8 research outputs found

    A Study on the Changes in Unit Planning of Korean High-rise Residential Buildings

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ฑด์ถ•ํ•™๊ณผ, 2014. 2. ์ตœ์žฌํ•„.์šฐ๋ฆฌ๋‚˜๋ผ๋Š” 1963๋…„ ๋งˆํฌ์•„ํŒŒํŠธ๋ฅผ ์‹œ์ž‘์œผ๋กœ ์•„ํŒŒํŠธ๋ผ๋Š” ์ฃผ๊ฑฐ์–‘์‹์ด ์ฒ˜์Œ ๋„์ž…๋˜์—ˆ๋‹ค. ์ดํ›„ 40๋…„์ด ์ง€๋‚œ 2002๋…„ ํƒ€์›ŒํŒฐ๋ฆฌ์Šค๋ผ๋Š” 50์ธต์ด ๋„˜๋Š” ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์ด ๋“ฑ์žฅํ•˜๊ฒŒ ๋˜์—ˆ์œผ๋ฉฐ 2011๋…„ ๋ถ€์‚ฐ์— 80์ธต, 300๋ฏธํ„ฐ์˜ ์‚ฌ๋ก€๊นŒ์ง€ ๋“ฑ์žฅํ•˜๊ฒŒ ๋˜์—ˆ๋‹ค. ์ด์ฒ˜๋Ÿผ ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ์ฃผ๊ฑฐ๊ฑด์ถ•์€ ์ ์  ๊ณ ์ธตํ™”๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ฃผ๊ฑฐ์˜ ๊ณ ์ธตํ™” ํ˜„์ƒ์€ ์šฐ๋ฆฌ๋‚˜๋ผ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ „ ์„ธ๊ณ„์  ์ถ”์„ธ์ธ๋ฐ ๊ทธ ์›์ธ์€ ๊ฑด์ถ•๊ธฐ์ˆ ์˜ ๋ฐœ์ „๊ณผ ์ธ๊ตฌ์˜ ๋„์‹œํ™”, ์ฃผ๊ฑฐ์˜ ๊ณ ๊ธ‰ํ™”์— ์˜ํ•œ ํ˜„์ƒ์œผ๋กœ ์ดํ•ดํ•  ์ˆ˜ ์žˆ๋‹ค. ์ „ ์„ธ๊ณ„์ ์œผ๋กœ 2000๋…„๋Œ€ ์ด์ „์—๋Š” ๋ฏธ๊ตญ์˜ ๋‰ด์š•๊ณผ ์‹œ์นด๊ณ , ํ™์ฝฉ์„ ์ค‘์‹ฌ์œผ๋กœ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์ด ๋‚˜ํƒ€๋‚ฌ๋‹ค๋ฉด 2000๋…„๋Œ€ ์ดํ›„์—๋Š” ํ•œ๊ตญ๊ณผ ์ค‘๊ตญ, ์ค‘๋™์ง€์—ญ, ํŒŒ๋‚˜๋งˆ ๊ฐ™์ด ๊ธ‰๊ฒฉํ•œ ๋„์‹œํ™”์™€ ๊ฒฝ์ œ์  ๋ถ€๊ฐ€ ์ง‘์ค‘๋˜๋Š” ์ง€์—ญ์„ ์ค‘์‹ฌ์œผ๋กœ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ๊ฑด์„ค๊ณผ ๋“ฑ์žฅ์ด ๋‚˜ํƒ€๋‚˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ์ด๋Ÿฌํ•œ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์€ ์ฃผ๊ฑฐ๋ฌธํ™”์˜ ํŠธ๋ Œ๋“œ๋กœ ์ž๋ฆฌ์žก์•„๊ฐ€๊ณ  ์žˆ์œผ๋ฉฐ, ํ˜ธํ…”์‹ ๊ณ ๊ธ‰์ฃผ๊ฑฐ์™€ ๋น„์ฆˆ๋‹ˆ์Šค ๊ณต๊ฐ„๊ณผ ๋ฌธํ™”์‹œ์„ค์ด ๊ฒฐํ•ฉ๋œ ๋„์‹œ์•ˆ์˜ ์ž‘์€๋„์‹œ๋ฅผ ์ง€ํ–ฅํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ๊ณ ์ธตํ™”๋˜๋Š” ๊ณผ์ •์—์„œ ๊ตฌ์กฐ์  ํ•œ๊ณ„๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ํŒ์ƒํ˜•๋ณด๋‹ค ํƒ‘์ƒํ˜•์˜ ์ฃผ๋™ํ˜•ํƒœ๋ฅผ ๋‚˜ํƒ€๋‚ด๊ณ , ์ด ๋•Œ๋ฌธ์— ๊ธฐ์กด ๊ตญ๋‚ด ์•„ํŒŒํŠธ ๊ณ„ํš์—์„œ ๋‚˜ํƒ€๋‚˜๋˜ ๊ฒƒ๊ณผ๋Š” ๋‹ค๋ฅธ ํ‰๋ฉด๊ตฌ์„ฑ์›๋ฆฌ๋ฅผ ๊ฐ€์ง€๊ฒŒ ๋œ๋‹ค. ํŠนํžˆ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์€ ๋ฏธ๊ตญ์—์„œ ์•ฝ 1์„ธ๊ธฐ์— ๊ฑธ์ณ ๋ฐœ์ „, ์ •์ฐฉ๋œ ์ฃผ๊ฑฐ๊ฑด์ถ•์œ ํ˜•์ด ์šฐ๋ฆฌ๋‚˜๋ผ์— ์ƒˆ๋กญ๊ฒŒ ๋„์ž…๋˜์—ˆ๋‹ค๊ณ  ์ดํ•ด ํ•  ์ˆ˜๋„ ์žˆ๋‹ค. ๋•Œ๋ฌธ์— ์šฐ๋ฆฌ๋‚˜๋ผ์— ์ƒˆ๋กœ์šด ์ฃผ๊ฑฐ๊ฑด์ถ•ํ˜•์‹์ด ๋“ฑ์žฅํ•˜์˜€์„ ๋•Œ ์ดํ›„ ๊ทธ๊ฒƒ์ด ๋‚˜ํƒ€๋‚ด๋Š” ๋ณ€ํ™”, ๋ฐœ์ „๊ณผ์ •์€ ๋งค์šฐ ํฅ๋ฏธ๋กœ์šด ์ฃผ์ œ์ด๋‹ค. ์ด๋Ÿฐ ์ด์œ ๋กœ ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์šฐ๋ฆฌ๋‚˜๋ผ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์ด ๋“ฑ์žฅํ•œ ์ดํ›„ ์ฃผ๊ฑฐํ‰๋ฉด์ด ์–ด๋– ํ•œ ๋ชจ์Šต์œผ๋กœ ๋ณ€ํ™”, ๋ฐœ์ „ํ•ด ๋‚˜๊ฐ”๋Š”์ง€๋ฅผ ๊ณต๊ฐ„๊ตฌ๋ฌธ๋ก (Space Syntax)์„ ํ†ตํ•ด ์ •๋Ÿ‰์  ๋ถ„์„๋ฐฉ๋ฒ•๋ก ์œผ๋กœ ๋ฏธ๊ตญ์˜ ์‚ฌ๋ก€์™€ ๋น„๊ตํ•˜์—ฌ ์‚ดํŽด๋ณด๊ณ  ๊ทธ ๋ฐฐ๊ฒฝ์„ ๋ฐํ˜€๋‚ด์—ˆ๋‹ค. ๊ณต๊ฐ„๊ตฌ๋ฌธ๋ก ์„ ํ†ตํ•œ ๋ถ„์„์— ์•ž์„œ ํ•œ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์„ 2007๋…„์„ ๊ธฐ์ค€์œผ๋กœ ๋„์ž…๊ธฐ์™€ ํ™•์‚ฐ๊ธฐ๋กœ ๊ตฌ๋ถ„ํ•˜์˜€๋‹ค. ๊ทธ ์ด์œ ๋กœ๋Š” 2007๋…„์„ ์ „ํ›„๋กœ ์„œ์šธ์„ ์ค‘์‹ฌ์œผ๋กœ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ๊ฑด์„ค์ด ๋ณธ๊ฒฉํ™” ๋˜์—ˆ์œผ๋ฉฐ 2007๋…„์„ ์ „ํ›„๋กœ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ํ‰๋ฉด๊ตฌ์„ฑ ์–‘์ƒ์ด ๋ˆˆ์— ๋Œ ์ •๋„๋กœ ์ƒ์ดํ•˜์—ฌ ๋‘ ์‹œ๊ธฐ์˜ ํ‰๋ฉด๊ตฌ์„ฑ ์›๋ฆฌ ์ž์ฒด๊ฐ€ ๋‹ค๋ฅผ ๊ฒƒ์ด๋ผ ๊ฐ€์ •ํ–ˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ์ฃผ๊ฑฐํ‰๋ฉด์˜ ๊ณต๊ฐ„๋ถ„์„์„ ์ง„ํ–‰ํ•˜๊ธฐ ์œ„ํ•ด ์„ค์ •ํ•œ ๊ธฐ์ค€์— ๋ถ€ํ•ฉํ•˜๋Š” ํ•œ๊ตญ๊ณผ ๋ฏธ๊ตญ ๊ฐ๊ฐ 17๊ฐœ์˜ ์‚ฌ๋ก€๋ฅผ ์„ ์ •ํ•˜์˜€์œผ๋ฉฐ, ์ฃผ๊ฑฐํ‰๋ฉด์„ ๊ฑฐ์‹ค๊ณผ ๋ถ€์—Œ/์‹๋‹น, ๋ถ€๋ถ€์นจ์‹ค, ์นจ์‹ค, ๋ถ€๋ถ€์š•์‹ค, ์š•์‹ค, ๋ณต๋„, ํ˜„๊ด€์œผ๋กœ ๊ตฌ์„ฑํ•˜์˜€๋‹ค. ์ด์™ธ์— ๋ฐœ์ฝ”๋‹ˆ๋‚˜ ์ฐฝ๊ณ  ๊ฐ™์€ ๋ถ€์†๊ณต๊ฐ„์€ ๋ถ„์„๋ฒ”์œ„์—์„œ ์ œ์™ธํ•˜์˜€๋‹ค. ์ด๋ ‡๊ฒŒ ์„ค์ •๋œ ๊ณต๊ฐ„๋“ค์„ ๊ณต๊ฐ„๊ตฌ๋ฌธ๋ก ์„ ํ†ตํ•ด ์‹ค๋ณ„ ํ†ตํ•ฉ๋„๋ฅผ ์‚ฐ์ถœํ•˜์˜€๋‹ค. ๊ทธ๋ฆฌ๊ณ  ํ†ตํ•ฉ๋„๋ฅผ T-test, ANOVA, ๋˜์ปจ์˜ ์‚ฌํ›„๊ฒ€์ • ๊ณผ์ •์„ ํ†ตํ•ด ๊ทธ ์œ ์˜์„ฑ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค. ๋ถ„์„ ๊ฒฐ๊ณผ 2000๋…„๋Œ€ ์ดํ›„ ํ•œ๊ตญ๊ณผ ๋ฏธ๊ตญ์— ๊ฑด์„ค๋œ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ๋‹จ์œ„์„ธ๋Œ€ ํ‰๋ฉด์˜ ๊ฒฝ์šฐ, ์ฃผ๊ฑฐํ‰๋ฉด์˜ ๊ตฌ์„ฑ์ด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ๋„์ž…๊ธฐ์— ํ•ด๋‹นํ•˜๋Š” 2002-2006๋…„ ์‚ฌ์ด์—๋Š” ๊ธฐ์กด์˜ ํŒ์ƒํ˜• ์•„ํŒŒํŠธ์— ๋‚˜ํƒ€๋‚˜๋˜ ๊ณต๊ฐ„๊ตฌ์„ฑ๊ณผ ์œ ์‚ฌํ•˜๋˜ ๊ฒƒ์ด 2008๋…„ ์ดํ›„์—๋Š” ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ์›ํ˜•์ด๋ผ ํ•  ์ˆ˜ ์žˆ๋Š” ๋ฏธ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ๊ทธ๊ฒƒ๊ณผ ์œ ์‚ฌํ•ด์ง€๋Š” ๊ฒƒ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๊ฒฝํ–ฅ์€ ๊ฑฐ์‹ค์—์„œ ๊ทน๋ช…ํ•˜๊ฒŒ ๋‚˜ํƒ€๋‚ฌ์œผ๋ฉฐ, ๊ฑฐ์‹ค๊ณผ ์ธ์ ‘ํ•œ ์‹ค๋“ค์— ์˜ํ–ฅ์„ ๋ผ์น˜๋Š” ๊ฒƒ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ณ€ํ™”๋Š” ๊ตฌ์กฐ์  ํ•ฉ๋ฆฌ์„ฑ๊ณผ ํ™˜๊ฒฝ์ ์š”์ธ, ์กฐ๋ง ์„ ํ˜ธ๋„ ์ฆ๊ฐ€์— ์›์ธ์ด ์žˆ์Œ์„ ์ฐพ์•„ ๋‚ผ ์ˆ˜ ์žˆ์—ˆ์œผ๋ฉฐ, ๋” ๋‚˜์•„๊ฐ€ ์ถ”ํ›„ ํ•œ๊ตญ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ํ‰๋ฉด ๋ณ€ํ™”๋ฅผ ์˜ˆ์ธกํ•˜๊ธฐ ์œ„ํ•ด ํŒ์ƒํ˜• ์•„ํŒŒํŠธ์˜ 50๋…„๊ฐ„์˜ ๋ณ€ํ™”๊ณผ์ •์„ ์‚ดํŽด๋ณด์•˜๋‹ค. ๊ทธ๋ฆฌ๊ณ  ์ด ๊ณผ์ •์—์„œ 1970๋…„๋Œ€ ๋“ฑ์žฅํ•˜์—ฌ 10๋…„ ์‚ฌ์ด์— ์†Œ๋ฉธํ•œ ๋ณต๋„์ค‘์‹ฌํ˜• ํ‰๋ฉด์˜ ์กด์žฌ๋ฅผ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ด ํ‰๋ฉด์€ 1970๋…„ ๋‹น์‹œ ํ•ฉ๋ฆฌ์ ์ธ ํ‰๋ฉด์˜ ๋„์ž…์ด๋ผ๋Š” ๋ช…๋ถ„์•„๋ž˜ ํ˜„๋Œ€ํ™”, ์„œ๊ตฌํ™”๋ฅผ ์ถ”๊ตฌํ•˜์˜€์ง€๋งŒ ํ•œ๊ตญ์ธ์˜ ์ฃผ๊ฑฐํ–‰ํƒœ์™€ ๋ถ€ํ•ฉ๋˜์ง€ ๋ชปํ•˜์˜€์œผ๋ฉฐ ๊ณต๊ฐ„์˜ ๊ฒฝ์ œ์  ์ฐจ์›์—์„œ ๋ถˆ๋ฆฌํ•˜์—ฌ ๊ฒฐ๊ตญ ์†Œ๋ฉธํ•˜์˜€๋‹ค. ํŒ์ƒํ˜• ์•„ํŒŒํŠธ์—์„œ ๋ณต๋„ ์ค‘์‹ฌํ˜• ํ‰๋ฉด์˜ ๋“ฑ์žฅ๊ณผ ์†Œ๋ฉธ๊ณผ์ •์„ ๋ณด๋ฉด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ํ‰๋ฉด๋ณ€ํ™”์™€ ๋งŽ์€ ์œ ์‚ฌ์ ์„ ๋ฐœ๊ฒฌ ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ํ‰๋ฉด์€ ๋„์ž… ์ดˆ๊ธฐ ๊ธฐ์กด ํŒ์ƒํ˜• ์•„ํŒŒํŠธ์— ๊ณ ์ฐฉํ™”๋œ ํ‰๋ฉด์„ ๊ทธ๋Œ€๋กœ ๋„์ž…ํ•˜์˜€๋‹ค. ๋„์ž…๋œ ํ‰๋ฉด ์ž์ฒด๋Š” ๊ธฐ์กด ํŒ์ƒํ˜• ์•„ํŒŒํŠธ์—์„œ ๊ฒ€์ฆ๋œ ๋งŒํผ ์šฐ๋ฆฌ๋‚˜๋ผ ํ–‰ํƒœ์™€ ๊ณต๊ฐ„์˜ ๊ฒฝ์ œ์ ์กฐ๊ฑด๋„ ๋งค์šฐ ๋งŒ์กฑ์Šค๋Ÿฌ์› ๋‹ค. ํ•˜์ง€๋งŒ ํ‰๋ฉด๊ณผ ๋นŒ๋”ฉ ์‹œ์Šคํ…œ๊ณผ์˜ ๊ดด๋ฆฌ ๊ทธ๋ฆฌ๊ณ  ๊ณ ์ธตํ™”๋กœ ์ธํ•œ ๊ตฌ์กฐ์  ํ•ฉ๋ฆฌ์„ฑ์— ์˜ํ•ด ํ‰๋ฉด์ด ๋ฏธ๊ตญ์˜ ์‚ฌ๋ก€์™€ ๋น„์Šทํ•˜๊ฒŒ ๋ณ€ํ™”ํ–ˆ๋‹ค. 1970๋…„ ๋ณต๋„์ค‘์‹ฌํ˜• ์•„ํŒŒํŠธ ํ‰๋ฉด์˜ ์†Œ๋ฉธ๊ณผ์ •์—์„œ ๋ดค๋“ฏ ์ฃผ๊ฑฐ์—์„œ ๋ฌธํ™”์  ์š”์ธ์˜ ๊ฐ„๊ณผ๋Š” ์†Œ๋ฉธ๋กœ ์ด์–ด์ง€๋ฉฐ ํ•œ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐํ‰๋ฉด์˜ ๋ณ€์ฒœ์€ ์ด์™€ ๋งค์šฐ ์œ ์‚ฌํ•œ ๊ฒƒ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๊ฒฐ๋ก ์ ์œผ๋กœ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ํ‰๋ฉด๋ณ€ํ™”๋Š” ์ˆ˜์‹ญ๋…„์˜ ์‹œ๊ฐ„๋™์•ˆ ๋ณ€ํ™”๋ฅผ ํ†ตํ•ด ์ •์ฐฉํ•ด์˜จ ํŒ์ƒํ˜• ์•„ํŒŒํŠธํ‰๋ฉด์˜ ๋ณ€ํ™”์–‘์ƒ์„ ์—ญํ–‰ํ•˜๊ณ  ์žˆ๋‹ค. ํŒ์ƒํ˜• ์•„ํŒŒํŠธํ‰๋ฉด์˜ ๋ณ€ํ™”๊ณผ์ •์„ ๋˜์งš์–ด ๋ณธ๋‹ค๋ฉด, ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ๋ณ€ํ™”๋œ ํ‰๋ฉด์ด ํ•œ๊ตญ์—์„œ ๊ฑฐ์ฃผ์ž์˜ ์ข‹์€ ํ‰๊ฐ€์™€ ๊ฑฐ์ฃผ์ƒํ™œ์„ ์ ํ•ฉํ•˜๊ฒŒ ๋‹ด์„ ์ˆ˜ ์žˆ๋„๋ก ์ž˜ ์ž‘๋™ํ• ์ง€ ์˜๋ฌธ์ด๋‹ค. ๋•Œ๋ฌธ์— ์ฃผ๋™์˜ ๋ณ€ํ™”๋ฅผ ์ˆ˜๋ฐ˜ํ•œ ๋‹ค๋ฅธ ํ˜•ํƒœ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ํ‰๋ฉด๊ฐœ๋ฐœ์„ ์œ„ํ•œ ์ƒˆ๋กœ์šด ๋…ธ๋ ฅ์ด ํ•„์š”ํ•˜๋‹ค.์ œ 1 ์žฅ ์„œ ๋ก  1 1.1. ์—ฐ๊ตฌ์˜ ๋ฐฐ๊ฒฝ ๋ฐ ๋ชฉ์  2 1.2. ์—ฐ๊ตฌ์˜ ๋ฒ”์œ„ 4 1.3. ์—ฐ๊ตฌ์˜ ๋ฐฉ๋ฒ• 5 1.3.1. ๊ณต๊ฐ„๊ตฌ๋ฌธ๋ก ์˜ ์ด๋ก ์  ๊ณ ์ฐฐ 5 1.4. ์—ฐ๊ตฌํ๋ฆ„๋„ 9 ์ œ 2 ์žฅ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ์ด๋ก ์  ๊ณ ์ฐฐ 11 2.1. ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ์ •์˜ 12 2.2. ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ์—ญ์‚ฌ 13 2.2.1. ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ์—ญ์‚ฌ ๋ฐ ์„ธ๊ณ„์  ์ถ”์„ธ 13 2.2.2. ๋ฏธ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• 17 2.2.3. ํ•œ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• 19 2.3. ์„ ํ–‰์—ฐ๊ตฌ ๊ณ ์ฐฐ 24 2.3.1. ์—ฐ๊ตฌ๋™ํ–ฅ 24 2.3.2. ์„ ํ–‰์—ฐ๊ตฌ ๊ณ ์ฐฐ 25 ์ œ 3 ์žฅ ํ•œ๊ตญ๊ณผ ๋ฏธ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ๋น„๊ต๋ถ„์„ 27 3.1. ๋น„๊ต๋ถ„์„ ๋Œ€์ƒ ์„ ์ • 28 3.1.1. ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ์‚ฌ๋ก€ ์„ ์ • ๊ธฐ์ค€ 28 3.1.2. ๋ฏธ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ์‚ฌ๋ก€ ์„ ์ • 31 3.1.3. ํ•œ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ์‚ฌ๋ก€ ์„ ์ • 35 3.2. ๋‹จ์œ„์„ธ๋Œ€ ๋‚ด ๋ถ„์„์˜ ๋ฒ”์œ„ 39 3.3. ํ•œ๊ตญ๊ณผ ๋ฏธ๊ตญ์˜ ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ๋น„๊ต๋ถ„์„ 40 3.3.1. ๊ณต๊ฐ„๊ตฌ๋ฌธ๋ก (Space Syntax) ๋ถ„์„๊ฒฐ๊ณผ 40 3.3.2. ํ†ต๊ณ„์  ๋ฐฉ๋ฒ•์— ์˜ํ•œ ๋ณ€์ฒœ ํŒจํ„ด ๋ถ„์„ 41 ์ œ 4 ์žฅ ๊ตญ๋‚ด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ ํ‰๋ฉด๊ตฌ์„ฑ์˜ ๋ณ€์ฒœ 49 4.1. ๊ธฐ์กด์˜ ๊ณ ์ฐฉํ™”๋œ ์•„ํŒŒํŠธ ํ‰๋ฉด๊ตฌ์„ฑ ์›๋ฆฌ 50 4.2. ๊ตญ๋‚ด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ํ‰๋ฉด๊ตฌ์„ฑ์˜ ๋ณ€์ฒœ 52 4.2.1. ๊ฑฐ์‹ค ๋ฐ ๋ณต๋„์˜ ๊ตฌ์„ฑ ์›๋ฆฌ 52 4.2.2. ํ˜„๊ด€์˜ ์œ„์น˜์— ๋”ฐ๋ฅธ ์™ธ๋ถ€๊ณต๊ฐ„๊ณผ์˜ ์—ฐ๊ฒฐ์„ฑ ์ฆ๋Œ€ 55 4.2.3. ๋ถ€๋ถ€์นจ์‹ค๊ณผ ๊ฑฐ์‹ค์˜ ์—ฐ๊ฒฐ์„ฑ ์ฆ๋Œ€ 56 4.3. ์†Œ๊ฒฐ 57 ์ œ 5 ์žฅ ๊ตญ๋‚ด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ ํ‰๋ฉด์˜ ๋ณ€์ฒœ์š”์ธ ๋ถ„์„ ๋ฐ ์ถ”ํ›„์ „๋ง 61 5.1. ๊ตญ๋‚ด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ํ‰๋ฉด์˜ ๋ณ€์ฒœ์š”์ธ ๋ถ„์„ 62 5.1.1. ๊ตฌ์กฐ์  ํ•ฉ๋ฆฌ์„ฑ์— ์˜ํ•œ ๋ณ€์ฒœ 65 5.1.2. ํ™˜๊ฒฝ์  ์š”์ธ(์„ค๋น„์  ํ•œ๊ณ„)์— ์˜ํ•œ ๋ณ€์ฒœ 68 5.1.3. ์กฐ๋ง ์„ ํ˜ธ๋„ ์ฆ๊ฐ€๋กœ ์ธํ•œ ๋ณ€์ฒœ 70 5.2. ๊ตญ๋‚ด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ• ํ‰๋ฉด์˜ ์ถ”ํ›„ ์ „๋ง 72 5.2.1. ๊ณผ๊ฑฐ ํŒ์ƒํ˜• ์•„ํŒŒํŠธ ํ‰๋ฉด๋ณ€ํ™” ์ถ”์ด ๊ณ ์ฐฐ 73 5.2.2. ๊ตญ๋‚ด ์ดˆ๊ณ ์ธต ์ฃผ๊ฑฐ๊ฑด์ถ•์˜ ํ‰๋ฉด๋ณ€ํ™” ์ œ์•ˆ 76 ์ œ 6 ์žฅ ๊ฒฐ๋ก  81 6.1. ์—ฐ๊ตฌ์˜ ์ข…ํ•ฉ 82 6.2. ์—ฐ๊ตฌ์˜ ์˜์˜ ๋ฐ ํ•œ๊ณ„ 86Maste

    ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค์— ๋Œ€ํ•œ ์™ธ๋ถ€์นจ์ž…์„ ๋Œ€์ƒ์œผ๋กœ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ๊ฑด์ถ•ํ•™๊ณผ, 2022. 8. ์ตœ์žฌํ•„.๋ณธ ๋…ผ๋ฌธ์€ ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค ์ค‘ ๊ฑด์ถ•์‹œ์„ค์— ๋Œ€ํ•œ ์™ธ๋ถ€์นจ์ž…์„ ๋Œ€์ƒ์œผ๋กœ ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ๋ฅผ ํ™œ์šฉํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์ฒด๊ณ„ ํ‰๊ฐ€, ๊ฐ•ํ™”์— ๋Œ€ํ•œ ์—ฐ๊ตฌ์ด๋‹ค. ๋‹ค์ธต์˜ ๋ณต์žกํ•œ ์‹ค๋‚ด๋กœ ๊ตฌ์„ฑ๋œ ๊ณต๊ฐ„ ํŠน์„ฑ๊ณผ ๋‚ด๋ถ€์‚ฌ์šฉ์ž๊ฐ€ ๋งŽ์€ ์‚ฌ์šฉ ํŠน์„ฑ์„ ๊ณ ๋ คํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๋Š”๋ฐ ๋ชฉ์ ์ด ์žˆ๋‹ค. ์„ ํ–‰์—ฐ๊ตฌ ๋ถ„์„์„ ํ†ตํ•ด ๊ธฐ์กด์˜ ๋ฐฉ๋ฒ•๋“ค์€ ์‹œ์„ค์„ ๋‹ค์ด์–ด๊ทธ๋žจ์ด๋‚˜ ๊ทธ๋ฆฌ๋“œ๋กœ ๋‹จ์ˆœํ™” ํ•˜์—ฌ ์‹œ์„ค์— ๋Œ€ํ•œ ์™ธ๋ถ€์นจ์ž…์„ ์ •ํ™•ํ•˜๊ฒŒ ๋ถ„์„ํ•˜๊ธฐ์— ํ•œ๊ณ„๊ฐ€ ์žˆ์Œ์„ ํ™•์ธํ•˜์˜€๋‹ค. ์ด๋Ÿฐ ๋ฐฉ๋ฒ•์€ ๋ณต์žกํ•œ ๊ณต๊ฐ„์„ ์ •ํ™•ํžˆ ์žฌํ˜„ํ•˜์ง€ ๋ชปํ•˜๊ณ , ๋ช‡ ๊ฐ€์ง€ ์นจ์ž…๊ฒฝ๋กœ๋งŒ์„ ๊ฐ€์ •ํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์˜ˆ์ƒํ•˜์ง€ ๋ชปํ•œ ์นจ์ž…๊ฒฝ๋กœ๋ฅผ ๋ถ„์„์—์„œ ๋ˆ„๋ฝํ•  ๊ฐ€๋Šฅ์„ฑ ์žˆ๋‹ค. ๋˜ํ•œ ๋‚ด๋ถ€์‚ฌ์šฉ์ž๋ฅผ ๊ณ ๋ คํ•œ ๊ฐ•ํ™” ์ง€์ ์„ ์ œ์•ˆํ•˜์ง€ ๋ชปํ•˜์˜€๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ๋Š” ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์‹œ์„ค์˜ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ๋ฅผ ์ •ํ™•ํ•˜๊ฒŒ ํ‰๊ฐ€ํ•˜๊ณ  ๋‚ด๋ถ€์‚ฌ์šฉ์ž์˜ ์ด๋™ํŽธ์˜์„ฑ์„ ์ตœ๋Œ€ํ•œ ์ €ํ•ดํ•˜์ง€ ์•Š๋Š” ๊ฐ•ํ™” ์ง€์ ์„ ๋„์ถœ ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜์˜€๋‹ค. 3์žฅ์—์„œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ๋ฅผ ์ •๋Ÿ‰์ ์œผ๋กœ ํ‰๊ฐ€ํ•˜๋Š” EASI(Estimate of Adversary Sequence Interruption) ๋ชจ๋ธ์„ ํ™œ์šฉํ•˜์—ฌ ๊ฑด์ถ•๊ณ„ํš ์ธก๋ฉด์—์„œ ์‹œ์„ค์˜ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ๋ฐฉ๋ฒ•(๋ฐฉํ˜ธ์„ฑ๋Šฅ ํ–ฅ์ƒ, ๋ฐฉํ˜ธ์ง€์  ์ถ”๊ฐ€)์„ ์ œ์•ˆํ•˜์˜€๋‹ค. ์ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ๋Š” ๋ฐฉํ˜ธ์„ฑ๋Šฅ ํ–ฅ์ƒ๊ณผ ๋ฐฉํ˜ธ์ง€์  ์ถ”๊ฐ€๋ฅผ ๊ณ ๋ คํ•  ์ˆ˜ ์žˆ๋Š” ๋…ธ๋“œ๊ฐ€ ํ•„์š”ํ•˜์˜€๋‹ค. ๋”ฐ๋ผ์„œ ๋ฌธ(door)๋…ธ๋“œ์™€ ์‹ค(room)๋…ธ๋“œ๋กœ ๋…ธ๋“œ๋ฅผ ๊ตฌ์„ฑํ•˜๊ณ , ์นจ์ž…์ž์˜ ์ด๋™์„ ๊ฐ€์žฅ ์ž˜ ์žฌํ˜„ํ•  ์ˆ˜ ์žˆ๋Š” Medial axis ๋ฐฉ๋ฒ•์„ ์‚ฌ์šฉํ•˜์—ฌ ์—ฃ์ง€๋ฅผ ๊ตฌ์„ฑํ•˜์˜€๋‹ค. ์ด๋ ‡๊ฒŒ ๊ตฌํ˜„๋œ ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์นจ์ž…์ž๊ฐ€ ๋ชฉํ‘œ๊ตฌ์—ญ์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š” ๋ชจ๋“  ๊ฐ€๋Šฅ ๊ฒฝ๋กœ๋ฅผ ํƒ์ƒ‰ํ•˜์—ฌ EASI ๋ชจ๋ธ์„ ํ™œ์šฉํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋„์ถœ ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜์˜€๋‹ค. ์ดํ›„ ์ด๋™ํŽธ์˜์„ฑ์„ ๊ณ ๋ คํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜์˜€๋‹ค. ์ด๋™ํŽธ์˜์„ฑ์€ ๋‚ด๋ถ€์‚ฌ์šฉ์ž์˜ ์—…๋ฌด์ƒ์‚ฐ์„ฑ, ๋น„์ƒ์‹œ ํ†ตํ–‰, ์žฅ์• ์ธ ํ†ตํ–‰ ๋“ฑ์— ์ค‘์š”ํ•œ ์š”์ธ์ด๋‹ค. ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค์ธ ์›์ž๋ ฅ๋ฐœ์ „์†Œ ์šด์ „์›์œผ๋กœ ๋Œ€์ƒ์œผ๋กœ ํ•œ ์„ค๋ฌธ์—์„œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™”๋Š” ์ด๋™ํŽธ์˜์„ฑ ์ €ํ•˜์— ์˜ํ–ฅ์„ ๋ผ์น˜๋ฉฐ, ์ด๋™ํŽธ์˜์„ฑ์„ ์ €ํ•ดํ•˜์ง€ ์•Š๋Š” ์ง€์ ์˜ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™”๋ฅผ ๊ณ ๋ คํ•ด์•ผ ํ•œ๋‹ค๋Š” ๊ฒฐ๊ณผ๋ฅผ ์–ป์—ˆ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ์—์„œ ๋‚ด๋ถ€์‚ฌ์šฉ์ž์˜ ์ด๋™ํŽธ์˜์„ฑ์„ ์ €ํ•ดํ•˜์ง€ ์•Š์œผ๋ฉด์„œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์  ์ง€์ ์„ ๋„์ถœํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์ด์ค‘์•™์„ฑ(Betweenness centrality)์„ ์ด๋™ํŽธ์˜์„ฑ์„ ๋‚˜ํƒ€๋‚ผ ์ˆ˜ ์žˆ๋Š” ์ง€ํ‘œ์ธ ์ด๋™ํŽธ์˜์„ฑ ๋น„์šฉ์œผ๋กœ ์„ ์ •ํ•˜์˜€๋‹ค. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ๊ณผ ์ด๋™ํŽธ์˜์„ฑ ๋น„์šฉ์„ ๊ณ ๋ คํ•˜์—ฌ ๋‚ด๋ถ€์‚ฌ์šฉ์ž์˜ ์ด๋™ํŽธ์˜์„ฑ์„ ์ตœ๋Œ€ํ•œ ์ €ํ•ดํ•˜์ง€ ์•Š์œผ๋ฉด์„œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋Š” ์ตœ์ ๋Œ€์•ˆ ๋„์ถœ ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜์˜€๋‹ค. 4์žฅ์—์„œ๋Š” 3์žฅ์—์„œ ์ œ์•ˆํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€, ๊ฐ•ํ™” ๋ฐฉ๋ฒ•์„ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ๋Š” ์‹œ์Šคํ…œ์„ ๊ฐœ๋ฐœํ•˜์˜€๋‹ค. BIM์„ ๊ธฐ๋ฐ˜์œผ๋กœ ์„ค๊ณ„ ๋‹จ๊ณ„์—์„œ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์‹œ์Šคํ…œ์œผ๋กœ ๊ธฐ๋Šฅ์— ๋”ฐ๋ผ Module 1.(๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ ๊ตฌ์ถ• ๋ฐ ๋ฐฉํ˜ธ์†์„ฑ ์ถ”์ถœ), Module 2.(์ „ ๊ฒฝ๋กœ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋ถ„์„), Module 3.(์ด๋™ํŽธ์˜์„ฑ ๊ธฐ๋ฐ˜ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ ๋„์ถœ)์œผ๋กœ ๊ตฌ์„ฑํ•˜์˜€๋‹ค. ๋˜ํ•œ ์ œ์•ˆํ•œ ๋ฐฉ๋ฒ•์˜ ์œ ํšจ์„ฑ์„ ํ™•์ธํ•˜๊ธฐ ์œ„ํ•ด ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. ์‹œ๋ฒ”์‹œ์„ค์„ ์„ ์ •ํ•˜์˜€๊ณ , ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๋ถ„์„์— ํ•„์š”ํ•œ ๋ฐฉํ˜ธ ๊ฐ’์„ ์„ค์ •ํ•˜์—ฌ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋ฐ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ ๋„์ถœ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. ๊ฒฐ๋ก ์ ์œผ๋กœ ์ œ์•ˆํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€, ๊ฐ•ํ™” ๋ฐฉ๋ฒ•์ด ์œ ํšจํ•จ์„ ํ™•์ธํ•˜์˜€๋‹ค. 5์žฅ์—์„œ๋Š” ๋ณธ ์—ฐ๊ตฌ์—์„œ ์ œ์•ˆํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ๋ฐฉ๋ฒ•์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค. ๊ฒ€์ฆ์„ ์œ„ํ•ด ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค ์ค‘ ์ „๋ ฅ์‹œ์„ค โ€˜๊ฐ€โ€™๊ธ‰์— ํ•ด๋‹นํ•˜๋Š” ์›์ž๋ ฅ๋ฐœ์ „์†Œ๋ฅผ ๊ฒ€์ฆ๋Œ€์ƒ์œผ๋กœ ์„ ์ •ํ•˜์˜€๋‹ค. ๋˜ํ•œ ์›์ž๋ ฅ๋ฐœ์ „์†Œ ๊ฑด์ถ•์„ค๊ณ„ ๋ฐ ๋ฐฉํ˜ธ์„ค๊ณ„ ๊ฒฝํ—˜์ด ์žˆ๋Š” 4๋ช…์˜ ์ „๋ฌธ๊ฐ€๋ฅผ ๋Œ€์ƒ์œผ๋กœ, ๋‚ด๋ถ€์‚ฌ์šฉ์ž์˜ ์ด๋™ํŽธ์˜์„ฑ์„ ๊ณ ๋ คํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ง€์  ์„ ์ • ์‹คํ—˜์„ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. 