This paper considers the acoustical characteristics of the closing click sounds of the mechanical valves employed in an implantable biventricular assist device (BYAD) and their re1evance to the Physical states of the valved. Bj rk Shiley Convexo Concave tilting disk valve was chosen for the study and acoustic measurement was made for the BYAD operated in a mock circulatory system as well as implanted in an animal (sheep). In the BYAD operated in the mock circulatory system. three different states of the valve were examined, ie. normal. mechanically damaged. pseudo-thrombus attached. Microphone measurement for the BVAD implanted in the animal was carried out for five days at a regular time interval from one day after implantation. Characteristic spectrum of the sound from the valve was estimated using Multiple Signal Classification (MUSIC) in which the optimal order was determined according to Bayesian Information Criterion (BIC) . It was observed that the mechanical damage of the valve resulted in changes of the structure of the acoustic spectrum. In contrast. the thrombus formed on the valve did not change much the basic structure of the spectrum but brought about altering the spectral Peak frequencies and energies. Maximum spectral Peak (MSP) with the greatest energy was seen at 2 kHz for the normal valve and it was shifted to 3 kHz for the calve attaching the Pseudo-thrombus. Unlike the normal valve, strong spectral Peak appeared around 7 kHz in the sound from the valve mechanically damaged. In the case of the BYAD implanted in the animal. as the thrombus grew, acoustic energy was reduced relatively more in the low frequency components (〈 2 kHz) and the frequencies of the 1st, 2nd and 3rd MSP were increased little. The thrombus formation would result in reduction in both the variability of the 1st, 2nd and 3rd MSP and the value of the BIC optimal order.
Journal of the Korean Association of Geographic Information Studies
/
v.14
no.3
/
pp.203-222
/
2011
The characteristics of flood damages have been increasingly strengthened and take the form of unpredictable and unusual weather phenomena caused by climate change and climate anomalies. To prevent inundation damage caused by breach of hydraulic structure such as dam or levee, and trouble of drainage of inner basin, the prediction necessity of flood inundation area, flood risk analysis, and drawing flood risk maps have been on the rise, and the national flood risk maps have been produced. In this study, the quantitative flood vulnerability analysis was performed, which represents population living within flood-affected areas, types of economic activities, facilities affected by flood, in order to extend flood risk mapping from simple hazard concept into risk based idea. By applying it to Nakdong River basin, the flood vulnerability indices were estimated to draw flood risk maps subdivided into administrative districts. The result of this study can be applied to establish the disaster prevention measures and priority decision of disaster prevention project.
Journal of the Korean Association of Geographic Information Studies
/
v.14
no.3
/
pp.150-162
/
2011
For the period between 1991 and 2009, the annual average of 448 forest fires occurred in Korea. Above all, approximately 94% of the total fires frequently occurred during the spring and fall seasons. Therefore, we need to minimize the damage of forest fire and manage them systematically. In this study, we analyzed the spatio-temporal distribution patterns for the frequency of forest fire occurrences by each city and gun during dry season between 1990s and 2000s using GIS. Then we compared to analyze the frequency of forest fire occurrence by ten-day intervals in 2000s with that in 1990s. As a result of analysis, early April showed the highest frequency of forest fire occurrence in both 1990s and 2000s. Compared to the 1990s and 2000s, the regional change of forest fire showed the most frequent fire events around Chungcheong province. Especially extra 27 fires increased in Daejeon city, and the second most frequent fire had more than 10 fires in Jeolla province and Incheon. However, the number of fire frequency decreased by 12 fires at the end of April in Hongcheon-gun(the province of Gangwon). This is the largest drop over the study period. We consider that this paper will utilize usefully to establish regional counterplan for forest fire prevention by understanding regional forest fire patterns from seasonal change.
Rockfall protection fences are used for diminishing rockfall damage in roads side slopes. In order to install the fences in effective way, the conditions of rock slopes and total predicted impact energy of fa11ing rock should be considered. However, the fences have been constructed without any consideration for lithology, height and slope angle of rock slope in Korea. In addition, the information about the performance of the protection fences, which should be evaluated by in-situ test or laboratory test in order to check out the practical use in the field, is not available. Therefore, in design manual for the rockfall protection fence, the specific details for the installation of this type of fence are not provided yet. The full sized rockfall in situ test was carried out for the calculation of falling energy of rock and the evaluation of the maximum energy absorbing capacity of fence. For this test, the rock slopes whose heights are about 20 m and dip angle of 65 degree, have been chosen. This is because those geometries are mean height and slope angle of most road cut slopes along Korean national highway. Based on the preliminary simulation procedure, four different sizes of concrete ball (0.7, 1.3, 2.3 and 4.3 ton) were prepared and flour different types of protection fence were constructed. The results of this test provide information about the maximum energy absorbing capacity of the fence, kinetic energy of rockfall and restitution coefficient, and these results can be utilized in the establishment of rockfall fence design and construction manual.
Journal of the Korea Institute of Information Security & Cryptology
/
v.28
no.5
/
pp.1119-1127
/
2018
Most of the cyber attacks are caused by malicious codes. The damage caused by cyber attacks are gradually expanded to IoT and CPS, which is not limited to cyberspace but a serious threat to real life. Accordingly, various malicious code analysis techniques have been appeared. Dynamic analysis have been widely used to easily identify the resulting malicious behavior, but are struggling with an increase in Anti-VM malware that is not working in VM environment detection. On the other hand, static analysis has difficulties in analysis due to various packing techniques. In this paper, we proposed malware classification techniques regardless of known packers or unknown packers through the proposed model. To do this, we designed a model of supervised learning and unsupervised learning for the features that can be used in the PE structure, and conducted the results verification through 98,000 samples. It is expected that accurate analysis will be possible through customized analysis technology for each class.
Journal of the Korea Institute of Information and Communication Engineering
/
v.17
no.2
/
pp.423-430
/
2013
Recently, the personal identification technologies using vein pattern of back of the hand, palm, and finger have been developed actively because it has the advantage that the vein blood vessel in the body is impossible to damage, make a replication and forge. However, it is difficult to extract clearly the vein region from captured vein images through common image prcessing based region segmentation method, because of the light scattering and non-uniform internal tissue by skin layer and inside layer skeleton, etc. Especially, it takes a long time for processing time and makes a discontinuity of blood vessel just in a image because it has non-uniform illumination due to use a locally different adaptive threshold for the binarization of acquired finger-vein image. To solve this problem, we propose illumination normalization based fast method for extracting the finger-vein region. The proposed method has advantages compared to the previous methods as follows. Firstly, for remove a non-uniform illumination of the captured vein image, we obtain a illumination component of the captured vein image by using a low-pass filter. Secondly, by extracting the finger-vein path using one time binarization of a single threshold selection, we were able to reduce the processing time. Through experimental results, we confirmed that the accuracy of extracting the finger-vein region was increased and the processing time was shortened than prior methods.
Network is changed from voice-based network into multimedia-based network by development of communication technology and multimedia service. We need a large bandwidth for multimedia service. The optical fiber is a more suitable medium than existing copper-based cable for large bandwidth. But, it is so expensive than copper-based cable. So, Minimizing total cost becomes a more important concept. In order to construct a minimum cost network, we have to consider existing conduits in network. On the other hand, optical fiber network allows that larger amount of traffic can be transmitted than copper-based network does. However, a failure of a node or link can make a serious damage to the network service. Thus, we have to get multiple paths to support continuous service even if a loss of failure occurs in some point of the network. The network survivability problem is to design the network that can provide reliable service to customers anytime with minimum total cost. In an existing solution of the network survivability problem with conduits, a conduit is considered only one time. But, the conduit is reusable if the network satisfies the required survivability. Proposed algorithm can more effectively considered already existed conduit. Network survivability and edge cost is predetermined. The proposed algorithm finds the best solution by conduit sharing within the limits of network survivability. According to the simulation result, the proposed method can decrease 7% of total cost than an existing method by effective conduits adaption.
In recent years, a series of large-scale disastrous accidents have been occurred frequently both in public and private sector. Such disasters become catastrophe due to poor early response and delayed prompt rescue. Damage from catastrophe could have been drastically reduced or minimized with effective response and recovery management. The smart phone-based mobile applications have important potentials in providing solutions for the effective response and recovery management. Mobile applications can greatly improve risk communication in case of disasters by integrating process of exchange information and data on risk among risk evaluators, risk managers, and other interested parties. In this light of potentials, this study investigates the measures and management to better manage early responses and to effectively deal with domestic disaster-related of the status of public applications service, and utilization. This study examines how disaster applications can be better used and how effective information dissemination through applications could help the post-disaster management process. Based on this findings, it proposes a guideline of effective disaster-related applications by public sector for the future development of actual services and activation solutions. The results show that "User Promptness Side" and "Content Believability Side" factors found to be the two most significant factors in the disaster-related applications by public sector. Discussion and implications are discussed.
When the mouth of the Nakdong River, opens its floodgate, thousands of tons of litter should flown into the South Sea, moving towards nearby coast, thus causing serious social and economic damage. For this reason, in the present study, research was performed on one certain area in northeast coast of Geoje island, which is assumed as area damaged due to rainy season and typhoon in 2012, and research for trace of movement route was implemented by using buoy to identify characteristic of movement of floating debris caused from Nakdong River. Flows related to the movement of floating debris was also identified by analyzing ocean meteorological environment. As a result of the study, total 40 tons of litter composed of grasses and trees(or plants litter) were flown into Heungnam beach on 16th, Jul which is the rainy season. Plus, the location tracking buoy, which was dropped when the typhoon SANBA was coming, was passed by southern sea of Gadeok-do and was flown into Geoje beach 1 ~ 2 days after it was dropped. The wind direction was mostly northeasterly wind around the Geoje beach at the time the buoy and floating debris were flown into northeast coast and there was common sea surface currents which was flowing into the coast.
As many countries in the world including the Republic of Korea have used all their national resources in the accelerating economic information warfare, illegal leakage of industrial technologies and information has increased rapidly. The costs required for damage prevention from 2007 to 2008 are estimated at approximately KRW 180 trillion which is expected to increase gradually in future. Because the tricks of leaking key technologies are also getting increasingly systematized, sophisticated and bigger, e.g., simple theft at the individual level or the conspiracy of all the staff taking part in the research activities, we should pay special attention to technology security in addition to technology development. While there are several factors affecting such the brain drain, they usually include personal, social, political and cultural factors, for instance, very heavy educational expenditure of children compared to relatively low pay, the speedy labor market circulation for experienced personnel, or political restrictions on researches. In this context, as part of efforts made to prevent the outflow of core personnel, individual companies and research institutes should establish systematically appropriate core personnel management systems for their own organizational or business goals and principles which are intented to ensure to give better treatment and benefit to core personnel and to exercise closer supervision over them. Furthermore, the conventional personnel management system should be radically and flexibly improved in the manner of encouraging the core personnel returning to the organization to combine their external experiences with practices, instead of penalizing them. At the same time, it is necessary to train and educate core personnel through mutual collaboration and in-house training facilities as well as external academic programs operated jointly at the level of the industry. Finally, as the issues concerning the outflow of core personnel are not just problems of relevant companies and other advanced countries have devoted their best efforts to secure their own key technologies at the national level, it is urgent for the industry and the competent authorities to cooperate closely.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.