Journal of the Korean Society of Fisheries and Ocean Technology
/
v.28
no.1
/
pp.71-78
/
1992
Zr-4 used for a cladding and an end plug of reactor component has creep deformation under operation at high temperature. Creep is regarded as the time dependent deformation of a material under constant applied stress. Although the major source of the deformation of zirconium component in water-cooled reactors is irradiation creep, the thermal creep may give a rise to significant deformation in reactor component especially at relatively high temperatures and at various constant stresses, and therefore it must be predicted accurately. Stress relaxation is the time dependent change of stress at constant strain and it is a process related intimately to creep. In this paper, the creep behavior and stress relaxation of Zr-4 is examined at the temperature of 50$0^{\circ}C$ that is 40% of the absolute melting temperature of Zr-4 under the stress below yield stress and under the various constant strains. The results obtained are summarized as follows: 1) With an increase of stress, the steady state creep rate increases and the creep rupture time decreases. 2) The steady state creep rate $\varepsilon$(%/s) for the stress $\sigma$sub(c) (kgf/mm super(2)) of Zr-4 increases outstandingly. All the empirical equations computed for Zr-4 increases outstandingly. All the empirical equations computed for Zr-4 are in accord with Norton's model equation($\varepsilon$=K$\sigma$ sub(c) super (n)). The constants of materials computed are as follows: K=3.9881$\times$10 super(-5), n=1.9608 3) The rupture time T sub(r) (hr) decreases linearly with the increase of stress on the log-log scaled graph. The empirical equations computed for Zr-4 are in accord with Bailey's model equation (T sub(r)=K sub(1)$\sigma$sub(c) super(m)). The constants of materials computed are as follows: K sub(1)=1.2875$\times$10 super(16), m=-3.467 4) It seems clear that the strain could be quantitatively dependent on the high temperature creep properties such as creep stress, rupture time, steady state creep rate and total creep rate. It is found that these relationships are linear on the log-log graph. 5) In stress relaxation test, as the critical constant strain that can be allowed to the specimen is larger, stress relaxation becomes more rapid, and as the constant strain is smaller, the stress relaxation becomes slower.
Currently. exchanges of industrial workers between countries are more active than ever. and the problem of AIDS in connection with the operation of preventive educational programs has reached a point where the issue cannot be limited to native people alone any more. Based on such judgement. this research has been carried out to provide basic study materials by grasping the latent factors representing the difference between countries in the levels of right knowledge. attitude and behavior with respect to AIDS maintained by workers who have grown in different social and cultural living background. During the period from Apr. 1. 1995 to Jun. 30. questionnaires. written both in Korean and English, were distributed to Korean and Malaysian employees working at certain Korean video manufacturers. and the results of replies. given by 80 workers who were analyzed through matched sampling· method where ages and sex matched by country. were used as the research materials. The gathered materials were analyzed through the SPSS package t-test. ANOVA. factor analysis and multiple stepwise regression methods. and the following results were obtained. 1. The 2 extracted latent factors could be named 'common. social' knowledge factor and 'in-depth. psychological' knowledge factor respectively. 2. The percentile points of 'external. social' knowledge factor. in the case of Korean workers. howed 90.0 at average. a figure 13.75 points higher than those of Malaysian workers. 76.25. On the other hand. the percentile points of the 'in-depth. psychological'knowledge factor showed 70.80 at average in the case of Korean workers. a figure 7.47 points lower than those of Malaysian workers. 78.33. Meanwhile. the difference in percentile points between the 2 latent factors was 8.54 at average. indicating that the points of 'in-depth. psychological' knowledge factor was lower than those of the 'external. social' knowledge factor. 3. As for Korean workers. the percentile points of the 'in-depth. psychological' knowledge factor showed higher points in office workers than in non-office workers. and such variables exhibited in the position of workers can explain the $7\%$ of the latent factor. The percentile points of the 'in-depth. psychological' knowledge factors. in the case of Malaysian workers. showed higher points in groups who had religion than in groups who did not. and higher points in groups who obtained information from newspapers than in groups who obtained from televisions or other sources; and with these 2 variables. $26\%$ of this latent factor can be explained. The results. of analysis described so far suggest that while Korean workers possessed general level of knowledge on AIDS. they had low level of practical knowledge as far as its depth is concerned. and that they had social prejudice on patients as well as on the AIDS infection route. In addition. because the overall knowledge level of Malaysian workers. is lower than that of Korean workers. it suggests that separate programs intended for Malaysian workers are required prior to executing integrated programs.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.12
no.2
/
pp.63-75
/
2013
Roundabouts have been operated in Europe, America and Australia since the 1970s, and many relevant researches continually was carried out. Though many studies regarding roundabout have been recently conducted in korea, most of them have focused on its operational safety and efficiency. Moreover, roundabout design guideline did not define a clear criteria related to pedestrian in roundabout, but seldom investigate the influences of pedestrian on crosswalk. In this study, we seek ways to operate the pedestrian crosswalk signal on roundabout maximizing their operational effects in exceptional case such as rush hour or intersection near the special facilities. We proved that roundabout signal operation is effective under certain circumstances in according to the number of pedestrian, and suggested the optimal signal timing plan for signalized roundabouts. For pursuing the above, we conducted the simulation test using the VISSIM model. The results show that the operational effectiveness of signalized roundabout was evaluated to be better than non-signalized roundabout in specific pedestrian volume condition. In addition, those results are confirmed using simulation analysis conducted on the real roundabout.
