOSCM) services today. Thus, it is an important academic topic to examine the factors affecting the use of blockchain-oriented SCM. However, most prior studies on blockchain and SCMs have designed their research models based on Technology Acceptance Model (TAM) or the Unified Theory of Acceptance and Use of Technology (UTAUT), which are suitable for explaining individual's acceptance of information technology rather than companies'. Under this background, this study presents a novel model of blockchain-oriented SCM acceptance model based on the Technology-Organization-Environment (TOE) framework to consider companies as the unit of analysis. In addition, Value-based Adoption Model (VAM) is applied to the research model in order to consider the benefits and the sacrifices caused by a new information system comprehensively. To validate the proposed research model, a survey of 126 companies were collected. Among them, by applying PLS-SEM (Partial Least Squares Structural Equation Modeling) with data of 122 companies, the research model was verified. As a result, 'business innovation', 'tracking and tracing', 'security enhancement' and 'cost' from technology viewpoint are found to significantly affect 'perceived value', which in turn affects 'intention to use blockchain-oriented SCM'. Also, 'organization readiness' is found to affect 'intention to use' with statistical significance. However, it is found that 'complexity' and 'regulation environment' have little impact on 'perceived value' and 'intention to use', respectively. It is expected that the findings of this study contribute to preparing practical and policy alternatives for facilitating blockchain-oriented SCM adoption in Korean firms.
There is a lack of knowledge and information on the understanding and application of the Process Safety Management (PSM) system, recognized as a major cause of industrial accidents in small-and medium-sized workplaces. Hence, it is necessary to prepare a protocol to secure the practical and continuous levels of implementation for PSM and eliminate human errors through tracking management. However, insufficient research has been conducted on this. Therefore, this study investigated and analyzed the various violations in the administrative measures, based on the regulations announced by the Ministry of Employment and Labor, in approximately 200 small-and medium-sized PSM workplaces with fewer than 300 employees across in korea. This study intended to contribute to the prevention of major industrial accidents by developing a facility maintenance web program that removed human errors in small-and medium-sized workplaces. The major results are summarized as follows. First, It accessed the web via a QR code on a smart device to check the equipment's specification search function, cause of failure, and photos for the convenience of accessing the program, which made it possible to make requests for the it inspection and maintenance in real time. Second, it linked the identification of the targets to be changed, risk assessment, worker training, and pre-operation inspection with the program, which allowed the administrator to track all the procedures from start to finish. Third, it made it possible to predict the life of the equipment and verify its reliability based on the data accumulated through the registration of the pictures for improvements, repairs, time required, cost, etc. after the work was completed. It is suggested that these research results will be helpful in the practical and systematic operation of small-and medium-sized PSM workplaces. In addition, it can be utilized in a useful manner for the development and dissemination of a facility maintenance web program when establishing future smart factories in small-and medium-sized PSM workplaces under the direction of the government.
In this study, we analyzed the difference in survival rates of those subject to electronic supervision of sex crimes based on the tracking of the period of recidivism and whether they were recidivism, and wanted to confirm the ability of the criminal record to predict recidivism. The criteria for recidivism were defined as cases where a conviction was confirmed due to a criminal case that occurred during the execution of electronic monitoring, and the date of recidivism was the date of occurrence of a case that was confirmed guilty. A total of 122 re-offenders were used in the analysis, and all of them were charged with electronic supervision for committing sex crimes. Studies have confirmed that the subjects commit the most recidivism within three years. In addition, in this study, the difference in survival rate between groups was analyzed after classifying mixed and sex recidivism cases. The number of members was 88 for the mixed recidivism group and 34 for the sex recidivism group. The analysis confirmed that both groups had the most recidivism within three years. There was a slight difference between the survival rate of the mixed recidivism group and the survival rate of the sex recidivism group. So the Log Rank Test and the Generalized Wilcoxon Test were conducted, but no statistically significant differences were identified(Wilcoxon statistic = 2.326, df = 1, p = .13, Log Rank = 1.345, df = 1, p = .25). Next, a Cox Regression analysis was performed to confirm the ability of the criminal record to predict recidivism. As a result, the number of criminal records(sex offense, violent crime) have been confirmed to be a good predictor of recidivism(X2=27.33, df=1, p< .001). As a result, the recidivism rate is gradually decreasing due to the implementation of the electronic monitoring. However, the duration of recidivism required by sex offenders in high-risk groups was found to be rather short. Currently, security measures against felons are being strengthened, so it is necessary to select high-risk groups. Therefore, based on the related studies, the characteristics of high-risk groups and the results of recidivism studies will be used as a basis for disposal within the criminal justice system, which will play a major role in granting objectivity.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.