4๋ช…์˜ ์ „๋ฌธ๊ฐ€ ์‹คํ—˜ ๊ฒฐ๊ณผ์™€ ๋ณธ ์—ฐ๊ตฌ์—์„œ ์ œ์•ˆํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ์„ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋ฐ ์ด๋™ํŽธ์˜์„ฑ ๋น„์šฉ ์ธก๋ฉด์—์„œ ๋น„๊ตํ•˜์˜€๋‹ค. ๊ฒฐ๊ณผ์ ์œผ๋กœ ๋ณธ ์—ฐ๊ตฌ์—์„œ ์ œ์•ˆํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ๋ฐฉ๋ฒ•์ด ์ „๋ฌธ๊ฐ€์˜ ์ •์„ฑ์ ์ธ ๋ฐฉ๋ฒ•๋ณด๋‹ค ๋” ๋‚˜์€ ๋Œ€์•ˆ์„ ์ œ์‹œํ•  ์ˆ˜ ์žˆ์Œ์„ ํ™•์ธํ•˜์˜€๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ 6์žฅ์—์„œ ๋ณธ ์—ฐ๊ตฌ์˜ ์˜์˜์™€ ํ•œ๊ณ„๋ฅผ ์„œ์ˆ ํ•˜์˜€๋‹ค. ๊ธฐ์กด์— ์ธ๋ ฅ์šด์šฉ์— ์ดˆ์ ์ด ๋งž์ถฐ์ง„ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์ฒด๊ณ„์—์„œ ๊ฑด์ถ•์‹œ์„ค์˜ ๊ณ„ํš์  ์ธก๋ฉด์—์„œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ๋ฅผ ํ‰๊ฐ€ํ•˜๊ณ  ๊ฐ•ํ™”ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜์˜€๋‹ค๋Š”๋ฐ ์˜์˜๊ฐ€ ์žˆ๋‹ค. ๊ฒฐ๋ก ์ ์œผ๋กœ ๋ณธ ์—ฐ๊ตฌ๋Š” ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์ฒด๊ณ„๋ฅผ ๊ฐ–์ถ”์–ด์•ผ ํ•˜๋Š” ์‹œ์„ค์„ ๋Œ€์ƒ์œผ๋กœ ์ด๋™ํŽธ์˜์„ฑ์„ ์ €ํ•ดํ•˜์ง€ ์•Š๊ธฐ ์œ„ํ•ด ์–ด๋–ค ๊ณณ์„ ๊ฐ•ํ™”ํ•ด์•ผ ํ•˜๋Š”์ง€์— ๋Œ€ํ•œ ๋Œ€์•ˆ์„ ์ฐพ๋Š” ๊ฒƒ์ด๋‹ค. ๊ฒ€์ฆ๊ณผ์ •์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ๋ฐฉ๋ฒ•์˜ ์œ ํšจํ•จ์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ์—ˆ์œผ๋ฉฐ, ๋” ๋‚˜์•„๊ฐ€ ๋ณธ ์—ฐ๊ตฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค์— ๋Œ€ํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์ฒด๊ณ„ ์ •๋Ÿ‰์  ์„ค๊ณ„๊ธฐ์ค€ ๋ฐ ํ‰๊ฐ€, ๊ฐ•ํ™” ๊ณผ์ •์— ํ™œ์šฉ์ด ๊ฐ€๋Šฅํ•˜๋ฆฌ๋ผ ์ƒ๊ฐํ•œ๋‹ค.This thesis is a study on the evaluation and improvement of the physical protection system using spatial networks for outside intruders into building facilities among national critical facilities. The purpose of this study is to propose a method for evaluating and improving physical protection system in consideration of the spatial characteristics of a multi-layered complex space and accessibility of many internal users. Through the analysis of previous studies, it was confirmed that the existing methods have limitations in accurately analyzing outsidersโ€™ intrusion into the facility by simplifying the facility to a diagram or grid. This method does not accurately reproduce complex spaces and assumes only a few intrusion paths, so unexpected intrusion paths may be omitted from the analysis. Also, previous studies could not propose improvement points considering internal usersโ€™ accessibility. Therefore, this study proposes a method to accurately evaluate the physical protection system of a facility by using spatial networks and to derive improvement point that does not impair the accessibility of internal users as much as possible. In Chapter 3, based on the EASI (Estimate of Adversary Sequence Interruption) model, which quantitatively evaluates effectiveness of physical protection system, two methods (improving protection performance and adding protection points) were proposed in terms of architectural planning. To implement this, the spatial networks needed nodes that could improve protection performance and adding protection points. Therefore, the node is composed of a door node and a room node, and the edge is reproduced by the medial axis method that can best reproduce the path of the intruder. A method of deriving the effectiveness of physical protection system using the EASI model was proposed by exploring all possible paths through which an intruder could access the target area by using the spatial networks implemented in this way. Afterwards, a method of improving physical protection system considering accessibility of internal users was proposed. Accessibility is an important factor for internal users' work productivity, emergency passage, and disabled access. In a survey of the operators of nuclear power plant, which is national critical facility, it was concluded that the reinforcement of physical protection has an effect on the deterioration of the convenience of movement, and that physical protection system should be improved at the point that does not impair the accessibility. Therefore, in this study, in order to derive the optimal point for improving physical protection system without compromising the accessibility of internal users, betweenness centrality was selected as an index of accessibility. Considering the effectiveness of physical protection system and the cost of accessibility, I proposed a method for deriving an optimal alternative that can improve the effectiveness of physical protection without compromising the accessibility of internal users as much as possible. In Chapter 4, a system that can implement the physical protection system evaluation and reinforcement method proposed in Chapter 3 was developed. It is a system that can be used in the BIM design stage. Depending on the function, it is composed of Module 1 (extraction of spatial network and protection properties), Module 2 (analysis of the effectiveness of physical protection systems for all intrusion paths), and Module 3 (derivation of optimal alternatives for improving physical protection system based on accessibility). In addition, simulation was performed to confirm the validity of the proposed method. By selecting a pilot facility and setting the physical protection values required for physical protection analysis, simulation was performed to derive the effectiveness and improvement of physical protection optimal alternatives. In conclusion, it was confirmed that the proposed physical protection system evaluation and improvement method is effective. In Chapter 5, the evaluation and improvement method of the physical protection system proposed in this study were verified. For verification, nuclear power