Park Sung-Ho;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
Journal of the Institute of Electronics Engineers of Korea SP
/
v.42
no.2
s.302
/
pp.27-36
/
2005
This thesis proposed an effective encryption method for the DCT-based image/video contents and made it possible to operate in a high speed by implementing it as an optimized hardware. By considering the increase in the amount of the calculation in the image/video compression, reconstruction and encryption, an partial encryption was performed, in which only the important information (DC and DPCM coefficients) were selected as the data to be encrypted. As the result, the encryption cost decreased when all the original image was encrypted. As the encryption algorithm one of the multi-mode AES, DES, or SEED can be used. The proposed encryption method was implemented in software to be experimented with TM-5 for about 1,000 test images. From the result, it was verified that to induce the original image from the encrypted one is not possible. At that situation, the decrease in compression ratio was only $1.6\%$. The hardware encryption system implemented in Verilog-HDL was synthesized to find the gate-level circuit in the SynopsysTM design compiler with the Hynix $0.25{\mu}m$ CMOS Phantom-cell library. Timing simulation was performed by Verilog-XL from CadenceTM, which resulted in the stable operation in the frequency above 100MHz. Accordingly, the proposed encryption method and the implemented hardware are expected to be effectively used as a good solution for the end-to-end security which is considered as one of the important problems.
An, Joonghyun;Youn, Jiae;Cho, Jeonghun;Park, Daejin
Journal of the Institute of Electronics and Information Engineers
/
v.52
no.12
/
pp.99-108
/
2015
The embedded microcontroller which is operated by the logic gates synchronized on the clock pulse, is gradually used as main controller of mission-critical systems. Severe electrical situations such as high voltage/frequency surge may cause malfunctioning of the clock source. The tolerant system operation is required against the various external electric noise and means the robust design technique is becoming more important issue in system clock failure problems. In this paper, we propose on-chip backup clock change architecture for the automatic clock failure detection. For the this, we adopt the edge detector, noise canceller logic and glitch-free clock changer circuit. The implemented edge detector unit detects the abnormal low-frequency of the clock source and the delay chain circuit of the clock pulse by the noise canceller can cancel out the glitch clock. The externally invalid clock source by detecting the emergency status will be switched to back-up clock source by glitch-free clock changer circuit. The proposed circuits are evaluated by Verilog simulation and the fabricated IC is validated by using test equipment electrical field radiation noise
Journal of the Institute of Electronics Engineers of Korea TC
/
v.48
no.4
/
pp.61-68
/
2011
Event-based service technology integrate service to detect events that occur in real time by analyzing the response. Is the core technology for real-time business and ubiquitous service environment construction. Is required event-based service technology on business processes in real-time business environment that providing rapid response to changing and custom service using a variety of information real-time monitoring and analysis in ubiquitous service environment. Last event-driven business processes can be used as a CEP(Complex Event Processing). The core of CEP technology, the event from multiple event sources analysis of events affecting and the way to handle action, is detect complex event to user. In previous studies, an event occurs that continue to perform without the need for partial operations. so many operations and spend a lot of memory is a problem. To solve these problems, event detection technique is proposed that large streams of data without processing any events, registered to configure a complex event occurs when all events in the application layer, complex event processing. The proposed method, first using a bitmap index to manage the event occurs. The complex events of the last event in response to define a trigger event. The occurrence of an event to display a bitmap index, a composite event occurrence of all event to configure the test through the point at which a trigger event occurs. Is proposed, If any event occurs to perform the operation. The proposed scheme perform operations when all event occurs without events having to perform each of the tests. As a result, avoid unnecessary operations and reducing the number of events to handle the increased efficiency of operations.
