• Title/Summary/Keyword: Assignment Model

Search Result 552, Processing Time 0.03 seconds

A Study on the Model of Inter-library Cooperation's Network in the Information of Library Materials (정보의 상호협력을 위한 네트웍모형에 관한 연구)

  • 권기원
    • Journal of Korean Library and Information Science Society
    • /
    • v.4
    • /
    • pp.39-60
    • /
    • 1977
  • The purpose of this study is to build a model of inter-library cooperation's network in the information of library materials. Results of this study are 1. The YTational Assembly Library and the Central National I, ibrar:; should be unified. 2. The unified organization should be organized its cooperative quarter for itself (in the Central National Library). .And every library should he organized his quarter and personnel for the inter-library cooperation. 3. The cooperatior, organization in the re~ion should organized by the Regional Central Public Library. 4. In case of the Central National Library, financial problems required of the performance in the inter-library cooperation should he charged equally among the Central National Library, the library belong to the reader and the reader. In case of the regional Central Public Library, it should be charged equally arnozlg the regional Central Public Library, the library belon-g' to the reader and the reader. 5. The Regional Central Public Library in the seat of provincial government should be managed the cooperation's work of the individual library, and upward the unified Central Xarional Library should generalize. 6. The purchase of materials should be done by the character of the each library 1r:ith the assignment of the each subject should be decided in the meeting of the each library personne!. -2nd the budget for purchasing per the year should be decided on the minimum by the circumstances of the each library regionally. 7. The unified Regional Central Public Library in the seat of provincial government should be charged of the Union Catalog's expense regionally, and the Central National Library should be charged of that National Union Catalog's expense to cumulative the Fegional Union Catalog within a definite period of time. 8. Books without presentation of a specimen copy to the unified Central National Library should be purchased, and r.cr 'oe included to the National Union Catalog. 9. The cooperation of the each library should be decided on the law, and considered the character of the each region.

  • PDF

Learning Effects of Flipped Learning based on Learning Analytics in SW Coding Education (SW 코딩교육에서의 학습분석기반 플립러닝의 학습효과)

  • Pi, Su-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.19-29
    • /
    • 2020
  • The study aims to examine the effectiveness of flipped learning teaching methods by using learning analytics to enable effective programming learning for non-major students. After designing a flipped learning programming class model applied with the ADDIE model, learning-related data of the lecture support system operated by the school was processed with crawling. By providing data processed with crawling through a dashboard so that the instructor can understand it easily, the instructor can design classes more efficiently and provide individually tailored learning based on this. As a result of analysis based on the learning-related data collected through one semester class, it was found that the department, academic year, attendance, assignment submission, and preliminary/review attendance had an effect on academic achievement. As a result of survey analysis, they responded that the individualized feedback of instructors through learning analysis was very helpful in self-directed learning. It is expected that it will serve as an opportunity for instructors to provide a foundation for enhancing teaching activities. In the future, the contents of social network services related to learners' learning will be processed with crawling to analyze learners' learning situations.

Group Key Management with Low Cost Rekey (저비용 rekey를 갖는 그룹키 관리)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • The Internet today provides group communication model, multicast service. It is important to keep security for multicast communication. Member leaving is associated with scalability problem for group key management. If one member of the group is removed, new group key has to be changed and communicated to all remaining members of group. Modification and distribution of new group keys for rekeying is an expensive operation. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme. Periodic rekey helps reducing these important parameters rather than removing members sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm, our model has advantages of reducing the number of message and operation cost for generation of the composite keys for rekeying.

  • PDF

A Dynamic Analysis of Distribution Network for SCP (DC와 DC의 상호작용을 고려한 분배망 분석 기법)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Dong-Wook
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1207-1212
    • /
    • 2003
  • As development of the e-commerce, the distributing network for a logistics currency is more complicated. A management of the distributing network (DN) is important factor in distribution planning. The DN can be expressed to distribution center (DC) and the interaction of DC. An internal factor of DC and an external factor to occur by an interaction of DC have many influences on the DN. Therefore, for an efficient DN management plan, analysis of the DN that considered DC and an interaction of DC is required. Until now a study on a viewpoint of supply chain management as resources assignment was performed, but the study on analysis of the distribution network was not performed. This paper propose the distribution network analysis technique that considered DC and an interaction of DC. A proposed technique consists of two steps largely. First of all a DN is expressed with the graph that included an interaction of DC and DC. It uses a reachibility tree, and the following, a DN expressed with a graph is analyzed. Also we presented an example model, and show an usefulness of proposal technique with the analysis of this model.

Lateral-Directional Dynamic Inversion Control Applied to Supersonic Trainer (초음속 고등훈련기 가로-방향축 모델역변환 비행제어법칙 설계)

  • Kim, Chongsup;Ji, Changho;Cho, In-Je
    • Journal of Aerospace System Engineering
    • /
    • v.8 no.4
    • /
    • pp.24-31
    • /
    • 2014
  • The modern version of aircrafts is allowed to guarantee the superior handing qualities within the entire flight envelope by imposing the adequate stability and flying qualities on a target aircraft through the various techniques of flight control law design. Generally, the flight control law of the aircraft in service applies the various techniques of the verified control algorithm, such as dynamic inversion and eigenstructure assignment. The supersonic trainer employs the RSS(Relaxed Static Stability) concept in order to improve the aerodynamic performance in longitudinal axis and the longitudinal control laws employ the dynamic inversion with proportional-plus-integral control method. And, lateral-directional control laws employ the blended roll system of both beta-betadot feedback and simple roll rate feedback with proportional control method in order to guarantee aircraft stability. In this paper, the lateral-directional flight control law is designed by applying dynamic inversion control technique as a different method from the current supersonic trainer control technique, where the roll rate command system is designed at the lateral axis for the rapid response characteristics, and the sideslip command system is adopted at the directional axis for stability augmentation. The dynamic inversion of a simple 1st order model is applied. And this designed flight control law is confirmed to satisfy the requirement presented from the military specification. This study is expected to contribute to design the flight control law of KF-X(Korean Fighter eXperimental) which will proceed into the full-scale development in the near future.

Reliable Hub Location Problems and Network Design (신뢰성에 기반한 허브 입지 모델과 네트워크 디자인)

  • Kim, Hyun
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.540-556
    • /
    • 2009
  • The hub and spoke network is a critical network-based infrastructure that is widely applied in current transportation and telecommunications systems, including Internets, air transportation networks and highway systems. This main idea of hub location models is to construct a network system which achieves the economy of scale of flows. The main purpose of this study is to introduce new hub location problems that take into account network reliability. Two standard models based on assignment schemes are proposed, and a minimum threshold model is provided as an extension in terms of hub network design. The reliability and interaction potentials of 15 nodes in the U.S. are used to examine model behaviors. According to the type of models and reliability, hubs, and minimum threshold levels, relationships among the flow economy of scale, network costs, and network resiliency are analyzed.

  • PDF

Adaptive Multi-Layer Security Approach for Cyber Defense (사이버 방어를 위한 적응형 다중계층 보호체제)

  • Lee, Seong-kee;Kang, Tae-in
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.1-9
    • /
    • 2015
  • As attacks in cyber space become advanced and complex, monotonous defense approach of one-one matching manner between attack and defense may be limited to defend them. More efficient defense method is required. This paper proposes multi layers security scheme that can support to defend assets against diverse cyber attacks in systematical and adaptive. We model multi layers security scheme based on Defense Zone including several defense layers and also discuss essential technical elements necessary to realize multi layers security scheme such as cyber threats analysis and automated assignment of defense techniques. Also effects of multi layers security scheme and its applicability are explained. In future, for embodiment of multi layers security scheme, researches about detailed architecture design for Defense Zone, automated method to select the best defense technique against attack and modeling normal state of asset for attack detection are needed.

Comparative Study on Various Ductile Fracture Models for Marine Structural Steel EH36

  • Park, Sung-Ju;Lee, Kangsu;Cerik, Burak Can;Choung, Joonmo
    • Journal of Ocean Engineering and Technology
    • /
    • v.33 no.3
    • /
    • pp.259-271
    • /
    • 2019
  • It is important to obtain reasonable predictions of the extent of the damage during maritime accidents such as ship collisions and groundings. Many fracture models based on different mechanical backgrounds have been proposed and can be used to estimate the extent of damage involving ductile fracture. The goal of this study was to compare the damage extents provided by some selected fracture models. Instead of performing a new series of material constant calibration tests, the fracture test results for the ship building steel EH36 obtained by Park et al. (2019) were used which included specimens with different geometries such as central hole, pure shear, and notched tensile specimens. The test results were compared with seven ductile fracture surfaces: Johnson-Cook, Cockcroft-Latham-Oh, Bai-Wierzbicki, Modified Mohr-Coulomb, Lou-Huh, Maximum shear stress, and Hosford-Coulomb. The linear damage accumulation law was applied to consider the effect of the loading path on each fracture surface. The Swift-Voce combined constitutive model was used to accurately define the flow stress in a large strain region. The reliability of these simulations was verified by the good agreement between the axial tension force elongation relations captured from the tests and simulations without fracture assignment. The material constants corresponding to each fracture surface were calibrated using an optimization technique with the minimized object function of the residual sum of errors between the simulated and predicted stress triaxiality and load angle parameter values to fracture initiation. The reliabilities of the calibrated material constants of B-W, MMC, L-H, and HC were the best, whereas there was a high residual sum of errors in the case of the MMS, C-L-O, and J-C models. The most accurate fracture predictions for the fracture specimens were made by the B-W, MMC, L-H, and HC models.

A Study on Criteria for the Manpower Required by Records Management in the Archives (기록물관리기관 소요 인력 산출 기준에 관한 연구)

  • Shin, Won Boo;Lim, Sin Young;Chu, Byung Joo
    • The Korean Journal of Archival Studies
    • /
    • no.62
    • /
    • pp.77-107
    • /
    • 2019
  • There have been constant requests for urgently recruiting professionals in the archives to establish archival management systems by reflecting public institutional feature as well as reinforcing expertise and independence of them. However, it is true that some even adequate professional manpower haven't been secured at each level of public institutions due to ambiguous standards for the placement of professionals in the field of records management followed by the current [Public Records Management Act]. Thereupon, this study is to create records management task model for the archival management institutions with the workload of records management induced by the model, and to present reasonable scale of workforce to deal with the assignment. Moreover, here is shown which professional staff should be allocated for better efficiency and systems to carry out the task of records management in each relevant institution.

Scheduling of Printing Process in which Ink Color Changes Exist (잉크 색상 변화가 존재하는 인쇄 공정의 스케줄링)

  • Moon, Jae Kyeong;Uhm, Hyun Seop;Tae, Hyun Chul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.32-42
    • /
    • 2021
  • The printing process can have to print various colors with a limited capacity of printing facility such as ink containers that are needed cleaning to change color. In each container, cleaning time exists to assign corresponding inks, and it is considered as the setup cost required to reduce the increasing productivity. The existing manual method, which is based on the worker's experience or intuition, is difficult to respond to the diversification of color requirements, mathematical modeling and algorithms are suggested for efficient scheduling. In this study, we propose a new type of scheduling problem for the printing process. First, we suggest a mathematical model that optimizes the color assignment and scheduling. Although the suggested model guarantees global optimality, it needs a lot of computational time to solve. Thus, we decompose the original problem into sequencing orders and allocating ink problems. An approximate function is used to compute the job scheduling, and local search heuristic based on 2-opt algorithm is suggested for reducing computational time. In order to verify the effectiveness of our method, we compared the algorithms' performance. The results show that the suggested decomposition structure can find acceptable solutions within a reasonable time. Also, we present schematized results for field application.