Proceedings of the Korean Institute of Navigation and Port Research Conference
/
2002.11a
/
pp.63-70
/
2002
The main subject to become a hub pen is automation The automated container terminal has already operated in advanced pons and it bas been planned for the basic planning and operation design in domestic case. The key of automated container terminal is effective operation of both ATC(automated transfer crane) and AGV(automated guided vehicle) which is automated handling equipments. This is essential to productivity of automated container terminal. This study suggests the moat optimal method of equipment operation in order to minimize loading time using each three types of effective AT operation methods and AGV dispatching rules in automated container terminals. As the automated equipment operation causes unexpected deadlocks or interferences, it should be proceeded on event-based real tine. Therefore we propose the most effective ATC operation methods and AGV dispatching rules in this paper. The various states occurred in real automated container terminals are simulated to evaluate these methods. This experiment will show the most robust automated equipment operation method on various parameters(the degree of yard re-marshaling, the number of containers and the number of AGVs).
Kim, Mo-Im;Harper, Paul A.;Rider, Rowland V.;Yang, Jae-Mo
Clinical and Experimental Reproductive Medicine
/
v.2
no.2
/
pp.13-26
/
1975
Seven aspects of attitude toward marriage in Korea are examined to better understand present and future marriage patterns. Also, various facets of current marriage practice are compared with attitudes. The study comprises three groups of roughly 600 women each, selected by random sampling from a rural, an urban, and a semi-urban area. A carefully designed and pretested questionnaire was checked for reliability by a reinterview in a 15% subsample. The great majority of Korean women support traditional attitudes that one must or should marry. The small group who recommend that one should not marry are mostly the very young or the never married, whose attitudes still may change. However, there are important and probably predictive shifts in favor of more individual decision, especially among the better educated, the young, and the more urban. Traditional reasons for marriage such as "custom" and procreation are ranked first by a majority, but there is a large shift to more contemporary or liberal desire for companionship and love, also primarily among the better educated, the urban, the young, and the never married. The traditional attitude that parents should have the sole or major role in mate selection is still held by a bare majority; the educated, urban, young, and never married are more liberal. Only 6% opt for each of the two extremes: That the parent alone or the respondent alone should decide. The remainder prefer one of the two middle-of-the-road positions where parent and child together decide. The proportions of respondents who classed specified criteria as moat important for selecting a husband, arranging the criteria in order from traditional to contemporary were: Lineage, etc., 23%; personal attributes, 40%; health and education, 27%; and love, 10%. The changing attitudes are suggested by the fact that love was ranked first by only 3% of the poorly educated rural poulation versus 23% of urban college level and 31% of the urban never married. There has been a substantial rise in the ideal age of marriage over the past twelve or more years, but there also is evidence that the ideal age is at or near a ceiling. Knowledge about legal age of marriage is minimal; the implications of this for proposed legislation are discussed. Three-fifthes to four-fifths of all respondents married husbands of the same religious, residential, and economic backgrounds as themselves. Almost all of them married men of the same or higher educational level. These evidences of traditional influences in mate selection are contrasted with the low priority given some of those items in earlier questions on reasons for marriage and criterion for selecting husband. Contrary to the expressed attitudes as to who should select the husband, we find that marriages of the study sample were stated to be arranged by parents alone in 62%; and in another 23%, the parents made the decision but asked the respondent's views. Such arrangements were most frequent among the rural, the less educated, and the older respondents and less common in the urban and more educated. The implications of these and related findings are discussed.
The Wondong Caldera, formed by the voluminous eruption of the rhyolitic ashflows of the Wondong Tuff which is about 1,550 m thick at the intracaldera and 550 m at the outflow, is a resurgent caldera which shows a dome structure on the central exposure of the caldera. The Wondong caldera volcanism eviscerated the magma chamber by a series of explosive eruptions during which rhyolitic magma was ejected, as small fallouts and voluminous ash-flows, to form the Wondong Tuff. The explosive eruptions began with ash-falls, progressed through pumice-falls and transmitted ash-flows. During the ash-flow phase the initial central vent eruption transmitted into late ring-fissure eruption which accompanied with caldera collapse. Contemporaneous collapse of the roop of the chamber resulted in the formation of the Wondong Caldera, a subcircular depression subsiding about 1,930 deep. Following the collapse, quartz porphyry was intruded as ring dykes along the ring fracture near the southwestern caldera rim. Subsequently the central part of the caldera floor began to be uplifted into a circular resurgent dome by the rising of residual magma. Concurrent with the resurgent doming, the volcaniclastic sediments of Hwajeri Formation were accumulated in the caldera moat and then rhyodacite lava erupted from the initial central resurgent dome and another ash-flow tuff from the northern ring fracture. After the sedimentation, the find-grained granodiorite was intruded as an arc along the eastern ring fracture of the caldera. Finally in the central part, the resurgent magma was emplaced as a hornblende biotite granite stock that formed the central dome.
