• Title/Summary/Keyword: Efficiency scope

Search Result 300, Processing Time 0.023 seconds

Difference Test of the factors in ISP and ERP (ISP 수립과 ERP 구성요소에 대한 차이 검증)

  • Kim, Min-Cheol;Kim, Jong-Hoon;Kim, Keun-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1807-1813
    • /
    • 2007
  • This study provides the most simplified ISP method while involving management strategy, organization process analysis, redesign and information system implementation strategy to enhance the feasibility and the efficiency of ISP. So this study compared the scope and the development projects of ISP and ERP. Through this, it provided a ISP connection model as a solution to effective process implementation and redesign and conducted study to provide systematic access method according to IT strategy implementation, process redesign and reengineering.

Aliphatic radiofluorination using TBAHCO3 eluate in hydrous organic medium

  • Kwon, Young-Do;Son, Jeongmin;Chun, Joong-Hyun
    • Journal of Radiopharmaceuticals and Molecular Probes
    • /
    • v.4 no.2
    • /
    • pp.51-56
    • /
    • 2018
  • Azeotropic drying process is routinely applied to enhance nucleophilicity of $[^{18}F]$fluoride ion during the nucleophilic production of PET radiotracers; however, the drying process requires usually 15-25 min. Due to the high demand of employing fluorine-18 ($t_{1/2}=109.8min$) in PET radiopharmaceutical production, several research groups have focused on the method development, obviating tedious removal process of the residual target water ($[^{18}O]H_2O$) for $[^{18}F]$fluoride ion complex to be used in radiofluorination. Some development in radiofluorination in a mixed organic solvent system was demonstrated with various aliphatic substrates, but only kryptand as a phase transfer agent was utilized in the reported method. Here, we extend to investigate the development scope of applicability with basic alkyl ammonium salt as a phase transfer agent through the extensive elution efficiency study and radiofluorination outcome for aliphatic radiofluorination.

Unidirectional Flow: A Survey on Networks, Applications, and Characteristic Attributes

  • Rai, Laxmisha
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.518-536
    • /
    • 2021
  • Studies and applications related to unidirectional flow are gaining attention from researchers across disciplines in the recent years. Flow can be viewed as a concept, where the material, fluid, people, air, and electricity are moving from one node to another over a transportation network, water network, or through electricity distribution systems. Unlike other networks such as computer networks, most of the flow networks are visible and have strong material existence and are responsible for the flow of materials with definite shape and volume. The flow of electricity is also unidirectional, and also share similar features as of flow of materials such as liquids and air. Generally, in a flow network, every node in the network participates and contributes to the efficiency of the network. In this survey paper, we would like to evaluate and analyze the depth and application of the acyclic nature of unidirectional flow in several domains such as industry, biology, medicine, and electricity. This survey also provides, how the unidirectional flow and flow networks play an important role in multiple disciplines. The study includes all the major developments in the past years describing the key attributes of unidirectional flow networks, including their applications, scope, and routing methods.

On the Need for Efficient Load Balancing in Large-scale RPL Networks with Multi-Sink Topologies

  • Abdullah, Maram;Alsukayti, Ibrahim;Alreshoodi, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.212-218
    • /
    • 2021
  • Low-power and Lossy Networks (LLNs) have become the common network infrastructure for a wide scope of Internet of Things (IoT) applications. For efficient routing in LLNs, IETF provides a standard solution, namely the IPv6 Routing Protocol for LLNs (RPL). It enables effective interconnectivity with IP networks and flexibly can meet the different application requirements of IoT deployments. However, it still suffers from different open issues, particularly in large-scale setups. These include the node unreachability problem which leads to increasing routing losses at RPL sink nodes. It is a result of the event of memory overflow at LLNs devices due to their limited hardware capabilities. Although this can be alleviated by the establishment of multi-sink topologies, RPL still lacks the support for effective load balancing among multiple sinks. In this paper, we address the need for an efficient multi-sink load balancing solution to enhance the performance of PRL in large-scale scenarios and alleviate the node unreachability problem. We propose a new RPL objective function, Multi-Sink Load Balancing Objective Function (MSLBOF), and introduce the Memory Utilization metrics. MSLBOF enables each RPL node to perform optimal sink selection in a way that insure better memory utilization and effective load balancing. Evaluation results demonstrate the efficiency of MSLBOF in decreasing packet loss and enhancing network stability, compared to MRHOF in standard RPL.

Development of Automation Technology for Modeling of Railway Infrastructure using BIM Library (BIM 라이브러리를 활용한 철도 인프라의 모델링 자동화 기술 개발)

  • Kim, Yun-Ok;Moon, So-Yeong;Yoon, Hee-Taek;Park, Young-Kon;Kim, Ji-Young
    • Journal of KIBIM
    • /
    • v.12 no.3
    • /
    • pp.18-29
    • /
    • 2022
  • Recently, research on the application of BIM has continuously been active not only in architecture but also in civil engineering in order to improve work efficiency across the project's planning, design, construction and maintenance phases. However, the empirical applications of BIM targeting to civil engineering scope of construction sites still lags compared to architectural sized projects. This is because BIM tools are mainly based upon vertical structures of architecture, thereby most of them have difficulties and limitations to get utilized on horizontal structures of civil engineering. Therefore, this study intends to propose automation technology of design using BIM library and to indicate its field availability through case application on a railway project representing linear infrastructure. In addition, it put forward the utilization plan of the automation technology upto 4D and 5D by continue making use of the BIM model created in the project's design stage up through the maintenance stage. The novel method of the technology proposed in this paper incorporates the automatic creation of the BIM library based on two-dimensional tunnel cross-sections and sweeping of it over three-dimensional alignment to create a BIM model of linear infrastructure. The proposed technology is anticipated to improve the efficiecny of modeling process of railway projects based on linear structures.

