• Title/Summary/Keyword: 보호제공시간

Search Result 361, Processing Time 0.025 seconds

ATM 교환기 연결 절단율 추정을 위한 시뮬레이터 개발

  • 정명기;고재상;최성훈
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1997.04a
    • /
    • pp.65-65
    • /
    • 1997
  • 가입자가 B-ISDN(Broadband Integrated Services Digital Network) 서비스에 대한 shb은 수준의 품질 및 안정적인 서비스 제공을 요구함에 따라, 이러한 서비스를 제공하기 위한 ATM (Asynchronous Transfer Mode) 교환기에 대한 신뢰성 설계의 중요성은 증가하 고 있다. 교환기의 중요한 신뢰성 성능 척도 중의 하나인 연결 절단율 (Cutoff connection rate)은 총 연결시간 동안 절단된 연결수로 정의되며, 연결 절단은 호 설정 (Call setup) 단 계를 지나 서비스 중인 연결이 사용자의 요구가 아닌 시스템의 고장으로 종료될 때 발생한 다. 연결 절단율 추정 문제는 기존의 신뢰도 또는 가용도 예측을 위한 시뮬레이션과는 달리 시스템 구성 유니트들의 고장율, 수리율, 그리고 요구된 연결의 트래픽 특성 부분이 혼합된 문제이다. 따라서, B-ISDN 서비스의 중요한 특징인 다양한 트래픽 특성과 시스템의 구성 (Configuration)을 고려하여 연결 절단율을 해석적인 방법을 통하여 추정하는 데네는 어려 움이 있으며 시뮬레이션에 의한 방법이 적절하다. 본 고에서는 B-ISDN 서비스의 트래픽 특 성과 ATM 교환기의 시스템 구성 및 신뢰도 데이터로부터 시스템의 연결 절단율을 추정하 기 위한 시뮬레이터의 기능 및 구조, 시뮬레이션 수행 결과 등을 제시한다. 시뮬레이터는 AweSim 시뮬레이션과 CUser Written Code를 사용하여 개발하였다. 시뮬레이터의 구성 모듈은 크게 호 도착 모듈, 연결 제어 및 자원 할당 모듈, 유니트 고장 및 수리 모듈, 통계 량 수집 모듈 등으로 구성된다. 개발된 시뮬레이터는 B-ISDN 트래픽 파라메터와 연결 절단 율의 상호 관계 규명 및 시스템 설계 대안 (Design alternatives)에 대한 비교/평가에 활용 된다., 수중생물의 경우는 특히 수온, 수량 영양원등이다.(중략). 본 연구의 접근방법으로는 ASRS의 개념적인 Reference Model을 수립하고 이 Reference Model에 대한 Formal Model로 DEVS(Discrete Event System Specification)을 이용하여 시스템을 Modeling하였다. 이의 Computer Simulation을 위하여 DEVS형식론 환경에서의 Simulation Language인 DEVSim ++ⓒ를 이용하여 시스템을 구현하였다.. 실형 결과로는 먼저 선형 상미분방정식의 예로 mass-damper-spring system, 비선형 상미분방정식의 예로는 van der Pol 방정식, 연립 상미분방정식의 예로는 mixing tank problem 등을 보였으며, 그의 공학에서 일어나는 여러 가지 문제들도 다루었다.화물에 대한 방어력이 증가되어 나타난 결과로 여겨지며, 또한 혈청중의 ALT, ALP 및 LDH활성을 유의성있게 감소시키므로서 감잎 phenolic compounds가 에탄올에 의한 간세포 손상에 대한 해독 및 보호작용이 있는 것으로 사료된다.반적으로 홍삼 제조시 내공의 발생은 제조공정에서 나타나는 경우가 많으며, 내백의 경우는 홍삼으로 가공되면서 발생하는 경우가 있고, 인삼이 성장될 때 부분적인 영양상태의 불충분이나 기후 등에 따른 영향을 받을 수 있기 때문에 앞으로 이에 대한 많은 연구가 이루어져야할 것으로 판단된다.태에도 불구하고 [-wh]의미의 겹의문사는 병렬적 관계의 합성어가 아니라 내부구조를 지니지 않은 단순한 단어(minimal $X^{0}$ elements)로 가정한다. 즉, [+wh] 의미의 겹의문사는 동일한 구성요 소를 지닌 병렬적 합성어([$[W1]_{XO-}$ $[W1]_{XO}$ ]$_{XO}$