plant corresponding to the โ€˜๊ฐ€โ€™ level of power facilities among national critical facilities were selected. For four experts with experience in nuclear power plant architectural design and physical protection design, a physical protection improvement point selection experiment was conducted considering the accessibility of internal users. Afterwards, the results of the experiments of four experts and the optimal alternative for improving physical protection system proposed in this study were compared in terms of physical protection effectiveness and accessibility cost. As a result, it was confirmed that the physical protection evaluation and improvement method proposed in this study could present a better alternative than the qualitative method based on expertโ€™s experience. Finally, in Chapter 6, the significance and limitations of this study are described. This study is meaningful in that it proposed a new method to evaluate and improve the physical protection system in terms of architectural planning, which was previously focused on the management of security personnel. In conclusion, this study is to find alternatives to where to improve in order not to impair accessibility that need to have a physical protection system. The validity of the proposed method was confirmed through verification, and it is thought that it will be possible to use it in the process of quantitative design, evaluation, and improvement of the physical protection system for national critical facilities based on this study.์ œ 1 ์žฅ ์„œ ๋ก  1 1.1. ์—ฐ๊ตฌ์˜ ๋ฐฐ๊ฒฝ 3 1.1.1. ์—ฐ๊ตฌ์˜ ๋ฐฐ๊ฒฝ 3 1.1.2. ์—ฐ๊ตฌ์˜ ๋ชฉ์  8 1.2. ์—ฐ๊ตฌ์˜ ๋ฐฉ๋ฒ• ๋ฐ ์ ˆ์ฐจ 10 1.2.1. ์—ฐ๊ตฌ์˜ ๋ฐฉ๋ฒ• 10 1.2.2. ์—ฐ๊ตฌ์˜ ์ ˆ์ฐจ 12 ์ œ 2 ์žฅ ์ด๋ก ์  ๊ณ ์ฐฐ 15 2.1. ๋ฐฐ๊ฒฝ์ด๋ก  ๊ณ ์ฐฐ 17 2.1.1. ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค 17 2.1.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์ฒด๊ณ„ 30 2.1.3. ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ 43 2.1.4. ์ค‘์•™์„ฑ(Centrality) ์ฒ™๋„ 52 2.2. ์„ ํ–‰์—ฐ๊ตฌ ๊ณ ์ฐฐ 56 2.2.1. ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค์˜ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์ฒด๊ณ„ 56 2.2.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ์˜ ์ •๋Ÿ‰์  ํ‰๊ฐ€ 58 2.3. ๋ณธ ์—ฐ๊ตฌ์˜ ์ฐจ๋ณ„์„ฑ 63 2.3.1. ์„ ํ–‰์—ฐ๊ตฌ์˜ ํ•œ๊ณ„ 63 2.3.2. ๋ณธ ์—ฐ๊ตฌ์˜ ์ฐจ๋ณ„์„ฑ 63 ์ œ 3 ์žฅ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ๋ฐฉ๋ฒ• ์ œ์•ˆ 65 3.1. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ๋ฒ”์œ„ ์„ค์ • 67 3.1.1. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ด€๋ จ๊ทœ์ • ๋ถ„์„ 67 3.1.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ๋ฒ”์œ„ ์„ค์ • 74 3.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€๋ฐฉ๋ฒ•๋ก  ์„ ์ • 78 3.2.1. EASI ๋ชจ๋ธ์— ๋”ฐ๋ฅธ ์œ ํšจ์„ฑ ํ‰๊ฐ€ 78 3.2.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ํ–ฅ์ƒ ์š”์†Œ ์„ ์ • 80 3.2.3. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ํ–ฅ์ƒ ๋ฐฉ๋ฒ• ์ œ์•ˆ 81 3.3. ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ ๊ตฌํ˜„ 85 3.3.1. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™”๋ฅผ ์œ„ํ•œ ๋„คํŠธ์›Œํฌ ๊ตฌ์„ฑ ์ œ์•ˆ 85 3.3.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™”๋ฅผ ์œ„ํ•œ ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ ์žฌํ˜„ 88 3.4. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ ๋ฐ ๊ฐ•ํ™” ๋Œ€์•ˆ์ง€์  ๋„์ถœ 89 3.4.1. ๋ชจ๋“  ๊ฒฝ๋กœ๋ฅผ ๊ณ ๋ คํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋„์ถœ 89 3.4.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ๋Œ€์•ˆ์ง€์  ๋„์ถœ 91 3.5. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™”์™€ ์ด๋™ํŽธ์˜์„ฑ 94 3.5.1. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™”์— ๋”ฐ๋ฅธ ์ด๋™ํŽธ์˜์„ฑ ์˜ํ–ฅ 94 3.5.2. ์ด๋™ํŽธ์˜์„ฑ ๋ถ„์„์ง€ํ‘œ ์„ ์ • 97 3.5.3. ์ด๋™ํŽธ์˜์„ฑ ๋น„์šฉ ์ •์˜ 99 3.6. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ ๋„์ถœ 103 3.6.1. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋ฐ ์ด๋™ํŽธ์˜์„ฑ ๋น„์šฉ ๋„์ถœ 103 3.6.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ ์„ ์ • 105 3.7. ์†Œ๊ฒฐ 108 ์ œ 4 ์žฅ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ ๋ฐ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ 111 4.1. ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ ๊ตฌ์„ฑ ๋ฐ ๊ฐœ๋ฐœ ๋ฐฉ๋ฒ• 113 4.1.1. ์‹œ์Šคํ…œ ๊ตฌ์„ฑ 113 4.1.2. ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ ๋ฐฉ๋ฒ• 114 4.2. ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ 116 4.2.1. BIM๋ชจ๋ธ ์†์„ฑ์ •๋ณด 116 4.2.2. (Module 1) ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ ๋ฐ ์†์„ฑ์ •๋ณด ์ถ”์ถœ 117 4.2.3. (Module 2) ์ „ ๊ฒฝ๋กœ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋ถ„์„ 120 4.2.4. (Module 3) ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ ๋„์ถœ 122 4.3. ์‹œ๋ฒ”์‹œ์„ค ์„ ์ • ๋ฐ ๋ฐฉํ˜ธ ๊ฐ’ ์„ค์ • 124 4.3.1. ์‹œ๋ฒ”์‹œ์„ค ๊ฐœ์š” 124 4.3.2. ๊ณต๊ฐ„ ๋„คํŠธ์›Œํฌ ์žฌํ˜„ 126 4.3.3. ์‹œ์„ค ๋ฐฉํ˜ธ ๊ฐ’ ์„ค์ • 127 4.3.4. ์นจ์ž…์ž ๋ฐ ๋Œ€์‘(Response) ๊ด€๋ จ ๋ฐฉํ˜ธ ๊ฐ’ ์„ค์ • 127 4.4. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ํ‰๊ฐ€ 128 4.4.1. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ ๋ถ„์„ 128 4.4.2. ๊ฐ•ํ™” ๋Œ€์•ˆ์ง€์  ๋„์ถœ ๋ฐ ์‚ฌ์ด์ค‘์•™์„ฑ ๋ถ„์„ 129 4.5. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ ๋„์ถœ 131 4.5.1. ๊ฐ•ํ™”์ง€์  ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์œ ํšจ์„ฑ, ์ด๋™ํŽธ์˜์„ฑ ๋น„์šฉ ๋ถ„์„ 131 4.5.2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ๊ฐ•ํ™” ์ตœ์ ๋Œ€์•ˆ ๋„์ถœ 134 4.6. ์†Œ๊ฒฐ 138 ์ œ 5 ์žฅ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ๋ฐฉ๋ฒ• ๊ฒ€์ฆ 139 5.1. ๊ฒ€์ฆ ํ”„๋กœ์„ธ์Šค 141 5.1.1. ๊ฒ€์ฆ ๋ชฉ์  141 5.1.2. ๊ฒ€์ฆ ๋ฐฉ๋ฒ• ๋ฐ ์ ˆ์ฐจ 141 5.1.3. ๊ฒ€์ฆ ๊ฒฐ๊ณผ ๊ฐ€์ • 142 5.2. ๋Œ€์ƒ์„ ์ • ๋ฐ ๊ด€๋ จ๊ทœ์ • ๋ถ„์„ 144 5.2.1. ๊ฒ€์ฆ๋Œ€์ƒ ์„ ์ • 144 5.2.2. ์„ค๊ณ„๊ธฐ์ค€์œ„ํ˜‘(Design Base Treat, DBT) ์„ค์ • 148 5.3. ๋Œ€์ƒ์‹œ์„ค ๊ตฌ์ถ• ๋ฐ ์ „๋ฌธ๊ฐ€ ์„ ์ • 150 5.3.1. ๋Œ€์ƒ์‹œ์„ค ๊ตฌ์ถ• 150 5.3.2. ์ „๋ฌธ๊ฐ€ ์„ ์ • 154 5.4. ๊ฒ€์ฆ 155 5.4.1. ๊ฒ€์ฆ ์‹คํ—˜ ํ™˜๊ฒฝ ๋ฐ ์ ˆ์ฐจ 155 5.4.2. ๋ณธ ์—ฐ๊ตฌ ๋ฐฉ๋ฒ•๋ก ์„ ํ†ตํ•œ ๋ถ„์„๊ฒฐ๊ณผ 156 5.4.3. ์ „๋ฌธ๊ฐ€ ๋ถ„์„ ๊ฒฐ๊ณผ 158 5.5. ๊ฒฐ๊ณผ ๋ถ„์„ 162 ์ œ 6 ์žฅ ๊ฒฐ ๋ก  165 6.1. ์—ฐ๊ตฌ์˜ ์š”์•ฝ 167 6.2. ์—ฐ๊ตฌ์˜ ์˜์˜ ๋ฐ ํ•œ๊ณ„ 169 6.2.1. ์—ฐ๊ตฌ์˜ ์˜์˜ 169 6.2.2. ์—ฐ๊ตฌ์˜ ํ•œ๊ณ„ 170 ์ฐธ๊ณ ๋ฌธํ—Œ 172 Appendix 1. ์‚ฌ์ด์ค‘์•™์„ฑ, ํ†ตํ–‰๋Ÿ‰ ์ƒ๊ด€๊ด€๊ณ„ ๋ถ„์„ ๊ฒฐ๊ณผ 181 Appendix 2. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ํ‰๊ฐ€ยท๊ฐ•ํ™” ์‹œ์Šคํ…œ ์•Œ๊ณ ๋ฆฌ์ฆ˜ 184 Appendix 3. ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ ์ตœ์ ๋Œ€์•ˆ ๋ฐ ์ „๋ฌธ๊ฐ€ ๊ฒ€์ฆ์‹คํ—˜ ๊ฒฐ๊ณผ 201๋ฐ•

    Changes in testicular blood flow according to age in normal children studied by doppler flowmeter

    No full text
    ์˜ํ•™๊ณผ/์„์‚ฌ[ํ•œ๊ธ€] ์‹ ์ƒ์•„์—์„œ ๋งŒ 20์„ธ๊นŒ์ง€ ์ด 292๋ช…(584 ๊ณ ํ™˜)์„ ๋Œ€์ƒ์œผ๋กœ ์—ฐ๋ น์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ์‹ ์ฒด์  ๋ณ€ํ™”์™€ ๊ณ ํ™˜ ํ˜ˆ๋ฅ˜์˜ ๋ณ€ํ™”๋ฅผ ๊ฐ๊ฐ ์ดํ•™์  ๊ฒ€์‚ฌ์™€ continuous-wave Doppler flowmeter๋ฅผ ์ด์šฉํ•ด ๊ฒ€์‚ฌ, ๋ถ„์„ํ•˜์—ฌ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ฒฐ๊ณผ๋ฅผ ์–ป์—ˆ๋‹ค. 1. ๊ณ ํ™˜ํฌ๊ธฐ(p<0.01) ๋ฐ ์Œ๊ฒฝ๊ธธ์ด(p<0.05)๋Š” 12-13์ƒˆ๋ถ€ํ„ฐ ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€ํ•˜์˜€์œผ๋ฉฐ ๊ณ ํ™˜ ํฌ๊ธฐ์˜ ์ขŒ์šฐ ์ฐจ์ด๋Š” ์—†์—ˆ๋‹ค. 2. ํ”ผ๋ง‰๋™๋งฅ(capsular artery)์˜ ์ˆ˜์ถ•๊ธฐ ์ตœ๊ณ ์œ ์†์€ ์—ฐ๋ น ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ๋ณ€ํ™”๊ฐ€ ์—†์—ˆ์œผ๋‚˜ ํ™•์žฅ๊ธฐ ์ตœ์ €์œ ์† ๋ฐ ํ‰๊ท ์œ ์†์€ 12์ƒˆ๋ถ€ํ„ฐ 14์„ธ ์‚ฌ์ด์— ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€ํ•˜์˜€๋‹ค(p<0.05). 3. ๊ณ ํ™˜๋™๋งฅ(testicular artery)์˜ ๋ชจ๋“  ์œ ์†์น˜๋Š” ์—ฐ๋ น์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ์ฐจ์ด๋ฅผ ๋ณด์ด์ง€ ์•Š์•˜๋‹ค. 4. ํ”ผ๋ง‰๋™๋งฅ์˜ Doppler ํŒŒํ˜•์€ ๋Œ€์ฒด๋กœ ๋†’์€ ํ™•์žฅ๊ธฐ ์œ ์†์„ ๋ณด์ด๋Š” ๋‚ฎ์€ impedance ํ˜•ํƒœ์˜€์œผ๋ฉฐ ๋ฐ•๋™์ง€์ˆ˜. ์ €ํ•ญ์ง€์ˆ˜๋Š” ์ „ ์—ฐ๋ น์— ๊ฑธ์ณ ๋น„๊ต์  ๋‚ฎ์•˜์œผ๋ฉฐ ํŠนํžˆ 12์„ธ์—์„œ 14์„ธ ์‚ฌ์ด์— ๊ธ‰๊ฒฉํ•œ ๊ฐ์†Œ๋ฅผ ๋ณด์˜€๋‹ค(p<0.05). 5. ๊ณ ํ™˜๋™๋งฅ์˜ Doppler ํŒŒํ˜•์€ ๋‹ค์–‘ํ•˜์˜€์œผ๋ฉฐ ๋ฐ•๋™์ง€์ˆ˜, ์ €ํ•ญ์ง€์ˆ˜๋Š” ์—ฐ๋ น์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ์ฐจ์ด๋ฅผ ๋ณด์ด์ง€ ์•Š์•˜๋‹ค. 6. ์œ ์†์˜ ํ˜ˆ๊ด€๊ฐ„ ๋น„๊ต์—์„œ ์œ ์†๋“ค์€ ๋‘ ํ˜ˆ๊ด€ ์‚ฌ์ด์— ํ†ต๊ณ„์ ์œผ๋กœ ์œ ์˜์„ฑ์žˆ๋Š” ์ฐจ์ด๋ฅผ ๋ณด์ด์ง€ ์•Š์•˜์œผ๋‚˜ ์ง€์ˆ˜์˜ ํ˜ˆ๊ด€๊ฐ„ ๋น„๊ต์—์„œ๋Š” ๋‘ ์ง€์ˆ˜ ๋ชจ๋‘์—์„œ ๊ณ ํ™˜๋™๋งฅ์ด ํ”ผ๋ง‰๋™๋งฅ ๋ณด๋‹ค ๋†’์•˜๋‹ค(p<0.05). ์œ ์† ๋ฐ ๋‘ ์ง€์ˆ˜ ๋ชจ๋‘์—์„œ ์ขŒ์šฐ ๊ณ ํ™˜์˜ ์ฐจ์ด๋Š” ์—†์—ˆ๋‹ค. 7. ๋‚˜์ด์˜ ์ฆ๊ฐ€์— ๋”ฐ๋ฅธ ๊ณ ํ™˜ํฌ๊ธฐ ๋ฐ ์Œ๊ฒฝ๊ธธ์ด์˜ ์ฆ๊ฐ€์™€ ํ”ผ๋ง‰๋™๋งฅ์˜ ํ™•์žฅ๊ธฐ ์ตœ์ €์œ ์†, ํ‰๊ท ์œ ์†, ๋ฐ•๋™์ง€์ˆ˜ ๋ฐ ์ €ํ•ญ์ง€์ˆ˜์˜ ์ฆ๊ฐ€ ์‚ฌ์ด์— ํ†ต๊ณ„์ ์œผ๋กœ ์—ฐ๊ด€์„ฑ์ด ์žˆ๋Š” ์œ ์‚ฌํ•œ ๊ฒฝํ–ฅ์„ ๋ณด์˜€๋‹ค(p<0.05). ์ด์ƒ์˜ ๊ฒฐ๊ณผ๋กœ ๋ณด์•„ ๊ณ ํ™˜์šฉ์ ์ด ํฌ๊ฒŒ ์ฆ๊ฐ€ํ•˜๋Š” 12์„ธ๋ฅผ ๊ธฐ์ ์œผ๋กœ ๊ณ ํ™˜ ํ˜ˆ๋ฅ˜๊ฐ€ ์ฆ๊ฐ€ํ•˜๊ณ  ์•„์šธ๋Ÿฌ ๊ณ ํ™˜์˜ impedance๋Š” ๊ฐ์†Œํ•œ๋‹ค๊ณ  ๊ฒฐ๋ก ์ง€์„ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์•ž์œผ๋กœ ์Œ๋‚ญ์งˆํ™˜์˜ ์—ฐ๊ตฌ๋‚˜ ์ง„๋‹จ์‹œ Doppler๋ฅผ ์‚ฌ์šฉํ•  ๋•Œ๋Š” ๊ฐ€๋Šฅํ•œ ํ”ผ๋ง‰๋™๋งฅ์„ ์ด์šฉํ•˜๊ณ , ๊ณ ํ™˜๋™๋งฅ์„ ์ด์šฉํ•  ๋•Œ๋Š” ์‚ฌ ์ „์— ๊ณ ํ™˜๋™๋งฅ์˜ ๋‹ค์–‘ํ•œ Doppler ํŒŒํ˜•์„ ์ธ์ง€ํ•œ ํ›„ ์ด์šฉํ•ด์•ผ๊ฒ ๋‹ค. [์˜๋ฌธ] The changes in testicular blood flow and physical characteristics according to growth for 20 years after birth were studied by continuous-wave Doppler flowmeter and physical examination in 292 men (584 testicles) and were compared each other. After then the following results were obtained. 1. The testicular size(p<0.01) and penile length(p<0.05) were increased rapidly at 12 or 13 years, and the differences in size between right and left testicle were not found. 2. In capsular arteries. peak systolic flow velocities were not changed by age, but end diastolic and mean flow velocities were raised rapidly between 12 and 14 years(p<0.05). 3. In testicular arteries, the values observes from all of velocities were not changed by age. 4. In capsular arteries. Doppler waveforms were similar and showed a low-impedance patterns with high levels of diastolic flow velocities and the pulsatility and resistive indexes were low relatively and were decreased rapidly between 12 and 14 years(p<0.05). 