• Title/Summary/Keyword: 결함 관리 기법

Search Result 2,856, Processing Time 0.034 seconds

Development of Work Zone Traffic Control Algorithm for Two Lane Road (공사구간 교대통행 동적제어 알고리즘 개발)

  • Park, Hyunjin;Oh, Cheol;Moon, JaePil
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.2
    • /
    • pp.23-35
    • /
    • 2017
  • Work zone traffic control is of keen interest because both traffic operations and safety performances are directly affected by traffic management methods. In particular, work zone traffic on two-lane roads needs to be managed in more efficient and safer manners due to its unique characteristics of alternative right-of-way assignment. This study developed a dynamic control algorithm that can be used for real-time operations of two-lane work zone traffic. The performance of the developed algorithm was evaluated by VISSIM microscopic traffic simulator. An applied programming interface (API) based program was developed to plug-in the control algorithm onto the simulator. The results demonstrated the feasibility of the proposed control algorithm for two-lane work zone.

Strategies of Home Health Care Services Linkages in Korea Based on Delphi Technique (델파이 기법을 이용한 우리나라 재가간호서비스 연계방안)

  • Lee, Seung-Hee;Lim, Ji-Young
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.282-290
    • /
    • 2012
  • Today, home health care services needs a linkage plan of the customized home visiting health service in public health center, the medical institute home health care service, and home visiting nursing service based on long term care insurance for the elderly program which acknowledges the independence and professionalism of the home health care services while minimizing overlap through linking the projects. So, this study was performed by applying the Delphi technique, which draws agreement from professional opinion, to determine a method to link home health care services in Korea. The results of this study are as follows. Specialists agreed on 24 important items within the two domains of institutional linkage and medical linkage. And the significance of this study is as follows. The 24 items deduced for the approved nursing service linkage plan are expected to improve the home health care service business system, enhance the quality of home health care service, and bring increased satisfaction for service recipients. Also, seeking ways to minimize overlap in service can increase the effectiveness of health care and public health management at a national level. In addition, it is considered that this will ultimately reduce public medical costs as well as improve home health care service.

Interference Management with Cell Selection using Cell Range Expansion and ABS in Heterogeneous Network based on LTE-Advanced (LTE-Advanced 기반 이종 네트워크에서 셀 영역 확장에 대한 셀 선택과 ABS를 통한 간섭 관리 기법)

  • Moon, Sangmi;Kim, Bora;Malik, Saransh;Kim, Daejin;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.39-44
    • /
    • 2013
  • Long Term Evolution (LTE) - Advanced has developed Heterogeneous Network (HetNet) that consists of a mix of macrocells and low-power nodes such as picocells to improve the system performance. Also, to encourage data offloading in HetNet, Cell Range Expansion (CRE) have been introduced. In this paper, we propose a cell selection scheme based on Signal to Interference plus Noise Ratio (SINR) for optimal offloading effect. And we manage the interference for user located in cell range expanded region using Almost Blank Subframe (ABS) with flexible ABS ratio to improve the spectrum efficiency in time domain. Simulation results show that proposed scheme can improve spectrum efficiency of macrocell and picocell user. Eventually, proposed scheme can imporve overall user performance.

A Comparative Case Study on Improvement of ITSM using 6 Sigma Technique (6시그마를 활용한 ITSM 개선 사례 비교 연구)

  • Im, Soo-Bin;Hwang, Kyung-Tae
    • Information Systems Review
    • /
    • v.12 no.2
    • /
    • pp.121-144
    • /
    • 2010
  • Recently, ITSM(IT Service Management) is adopted very widely among private and public organizations. The successful implementation of ITSM requires continuous improvement, not just implementation of IT processes and/or ITSM solutions. One of the major tools for the continuous improvement is 6 Sigma technique. This study compares success and failure cases at the project level, and identifies factors affecting successful application of 6 Sigma technique in the improvement of ITSM. To achieve the research objective, this study first identifies and classifies success factors for 6 Sigma application through literature review. Then, factors to be used in the study are determined. Based on the factors, success and failure cases are compared. The research results show that all 5 factors (participation of management, participation of project team, project selection and verification, customer and market orientation, strategy and goal focus) are significantly different between success and failure cases.

Exploring a Researcher's Personal Research History through Self-Citation Network and Citation Identity (자기 인용 네트워크와 인용 정체성을 이용한 연구자의 연구 이력 분석에 관한 연구)

  • Lee, Jae-Yun
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.1
    • /
    • pp.157-174
    • /
    • 2012
  • This paper compares two recent methods for exploring a scientist's research history: citation identity and self-citation network. The former is proposed by White(2000), while the latter is suggested by Hellsten et al.(2007). An experimental citation analysis was carried out on the research output of Young Mee Chung, a renouned Korean information scientist. The result shows that the two methods divided the research period into two sub-periods in the same way. They also identified the major research themes very similarly. In the analysis of each method's performance in depth, the two methods revealed different functions to understand a researcher's history. Citation identity was useful to identify authors who have affected Chung's research in terms of research topics. whereas, self-citation network was successful to identify the core papers and leading papers of the research sub-periods. This study indicates the combination of two methods can provide rich information on a scientist's research history.

