• Title/Summary/Keyword: 시스템 지연

Search Result 3,891, Processing Time 0.032 seconds

An Design of Analyzing Process by Construction Extension of Time (공기연장 분쟁의 공사기간 분석 프로세스 설계에 관한 연구)

  • Kim, Beop-su;Seong, Gi-gang;Bae, In-ho;Bang, Hong-soon;Choi, Hyeong-jin;Kim, Ok-kyue
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.4
    • /
    • pp.104-113
    • /
    • 2019
  • Construction dispute about Extension of Time are complexly intertwined with various issues. The duration delay analysis defines the impact the issue has on the duration variation. And The international court and the arbitrator use the results of the analysis as a basis for reasonable duration judging. However, most of the domestic Construction sites have not established a business process for Extension of Time litigation. Therefore, Analysis data are collected after the occurrence of the dispute, there is not enough basic data of analysis almost. This study sought to improve the management efficiency by organizing information requirement for delay analysis and suggesting a reasonable business process. As a result of applying the proposed process to actual construction duration extension disputes, about 33% of practitioners, 46% of contractors, and 48% of legal advisors were satisfied with the process application site And Matrix validation was 91% identical. This study suggests that it is possible to increase the efficiency of the construction duration analysis work used as a basis in the construction dispute. Finally, the Computer based system design for this process should continue in the future.

Connectivity Assessment Based on Circuit Theory for Suggestion of Ecological Corridor (생태축 제안을 위한 회로 이론 기초 연결성 평가)

  • Yoon, Eun-Joo;Kim, Eun-Young;Kim, Ji-Yeon;Lee, Dong Kun
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.3
    • /
    • pp.275-286
    • /
    • 2019
  • In order to prevent local extinction of organisms and to preserve biodiversity, it is important to ensure connectivity between habitats. Even if the habitat is exposed to various disturbance factors, it is possible to avoid or respond to disturbances if they are linked to other habitats. Habitat connectivity can be assessed from a variety of perspectives, but the importance of functional connectivity based on species movement has been emphasized in recent years due to the development of computational capabilities and related software. Among them, Circuitscape, which is a connectivity evaluation tool, has an advantage it can provide detailed reference data for the city planning because it maps ecological flows on individual grid based on circuit theory. Therefore, in this study, the functional connectivity of Suwon was evaluated by applying Circuitscape and then, the ecological corridor to be conserved and supplemented was suggested based on it. The results of this study are expected to effectively complement the methodology related ecological corridor/axis, which was previously provided only in the form of a diagram, and to be effective in management of development project and urban planning.

A Study on the Determinants of Capital Structure of Agricultural Corporations (농업법인의 자본구조 결정요인 연구)

  • Byun, Ji-Yeon;Im, In-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.368-377
    • /
    • 2021
  • This study analyzed the determinants of capital structure based on the financial statements of agricultural corporations disclosed on the DART(data analysis, retrieval and transfer system) of the Financial Supervisory Service since 2011, when the Korea international financial reporting standards (K-IFRS) was introduced. There have been many empirical studies on the capital structure so far, but there are no studies targeting agricultural corporations. The sample period of agricultural corporations was from 2015 to 2019, with the debt ratio as the dependent variable, and among the variables suggested as meaningful in existing empirical studies, ROA(profitability), SIZE(corporate size), LIQ(liquidity), TA(tangible asset ratio), FA(fixed long-term suitability ratio), and GROWTH(growth potential) were selected as independent variables and panel data analysis was performed. As a result of the analysis, it was found that the debt ratio decreased as the ROA and SIZE of agricultural corporations increased. This can be interpreted as supporting the pecking order theory rather than the static trade-off theory in the relationship between the ROA and SIZE of Korean agricultural corporations with the capital structure. In addition, it was found that the debt ratio increased as the FA increased. These results suggest that Korean agricultural corporations need to establish a financing policy in consideration of ROA, SIZE, and FA.

