• Title/Summary/Keyword: 효율 성

Search Result 38,567, Processing Time 0.064 seconds

A study on the Human Resources Development Strategy for Korean Companies in China (중국진출 한국기업의 현지인력 개발 전략에 관한 연구 - 중국 하얼빈지역 진출기업을 중심으로 -)

  • Kim, Jong-Deuk;Kim, Jang-Ho
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.29-52
    • /
    • 2012
  • Since diplomatic relations with China in 1992, many Korean companies have entered into China and that expansion is currently continuing. But now, many of Korean enterprises tend to withdraw and return to the domestic, this is because that major factors are too much fast increasing in labor costs and the difficulty of local workforce management. In this study, it is researched that the type of human resource management of Korean firms entering into Heilongjiang Province, Harbin and the similarities and differences were investigated by comparing the form of personnel management of existing areas and Harbin area, and then this study was conducted the survey and interview of domestic companies operating in Harbin, to pursuit the efficient way to manage the workforce development and management strategies. The result of researches and workforce development strategies of entering firms are as follows; First, it is required to establish a human resource discovery system for entering companies in focusing on managerial work ability and on blue-collar which is separated by professional and technical experts and a simple blue-collar people. Second, it is required to entering companies that they have to grow up the promotion and exchange of the Department of Korean Studies in Harbin and have to build the industry and universities training programs to promote needed experts, and have to establish the expert pool systems to support the flexible labor supply.

  • PDF

Characteristics of Gaeryangmerou Wine deacidified by Calcium Carbonate (탄산칼슘 처리에 의한 개량머루주의 감산 특성)

  • Kim, Chan-Woo;Jeon, Jin-A;Kang, Ji-Eun;Choi, Han-Seok;Yeo, Soo-Hwan;Jeong, Seok-Tae
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.26 no.6
    • /
    • pp.559-564
    • /
    • 2016
  • We investigated the effect of calcium carbonate on the quality of wine obtained from Gaeryangmerou (Vitis. spp.), grapes, which are commonly used in wine making in Korea. Alcoholic fermentation was carried out at $25^{\circ}C$, for 7 days in the presence of 0.1%, 0.2%, and 0.3% calcium carbonate. As calcium carbonate concentration increased, the pH of wine increased, while its total acid content and redness decreased. Calcium carbonate treatment during precipitation and aging is more effective than during fermentation. Concentrations of alcohol, total anthocyanin, polyphenol, and tannin showed no significant differences between controls and deacidified groups. Tartaric and malic acids were found to be the major acids in Gaeryangmerou wine. Calcium carbonate reduced total acidity by precipitating tartaric acid. In the sensory evaluation of the acidity, and overall acceptability, wine treated with 0.1% calcium carbonate was the best. Higher calcium carbonate concentration, was associated with greater reduction in total wine acidity. However, it is necessary to maintain the calcium carbonate concentration within 0.1% since excessive amounts of calcium carbonate can have a negative effect on wine quality.

Improvement of Flexible Zerotree Coder by Efficient Transmission of Wavelet Coefficients (웨이블렛 계수의 효율적인 전송에 따른 가변제로트리코더의 성능개선)

  • Joo, Sang-Hyun;Shin, Jae-Ho
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.9
    • /
    • pp.76-84
    • /
    • 1999
  • EZW proposed by Shapiro is based on a zerotree constructed in a way that a parent coefficient in a subband is related to four child coefficients in the next finer subband of similar orientation. This fixed treeing based on 1-to-4 parent-child is suitable to exploti hierachical correlations among subbands but not to exploit spatial correlations within a subband. A new treeing by Joo, et al. is suggested to simulatneously exploit those two correlatins by extending parent-child relationship in a flexible way. The flexible treeing leads to increasing the number of symbols and lowering entorpy comparing to the fixed treeing, and therefore a better compression can be resulted. In this paper, we suggest two techniques to suppress the increasing of symbols. First, a probing bit is generated to avoid redundant scan for insignivicant coefficients. Second, since all subbands do not always require the same kind of symbol-set, produced symbols are re-symbolized into binary codes according to a pre-defined procedure. Owing to those techniques, all symbols are generated as binary codes. The binary symbols can be entropy-coded by an adaptive arithmetic coding. Moerover, the binary symbol stream can give comparatively good performances without help of additional entropy coding. Our proposed coding scheme is suggested in two modes: binary coding mode and arithmetic coding mode. We evaluate the effectivenessof our modifications by comparing with the original EZW.

  • PDF

Contents Based Partial Encryption of GIS Vector Map (GIS 벡터맵의 콘텐츠 기반 선택적 암호화 기술)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.88-98
    • /
    • 2011
  • Recently, according as the importance of GIS(geography information system) database security is embossed, much researches had been achieved about GIS network security. But most such researches are weak against sourceful illegal reproductions and distributions of GIS vector data map. In this paper, we proposed an efficient layer unit contents based partial encryption technique in the vector map compression domain to prevent illegal distributions and unauthorized accesses. This method achieves a partial encryption about each central coordinate and directional parameters of a MCA(minimum coding attribute) that is created at the vector map compression processing in the vector space. First, the position encryption is applied as permutating randomly the center coordinate of each record that is minimum unit of vector map shape. And second, the direction encryption that changing shapes of vector map topography is applied as encrypting the direction of vertices's coordinates of each record. In experimental results, we confirmed that our proposed method can encipher the large volumed vector map data effectively in low computational complexity. Also, we could minimize the decline of compression efficiency that occurred by conventional contents based encryption schemes using AES or DES algorithms.

Accelerated Convolution Image Processing by Using Look-Up Table and Overlap Region Buffering Method (Loop-Up Table과 필터 중첩영역 버퍼링 기법을 이용한 컨벌루션 영상처리 고속화)

  • Kim, Hyun-Woo;Kim, Min-Young
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.4
    • /
    • pp.17-22
    • /
    • 2012
  • Convolution filtering methods have been widely applied to various digital signal processing fields for image blurring, sharpening, edge detection, and noise reduction, etc. According to their application purpose, the filter mask size or shape and the mask value are selected in advance, and the designed filter is applied to input image for the convolution processing. In this paper, we proposed an image processing acceleration method for the convolution processing by using two-dimensional Look-up table (LUT) and overlap-region buffering technique. First, based on the fixed convolution mask value, the multiplication operation between 8 or 10 bit pixel values of the input image and the filter mask values is performed a priori, and the results memorized in LUT are referred during the convolution process. Second, based on symmetric structural characteristics of the convolution filters, inherent duplicated operation region is analysed, and the saved operation results in one step before in the predefined memory buffer is recalled and reused in current operation step. Through this buffering, unnecessary repeated filter operation on the same regions is minimized in sequential manner. As the proposed algorithms minimize the computational amount needed for the convolution operation, they work well under the operation environments utilizing embedded systems with limited computational resources or the environments of utilizing general personnel computers. A series of experiments under various situations verifies the effectiveness and usefulness of the proposed methods.

Distributed Multi-view Video Coding Based on Illumination Compensation (조명보상 기반 분산 다시점 비디오 코딩)

  • Park, Sea-Nae;Sim, Dong-Gyu;Jeon, Byeung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.6
    • /
    • pp.17-26
    • /
    • 2008
  • In this paper, we propose a distributed multi-view video coding method employing illumination compensation for multi-view video coding. Distributed multi-view video coding (DMVC) methods can be classified either into a temporal or an inter-view interpolation-based ones according to ways to generate side information. DMVC with inter-view interpolation utilizes characteristics of multi-view videos to improve coding efficiency of the DMVC by using side information based on the inter-view interpolation. However, mismatch of camera parameters and illumination change between two views could bring about inaccurate side information generation. In this paper, a modified distributed multi-view coding method is presented by applying illumination compensation in generating the side information. In the proposed encoder system, in addition to parity bits for AC coefficients, DC coefficients are transmitted as well to the decoder side. By doing so, the decoder can generate more accurate side information by compensating illumination changes with the transmitted DC coefficients. We found that the proposed algorithm is $0.1{\sim}0.2\;dB$ better than the conventional algorithm that does not make use of illumination compensation.

Characteristics and Methods of Bandwidth Allocation According to Flow Features for QoS Control on Flow-Aware Network (Flow-Aware Network에서 QoS제어를 위해 Flow 특성에 따른 대역할당 방법과 특성)

  • Kim, Jae-Hong;Han, Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.9
    • /
    • pp.39-48
    • /
    • 2008
  • Recently, many multimedia services have emerged in Internet such as real-time and non- real time services. However, in this Internet environment, we have some limitations to satisfy each service feature. To guarantee the service features in Measurement-Based Admission Control(MBAC) based system on the flow-aware network, there is the method applying Dynamic Priority Scheduling(DPS) algorithm that gives a higher priority to an earlier incoming flow in all of the link bandwidth. This paper classifies all flows under several groups according to flow characteristics on per-flow MBAC algorithm based system. In each flow group, DPS algorithm is applied. This paper proposes two methods that are a DPS based bandwidth borrowing method and a bandwidth dynamic allocation method. The former is that if low priority class has available bandwidths, the flow of high priority class borrows the bandwidth of low priority class when high priority flow has insufficient bandwidth to connect a flow call. The later is that the each group has a minimum bandwidth and is allocated the bandwidth dynamically according to the excess rate for available bandwidth. We compare and analyze the characteristics of the two proposed methods through the simulation experiments. As the results of the experiment, the proposed methods are more effective than existing DPS based method on the packet loss and delay characteristics. Consequently the proposed two methods are very useful in various multimedia network environments.

A Rule-based Reasoning Engine supporting Hierarchical Taxonomy (계층적 분류체계를 지원하는 규칙기반 추론엔진)

  • Kim, Tae-Hyun;Kim, Jae-Ho;Won, Kwang-Ho;Lee, Ki-Hyuk;Sohn, Ki-Rack
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.148-154
    • /
    • 2008
  • In a ubiquitous computing environment, a ubiquitous smart space is required to help devices provide intelligent services. The smart space embedded with mobile devices should have the capabilities of collecting data and refining the data to contact. Unfortunately, the context information in a ubiquitous smart space has many ambiguous characteristics. Therefore, it is necessary to adapt a standard taxonomy for contact information in the smart space and to implement an inference technique of the context information based on taxonomy. Rule-based inference engine, such as CLIPS, Jess, was employed for providing situation-aware services. However, it is difficult for these engines to be used in resource limited mobile devices. In this paper, we propose a light-weight inference engine providing autonomous situation aware services in mobile environment. It can be utilized for personal mobile devices tuck as mobile phone, PMP and navigation. It can also support both generalized rules and specialized rules as using hierarchical taxonomy information.

A Method of Inspecting ITO Pattern and Node Using Measured Data of Each Node's Mutual Capacitance ITO Sensor (상호 유도 정전하 방식 ITO 센서의 노드별 측정 데이터를 이용한 ITO패턴과 노드 검사 방법)

  • Han, Joo-Dong;Moon, Byoung-Joon;Choi, Kyung-Jin;Kim, Dong-Han
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.230-238
    • /
    • 2014
  • In this paper, we propose the possible way of accurate analysis and examination of ITO sensor to discriminate whether mutual capacitance ITO sensor is defective by using mutual capacitance of data in each node which consists of electrodes inside of ITO sensor. We have analyzed the structure characteristic of mutual capacitance ITO sensor which is used as an input device for not only small size electronics like mobile phone and tablets but also big size electronics and designed the circuit to inspect ITO sensor using touch screen panel IC. Set a variable related with mutual capacitance of charge and discharge and Implement to find and analyze accurate position when defect is made through the data from each node of ITO sensor. First, we can set a yield effective range through the first experiment data of mutual capacitance ITO sensor and by using the data of each node of ITO sensor which is the result from the second experiment, we can verify accuracy and effectiveness of effective range from the first experiment as a sample which is used in this experiment.

Improving the performance of Multipath TCP using Delay Alerted Path-blocking Scheduler in Heterogeneous Networks (이종 망에서의 지연경보 경로차단 스케줄러를 이용한 MPTCP성능 개선방안)

  • Kim, Min Sub;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.2
    • /
    • pp.28-37
    • /
    • 2017
  • Multipath TCP (MPTCP), which is a layer 4 protocol that can get the reliability and the efficiency of the transmission by using multipath transfer, was standardized by the IETF. MPTCP provides superior performance when compared to a single TCP when used in a homogeneous network with similar network characteristics. However, MPTCP degrades performance when used in heterogeneous networks with different network characteristics. In this paper, we propose 'Delay-alerted path-blocking scheduler'. It measures the delay of each path and blocks the path with a long delay to reduce the order of packets in the receive buffer. If the duplicated packet is sent to the blocked path to measure the delay and the congestion on the blocking path is reduced, the blocked path is unblocked. For performance analysis, the proposed scheduler was implemented in the Linux kernel and improved performance was obtained in the test bed. We also confirmed that the proposed scheduler reduces the degradation of MPTCP performance in real wireless networks with heterogeneous path characteristics.