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

Determining Relative Weights of Criteria for Evaluating National Quarantine Station by the Analytic Hierarchy Process (AHP방법(方法)을 적용(適用)한 국립검역소(國立檢疫所) 평가준거(評價準據)의 가중치(加重値) 결정(決定))

  • Yong, Yeong-Mun;Lee, Moo-Sik;Na, Baeg-Ju;Kim, Cheol-Ung;Kim, Gwang-Hwan;Yoo, In-Sook
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.817-820
    • /
    • 2009
  • 신종 및 재출현 전염병이 지속적으로 유행하고 해외 전염병의 국내유입가능성이 증대됨에 따라 국립검역소의 검역관리 사업의 효율성 평가는 매우 중요하다. 연구는 평가 구성요소 사이의 상대적 중요도, 즉 가중치(weight) 부여에 있어서 과학적 타당성을 인정받고 있는 계층분석절차(Analytical Hierarchy Process; AHP) 기법에 의한 이원비교방법을 사용하여 설정하였다. AHP기법은 복잡한 다기준 의사결정문제(multi-criteria decision making problem)를 계층화하여 단순화 체계화시킴으로써 그 영향도를 계량화하는데 탁월한 기법이라는 평가를 받고 있다. 실제 측정에 있어서는 본 모형을 이용하여 얻어졌다. 대영역(기관평가영역, 서비스 및 프로그램평가 영역), 중영역(투입, 과정, 결과, 검역업무, 검사업무, 위생관리업무, 병원체조사감시업무, 전염병예방홍보 교육업무)으로 구분하여 최종적으로 평가지표로 선정된 지표는 실제 국립검역소 사업에 적용하였으며, 이에 대한 최소한의 평가지표를 최종 선정하여 향후 국립검역소사업 평가체계를 보다 체계화 하였다.

  • PDF

Estimation of Rotational Stiffness of Connections in Steel Moment Frames by using Artificial Neural Network (인공신경망을 이용한 철골모멘트골조 접합부의 회전강성 손상예측)

  • Choi, Se-Woon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.22 no.1
    • /
    • pp.107-114
    • /
    • 2018
  • In this study, the damage detection method is proposed for the rotational stiffness of connections in steel moment frames by using artificial neural network(ANN). The flexural moment of columns, natural frequencies, modeshapes are used for the input layer in ANN while the damage index, that signify the damage level, is used for the output layer in ANN. The 5-story steel moment frame as an example structure is used to generate the train and test data. Total number of damage scenarios considered is 829. From the results of application, it is shown that the proposed method can accurately estimate the location and level of damages.

Work Process Analysis of the High-performed Precast Concrete Columns using Simulation Technology (시뮬레이션 기법을 활용한 고성능 프리캐스트 콘크리트 기둥의 작업프로세스 분석)

  • Shin, Young-Su;Cho, Kyuman;Cho, Chang-Geun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.4
    • /
    • pp.49-57
    • /
    • 2014
  • Since the structure systems of construction projects have been forced to be large, high-rised, and complex, many researchers have been put their efforts to develop high strength concrete incorporating diverse advanced materials. In order to improve the performance of the concrete, the fibers leading high ductility to concrete have been used, consequently concrete columns adopting High-Performance Fiber Cement(HPFC) have been developed. This paper analyzed not only the construction work process of HPFC column installed to the real construction project, but also construction productivity of the columns by using discrete event simulation technique. As a result, several considerations on installing such a column have identified, compared with the works for typical concrete columns. In particular, there was specific characteristic to install the columns in terms of labor resource productivity, which is not shown with the work for the typical concrete columns.

Active Buffer Management Algorithm for Voice Communication System with Silence Suppression (무음 압축을 이용하는 음성 통신 시스템을 위한 동적 버퍼 관리 알고리즘)

  • Lee, Sung-Hyung;Lee, Hyun-Jin;Kim, Jae-Hyun;Lee, Hyung-Joo;Hoh, Mi-Jeong;Choi, Jeung-Won;Shin, Sang-Heon;Kim, Tae-Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7B
    • /
    • pp.528-535
    • /
    • 2012
  • This paper proposes silence drop first(SDF) active buffer management algorithm to increase the voice capacity when silence suppression is used. This algorithm finds and drops silence packet rather than voice packet in the queue for resolving buffer overflow of queue. Simulations with voice codec of G.729A and G.711 are performed. By using proposed SDF algorithm, the voice capacity is increased by 84.21% with G.729A and 38.46% with G.711. Further more, SDF algorithm reduces the required link capacity and loosens the silence packet inter-arrival time limit to provide target voice quality compared with that of conventional algorithms.