• Title/Summary/Keyword: Sample concept

Search Result 463, Processing Time 0.026 seconds

Evaluation of Infiltration Characteristics of Rainfall in Gneiss Weathered Soil by a Field Monitoring (현장 강우계측을 통한 편마암 풍화토층의 침투특성 평가)

  • Kim, Man-Il;Chae, Byung-Gon;Han, Byung-Won
    • The Journal of Engineering Geology
    • /
    • v.18 no.4
    • /
    • pp.567-576
    • /
    • 2008
  • It is possible to understand rainfall infiltration characteristics by identification of wetting front in the soil. The wetting front by rainfall infiltration has close relationships among soil density, grain size distribution, and permeability coefficient in the soil. The infiltration velocity is a similar concept of permeability coefficient in the soil. In this study, infiltration velocity of rainfall was calculated by a field monitoring of volumetric water contents at the depths of 50 cm and 80 cm below the surface in the gneiss weathered soil. The calculated field infiltration velocity was compared with a permeability coefficient by a laboratory soil test using undisturbed soil samples in the study area. The permeability coefficient of the soil sample is $3.15{\times}10^{-3}cm/sec$, while the field infiltration velocity is $1.87{\times}10^{-3}cm/sec$. It is interpreted that the lower infiltration velocity is induced by complicate condition of porosity and grain size distribution of soil in the field. The rainfall intensity which influences on the volumetric water content and infiltration velocity is more than 20 mm/day resulting in expansion of wetting front in the soil.

Adaptation of p-Cycle considering QoS Constraints in WDM Networks (WDM 망에서 QoS 제약 조건을 고려한 p-Cycle 적용 방안)

  • Shin, Sang-Heon;Shin, Hae-Joon;Kim, Young-Tak
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.668-675
    • /
    • 2003
  • In this paper, we propose an enhanced p-cycle (preconfigured protection cycle) scheme for WDM mesh networks with QoS constraints. In the previous researches on p-cycle, it is assumed that user's connection has a hi-directional connectivity and the same bandwidth on both direction. Therefore it is difficult to apply p-cycle based link protection to uni-directional connections for multicasting or asymmetric broadband multimedia communications with hi-directional connectivity. And it didn't consider QoS of backup path. We enhanced the p-cycles to accomodate uni-directional connections for multicasting or asymmetric bandwidth communications with hi-directional connectivity. And we propose a selection procedure of p-cycle to assure QoS of backup path. We were able to reduce a required backup bandwidth by applying a uni-directional p-cycle concept to asymmetric broadband multimedia communication environment. The proposed p-cycle selection procedure is applied to the U.S. sample network to evaluate whether the configured p-cycles can support QoS constraint of working path and backup path.

Coping Patterns in Chronic Low Back Pain : Relationship with Locus of Control and Self-Efficacy (만성 요통 환자의 대처 유형과 건강 통제위, 자기효능감과의 관계)