Dangsanbong volcano, which is located on the coast of the western promontory of Cheju Island, occurs in such a regular pattern on the sequences which represent an excellent example of an eruptive cycle. The volcano comprises a horseshoe-shaped tuff cone and a younger nested cinder cone on the crater floor, which are overlain by a lava cap at the top of the cinder cone, and wide lava plateau in the moat between two cones and in the northern part. The volcanic sequences suggest volcanic processes that start with Surtseyan eruption, progress through Strombolian eruption and end with Hawaiian eruption, and then are followed by rock fall from sea cliff of the tuff cone and by air fall from another crater. It is thought that the eruptive environments of the tuff cone could be mainly emergent because the present cone is located on the coast, and standing body of sea water could play a great role. It is thought that the now emergent part of the tuff cone was costructed subaerially because there is no evidence of marine reworking. The emergent tuff cone is characterized by distinctive steam-explosivity that results primarily from a bulk interaction between rapidly ascending magma and external water. The sea water gets into the vent by flooding accross or through the top or breach of northern tephra cone. Dangsanbong tuff cone was constructed from Surtseyan eruption which went into with tephra finger jetting explosion in the early stage, late interspersed with continuous upruch activities, and from ultra-Surtseyan jetting explosions producting base surges in the last. When the enclosure of the vent by a long-lived tephra barrier would prevent the flooding and thus allow the vent to dry out, the phreatomagmatic activities ceased to transmit into magmatic activity of Strombolian eruption, which constructed a cinder cone on the crater floor of the tuff cone Strombolian eruption ceased when magma in the conduit gradually became depleted in gas. In the Dangsanbong volcano, the last magmatic activity was Hawaiian eruption which went into with foundation and effusion of basalt lava.
The Journal of the Korea institute of electronic communication sciences
/
v.3
no.3
/
pp.188-194
/
2008
In this paper, we propose for improving QoS in Hospital wireless network using Cellular-IP/PRC(Paging Route Cache) with Paging Cache and Route Cache in Cellular-IP and propose for performance of realtime and non-real time handoff service using Handoff state machine Paging Route Cache. Although the Cellular-IP/PRC technology is devised for mobile internet communication, it has its vulnerability in frequent handoff environment. This handoff state machine using differentiated handoff improves quality of services in Cellular-IP/PRC Suggested algorithm shows better performance than existing technology in wireless mobile internet communication environment. When speech quality is secured considering increment of interference to receive in case of suppose that proposed acceptance method grooves base radio station capacity of transfer node is plenty, and moat of contiguity cell transfer node was accepted at groove base radio station with a blow, groove base radio station new trench lake acceptance method based on transmission of a message electric power estimate of transfer node be. Do it so that may apply composing PC(Paging Cache) and RC(Routing Cache) that was used to manage paging and router in radio Internet network in integral management and all nodes as one PRC(Paging Router Cache), and add hand off state machine in transfer node so that can manage hand off of transfer node and Roaming state efficiently, and studies so that achieve connection function at node. Analyze benevolent person who influence on telephone traffic in system environment and forecasts each link currency rank and imbalance degree, forecast most close and important lake interception probability and lake falling off probability, GoS(Grade of Service), efficiency of cell capacity in QoS because applies algorithm proposing based on algorithm use gun send-receive electric power that judge by looking downward link whether currency book was limited and accepts or intercept lake and handles and displays QoS performance improvement.
Journal of the Korean Institute of Traditional Landscape Architecture
/
v.34
no.3
/
pp.67-77
/
2016
This study was initiated from question raised on existing study achievement that purpose for Wolji construction simply was to build gardens. In this research, after raising a question on existing theory about the Wolji construction, another purpose of Wolji construction is investigated. Study result is as follows. First, two questions raised on Wolji construction are "Was Wolji constructed as a garden from the beginning?" and "Was Wolji region available land as now at time of creation?" However, it was verified that the purpose of Wolji construction was to use not as a garden but as a detention pond, and the land of such region was unserviceable at time of Wolji construction. Second, in terms of locations and Topography, it was confirmed that Wolji has a favorable condition for undercurrent function as it is positioned at the end point of flow path formed by gushout water spurting from the water flooded from Bukcheon, or low and wetland. Third, from hydraulic point of view, Bukcheon always has a possibility of flooding occurrence before completing river bank build up, and such flooding damage was curved at Guhwangdongwonji, and at Wolji once again in order to prevent the damage spread into the center of Wanggyeong. Fourth, from urban planning point of view, it was confirmed that urban functions were not established in Wolji region before Wolji construction, and urban planning was completed through the opening of roads and others, after Wolji construction. Fifth, it was confirmed that inflow and outflow device of Wolji, and vertical stone platform at western side of Wolji were the facilities to provide sufficient functions as detention ponds.
