• Title/Summary/Keyword: List

Search Result 4,202, Processing Time 0.036 seconds

Mailing List Characteristic from Electronic Mail

  • Khaitiyakun, N.;Khunkitti, A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.917-921
    • /
    • 2004
  • Principle of mailing list was distributed messages to all subscribers in one time. But mailing list operation has constructed a network traffic problem. Because mailing list manager distributed mails without concentrate on subscriber network. If our network has many of subscribers, there will be redundant data in traffic channel. Submailing list has purpose to reduce problems. Analyses of mailing list characteristic in electronic mail were a feature of submailing list system, which manage by human hand (Network Administrator). That will cause trouble for network traffic if Network Administrator could not seek for mailing list characteristic from e-mails in due time. This article will present ideas and recognize methodology for automatic working in submailing list system. Recognize step begin with capture process, which use to trap e-mail information from transfer channel. Next process is preparing raw data into recognition format. Then the third one is recognize part and find out confidential factor. The last process is make decision and determine which electronic mail has properties of mailing list characteristic. Afterward deliver result to submailing list for carry on.

  • PDF

A Study on the Risk Analysis of Construction Method (건축공법 내부 리스크 분석에 관한 연구)

  • 윤여완;양극영
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2002.11a
    • /
    • pp.117-121
    • /
    • 2002
  • The purpose of this study was to Identification the Risk of construction method to protect and reduce the risk of construction period. For this study we are using the pre and during construction period Inspection list. The inspection list was used by construction company for check a flaw of Construction field. So we rearrange the individual item of inspection list to match the Risk factor. This inspection list usually has the difference of importance because this list is not made by Method which is not focused on Method. Therefore, To find the difference of these importance, We surveyed this matter by doing interview of specialist group. To find the application of field and the possibility of measurement of Risk status, We tested Risk occurring frequency and it's strength by checking the level of Risk. The results of this study were as follows; Each Method Check List made out through the rearrangement of Construction Inspection list which used in construction company. To solve and compensate the matter which happened by changing the each Method Check List to each General Inspection List, we added the each Method Check List by checking the importance of check list of each process. By doing this, The Check List for finding Risk level of Method was created by using the check list of each Method.

  • PDF

A Study on the Risk Analysis of Construction Method (건축공법 내부 리스크 분석에 관한 연구)

  • Yoon, Yer-Wan;Yang, Keek-Young
    • Journal of the Korea Institute of Building Construction
    • /
    • v.2 no.4
    • /
    • pp.131-135
    • /
    • 2002
  • The purpose of this study was to Identification the Risk of construction method to protect and reduce the risk of construction period. For this study we are using the pre and during construction period Inspection list. The inspection list was used by construction company for check a flaw of Construction field. So we rearrange the individual item of inspection list to match the Risk factor. This inspection list usually has the difference of importance because this list is not made by Method which is not focused on Method. Therefore, To find the difference of these importance, We surveyed this matter by doing interview of specialist group. To find the application of field and the possibility of measurement of Risk status, We tested Risk occurring frequency and it's strength by checking the level of Risk. The results of this study were as follows; Each Method Check List made out through the rearrangement of Construction Inspection list which used in construction company. To solve and compensate the matter which happened by changing the each Method Check List to each General Inspection List, we added the each Method Check List by checking the importance of check list of each process. By doing this, The Check List for finding Risk level of Method was created by using the check list of each Method.

과학위성 2호 주 탑재체 LIST Operation 개념소개

  • 권륜영;장민환;김성수;이현수;이윤찬;이은석;이선민;조성복;손인혜
    • Bulletin of the Korean Space Science Society
    • /
    • 2003.10a
    • /
    • pp.108-108
    • /
    • 2003
  • 본 논문에서는 과학위성 2호의 주 탑재체인 LIST의 Operation에 대한 개념을 소개하고자 한다. LIST는 태양 진공자외선(Lyman-$\alpha$)의 full disk 영상을 획득하고 분석함으로서 채층과 전이영역의 구조와 진화, ‘Quiet Sun’의 진공자외선 복사 변화 모델, 그리고 태양 진공자외선의 복사로 인한 지구 고층 대기의 변화를 밝혀내는 것이 목표이다. 이러한 목표를 성공적으로 수행하기 위해서는 LIST Operation 개념의 정립과 철저한 규정이 필요하다. 따라서 본 연구진은 Operation을 크게 두 부분으로 세분하였다. 즉, LIST의 각 구성 요소들이 유기적으로 작용, 목적하는 데이터의 성공적인 획득을 위한 ‘Technical Operation’과 획득된 데이터를 활용하여 효과적으로 분석하고 목적한 과학적 성과를 달성하기 위한 ‘Scientific Operation’으로 구분하여 규정하였다. 또한 효율적인 Data System의 관리를 위해 데이터의 흐름을 ‘LIST Observing System’, ‘LIST Data Acquisition System’, ‘LIST Data Reduction and Analysis’, 그리고 ‘LIST Data Analysis and Publication’의 네 가지 단계로 나누어 Data의 활용 중에 나타날 수 있는 위험들을 최소화 하고자 하였다.

