http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
조은선,김민숙,박종일,이영학,Jo, Eunsun,Kim, Min Sook,Park, Jong Yil,Lee, Young Hak 한국전산구조공학회 2014 한국전산구조공학회논문집 Vol.27 No.2
This paper showed the behavior of the material four members under blast load, and are trying to demonstrate the effectiveness of the prestress. The prestressed concrete structures are on the rise, but there is little research in this regard explosion. Concrete panels, Reinforced concrete panels, the prestressed concrete panels, and the prestressed reinforced concrete panels was set variables. TNT 500 kg was an explosion in the distance 3m. Analysis, concrete and reinforced concrete members after an explosion occurred continuously deformed, but the including prestressed panel deformation occurs only at the beginning of the explosion were able to see the results. That is, the including prestressed member is prestressed against blast load cracking and destruction can be seen that control. 본 논문은 폭발하중을 받는 네 가지 부재의 거동을 해석하여 프리스트레스의 폭발에 대한 저항 효과를 검증하고자 하였다. 프리스트레스를 도입한 구조물 사용이 증가하고 있지만 그에 관한 방폭 연구는 미비한 실정이다. 콘크리트 패널, 철근 콘크리트 패널, 프리스트레스를 도입한 콘크리트 패널, 프리스트레스를 도입한 철근 콘크리트 패널을 변수로 TNT 500Kg을 이격거리 3m 위치에서 폭파시키는 시나리오를 가정하였다. 해석결과, 콘크리트와 철근 콘크리트 부재는 폭발이 발생한 후 지속적으로 변형이 발생하지만 프리스트레스를 도입한 패널은 폭발 시 초기에만 변형이 발생하는 결과를 볼 수 있었다. 이는 프리스트레스를 도입한 부재가 폭발하중에 대해 균열과 파괴를 제어한다는 것을 알 수 있다.
카지노 딜러 직무교육의 교육훈련 전이 핵심성공요인: 성공사례기법의 적용
조은선,박윤희,이재은 (사)한국관광레저학회 2019 관광레저연구 Vol.31 No.12
The purpose of this study was to identify factors affecting transfer of training in Korean casino dealers’ job training programs using Success Case Method (SCM). To address the research purpose, we selected outstanding trainees who showed high level of training transfer by comparing results of personnel evaluations before and after completing job training programs. Then we analyzed and derived the success factors from the successful training transfer cases based on the in-depth interviews and open-ended surveys. The research findings show that main facilitating factors of training transfer are learner characteristics, program design, and work environment. More specifically, learner characteristics include customer-oriented mindset, motivation to transfer, and recognition of importance about program contents. Program design factor involves program contents relevance, program contents transferable to work, and program contents about company policy. Finally work environment factors are sharing the learning contents with colleagues, opportunity to apply new learning, and positive feedback. Based on the results of the study, several implications are suggested for job training programs of casino dealers
Korean Cinema Bids Farewell to Its Allegorical Legacy: Reading Old Boy on the Global Scene
조은선 문학과영상학회 2009 문학과영상 Vol.10 No.2
An allegorical rewriting of an existing text creates a temporal and interpretative palimpsest that bridges the past and the present. Until recently Korean cinema has served to redeem the repressed experiences of the country’s historical traumas through allegorical representations of collective, traumatic experiences. The mode of allegory has been one of the primary vehicles mobilized for both the making and reading of Korean cinema. Yet around the start of its renaissance in the late 90s and early 2000s, yet, diverse and radical shifts have occurred in Korean cinema, one of which was a break with the heritage of the allegorical mode. Old Boy, a paradigmatic example that embodies this break employs counter—and pseudo—allegorical gestures, and turns politically loaded cinematic motifs into signs that are intelligible without an understanding of their historical and cultural contexts, as well into a form of cinematic entertainment enjoyed by audiences worldwide. Signaling the film’s departure from the legacy of Korean cinema, the change achieves a culture crossing vis-à-vis the translation of Korean cinema into a language that appeals to global audiences.
조은선,한상환 한국강구조학회 2022 International Journal of Steel Structures Vol.22 No.6
Welded unreinforced fl ange-welded web (WUF-W) connections are one of prequalifi ed connections specifi ed in AISC 358-16 (2016) for special and intermediate moment frames. The cyclic behavior of the WUF-W connections varies according to many diff erent parameters such as panel zone strength ratio, beam span-to depth ratio, access hole geometry, and beam-column strength ratio. The cyclic behavior of the connections has been often investigated using experimental tests. The cyclic behavior of the connections has been often investigated using experimental tests. However, it is diffi cult to conduct tests considering all combinations of individual design and detail parameters because of excessive cost and time. The objective of this study was to construct the FE model with an accurate material model for predicting the cyclic behavior of WUF-W connections. The material model was constructed with a combination of one isotropic and three kinematic hardening models based on combined hardening model. The particle swarm optimization was used to precisely determine the constituent parameter values of the material model for steel materials. The cyclic behavior of WUF-W connections was accurately simulated using the proposed FE model. Strain distribution and local fl ange bucking shape were also precisely predicted using the model.
조은선,예홍진,오세창,홍선호,홍만표 한국정보과학회 2002 정보과학회논문지 : 시스템 및 이론 Vol.29 No.4
Trojan-horse programs are the programs that disguise normal and useful programs but do malicious thing to the hosts. This paper proposes an anti-Trojan horse mechanism using the information attached to the code by the developers. In this mechanism, each code is accompanied with the information on their possible accesses to resources, and based on this information users determine whether the code is malicious or not. Even in the case a code is accepted by users due to its non-malicious appearance, its runtime behaviors are monitored and halted whenever any attempts to malicious operations are detected. By hiring such runtime monitoring system, this mechanism enables detecting unknown Trojan horses and reduces the decision-making overhead being compared to the previous monitoring-based approaches. We describe the mechanism in a formal way to show the advantages and the limitations of the security this mechanism provides. '트로이 목마 프로그램 (Trojan-horse program)' 이란 겉으로는 유용한 일을 하는 것처럼 보이지만 사용자 모르게 악성 행위를 하는 프로그램을 의미한다. 본 논문에서는 개발자의 첨부 자료에 의거하여 트로이 목마 프로그램을 감지할 수 있는 방법을 제안한다. 이 방법에서 코드는 개발자에 의해 자원 접근 정보를 가지는 첨부자료와 함께 배포되며 사용자는 첨부 자료를 통해 코드의 악성 여부를 1차 판단한다. 이 때 정상 코드로 판명되어 수행이 허가된 코드는 수행 중에 감시 시스템에 의해 자신의 첨부자료에 위배되지 않는 다는 것을 2차로 감시 받게 된다. 이로써 알려지지 않는다는 트로이 목마 프로그램의 감지가 가능함과 동시에 기존 감시 시스템 기법들에 비해 사용자 측의 정책 설정 및 판단 부담을 줄여주는 특징을 가진다. 본 논문에서는 제안된 방식을 형식 언어로 기술하고 그 안전성도 함께 보인다.