  • PDF

A Review on the Relationship of the Life Salvage and its Remuneration (해상인명구조와 보상체계에 관한 고찰)

  • Lee, Jung-won
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.491-524
    • /
    • 2017
  • Under the general maritime law, a life salvor has no claim against the person saved, and a pure life salvor has no right to compensation from the owner of the ship or its cargo. This harsh rule, which treats the salvor of life less generously than the salvor of property, has been modified by international conventions, statutes, so that life salvors may expect a reward in most cases. It is, especially, unreasonable that a prerequisite of a salvage award is that at least some of the property must be saved, because life of a person can not be compared to values of goods such as vessels and cargoes. Also it is not understandable that only pure life salvors can not expect a reward for the saving of life from the owners of the property. In the meantime, according to Article 39 of the Korean Maritime Search and Rescue Act (hereunder, KMSARA), any person who has gave assistance and rescued in accordance with a governmental officer's order may get a compensation for their time and labour. The above mentioned compensation which is stemmed from the KMSARA may play a role as a compliment for the lack of enough compensation to a life salvor. This means that even though a life salvor failed to save property, he may expect a minimum compensation from the KMSARA. However, it should be recognized that when a life salvor is entitled to both remuneration for the salvage of life and recourse of expenditures from the KMSARA, the total remuneration shall be paid only if and to the extent that such remuneration is greater than any reward recoverable by the salvor under the Korean Commercial Code and the KMSARA.

Monitoring of the Estuary Sand Bar Related with Tidal Inlet in Namdaecheon Stream using Landsat Imagery (Landsat 위성 영상을 활용한 강원도 양양군 남대천 연안 하구사주 갯터짐 환경 모니터링)

  • Jang, Jiwon;Eom, Jinah;Cheong, Daekyo;Lee, Changwook
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.5_1
    • /
    • pp.481-493
    • /
    • 2017
  • Estuary sand bar of Namdaecheon Stream is located in Yangyang-gun, Gangwon-do in Korea. This unique place is situated between end of Namdaecheon Stream and East Sea. It is an important environment area of the global ecosystem from the transition zone of land and marine environments by forming a variety of coastal circumstance. Some endemic species should be protected which is appearing in the Namdaecheon Stream because of preservation for future generations. Especially, the salmon return to this stream as adults in order to breed which is more than 70 % of the salmon in Korea peninsular. The monitoring of estuary sand bar is need to analyze ecological environment and sustainable development with time. First of all we represents a different shape of estuary sand bar of Namdaecheon Stream from 1984 to 2015 using Landsat satellite imagery series. Particularly movement of the "tidal inlet" is most important factor to investigate the condition of the change for estuary sand bar. The location of tidal inlet is compared with precipitation, height of tide and oceanic current data according to time variation.

A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board (익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구)

  • Min, So-Yeon;Jang, Seung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4214-4223
    • /
    • 2012
  • The argument related to the use of real and anonymous names on the Internet bulletin board has recently become a main issue. When using real names, it is possible to violate free discussion and privacy. Also, when using anonymous names, it is possible to have the reverse function of the Internet in regard to the use of malicious replies or the distribution of false ideas. Therefore, this paper has made it possible to prevent the spread of the user's personal information and execute the single log-in process by using the XML-token method which is one of the SSO technologies. Also, by issuing virtual IDs and forming the path when establishing tokens, the anonymous bulletin board which provides anonymity with a conditional tracing process has been suggested. After analyzing the performance of visitor numbers at authentication time, the anonymous bulletin board based on the group signature method showed the average response rate of 0.72 seconds, 0.18 seconds, which was suggested scheme. In the authentication time 4-5 times faster response speed, respectively. Also, since the suggested system does not have to provide a single authentication process or make the user provide his or her signature, the level of user's convenience seems to be much higher. Such a result shows that the system suggested on the anonymous bulletin board has a more appropriate level of user's convenience.

A Study on improvement of education training for private Security (일반경비원 교육훈련제도의 개선방안에 관한 연구)

  • Huh, Koung-Mi;Park, Young-Ju
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.529-550
    • /
    • 2007
  • In proportion to the increase of public security demand, the private companies advanced continuously every year. However the size of the industry expanded in its quantity, the quality remains the same as before. So it's important to training of the security officers. This study suggest the improvements of training system through the analysis and the review of problems of training and education security officers. To develop our private security industry, we suggest as follows. First, In spite of the training is important, the recognition against security officers training is low, so the improvement is demanded. Second, When selecting the educational institution, it does not reflect the demand and situation of education enough. So there is necessary that selecting the educational institution again, after finishing a demonstration duration. Third, The education contents is general, so there is a necessity of the education which is professionalized. Fourth, In order to improve the ability of the lecturer, we must strengthen the qualification of the lecturer. Fifth, For the development of securities industry, we must found the professional training institution.

  • PDF

West seacoast wetland monitoring using KOMPSAT series imageries in high spatial resolution (고해상도 KOMPSAT 시리즈 이미지를 활용한 서해연안 습지 변화 모니터링)

  • Sunwoo, Wooyeon;Kim, Daeun;Kim, Seongkyun;Choi, Minha
    • Journal of Korea Water Resources Association
    • /
    • v.50 no.6
    • /
    • pp.429-440
    • /
    • 2017
  • A series of multispectral high-resolution Korean Multi-Purpose Satellite (KOMPSAT) images were analyzed to detect the geographical changes in four different tidal flats in the west coast of South Korea. The method of unsupervised classification was used to generate a series of land use/land cover (LULC) maps from the satellite images, which were used as the input of the temporal trajectory analysis to detect the temporal change of coastal wetlands and its association with natural and anthropogenic activities. The accurately classified LULC maps extracted from the KOMPSAT images indicate that these multispectral high-resolution satellite data is highly applicable to generate good quality thematic maps for extracting wetlands. The result of the trajectory analysis showed that, while the tidal flat area of Gyeonggi and Jeollabuk provinces was estimated to have changed due to tidal effects, the reductive trajectory of the wetland areas belonging to the Saemangeum province was caused by a high degree of human-induced activities including large reclamation and urbanization. The conservation of the Jeungdo Wetland Protected Area in Jeollanam province revealed that the social and environmental policies can effectively protect coastal wetlands from degradation. Therefore, monitoring for wetland change using high resolution KOMPSAT is expected to be useful to coastal environment management and policy making.

A Study of Authors' Moral Rights Infringements Regarding Cinematographic Works and Other Visual Works (음악·영상저작물의 동일성유지권 침해관련 연구)

  • Kang, Sang-Gu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.228-236
    • /
    • 2021
  • This research investigates the causes of infringements related to authors' moral rights which has most conflict among moral rights of authorship, through analysis of judicial precedents and compare whether there subsists any differences in viewpoints between judicial precedent trend and those on behind the scene of broadcast production. Copyright is divided into intellectual property and moral rights of authorship. Right to the integrity of the work is part of moral rights of authorship and produce one content and used in various media. When the edit is needed to fit the organization and advertisement time, advanced consultation from the rightful owner or written consent is needed. However, under the time pressure or ignorance of copyright, the arbitrary edits are made and content is used. This infringes the right of the integrity of the work. When we produce and use cinematographic works and other audiovisual works, there are considerable variablilies stemming from authorship, production cost and program staff. Therefore, prior conscent is needed to acquire and use the copyright in a proper manner. However, due to production-oriented environment and low understanding of the copyright protection, we usually depend on the users' work practices rhather than insufficiency of copyright laws in dealing with the infringement of right to the industry. In conclusion, we need to provide meticulous work manual and to focus on systematic eduction of professional copyright manpower.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A Study on Survey of Improvement of Non Face to Face Education focused on Professor of Disaster Management Field in COVID-19 (코로나19 상황에서 재난분야 교수자를 대상으로 한 비대면 교육의 개선에 관한 조사연구)