5. In testicular arteries, Doppler waveforms were variable and the pulsatility and resistive indexes were not changed by age. 6. There was no statistically significant difference in velocities between two arteries. but all indexes in testicular arteries were higher than those of capsular arteries( p<0.05). There was no difference in velocities and indexes between two arteries. 7. The testicular size and penile length had a significant correlation with end diastolic flow velocity, mean flow velocity. pulsatility index and resistive index in capsular arteries(p<0.05). On the basis of the above results, it is concluded that from the age of 12 when testicular size increases rapidly, the testicular blood flow increases and the impedance of testis decreases. Study through capsular arteries or the knowledge of the variable waveform characteristics of the testicular arteries is needed if Doppler ultrasound is to be had a role in studying or diagnosing testicular disease .restrictio

    Gain medium์„ ์ด์šฉํ•œ Epsilon Near Zero ๋ฉ”ํƒ€ ๋ฌผ์งˆ ๊ธฐ๋ฐ˜์˜ ์ž๊ธฐ ๋„์ฒด ๊ตฌํ˜„ ๋ฐ ์„ฑ๋Šฅ ํ–ฅ์ƒ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐ์ •๋ณด๊ณตํ•™๋ถ€, 2016. 8. ๋ฐ•๋‚จ๊ทœ.์ž์—ฐ๊ณ„์— ์กด์žฌํ•˜์ง€ ์•Š๋Š” ๋ฌผ์งˆ ํŠน์„ฑ์„ ํŠน์ •ํ•œ ๊ตฌ์กฐ๋ฅผ ์ด์šฉํ•˜์—ฌ ์ธ๊ณต์ ์œผ๋กœ ๊ตฌํ˜„ํ•œ ๋ฌผ์งˆ์„ ๋ฉ”ํƒ€ ๋ฌผ์งˆ์ด๋ผ ํ•œ๋‹ค. ๋ฉ”ํƒ€ ๋ฌผ์งˆ์€ ์Œ ๊ตด์ ˆ๋ฅ , ์™„์ „ ํก์ˆ˜์ฒด, ๋ณ€ํ™˜ ๊ด‘ํ•™ ๋“ฑ์˜ ๋„“์€ ๋ถ„์•ผ์— ๊ฑธ์ณ ํ™œ์šฉ๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฉ”ํƒ€ ๊ตฌ์กฐ๋ฅผ ์„ค๊ณ„ํ•จ์— ์žˆ์–ด์„œ ์ด์ƒ์ ์ธ ์ „๊ธฐ ๋„์ฒด ํ˜น์€ ์ž๊ธฐ ๋„์ฒด๊ฐ€ GHz ๋ฐ THz ์˜์—ญ์—์„œ ๊ตฌ์กฐ์˜ ๊ธฐ๋ณธ ์žฌ๋ฃŒ๋กœ์จ ๋‘๋ฃจ ์‚ฌ์šฉ๋œ๋‹ค. ํ•ด๋‹น ์˜์—ญ์—์„œ์˜ ์ด์ƒ์ ์ธ ์ „๊ธฐ ๋„์ฒด์˜ ๊ฒฝ์šฐ์—๋Š” ๊ธˆ์ด๋‚˜ ์€๊ณผ ๊ฐ™์€ ์ผ๋ฐ˜์ ์ธ ๊ธˆ์†๋“ค์˜ ์ž์—ฐ์ ์ธ ํŠน์„ฑ์œผ๋กœ ๊ตฌํ˜„ ํ•  ์ˆ˜ ์žˆ์ง€๋งŒ, ์ด์ƒ์ ์ธ ์ž๊ธฐ ๋„์ฒด๋Š” ์ž์—ฐ๊ณ„์— ๊ทธ ํŠน์„ฑ์„ ๊ฐ€์ง„ ๋ฌผ์งˆ์ด ์กด์žฌํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋”ฐ๋ผ์„œ ์ž๊ธฐ ๋„์ฒด๋ฅผ ๊ตฌํ˜„ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ๋ฉ”ํƒ€ ๋ฌผ์งˆ์€ ์ด์šฉํ•ด์•ผ ํ•˜๋Š”๋ฐ, ํ˜„์žฌ๊นŒ์ง€ ํŒจ์น˜๋ฅผ ์ด์šฉํ•œ high impedance, 0์— ๊ฐ€๊นŒ์šด ์œ ์ „์œจ(Epsilon Near Zero)์„ ๊ฐ€์ง€๋Š” ๋ฉ”ํƒ€ ๋ฌผ์งˆ ๊ธฐ๋ฐ˜์˜ ๊ตฌํ˜„ ๋“ฑ์ด ์‹œ๋„๋˜์–ด ์™”์œผ๋‚˜, ๋‹ค์ฐจ์›์ ์ธ ํ™•์žฅ์˜ ์–ด๋ ค์›€๊ณผ ๋”๋ถˆ์–ด ์‹ค์ œ์ ์ธ ๊ณต์ • ๋ฐ ๊ตฌํ˜„์— ์žˆ์–ด์„œ์˜ ๋‚œ์  ๋“ฑ์˜ ๋ฌธ์ œ๊ฐ€ ์žˆ๋‹ค. ์ด์™€ ํ•จ๊ป˜ ์™„์ „ ์ž๊ธฐ ๋„์ฒด๋ฅผ ๊ตฌํ˜„ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ๋น„๋“ฑ๋ฐฉ์ ์œผ๋กœ 0์— ๊ฐ€๊นŒ์šด ์œ ์ „์œจ์„ ๊ฐ–๋Š” ๋ฉ”ํƒˆ ๋ฌผ์งˆ์„ ์ด์šฉํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ง„ํ–‰๋˜์—ˆ์œผ๋‚˜, ์ด๋ก ์—์„œ ๋‚˜์•„๊ฐ€ ์‹ค์ œ์ ์ธ ๊ตฌํ˜„์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋Š” ์•„์ง ์ง„ํ–‰๋˜์ง€ ์•Š์•˜๋‹ค. ๋น„๋“ฑ๋ฐฉ์ ์œผ๋กœ 0์— ๊ฐ€๊นŒ์šด ์œ ์ „์œจ์„ ์œ ํšจ ๋ฌผ์งˆ ์ด๋ก ์„ ์ด์šฉํ•˜์—ฌ ์ƒˆ๋กœ์šด ๊ตฌ์กฐ๋ฅผ ์ œ์‹œํ•˜๊ณ , ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์ˆ˜์น˜ํ•ด์„์  ๋ฐฉ๋ฒ•์„ ํ†ตํ•˜์—ฌ ๊ทธ ์„ฑ๋Šฅ์„ ํ™•์ธํ•จ์œผ๋กœ์จ ๋“ฑ๊ฐ€ ์ž๊ธฐ ๋„์ฒด์˜ ์‹ค์ œ์  ๊ตฌํ˜„ ๊ฐ€๋Šฅ์„ฑ์— ๋Œ€ํ•ด ๋ถ„์„ํ•ด๋ณธ๋‹ค.์ œ 1 ์žฅ ์„œ ๋ก  1 ์ œ 1 ์ ˆ ์—ฐ๊ตฌ์˜ ๋ฐฐ๊ฒฝ 1 ์ œ 2 ์ ˆ ์—ฐ๊ตฌ์˜ ๋ชฉ์  8 ์ œ 3 ์ ˆ ๋…ผ๋ฌธ์˜ ๊ตฌ์„ฑ 10 ์ œ 2 ์žฅ ๋ฐฐ๊ฒฝ ์ด๋ก  11 ์ œ 1 ์ ˆ ์œ ํšจ ๋ฌผ์งˆ ์ด๋ก  11 ์ œ 2 ์ ˆ ์œ ํ•œ์š”์†Œ๋ฒ• 15 ์ œ 3 ์ ˆ ๋“œ๋ฃจ๋“œ ๋ชจ๋ธ 17 ์ œ 3 ์žฅ ๊ตฌ์กฐ์˜ ํ•ด์„ ๋ฐ ๊ฒฐ๊ณผ 18 ์ œ 1 ์ ˆ ๋“ฑ๊ฐ€ ์ž๊ธฐ ๋„์ฒด ๊ตฌ์กฐ์˜ ํ•ด์„ 18 ์ œ 2 ์ ˆ ์œ ํšจ ๋ฌผ์งˆ ์ด๋ก ์— ์˜ํ•œ ๋“ฑ๊ฐ€ ์ž๊ธฐ ๋„์ฒด์˜ ๊ตฌํ˜„ 21 ์ œ 3 ์ ˆ ์ด๋ก ๊ฐ’์„ ์ด์šฉํ•œ ์ž๊ธฐ ๋„์ฒด์˜ ๊ตฌํ˜„ 25 ์ œ 4 ์ ˆ ์‹ค์ œ ๋ฌผ์„ฑ์—์„œ์˜ loss์˜ ์˜ํ–ฅ 28 ์ œ 5 ์ ˆ Gain medium์„ ์ด์šฉํ•œ ์„ฑ๋Šฅ ํ–ฅ์ƒ 32 ์ œ 4 ์žฅ ๊ฒฐ๋ก  39 ์ฐธ๊ณ  ๋ฌธํ—Œ 41 Abstract 44Maste

    A Proposed Method to Improve the Physical Protection System of an Architectural Facility Factoring Indoor Accessibility

    No full text
    ยฉ 2022 Architectural Institute of Korea.This study proposes a method to derive an optimal alternative to the reinforcement point factoring indoor accessibility by evaluating the physical protection system for architectural facilities with many internal users among nationally significant facilities. The point of high accessibility is when an area is frequently used by insiders; consequently, when security is strengthened, indoor accessibility is lowered. Therefore, a point with a high effect of reinforcement physical protection system was derived while minimizing the deterioration of the indoor accessibility of internal users. To verify, a BIM model based pilot facility was selected, and vulnerability analysis was performed factoring all access routes using a spatial network. For the reinforcement method, improving the performance of the protection point and adding a protection point was considered. As a result of this simulation, 45 intrusion routes, 45 routes of physical protection effectiveness values, and 33 reinforcement alternative points were derived. A total of 72,428 reinforcement cases were analyzed, and 11 optimal alternatives were gleaned. In conclusion, this study was conducted to find alternatives for places that should be strengthened at low cost for facilities needing a physical protection system. The effectiveness of this proposed method was confirmed through a simulation and is possible to potentially use as a quantitative design criteria, evaluation, or reinforcement of a physical protection system for nationally significant facilities.N