  • PDF

A Study on the Risk Measurement of Construction Method for Fie1d Work (건축공사를 위한 공법별 리스크 측정에 관한 연구)

  • Yoo In-Geun;Choi Sang-Chun;Cho Taek-Hee;Koo Bron-Woo;Yoon Yer-Wan
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.1121-1129
    • /
    • 2005
  • The purpose of this study. was to Identification the Risk of construction method to protect and reduce the risk of construction period. The inspection list usually has the difference of importance because this list is not made by Method which is not focused on Method. We tested Risk occurring frequency and it's strength by checking the level of Risk. To solve and compensate the matter which happened by changing the each Method Check List to each General Inspection List, we added the each Method Check List by checking the importance of check list of each process. By doing this, the Check List for finding Risk level of Method was created by using the check list of each Method.

  • PDF

A Basic Study for Selecting the Project Risk Management Check List (PRM(Project Risk Management) 체크리스트 항목 선정을 위한 기초연구)

  • Bang, Hong-Song;Kim, Jin-Kuk;Choi, Byung-Ju;Kim, Ok-Kyue
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2017.05a
    • /
    • pp.99-100
    • /
    • 2017
  • In today's builders PRM(Project Risk Management) for Risk Management to fill out the competitive advantage, by and return it safe and take. But PRM has different standards for each construction company and can also see that even the list. In this study, consideration existing research through PRM by developing a list of check list to proceed to the basic research to help. In this study, PRM by creating a basis of the check list disclosed to the frame of reference. The results of this study by PRM of the check list for field application management system to provide a basis to build.

  • PDF

A Study on Characteristics of the Survey for Architectures by Joseon Government-General through its List of Architectural Heritages in North Korea (일제강점기 북한지역 고건축물 목록을 통해 본 조선총독부 학무국 고건축 조사의 성격)

  • Seo, Hyowon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.5
    • /
    • pp.95-106
    • /
    • 2019
  • The purpose of this study was to analyze the "朝鮮古建築物", the list of architectural heritages in Korea during the early Japanese colonial period. The list included architectural heritage of the region of North Korea in the colonial era. A process of listing was showing the meaning of an architectural heritage for the Japanese General Government through the criteria of selecting buildings registered on the list. This study revealed the process of a survey for making list and explored the criteria of the list. The result of this effort will contribute to determining the historical background of North Korea's architectural heritage in the early days.

LIST EDGE AND LIST TOTAL COLORINGS OF PLANAR GRAPHS WITHOUT 6-CYCLES WITH CHORD

  • Dong, Aijun;Liu, Guizhen;Li, Guojun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.49 no.2
    • /
    • pp.359-365
    • /
    • 2012
  • Giving a planar graph G, let $x^'_l(G)$ and $x^{''}_l(G)$ denote the list edge chromatic number and list total chromatic number of G respectively. It is proved that if a planar graph G without 6-cycles with chord, then $x^'_l(G){\leq}{\Delta}(G)+1$ and $x^{''}_l(G){\leq}{\Delta}(G)+2$ where ${\Delta}(G){\geq}6$.

A Real-time Dynamic Storage Allocation Algorithm Supporting Various Allocation Policies (다양한 할당 정책을 지원하는 실시간 동적 메모리 할당 알고리즘)

  • 정성무
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10B
    • /
    • pp.1648-1664
    • /
    • 2000
  • This paper proposes a real-time dynamic storage allocation algorithm QSHF(quick-segregated-half-fit) that provides various memory allocation policies. that manages a free block list per each word size for memory requests of small size good(segregated)-fit policy that manages a free list per proper range size for medium size requests and half-fit policy that manages a free list per proper range size for medium size requests and half-fit policy that manages a free list per each power of 2 size for large size requests. The proposed algorithm has the time complexit O(1) and makes us able to easily estimate the worst case execution time(WCET). This paper also suggests two algorithm that finds the proper free list for the requested memory size in predictable time and if the found list is empty then finds next available non-empty free list in fixed time. In order to confirm efficiency of the proposed algorithm we simulated the memory utilization of each memory allocation policy. The simulation result showed that each policy guarantees the constant WCET regardless of memory size but they have trade-off between memory utilization and list management overhead.

  • PDF

A Way of Securing the Access By Using PCA (주성분분석(PCA)을 이용한 출입인원관리에 대한 보안성 확보 방안)

  • Kim, Min-Su;Lee, Dong-Hwi
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.3-10
    • /
    • 2012
  • This study aimed at making a way of securing the access by using PCA. We got our result through using Box-Plot and PCA with the access data of the area of security level A~E at K(IPS)center. In order to perform PCA, We confirmed the extracted value of commonality has no problem in performing PCA because VIF is below 2.902. Based on this result, We classified people into Green-list, Blue-list, Red-list, and Black-list in a standard of security level with 1.453, as the eigen value of 1 main element, 1.283, as eigen value of 2 main elementm, 1.142, as the eigen value of 3 main element.