A Study on the Improvement of Aviation Safety in Jeju Southern Air Corridor(AKARA-FUKUE Corridor) (제주남단 항공회랑(AKARA-FUKUE Corridor)의 항공안전 개선에 관한 연구)

  • Ahn, Hee-Bok;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.55-66
    • /
    • 2021
  • ICAO recommended that airspace monitoring and periodic safety assessments in each Contracting State ensure the stability of the airspace, since reducing the aircraft lateral and vertical separation intervals would rather increase the risk of collision. The target level of safety of the AKARA-FUKUE Corridor at the southern end of Jeju was 247×10-9. In simple comparison, this means that the risk of an aircraft collision in this area (international safety standards, 5.0×10-9) is about 50 times higher. The scope of this study is to organize the concept of terms, analyze the air traffic volume, the current status of navigational safety facility usage fees, and investigations of an aircraft collision risk in Jeju southern air corridor. Analyzing government policies and overseas evaluations, revising some of the existing contents, presenting some of the additional contents of new routes, and changing the instrument procedure for Korean-Chinese routes, change of arrive/departure route between Incheon Airport and Shanghai Airport, reduce the risk of aircraft collisions. We hope to restore airspace sovereignty, contribute to policies for the government to take the lead in solving this problem, and expect stability and operational efficiency in air traffic.

Criminal and Legal Countermeasures against Cybercrime in the Conditions of Martial Law

  • Nataliia, Veselovska;Serhii, Krushynskyi;Oleh, Kravchuk;Olеksandr, Punda;Ivan, Piskun
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.85-90
    • /
    • 2022
  • The article is devoted to the consideration of the features of the application of criminal and legal countermeasures against cybercrime in the conditions of martial law. While conducting this research, we found an opportunity to formulate the author's recommendations for solving the most complex law enforcement problems, as well as to propose changes to the Criminal Code of Ukraine aimed at eliminating the flaws of the analyzed Law, the adoption of which will contribute to the achievement of higher efficiency of the relevant criminal law prescriptions. It is argued that the removal of the previously existing in the footnote of Art. 361 of the Criminal Code of a fundamentally important caveat regarding the fact that when assessing "significant damage", the mentioned property equivalent was to be taken into account only when such damage consisted in causing material damage, which led to a significant and unjustified narrowing of the scope of potential application of Part 4 of Article 361 of the Criminal Code.

Scanning acoustic microscopy for material evaluation

  • Hyunung Yu
    • Applied Microscopy
    • /
    • v.50
    • /
    • pp.25.1-25.11
    • /
    • 2020
  • Scanning acoustic microscopy (SAM) or Acoustic Micro Imaging (AMI) is a powerful, non-destructive technique that can detect hidden defects in elastic and biological samples as well as non-transparent hard materials. By monitoring the internal features of a sample in three-dimensional integration, this technique can efficiently find physical defects such as cracks, voids, and delamination with high sensitivity. In recent years, advanced techniques such as ultrasound impedance microscopy, ultrasound speed microscopy, and scanning acoustic gigahertz microscopy have been developed for applications in industries and in the medical field to provide additional information on the internal stress, viscoelastic, and anisotropic, or nonlinear properties. X-ray, magnetic resonance, and infrared techniques are the other competitive and widely used methods. However, they have their own advantages and limitations owing to their inherent properties such as different light sources and sensors. This paper provides an overview of the principle of SAM and presents a few results to demonstrate the applications of modern acoustic imaging technology. A variety of inspection modes, such as vertical, horizontal, and diagonal cross-sections have been presented by employing the focus pathway and image reconstruction algorithm. Images have been reconstructed from the reflected echoes resulting from the change in the acoustic impedance at the interface of the material layers or defects. The results described in this paper indicate that the novel acoustic technology can expand the scope of SAM as a versatile diagnostic tool requiring less time and having a high efficiency.

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF

Developing a National Data Metrics Framework for Learning Analytics in Korea

  • RHA, Ilju;LIM, Cheolil;CHO, Young Hoan;CHOI, Hyoseon;YUN, Haeseon;YOO, Mina;Jeong Eui-Suk
    • Educational Technology International
    • /
    • v.18 no.1
    • /
    • pp.1-25
    • /
    • 2017
  • Educational applications of big data analysis have been of interest in order to improve learning effectiveness and efficiency. As a basic challenge for educational applications, the purpose of this study is to develop a comprehensive data set scheme for learning analytics in the context of digital textbook usage within the K-12 school environments of Korea. On the basis of the literature review, the Start-up Mega Planning model of needs assessment methodology was used as this study sought to come up with negotiated solutions for different stakeholders for a national level of learning metrics framework. The Ministry of Education (MOE), Seoul Metropolitan Office of Education (SMOE), and Korean Education and Research Information Service (KERIS) were involved in the discussion of the learning metrics framework scope. Finally, we suggest a proposal for the national learning metrics framework to reflect such considerations as dynamic education context and feasibility of the metrics into the K-12 Korean schools. The possibilities and limitations of the suggested framework for learning metrics are discussed and future areas of study are suggested.