    Development of Quantitative Evaluation System for PPS(Physical Protection System) using BIM-based 3D Network

    No full text
    ์šฐ๋ฆฌ๋‚˜๋ผ๋Š” ๊ฒฝ์ œ๊ฐ€ ์„ฑ์žฅํ•˜๊ณ  ์‚ฐ์—…์ด ๊ณ ๋„ํ™”๋จ์— ๋”ฐ๋ผ ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค์˜ ์ข…๋ฅ˜์™€ ๊ทธ ๊ทœ๋ชจ๋Š” ๊พธ์ค€ํžˆ ์ฆ๊ฐ€ํ•˜์˜€๋‹ค. ํŠนํžˆ ๊ตญ๊ฐ€์ค‘์š”์‹œ์„ค์€ ํ…Œ๋Ÿฌ๋กœ ์ธํ•ด ์‹œ์„ค์˜ ๊ธฐ๋Šฅ์ด ์ƒ์‹คํ–ˆ์„ ๋•Œ ๊ทธ ์˜ํ–ฅ์ด ๊ตญ๊ฐ€ ์ „์ฒด์— ๋ฏธ์น  ์ˆ˜ ์žˆ์–ด ์ด์— ๋Œ€ํ•œ ์ฒ ์ €ํ•œ ๋Œ€๋น„๊ฐ€ ์š”๊ตฌ๋œ๋‹ค. ํ•˜์ง€๋งŒ ๋งŽ์€ ์‹œ์„ค๋“ค์ด ์™ธ๋ถ€ ์นจ์ž…์ด๋‚˜ ํ…Œ๋Ÿฌ์— ๋Œ€ํ•œ ๊ณ ๋ ค ์—†์ด ์„ค๊ณ„๋˜๊ฑฐ๋‚˜ ๊ธฐ์ค€์— ๋ฏธํกํ•œ ์‹ค์ •์ด๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ์—ฐ๊ตฌ๋Š” ์™ธ๋ถ€ ์นจ์ž…์œผ๋กœ๋ถ€ํ„ฐ ์•ˆ์ „ํ•˜๊ฒŒ ์„ค๊ณ„๋˜์–ด์•ผ ํ•˜๋Š” ์‹œ์„ค์˜ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ์ฒด๊ณ„๋ฅผ ์ •๋Ÿ‰์ ์œผ๋กœ ํ‰๊ฐ€ํ•˜๊ณ  ๋ถ„์„ํ•˜๋Š” ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ์— ๋ชฉ์ ์ด ์žˆ๋‹ค. ๋˜ํ•œ BIM(๊ฑด์„ค์ •๋ณด๋ชจ๋ธ)์„ ํ™œ์šฉํ•˜์—ฌ ์„ค๊ณ„ ์ดˆ๊ธฐ ๋ฐ ์ง„ํ–‰๊ณผ์ •์—์„œ ์‹œ์„ค์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์ •ํ™•ํ•˜๊ณ  ์‹ ์†ํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ์ฒด๊ณ„๋ถ„์„์ด ๊ฐ€๋Šฅํ•œ ๋„๊ตฌ๋ฅผ ๊ฐœ๋ฐœํ•˜๊ณ ์ž ํ•˜์˜€๋‹ค. ํŠน์ • ์‹œ์„ค์˜ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ์ฒด๊ณ„๋ฅผ ์ •๋Ÿ‰์ ์œผ๋กœ ๋ถ„์„ํ•˜๋Š”๋ฐ ํ•„์š”ํ•œ ํƒ์ง€, ์ง€์—ฐ ์š”์†Œ์™€ ์ด๋“ค์ด ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ์†์„ฑ์„ Sandia National Lab.์˜ EASI ๋ชจ๋ธ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ‰๊ฐ€ํ•˜์˜€๋‹ค. EASI ๋ชจ๋ธ์€ ์™ธ๋ถ€ ์นจ์ž…์ž์˜ ๋™์„ ์„ Sequence Diagram์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๊ธฐ ๋•Œ๋ฌธ์— BIM์˜ ๊ณต๊ฐ„๊ณผ ๊ตฌ์„ฑ์š”์†Œ๋“ค์„ ๋„คํŠธ์›Œํฌ(Edge+Node)๋กœ ์žฌํ˜„ํ•˜์˜€๋‹ค. ์ด๋ ‡๊ฒŒ ์žฌํ˜„๋œ ๋„คํŠธ์›Œํฌ๋Š” Python๊ธฐ๋ฐ˜ ํ”„๋กœ๊ทธ๋ž˜๋ฐ์„ ํ†ตํ•ด ๋ชจ๋“  ๊ฒฝ๋กœ์˜ ์œ ํšจ์„ฑ ๊ฐ’๊ณผ ์ทจ์•ฝ๊ฒฝ๋กœ๋ฅผ ์ฐพ์•„๋‚ผ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ๊ฐ€์ƒ์˜ ์‹œ์„ค์— ๋Œ€ํ•œ ๋ฌผ๋ฆฌ์ ๋ฐฉํ˜ธ์ฒด๊ณ„ ์ทจ์•ฝ์„ฑ ๋ถ„์„์„ ์ˆ˜ํ–‰ํ•˜์˜€๊ณ  3๋‹จ๊ณ„์˜ ๊ฐœ์„ ๊ณผ์ •์„ ํ†ตํ•ด ์„ค์ •ํ•œ ๊ธฐ์ค€์— ๋„๋‹ฌ๋  ์ˆ˜ ์žˆ๋„๋ก ๊ฐœ์„ ์•ˆ์„ ์ œ์•ˆํ•˜์˜€๋‹ค. In Korea, the types and sizes of important national facilities have steadily increased as the economy has grown and industry has advanced. Not only government facilities, but also private industrial facilities, there are a number of facilities that can affect the entire country when the facility&apos;s function is lost due to terrorism. However, many important national facilities are vulnerable to external attacks due to insufficient design considerations for external intrusion and terrorism. Therefore, this study aims to develop a system that quantitatively evaluates and analyzes the physical protection system of a facility that must be designed safely from external intrusion. In addition, this system makes it possible to accurately and quickly analyze the physical protection system information for the facility at the initial stage of design by using BIM. Through this, the designer can design a facility that can satisfy the required performance of the facility&apos;s physical protection system, and it can be used to reach the standard of an increasingly strengthened trend. The BIM-based physical protection system quantitative evaluation system analyzed detection and delay factors and their attributes based on the EASI model of Sandia Nation Lab. To this end, the sequence diagram of the external intruder of the EASI model was reproduced with the space and components of BIM as edges and nodes. The reproduced Edge and Node can find the physical protection system&apos;s effectiveness and weak paths of all paths through Python-based programming. Finally, the vulnerability analysis of the physical protection system for the sample facility was performed through simulation, and an improvement plan was proposed to reach the target value through three upgrade processes.N

    Wireless Communication Systems for Human Implantable Artificial Cochlea

    No full text
    ์ธ๊ณต์™€์šฐ๋Š” ์™€์šฐ์˜ ๋ฌผ๋ฆฌ์  ๋˜๋Š” ๊ธฐ๋Šฅ์  ์†์ƒ์œผ๋กœ ์œ ๋ฐœ๋œ ์ฒญ๊ฐ์žฅ์• ๋ฅผ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ํ™˜์ž์—๊ฒŒ ์ฒญ๊ฐ๊ธฐ๋Šฅ์„ ํšŒ๋ณตํ•˜๋Š” ๋งค์šฐ ํšจ๊ณผ์ ์ธ ์ˆ˜๋‹จ์œผ๋กœ ์•Œ๋ ค์ ธ ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ํ˜„์žฌ๊นŒ์ง€ ์ƒ์šฉํ™”๋œ ์ธ๊ณต์™€์šฐ ์ œํ’ˆ์€ ํฌ๊ธฐ, ์ „๋ ฅ์†Œ๋ชจ์™€ ๊ฐ™์€ ์ธก๋ฉด์—์„œ ํœด๋Œ€์„ฑ์ด ๋ถˆํŽธํ•˜์—ฌ ์•„์ง ๋งŽ์€ ํ•œ๊ณ„์ ์„ ๊ฐ€์ง€๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋‹จ์ ์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด ๋ฐฉ์‹์˜ ์ธ์ฒด ์‚ฝ์ž…ํ˜• ์ธ๊ณต์™€์šฐ ๊ฐœ๋ฐœ์ด ์š”๊ตฌ๋˜๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ตœ๊ทผ ์—ฐ๊ตฌ ๊ฐœ๋ฐœ ์ค‘์ธ ์ธ์ฒด ์‚ฝ์ž…ํ˜• ์ธ๊ณต์™€์šฐ๋ฅผ ๊ตฌ์„ฑํ•˜๋Š” ์„ผ์„œ๋ถ€,์ž๊ทน๋ถ€, ๋ฌด์„ ํ†ต์‹ ๋ถ€ ๋“ฑ์˜ ์„ค๊ณ„์™€ ๋ณธ ์‹œ์Šคํ…œ์— ํƒ‘์žฌ๋˜๋Š” ํ†ต์‹ ์‹œ์Šคํ…œ์˜ ํŠน์ง• ๋ฐ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•œ ํ‰๊ฐ€๊ฒฐ๊ณผ ๋“ฑ์„๊ธฐ์ˆ ํ•˜์˜€๋‹ค.2
    corecore