• Title/Summary/Keyword: 버킷

Search Result 107, Processing Time 0.019 seconds

Types of Attitudes of Nursing Students in Korea Toward Bucket Lists Q-Methodological Approach (한국 간호대 학생이 죽기 전에 하고 싶은 버킷리스트 유형)

  • Lee, Hong Seon;Jo, Kae Hwa;Lee, Hyun Ji
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.21 no.1
    • /
    • pp.129-140
    • /
    • 2015
  • Purpose: The purpose of this study was to analyze the types of attitudes of nursing students in Korea toward bucket lists. Methods: The Q-methodology, which provides a method for analyzing the subjectivity of each item was used. From each of the 37 subjects, 34 selected Q-statements were classified into the shape of a normal distribution, using a 9-point scale. The collected data were analyzed using a QUANL PC program. Results: Four types of attitudes toward the bucket list of subjects were identified in Korean nursing students. Type I is a pursuit of money type, Type II is a pursuit of relationship type, Type III is a pursuit of self-centered type, and TypeIV is a pursuit of others-centered type. Conclusion: The results of this study indicate that different approaches toward educational programs for students in the human service area are recommended based on the four types of nursing students' attitudes toward the bucket list.

Analysis of a Queueing Model with Combined Control of Arrival and Token Rates (패킷 도착률과 토큰 생성률의 통합 관리를 적용한 대기모형의 분석)

  • Choi, Doo-Il;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.895-900
    • /
    • 2010
  • As the diverse telecommunication services have been developed, network designers need to prevent congestion which may be caused by properties of timecorrelation and burstiness, and unpredictable statistical fluctuation of traffic streams. This paper considers the leaky bucket scheme with combined control of arrival and token rates, in which the arrival rate and the token generation interval are controlled according to the queue length. By using the embedded Markov chain and the supplementary variable methods, we obtain the queue length distribution as well as the loss probability and the mean waiting time.

Design of Single Rate Three Color Marker using FPGA (EPGA를 이용한 Single Rate Three Color Marker 설계)

  • Park, Chung-Kwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.141-148
    • /
    • 2005
  • This paper addresses the design of srTCM (single rate Three Color Marker) described in RFC2697. It has proposed for srTCM to be used at the ingress of Differentiated Service network that provides AF PHB (Assured Forwarding Per Hop Behavior). srTCM is the marker with the metering function, and consists of the token updating function and the marking function. The token updating function uses the dual token bucket. The marking function compares the token values with the length of input packet, and then marks the result into IP QoS field (ToS field). This paper designs srTCM function and then implements it in one chip using VHDL and FPGA technology.

A study on improvement of leaky bucket UPC algorithm in ATM networks (ATM 망에서의 Leaky Bucket UPC 알고리즘의 성능 개선에 관한 연구)

  • 심영진;박성곤;조용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.5
    • /
    • pp.1116-1125
    • /
    • 1997
  • In this paper, the modified UPC(Usage Parameter Control) algorithm is proposed. The proposed UPC algorithm is based on Leakey Bucket algorithm and adds the characteristics of the jumping window algorithm for monitoring the average bit rate. The proposed algorithm let a cell, which is tagged by Leaky Bucket algorithm, pass through the network, if the network does not violate the average bit rate. The measuring method of window mechanism like jumping window. This paper supposes On/Off traffic source model of rthe performance evaluation and analysis of the proposed algorithm. Therefore, as simulation results, the proposed algorithm acquires more reduced results of the cell loss rate and bucket size than the Leaky Bucket algorithm.

  • PDF

Video Quality Variation Minimizing for Real-Time Low Bit Rate Video (영상품질 변화를 최소화하는 실시간 저전송률 영상코딩)

  • Park, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.868-874
    • /
    • 2007
  • A real-time frame-layer rate control algorithm with a token bucket traffic shaper is proposed for minimizing video duality variation. The proposed rate control method uses a non-iterative optimization method for low computational complexity, and performs bit allocation at the frame level to minimize variation in distortion between frames. In order to reduce the quality fluctuation, we use a sliding window scheme which does not require the pre-analysis process. Therefore, the proposed algorithm does not produce the delay from encoding, and is suitable for real-time low-complexity video encoder. Experimental results indicate that the proposed control method provides better PSNR performance than the existing rate control method.

A Study on Excavation Path Design of Excavator Considering Motion Limits (실차의 거동한계를 고려한 굴착기의 굴착 경로설계 연구)

  • Shin, Dae Young
    • Journal of Drive and Control
    • /
    • v.18 no.2
    • /
    • pp.20-31
    • /
    • 2021
  • An excavator is a construction machine that can perform various tasks such as trenching, piping, excavating, slope cutting, grading, and rock demolishing. In the 2010s, unmanned construction equipment using ICT technology was continuously developed. In this paper, the path design process was studied to implement the output data of the decision stage, and the path design algorithm was developed. For example, the output data of the decision stage were terrain data around the excavator, excavator mechanism information, excavator hydraulic information, the position and posture of the bucket at key points, the speed of the desired bucket path, and the required excavation volume. The result of the path design was the movement of the hydraulic cylinder, boom arm, bucket, and bucket edge. The core functions of the path design algorithm are the function of avoiding impact during the excavation process, the function to calculate the excavation depth that satisfies the required excavation volume, and the function that allows the bucket to pass through the main points of the excavation process while maintaining the speed of the desired path. In particular, in the process of developing the last function, the node tracking method expressed in the path design table was newly developed. The path design algorithm was verified as this path design satisfied the JCMAS H02 requirement.

A Study on Structural Safety of the Boom Hoisting Cylinder of a Coal Handling Machine (석탄하역기 붐 호이스팅 실린더의 구조 안전성에 관한 연구)

  • Choi, Yong Hoon;Kwak, Hyo Seo;Kim, Chul
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.12
    • /
    • pp.1265-1273
    • /
    • 2015
  • A coal handling machine is a type of equipment used for loading coal, the main material in a steam power plant, along a conveyer belt from a ship, and is placed after the driving chain bucket. However, studies on the boom hoisting cylinder, which is a hydraulic system used to control the angle of the boom based on loading location, indicate that domestic models are insufficient, and are thereby often substituted with a foreign product. In this study, a technique for analyzing the contact pressure in a thick-walled cylinder was established by comparing the contact pressure, which is calculated theoretically based on the results obtained from FEM simulation, and by checking whether the working oil is leaking from the boom hoisting cylinder using a v-seal. In addition, the driving motion was simulated according to the strokes of the cylinder, and the structural stability was verified under the maximum output conditions.

A Proposal of Privacy Protection Method for Location Information to Utilize 5G-Based High-Precision Positioning Big Data (5G 기반 고정밀 측위 빅데이터 활용을 위한 위치정보 프라이버시 보호 기법 제안)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.679-691
    • /
    • 2020
  • In the future, 5G technology will become the core infrastructure driving the 4th industrial era. For intelligent super-convergence service, it will be necessary to collect various personal information such as location data. If a person's high-precision location information is exposed by a malicious person, it can be a serious privacy risk. In the past, various approaches have been researched through encryption and obfuscation to protect location information privacy. In this paper, we proposed a new technique that enables statistical query and data analysis without exposing location information. The proposed method does not allow the original to be re-identified through polynomial-based transform processing. In addition, since the quality of the original data is not compromised, the usability of positioning big data can be maximized.

A Study on the Durability Design of a Hydraulic Cylinder for an Excavator (굴삭기 유압실린더의 내구설계 기법에 관한 연구)

  • Kim, Young-Bum;Kim, Pan-Young;Kim, In-Kyu;Kwon, Hak-Soon;Lee, Min-Hee;Park, Jin-Soo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.12
    • /
    • pp.1901-1907
    • /
    • 2010
  • A hydraulic cylinder is a primary component of an excavator and is used for activating attachments such as boom, arm, and bucket. Generally, the cylinder is prone to structural problems such as buckling and fatigue failure caused by cyclic high pressure. Therefore, the safety margin for fatigue, yield, and buckling during the design lifetime should be evaluated at the durability-design stage. The durability design includes basic and detailed stages. In the basic design, the principal dimensions of the rod and tube are determined by considering the working force, speed, and range with respect to yield and buckling. In the detailed design, the dimensions of the rod notch, welds, tube end, gland, orifice, and cushion ring are determined by considering the fatigue safety. We present and discuss the overall procedure for durability design and the related analysis techniques.

Learning Rules for AMR of Collision Avoidance using Fuzzy Classifier System (퍼지 분류자 시스템을 이용한 자율이동로봇의 충돌 회피학습)

  • 반창봉;심귀보
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.5
    • /
    • pp.506-512
    • /
    • 2000
  • In this paper, we propose a Fuzzy Classifier System(FCS) makes the classifier system be able to carry out the mapping from continuous inputs to outputs. The FCS is based on the fuzzy controller system combined with machine learning. Therefore the antecedent and consequent of a classifier in FCS are the same as those of a fuzzy rule. In this paper, the FCS modifies input message to fuzzified message and stores those in the message list. The FCS constructs rule-base through matching between messages of message list and classifiers of fuzzy classifier list. The FCS verifies the effectiveness of classifiers using Bucket Brigade algorithm. Also the FCS employs the Genetic Algorithms to generate new rules and modifY rules when performance of the system needs to be improved. Then the FCS finds the set of the effective rules. We will verifY the effectiveness of the poposed FCS by applying it to Autonomous Mobile Robot avoiding the obstacle and reaching the goal.

  • PDF