Journal of the Institute of Electronics Engineers of Korea SD
/
v.45
no.2
/
pp.21-27
/
2008
This paper describes a CMOS 16:1 binary-tree multiplexer(MUX) using $0.18-{\mu}m$ technology. To provide immunity for wide frequency range and process-and-temperature variations, the MUX adopts several delay compensation techniques. Simulation results show that the proposed MUX maintains the setup margins and hold margins close to the optimal value, i.e., 0.5UI, in wide frequency-range and in wide process-and-temperature variations, with standard deviation of 0.05UI approximately. These results represent that these proposed delay compensations are effective and the reliability is much improved although CMOS logic circuits are sensitive to those variations. The MUX is fabricated using $0.18-{\mu}m$ CMOS process, and tested with a test board. At power supply voltage of 1.8-V, maximum data-rate and area of the MUX is 1.65-Gb/s and 0.858 $mm^2$, respectively. The MUX dissipates a power of 24.12 mW, and output eye opening is 272.53 mV, 266.55 ps at 1.65-Gb/s operation.
The Journal of Korean Institute of Electromagnetic Engineering and Science
/
v.21
no.4
/
pp.408-416
/
2010
A study on the calibration of an X-band HPS(Hongik Polarimetric Scatterometer) system for ground-based operation is presented in this paper. In order to calibrate the scatterometer system, the degree of its distortions are analyzed by comparison between theoretical- and measured-values using the theoretically well-known calibration targets such as a metal sphere, a trihedral corner reflector(CR) and a metal cylinder. The calibration works in the field conditions depend on the precise and stable measurements of those calibration target. we present a measurement technique, so-called, an automatic 2-D target-scanning technique, using the incidence-angle(${\xi}-$ and ${\phi}-$ directions) control of HPS system. Then, we used STCT(Single-Target Calibration Technique) and GCT(General Calibration Technique) to calibrate a distortion of the scatterometer system, and measured the polarimetric RCS(Radar Cross Section) and phase-difference of a trihedral-CR as a test-target to verify the accuracy of the calibration technique. Then, three different types(i.e., 10, 20, 30 cm) of trihedral-CR were used. we obtained the error ranges about ${\pm}1.0$dB, ${\pm}0.5$ dB in a polarimetric RCS and about $-20^{\circ}{\sim}0^{\circ}$ and ${\pm}5^{\circ}$ in the co-polarized phase-difference by using the GCT and STCT, respectively.
The Journal of Korea Institute of Information, Electronics, and Communication Technology
/
v.11
no.4
/
pp.452-459
/
2018
Conventional fire fighting robots are controlled by a remote control to monitor the fire scene or to suppress the fire. However, this method has a problem that it takes a long time to prepare robot and input it to fire place in the golden time after the fire, so that it can not sufficiently serve as a fire fighting robot. Using the autonomous driving fire monitoring robot, when a fire signal is generated, in conjunction with a fire receiver a moving robot takes a video of the fire scene and delivers the image to the fire department, so that the fire fighter can decide if it is real fire or not. Thereby it is possible to prevent a sudden spread of an accident by providing a quick judgment opportunity and at the same time suppressing the fire early. In this paper, we propose an architecture of the autonomous mobile fire monitoring robot and the communication protocol required for the robot to work with the fire receiver. A communication protocol is designed to control multiple fire monitoring robots in real time, and a communication with a fire receiver is designed as a hierarchical network to serve as an interface of an Ethernet network using wireless Wi-Fi. The fire monitoring robot and the wireless communication of the fire receiving period are implemented and the effectiveness of the operation is confirmed through the field test.
For the purpose of next generation technology for robot perfomances, a RAoRA (Robot Actor on Robot Arm) structure was proposed using a robot arm joined with a humanoid robot actor. Mechanical analysis, machine design and fabrication were performed for motions combined with the robot arm and the humanoid robot actor. Kinematical analysis for 3D model, spline interpolation of positions, motion control algorithm and control devices were developed for movements of the robot actor. Preliminary visualization, simulation tools and integrated operation of consoles were constructed for the non-professionals to produce intuitive and safe contents. Air walk was applied to test the developed platform. The air walk is a natural walk close to a floor or slow ascension to the air. The RAoRA also executed a performance with 5 minute-running time. Finally, the proposed platform of robot performance presented intensive and live motions which was impossible in conventional robot performances.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.