  • Park, Jin Chan;Beck, Min Ho
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.640-654
    • /
    • 2021
  • Purpose: Normal education operation was difficult in the national disaster situation of Coronavirus Infection-19. Non-face-to-face education can be an alternative to face to face education, but it is not easy to provide the same level of education. In this study, the professor of disaster management field will identify problems that can occur in the overall operation and progress of non-face-to-face education and seek ways to improve non-face-to-face education. Method: Non-face-to-face real-time education was largely categorized into pre-class, in-class, post-class, and evaluation, and case studies were conducted through the professor's case studies. Result&Conclusion: The results of the survey are as follows: First, pre-class, it was worth considering providing a non-face-to-face educational place for professors, and the need for prior education on non-face-to-face educational equipment and systems was required. In addition, it seems necessary to make sure that education is operated smoothly by giving enough notice on classes and to make efforts to develop non-face-to-face education programs for practical class. Second, communication between professor and learner, and among learners can be an important factor in non-face-to-face mid classes. To this end, it is necessary to actively utilize debate-type classes to lead learners to participate in education and enhance the educational effect through constant interaction. Third, non-face-to-face post classes, policies on the protection of privacy due to video records should be prepared to protect the privacy of professors in advance, and copyright infringement on educational materials should also be considered. In addition, it is necessary to devise various methods for fair and objective evaluation. According to the results of the interview, in the contents, which are components of non-face-to-face education, non-face-to-face education requires detailed plans on the number of students, contents, and curriculum suitable for non-face-to-face education from the design of the education. In the system, it is necessary to give the professor enough time to fully learn and familiarize with the function of the program through pre-education on the program before the professor gives non-face-to-face classes, and to operate the helpdesk, which can thoroughly check the pre-examination before non-face-to-face education and quickly resolve the problem in case of a problem.

A study on the present situation of the treatment services provided by alcohol addiction specialized hospitals (알코올중독전문병원의 서비스 제공 현황에 관한 연구)

  • Cho, Hyun;Yoo, Jin-Yeong;Lee, Ji-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3547-3554
    • /
    • 2011
  • The aim of this study is to take hold of the present situation as well as the perspective of the domestic alcohol specialized hospitals. The structured questionnaire was prepared to understand the type of services, manpower and systematic programs. Among eight hospitals that stand for the alcohol addiction specialized hospitals, six hospitals agreed to participate in the survey, which was made from Jun. 17 to July 15, 2010. The average number of beds of the surveyed hospitals was 208. They were mostly private ones(66.7%), located in urban area(50%), and had experiences of alcohol treatment less than five years(50%). While all of them practiced both the inpatient and outpatient services, only 33% provided the systematic outpatient program that was at least 2 or 3 hours per week. All hospitals practiced the physical and individual psychological evaluations, but only 16.1% had the daytime programs. The beds of protective ward were 72% of all beds, and the beds of night and day occupied 7.6% and 2.6% respectively. It was found that although the average number of mental health social worker and mental health nurse was larger than that required in the regulation of mental health law there are significant deviations between hospitals. However, the manpower of psychiatrists and nurses were comparatively large. The first problem indicated by clinical experts was the patient's refusal of care, which results in an inefficiency in the treatment. The next problem was the lack of local health care institutions that can attend on the discharged patients were important issues. Also the low reimbursement and indifferences to the alcohol abuse were considered as important issues.