Implementation of High-radix Modular Exponentiator for RSA using CRT (CRT를 이용한 하이래딕스 RSA 모듈로 멱승 처리기의 구현)

  • 이석용;김성두;정용진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.81-93
    • /
    • 2000
  • In a methodological approach to improve the processing performance of modulo exponentiation which is the primary arithmetic in RSA crypto algorithm, we present a new RSA hardware architecture based on high-radix modulo multiplication and CRT(Chinese Remainder Theorem). By implementing the modulo multiplier using radix-16 arithmetic, we reduced the number of PE(Processing Element)s by quarter comparing to the binary arithmetic scheme. This leads to having the number of clock cycles and the delay of pipelining flip-flops be reduced by quarter respectively. Because the receiver knows p and q, factors of N, it is possible to apply the CRT to the decryption process. To use CRT, we made two s/2-bit multipliers operating in parallel at decryption, which accomplished 4 times faster performance than when not using the CRT. In encryption phase, the two s/2-bit multipliers can be connected to make a s-bit linear multiplier for the s-bit arithmetic operation. We limited the encryption exponent size up to 17-bit to maintain high speed, We implemented a linear array modulo multiplier by projecting horizontally the DG of Montgomery algorithm. The H/W proposed here performs encryption with 15Mbps bit-rate and decryption with 1.22Mbps, when estimated with reference to Samsung 0.5um CMOS Standard Cell Library, which is the fastest among the publications at present.

A Study on the Runoff Reduction According to the Calculation Method of the LID Scale Considering the Land Use Area and the Application of Stormwater Storage Basin (토지이용면적을 고려한 LID 규모 산정 및 우수저류지 적용에 따른 유출저감 연구)

  • Kim, Byung Sung;Kim, Jea Moon;Kim, Seong Su;Shin, Gang Wook;Lee, Sang Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.3
    • /
    • pp.229-235
    • /
    • 2021
  • Globally, due to climate change and urbanization, problems with water cycle destruction in urban areas frequently occur. In order to solve this problem, LID technique is being actively conducted the application in urban and research. In this study, some areas of the new city located in Busan was constructed using a widely used SWMM model to verify the effectiveness of the LID technique. This is to present a plan to maximize the efficiency of urban water cycle of the stormwater management target figure and the LID scale calculation method. In addition, the efficiency of runoff reduction using stormwater storage basin was analyzed in urban development projects. By calculating the scale of customized LID for each sub basin, the amount of runoff and peak runoff after LID application was reduced by 86.8 % and 69.5 %, respectively. Depending on the application of the stormwater storage basin, the reduction effect of peak runoff from 0.5 m3/s to 4.9 m3/s and delay effect of 8 minutes to 10 minutes was shown.

Detection of Zebra-crossing Areas Based on Deep Learning with Combination of SegNet and ResNet (SegNet과 ResNet을 조합한 딥러닝에 기반한 횡단보도 영역 검출)

  • Liang, Han;Seo, Suyoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.3
    • /
    • pp.141-148
    • /
    • 2021
  • This paper presents a method to detect zebra-crossing using deep learning which combines SegNet and ResNet. For the blind, a safe crossing system is important to know exactly where the zebra-crossings are. Zebra-crossing detection by deep learning can be a good solution to this problem and robotic vision-based assistive technologies sprung up over the past few years, which focused on specific scene objects using monocular detectors. These traditional methods have achieved significant results with relatively long processing times, and enhanced the zebra-crossing perception to a large extent. However, running all detectors jointly incurs a long latency and becomes computationally prohibitive on wearable embedded systems. In this paper, we propose a model for fast and stable segmentation of zebra-crossing from captured images. The model is improved based on a combination of SegNet and ResNet and consists of three steps. First, the input image is subsampled to extract image features and the convolutional neural network of ResNet is modified to make it the new encoder. Second, through the SegNet original up-sampling network, the abstract features are restored to the original image size. Finally, the method classifies all pixels and calculates the accuracy of each pixel. The experimental results prove the efficiency of the modified semantic segmentation algorithm with a relatively high computing speed.

An Exploratory Study on Discarded Books in Academic Libraries (대학도서관 단행본 자료의 장서폐기에 관한 연구)

  • Lee, Yong Min;Lee, Jee Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.1
    • /
    • pp.71-86
    • /
    • 2021
  • This study attempted to discover the problems related to the increasing book disposal trend within academic libraries by analyzing the disposal status over ten years and interviews with the librarians. The analysis utilized Korea Education and Research Information Service provided disposal information from 2010 to 2019. The academic libraries with more than 2 million books had disposed of the most number of books. This trend led to a distinctive decrease in the books' duplicate copies in terms of the collection composition. The librarians from the organizations, which conducted disposal more than three times and one massive removal within ten years, revealed in the interviews that they discarded many valuable duplicate books. They discussed the importance of digitizing high-value resources and also the limitation imposed by the copyright law. In conclusion, this study pointed out that book disposal can cause changes in the collection composition in the long run and suggested that academic libraries pay attention to these changes. The study also suggested evaluating the discarded books' values to guide the digitization efforts and count the number of books to include digital book use rights.

Trend Analysis of Earthquake Researches in the World (전세계의 지진 연구의 추세 분석)

  • Yun, Sul-Min;Hamm, Se-Yeong;Jeon, Hang-Tak;Cheong, Jae-Yeol
    • Journal of the Korean earth science society
    • /
    • v.42 no.1
    • /
    • pp.76-87
    • /
    • 2021
  • In this study, temporal trend of researches in earthquake with groundwater level, water quality, radon, remote sensing, electrical resistivity, gravity, and geomagnetism was searched from 2001 to 2020, using the journals indexed in Web of Science, and the number of articles published in international journals was counted in relation to the occurrences of earthquakes (≥Mw 5.0, ≥Mw 6.0, ≥Mw 7.0, ≥Mw 8.0, and ≥Mw 9.0). The number of articles shows an increasing trend over the studied period. This is explained by that studies on earthquake precursor and seismic monitoring becomes active in various fields with integrated data analysis through the development of remote sensing technology, progress of measurement equipment, and big data. According to Mann-Kendall and Sen's tests, gravity-related articles exhibit an increasing trend of 1.30 articles/yr, radon-related articles (0.60 articles/yr), groundwater-related articles (0.70 articles/yr), electrical resistivity-related articles (0.25 articles/yr), and remote-sensing-related articles (0.67 articles/yr). By cross-correlation analysis of the number of articles in each field with removing trend effect and the number of earthquakes of ≥Mw 5.0, ≥Mw 6.0, ≥Mw 7.0, ≥Mw 8.0, and ≥Mw 9.0, radon and remote sensing fields exhibit a high cross-correlation with a delay time of one year. In addition, large-scale earthquakes such as the 2004 and 2005 Sumatra earthquake, the 2008 Sichuan earthquake, the 2010 Haiti earthquake, and the 2010 Chile earthquake are estimated to be related with the increase in the number of articles in the corresponding periods.

A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT(Open Source Intelligence) (표면 웹기반 공개정보 수집을 위한 워크플로우 확장 연구)

  • Lee, SuGyeong;Choi, Eunjung;Kim, Jiyeon;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • In traditional criminal cases, there is a limit to information collection because information on the subject of investigation is provided only with personal information held by the national organization of legal. Surface web-based OSINT(Open Source Intelligence), including SNS and portal sites that can be searched by general search engines, can be used for meaningful profiling for criminal investigations. The Korean-style OSINT workflow can effectively profile based on OSINT, but in the case of individuals, OSINT that can be collected is limited because it begins with "name", and the reliability is limited, such as collecting information of the persons with the same name. In order to overcome these limitations, this paper defines information related to individuals, i.e., equivalent information, and enables efficient and accurate information collection based on this. Therefore, we present an improved workflow that can extract information related to a specific person, ie., equivalent information, from OSINT. For this purpose, different workflows are presented according to the person's profile. Through this, effective profiling of a person (individuals) is possible, thereby increasing reliability in collecting investigation information. According to this study, in the future, by developing a system that can automate the analysis process of information collected using artificial intelligence technology, it can lay the foundation for the use of OSINT in criminal investigations and contribute to diversification of investigation methods.

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.