Software architecture representing a common high-level abstraction of a system can be used as a basis for creating mutual understanding among all stakeholders of the system. In determining a software architecture's fitness with respect to its desired qualities as well as in improving a software architecture, software architecture evaluation is importantly performed. However moat of architecture evaluation methods are not still sufficient in that they do not explicitly consider artifacts discussed during architecture evaluation and their processes are net systematic. As a result, we are hard to follow them. To address these problems, this paper presents the method to evaluate systematically a software architecture with respect to its desired qualities. In this approach, the functional and non-functional requirements are separately handled, and software architecture is represented in the 4+1 view model using UML. Through this initial consideration, the important artifacts such as goals, scope, and target of evaluation are clearly determined. Also, the method provides the well defined process to produce the important evaluation artifacts such as sub-designs, design decisions, rationale, qualities from inputs. In addition, it enables us to determine satisfaction of a architecture with respect its desired qualities or improve a architecture through the structured evaluation results.
Nationwide weed survey of paddy rice field conducted in 1981 and 1971 was compared and determined major dominant weed community types distributed by province. Based on the similarity coefficients between 1971 and 1981 the floristic composition based on the degree of dominance was greatly dissimilar while kind of weed flora were not much differed. Degree of dominance were concentrated to perennial weeds in 1981 while these were at animal weeds in 1971. The moat important 10 weed species and their dominance in 1981 were Monochoria vaginalis Presl.(22.2%), Sagittaria pygmaea Miquel(17.5%), S. trifolia L.(9.0%), Poramogeton distinctus Benn.(9.0%), Cyperus serotinus Rottb.(8.5%), Rotala indica Koehne(6.0%), Aneilema japonica Kunth(4.4%), Lindernia procumbens Philcox(3.9%), Eleocharis kuroguwai Ohwi(3.4%) and Ludwigia proarrara Roxb(3.0%), respectively while these for 1971 were R. indica(34.5%), Eleocharia acicularis Roem, et Schult (11.9%), M. vaginalis(11.1%), Cyperua difformis L.(8.7%), Echinochloa crus-galli Beauv.(6.9%), L. procumbens(3.3%), P. distinctus(3.1%), A. Japonica (2.4%), E. kuroguwai(1.8%) and P. hydropiper(1.8%), respectively. Weed occurrence was also closely related with soil type, cropping pattern and cultural practices. Particularly, the occurrence of P. distincrus was negatively correlated with the degree of land utilization. Weed community types dafined by two-dimensional ordination analysis were 11 for Jeonnam province, 9 for Gyeoaggi, Gangweon, Chungbuk and Gyeongnam provinces, 8 for Jeonbuk and Gyeongbuk provinces, 7 for Chungnam province and 4 for Jeju province, respectively.
Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.
Previous studies on Wolseong fortress have focused on capital system of Silla Dynasty and on the recreation of Wolseong fortress due to the excavations in and around Wolseong moat. Since the report on the Geographical Survey of Wolseong fortress was published and GPR survey in Wolseong fortress was executed as a trial test in 2004, the academic interest in the site has now expanded to the inside of the fortress. From such context, the preliminary research on the fortress including geophysical survey had been commenced. GPR survey had been conducted for a year from March, 2007. The principal purpose of the recent 3D GPR survey was to provide visualization of subsurface images of the entire Wolseong fortress area. In order to obtain 3D GPR data, dense profile lines were laid in grid-form. The total area surveyed was $112,535m^2$. Depth slice was applied to analyse each level to examine how the layers of the remains had changed and overlapped over time. In addition, slice overlay analysis methodology was used to gather reflects of each depth on a single map. Isolated surface visualization, which is one of 3D analysis methods, was also employed to gain more in-depth understanding and more accurate interpretations of the remain The GPR survey has confirmed that there are building sites whose archaeological features can be classified into 14 different groups. Three interesting areas with huge public building arrangement have been found in Zone 2 in the far west, Zone 9 in the middle, and Zone 14 in the far east. It is recognized that such areas must had been used for important public functions. This research has displayed that 3D GPR survey can be effective for a vast area of archaeological remains and that slice overlay images can provide clearer image with high contrast for objects and remains buried the site.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.