  • Kim, In-Ja;Lee, Eun-Ok
    • Journal of muscle and joint health
    • /
    • v.2 no.1
    • /
    • pp.1-16
    • /
    • 1995
  • Coping patterns were investigated in a sample of 126 patients with chronic low back pain by means of self-reported questionnaire. Based on the previous researches, coping pat terns were divided into the active cognitive coping, the active behavioral coping, the passive cognitive coping, and the passive behavioral coping. While all the above coping patterns were used, the passive behavioral coping was found to be used most frequently. Six subgroups were identified by cluster analytic procedure using their scores of the coping scale : active cognitive coper, general active coper, passive behavioral coper, general passive coper, multidimensional coper, and multi dimensional non-coper. Six subgroups were compared regarding locus of control, self-efficacy, pain and demographic variables. Distinct differences appeared among subgroups in internal locus of control, self-efficacy, and pain. General active coper and active cognitive coper had higher internal locus of control, higher self-efficacy, and lower pain. General passive coper and multidimensional non-coper had lower internal locus of control, lower self-efficacy, and higher pain. Passive behavioral coper had higher internal locus of control, lower self-efficacy, and higher pain. It supports the concept of learned helplessness due to prior experiences. Multi dimensional coper had higher internal, higher powerful others, and higher self-efficacy. So it corresponds to 'believer in control' group Identified by Wallston et at(1982). Unexpectedly this group also complained more pain. It could be interpreted in two ways. The more coping methods they use, the more they complain pain ; which is the result of Folkman et al (1986). Or they might be typical 'yea sayers'. These unique groups-passive behavioral coper and multidimensional coper-identified by this study supports the suggestion of Wallston et al(1982), about locus of control : individual's pattern of responses across the three scales may be more predictive than his or her scores on each of the scale seperately. The fact that passive coping was used more than active coping also suggests that self controlled active co ping is encouraged to chronic patients as well as acute patients. And it is necessary to articulate the coping scale and self-efficacy scale. It is also necessary to study the relationship of coping and adjustment by experimental design.

  • PDF

An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability (핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구)

  • Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

An Algorithm Generating All the Playable Transcoding Paths using the QoS Transition Diagram for a Multimedia Presentation Requiring Different QoS between the Source and the Destination (근원지와 목적지에서 서로 다른 서비스 품질(QoS)을 필요로 하는 멀티미디어 연출의 재생을 위한 서비스 품질 전이도 기반의 변환 경로 생성 알고리즘)

  • 전성미;임영환
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.208-215
    • /
    • 2003
  • For playing a multimedia presentation in a Internet, the case that the presentation QoS(Quality of Services) at a destination nay be different from the QoS of multimedia data at the source occurs frequently. In this case, the process of trancoding the multimedia data at the source Into the multimedia data satisfying the QoS at the destination should be requited. In addition, even the presentation description having the homogeneous QoS at both sides may have different transcoding paths due to the limitation of display terminals or network bandwidth. That is, for a multimedia description, it is required to regenerate a proper transcoding path whenever the displaying terminals or the network environment gets decided. And the delay time required to go through the transcoding path may affect the playability of the give presentation. Therefore it should be checked whether the presentation requiring a transcoding process is able to be played in a real time. In this paper, the algorithm for generating all the possible transcoding paths for a given multimedia description under a fixed set of transcoders and the network environment is proposed. The algorithm adopts the concept of QoS transition diagram to Prevent from a trancoding Path being cycled by the repetition of a cyclic Path which generates the same QoS of multimedia data as its input QoS. By eliminating all the cyclic Paths, the algorithm can guarantee the termination of the process. And for the playability check, a method of computing the transcoding time and the delay lime between logical data units are proposed.Finally all the proposed methods were implemented in the stream engine, called TransCore and the presentation-authoring tool, called VIP, we had developed. And the test results with sample scenarios were presented at the last.

  • PDF

A Scale Development of Healthy Lifestyle of Single-Person Household (1인가구 건강성 척도 개발 연구)

  • Song, Hyerim;Park, Jeongyun;Chin, Meejung;Koh, Sun-Kang
    • Journal of Family Resource Management and Policy Review
    • /
    • v.25 no.1
    • /
    • pp.35-45
    • /
    • 2021
  • Focusing on increasing of single-person households this study aims to develop a scale to measure the healthiness of lifestyle among single-person households. The concept of healthiness of lifestyle is based on the theories of family strength and family ecology. We draw 50 items that encompass basic needs, individual, familial, and social aspects of single-person life. Using a sample of 317 persons who live alone, this study examined a factor structure of the items and selected 44 items based on the results of factor analysis. Reliability and criterion- and construct validity were also examined. The final scale consists of four domains; basic needs (finance, housing, consumption, and future plan), work·life balance (time management, health, and stress), family relations, and social participation (social network, social interests, and community participation). This scale can be used as an assessment measure of the healthiness of lifestyle of single persons who participate in programs in Healthy and Multicultural Families Support Centers.

The Study of the Economic Effects and the Policy Demands through the Strategic Servitization in the Era of Industry 4.0 (인더스트리 4.0 시대의 전략적 제조-서비스 융합을 통한 경제효과분석 및 정책수요시사)

  • Kim, Jonghyuk;Kim, Suk-Chul
    • International Area Studies Review
    • /
    • v.20 no.2
    • /
    • pp.25-46
    • /
    • 2016
  • In order to newly expand and define the concept of "strategic servitization" based on Industry 4.0, this study tried to evaluate the existing status of domestic and foreign servitized manufacturing and investigated the servitization cases of some leading overseas companies. In addition, we chose 250 samples of manufacturing firms listed on KOSDAQ and collected a vast amount of data regarding servitized manufacturing, such as the current status about new businesses, profit model, and financial fluctuations of each company. Based on these data, we classified the main types of manufacturing-service convergence into a $2{\times}2$ framework and derived a new strategic servitization model for each type of signature. Furthermore, we divided the sample corporations into three groups, which are pure manufacturer, servitized firm, and strategic servitized firm, and through the mutual comparison of the real sales amounts and the estimated sales amounts by time-series extrapolation analysis, we statistically proved that the service sales of strategic servitized firms give positive impacts on ROA when compared with those of the other two groups. Finally, we selected 12 leading domestic strategic-servitized firms, interviewed them in depth, and not only organized the issues during this process and their solutions by categories but also suggested the policy demands for strategic servitization.

Effects of Open Innovation on Export Performance: Moderation of Innovation Speed (개방형 혁신이 수출성과에 미치는 영향: 혁신속도의 조절효과를 중심으로)

  • Roh, Taewoo;Park, Kwangmin;Seo, Jeongeun;Kim, Gyunhwan;Kim, Hwayoung;Kang, Minah
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.207-215
    • /
    • 2018
  • This study started from the point that the most important SMEs in the economic growth engine of Korea are prepared to grow through innovation. This study focuses on the fact that existing studies have focused on the open innovation of SMEs has been continued since the external knowledge search became an important concept, but mainly focused on the enterprise performance. The purpose of this study is to examine the moderating effect of innovation speed focusing on exports to Korean SMEs. The hypothesis suggests the depth and breadth of external knowledge search, which is the two methods of open innovation emphasized in the previous studies, and then shows the innovation speed on export performance as a moderating effect. Robust regression analysis was used for the analysis and the sample used for the analysis was valid 1,357 SMEs data. The hypothesis test for the moderation effect was performed by comparing the F-values between models. The proposed hypothesis was adopted and the moderation effect was verified.

Extraction of UAV Image Sharpness Index Using Edge Target Analysis (에지 타겟 분석을 통한 무인기 영상의 선명도 지표 추출)

  • Lim, Pyung-Chae;Seo, Junghoon;Kim, Taejung
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.6_1
    • /
    • pp.905-923
    • /
    • 2018
  • In order to generate high-resolution products using UAV images, it is necessary to analyze the sharpness of the themselves measured through image analysis. When images that have unclear sharpness of UAV are used in the production, they can have a great influence on operations such as acquisition and mapping of accurate three-dimensional information using UAV. GRD (Ground Resolved Distance) has been used as an indicator of image clarity. GRD is defined as the minimum distance between two identifiable objects in an image and is used as a concept against the GSD (Ground Sampling Distance), which is a spatial sample interval. In this study, GRD is extracted by analyzing the edge target without visual analysis. In particular, GRD to GSD ratio (GRD/GSD), or GRD expressed in pixels, is used as an index for evaluation the relative image sharpness. In this paper, GRD is calculated by analyzing edge targets at various altitudes in various shooting environments using a rotary wing. Using GRD/GSD, it was possible to identify images whose sharpness was significantly lowered, and the appropriateness of the image as an image clarity index was confirmed.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.