• Title/Summary/Keyword: Window DEA

Search Result 47, Processing Time 0.02 seconds

A Study on the Efficiency of Container Ports in the Mediterranean Sea (지중해 컨테이너항만의 효율성 분석에 관한 연구)

  • Ibrahim, Ousama Ibrahim Hassan;Kim, Hyun Deok
    • Journal of Korea Port Economic Association
    • /
    • v.37 no.2
    • /
    • pp.91-105
    • /
    • 2021
  • The current increasing size of container vessels affects the container port's situation. The containerization has changed the inter-modal handling process, which brought more flexibility and comfortableness in the shipping industry sector. Thus, it is very crucial to analyze the efficiency of container ports in the regional sphere. Such kind of efficiency analysis provide a powerful management tool for port operators and shipping managers in the Mediterranean market, and it also helps to form an information for planning new regional and national port operations. This paper aims to analyze the ports' technical efficiency of Mediterranean major container ports. It is conducted to establish the model of port performance and efficiency through the empirical test of the various factors. Regarding to the panel data collected from the 48 DMUs (decision making units), this study attempts to provide the empirical basis of the port efficiency relative to another factors in the total port performance. Due to the complexity of the various activities carried out at container ports, the study focuses only on the technical efficiency at the level of the Mediterranean container port. Unlike the practice of cross-sectional data analysis, originally established by Charnes et al. (1985), the panel data in DEA window analysis applications are used. The main focus of this study is the relative technical efficiency of 12 container ports from 7 countries in the Mediterranean market. The selection of ports under study is based on their high handling capability and rankings in World Top 100 (Containerization International, 2018).

Study on 3D AR of Education Robot for NURI Process (누리과정에 적용할 교육로봇의 가상환경 3D AR 연구)

  • Park, Young-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.209-212
    • /
    • 2013
  • The Nuri process of emphasis by the Ministry of Education to promote is standardized curriculum at the national level for the education and care. It is to improve the quality of pre-school education and Ensure a fair starting line early in life and It emphasizes character education in all areas of the window. Nuri the process of development of a the insect robot for the Creativity education Increased the interesting and educational effects. Assembly and the effect on learning of educational content using a VR educational robot using the existing floor assembly using the online website to help assemble and learning raised. Order to take advantage of information technology in the information-based society requires the active interest and motivation in learning, creative learning toddlers learning robot are also needed. A three-dimensional model of the robot, and augmented by linking through the marker, the target marker and the camera relative to the coordinate system of augmented reality, seeking to convert the marker to be used in augmented reality marker patterns within a pre-defined patternto be able to make a decision on what of. The fusion of a smart education through training and reinforcement the educational assembly of the robot in the real world window that is represented by a virtual environment in this paper to present a new form of state-of-the-art smart training, you will want to lay the foundation of the nation through the early national talent nurturing talent.

  • PDF

The Productivity Analysis on Regional Logistics Warehouse (지역별 물류창고의 생산성 분석)

  • Park, Hong-Gyun
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.1
    • /
    • pp.143-157
    • /
    • 2012
  • By strengthening the market control and expanding the networks, providers of global logistics are expanding their service scope. The warehouses connect networks to internal and external warehouses by using logistics providers. The paper focuses on analyzing the efficiency of warehouses on each district. Therefore, the study classifies the factors which specify the efficiency of a total logistics of warehouse industry and warehouses' employees and the number of warehouses on district. Furthermore, the most recently published reports by National Center for Statistics in 2012 was used in order to guarantee credibility of the study. This study utilizes five years of materials, which are from 2005 to 2009. By applying SBM (Slack Based Measure), DEA Window model, and the Malmquist productivity model, the trend in efficiency and stableness were analyzed. The principal purpose of the paper is evaluating the efficiency. Also, analyzing its determinants and illustrating a long-term relationship between the regional warehouses and annual turnover of the warehouses were used as output measures. In addition, the number of warehouses of each region, employees, warehouses equipments, and the Logistics Warehouses Providers were used as input measurements. As a result, Malmquist productivity model and annual stableness has shown a continuous increasing. Ultimately, to be approved as product of Korea, a new stratiges that meet the standards and Rules of Origins by FTA should be developed. Therefore, there must be a development that takes regional characteristics into consideration.

Evaluation of Operational Efficiency among Long-Term Care Visiting Nursing Centers using Data Envelopment Analysis (자료포락분석을 이용한 노인장기요양 방문간호센터 운영의 효율성 평가)

  • Lim, Ji Young;Kim, Seonhee;Oh, Eunsook;Song, Su Young
    • Journal of Home Health Care Nursing
    • /
    • v.27 no.1
    • /
    • pp.16-28
    • /
    • 2020
  • Purpose: The aim of this study was to evaluate the efficiency of long-term care visiting nursing centers in communities using data envelopment analysis (DEA). Methods: Data were collected using a self-reported questionnaire. The average number of staff per 6 months and total space of center were used as input variables. The average number of clients per 6 months and the average profits per 6 months were used as output variables. EMS Window version 3.1 was used to measure the efficiency scores. Descriptive statistics and tobit regression were applied to analyze the general characteristics of the variables and the factors affecting efficiency scores. Results: The average efficiency of 30 long-term care visiting nursing centers in communities was approximately 66.9% on technical efficiency analysis, and 79.1% on scale efficiency analysis. Eight nursing centers on technical efficiency analysis and 12 centers on scale efficiency analysis had 100.0% efficiency. Conclusion: Our findings reveal that long-term care visiting nursing centers in communities have low operational efficiency. Therefore, it is essential to institute policies and regulations to improve the efficiency of visiting nursing centers and to strengthen the business competencies of center officers.

Forensic Evidence of Search and Seized Android and Windows Mobile Smart Phone (압수 수색된 안드로이드와 윈도우모바일 스마트폰의 포렌식 증거 자료)

  • Yoon, Kyung-Bae;Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.323-331
    • /
    • 2013
  • There are three ways how to extract forensic evidence from mobile phone, such as SYN, JTAG, Revolving. However, it should be a different way to extract forensic evidence due to the differences of their usage and technology between them(mobile phone and smart phone). Therefore, in this paper, I will come up with extraction method that forensics evidence by search and seizure of a smart phone. This study aims to analyze specifications and O.S., backup analysis, evidence in smart to analyze for search and seizure of a smart phone commonly used google android and windows mobile smart phone. This study also aim to extract forensics evidence related to google android and phone book, SMS, photos, video of window mobile smart phone to make legal evidence and forensics report. It is expected that this study on smart phone forensics technology will contribute to developing mobile forensics technology.

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF