• Title/Summary/Keyword: 반입 패턴

Search Result 5, Processing Time 0.017 seconds

A Study on the Dynamic Export Yard Planning Considering Pattern of Coming-in Containers (반입 패턴을 고려한 동적 수출 장치장 운영 계획에 관한 연구)

  • Lee, Jong-Ho;Shin, Jae-Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.337-339
    • /
    • 2007
  • The productivity of container terminal is usually regarded same as the productivity of quay crane. Operation of quay crane for the export is started from picking up a container in yard block. In doing so, smooth flow of container is vital to maximize the productivity of quay crane. Improvement of quay crane's productivity means improvement of entire productivity in container terminal, which reinforces the competitiveness of terminal consequently. Setting effective plan is essential to improve work flow from yard to quay crane. For optimal plan, it is necessary to gather information about exact time schedule of come-and-go containers for loading, amount of containers that will be come to terminal. Generally, the arrival time of containers and the amount of containers are definite and predictable. However, in the case of export container, the arrival time of containers is random and unpredictable. This study examines the pattern of coming-in containers as time goes in container yard and provides the solution to how to plan export yard considering the change of state in terminal and adapt it to container yard plan

  • PDF

Modern Fashion Design Development using Morphological Characteristics of Hanbok (한복의 형태적 특성 분석에 따른 현대 패션디자인 개발)

  • Park, Myunghee;Shim, Sangbo
    • Journal of the Korean Society of Costume
    • /
    • v.66 no.2
    • /
    • pp.134-147
    • /
    • 2016
  • The mainstay of modern fashion design has always been Western costumes. Though Asian costumes do get featured in collections at times, most instances are just instances of the western culture showing curiosity toward non-mainstream costumes. Until recently, Japan, which has been the most active in cultural exchanges, has been the main recipient of these curiosities, and has been used as the representative style and culture of East Asia. What needs to be let known is that Korea has its own costume style and culture, which have been developed according to its tradition and beliefs. Hanbok, which is the representative traditional costume in Korea, has existed since the beginning of the Kochosun dynasties. I started this study to figure out the design source of Hanbok's shape and develop it into a modern costume. In the fashion industry, "Mandarin Collar" and "Kimono Sleeve" are common terms, And I hope that words like 'Korean Collar' and 'Hanbok Sleeve' will one day become a household term. Hanbok contains Korea image. And its shape is formed depending on how Koreans have been treating all sorts of objects or things for many years. If my study can identify and express the unique Korean way of pattern and considering clothes, which is clearly different from those of China and Japan, I will be able to establish a concept of 'Korean style', that people of the world could come to recognize.

Prefetching Policy based on File Acess Pattern and Cache Area (파일 접근 패턴과 캐쉬 영역을 고려한 선반입 기법)

  • Lim, Jae-Deok;Hwang-Bo, Jun-Hyeong;Koh, Kwang-Sik;Seo, Dae-Hwa
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.447-454
    • /
    • 2001
  • Various caching and prefetching algorithms have been investigated to identify and effective method for improving the performance of I/O devices. A prefetching algorithm decreases the processing time of a system by reducing the number of disk accesses when an I/O is needed. This paper proposes an AMBA prefetching method that is an extended version of the OBA prefetching method. The AMBA prefetching method will prefetching blocks continuously as long as disk bandwidth is enough. In this method, though there were excessive data request rate, we would expect efficient prefetching. And in the AMBA prefetching method, to prevent the cache pollution, it limits the number of data blocks to be prefetched within the cache area. It can be implemented in a user-level File System based on a Linux Operating System. In particular, the proposed prefetching policy improves the system performance by about 30∼40% for large files that are accessed sequentially.

  • PDF

The storage characteristic study of pelletized RDF (펠렛형 폐기물 고형연료의 저장 특성 연구)

  • Choi, Yeonseok;Kim, Yeongjae;Han, Soyoung;Jeong, Minhong
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2010.11a
    • /
    • pp.157-157
    • /
    • 2010
  • RDF는 장기저장이 가능한 것이 특징 중의 하나이지만, 우리나라보다 앞서 대량저장을 시작한 일본의 RDF 저장 사일로에서 폭발사고가 발생한 사례가 있어, RDF를 실제로 저장하여 RDF 온도 및 가연성가스 발생상황 등을 장기간 감시 측정하여 사일로 안전관리지표를 도출하였다. 실험에 사용한 RDF 저장조는 직경 3.1m, 높이 11.4m의 사일로방식으로 제작하였다. RDF 저장량은 $70m^3$이었으며, 저장기간은 475일이었다. 사일로에는 15개의 열전대를 설치하여 사일로 표면, 직경방향 1.2m 지점 및 기온을 측정하여 수직방향 및 수평방향의 온도변화를 분석하였다. 가스 샘플링포트는 온도측정지점과 동일한 위치 설치하여 진공펌프로 흡인하여 테트라 백에 포집하여 GC로 분석하였으며, 가스샘플링은 17회 실시하였다. 비교적 대형 저장설비이고 RDF가 열전도성이 낮은 물질임에도 불구하고 사일로 내부온도는 기온보다는 높았지만, 기온의 영향을 많이 받아 7월에 정점, 1월에 하점을 나타내는 사인곡선과 같은 패턴을 보였다. 측정지점별 온도차는 수평방향 보다 수직방향에서 높게 나타났으며, RDF층으로 전열 및 축열이 진행되고 생화학반응을 촉진시키는 상승작용의 결과로 월평균온도가 $49^{\circ}C$를 나타내는 지점도 있었다. 실제 사일로는 RDF의 투입과 배출이 연속적으로 진행되어 방열이 이루어지므로 하계에 대량저장을 실시하지 않는 한 RDF층 내부에서 생화학적 반응열이 생성되더라도 $40^{\circ}C$를 상회할 가능성은 매우 희박할 것으로 판단된다. RDF 저장시 발생하는 가스는 대부분 $CO_2$였으며, 미량이지만 $H_2$, CO, $CH_4$도 검출되었다. 가연성 가스는 저장 후 2개월 동안은 발생하지 않았으며, 하계에는 타 계절에 비해 상대적으로 고농도로 검출되었다. 발생가스와 온도 및 $CO_2$$H_2$농도의 상관성은 높게 나타나지 않았지만, 정의 상관관계를 나타내었다. 저장한 RDF의 성상(수분, 발열량, 분화물)은 실험개시 전의 RDF분석결과와 실험종료 후 분석결과에서는 큰 차이가 나타나지 않았다. 따라서 RDF의 안전 저장을 위해서는 (1) 반입되는 RDF성상관리, (2) RDF가 2개월 이상 장기간 체류하는 데드스페이스가 발생하지 않고 선입선출이 확보되는 저장조 설계, (3) 사일로 내부에 최소 3개 이상의 지점에서 온도를 측정하여 상시감시하고 $40^{\circ}C$이하로 관리, (4) 발생가스는 CO, $CO_2$, $H_2$, $CH_4$ 등의 가연성가스를 모두 측정 감시하는 것이 바람직하지만, 최소 $CO_2$$H_2$는 상시감시하고 각각 1%와 100ppm 미만으로 관리, (5) 배풍기 등을 이용한 상시 환기실시, (6) 하계에는 대량저장이 이루어지지 않도록 저장조 운용계획 수립 등을 실시해야 한다.

  • PDF

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF