• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.031 seconds

Conceptual Design of Product & Asset Lifecycle Management System for Marine Structures During Middle of Life (선박해양구조물의 유지보수 단계 수명주기관리 정보 시스템의 개념 설계와 구현)

  • Kim, Seung-Hyun;Lee, Jang-Hyun;Son, Gum-Jun;Han, Eun-Jung
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.2
    • /
    • pp.58-67
    • /
    • 2012
  • Recently, both the integration of product data during design and production and the effective management of information during full lifecycles have attracted attention from shipyards and ship owners as a result of recycling regulations and a desire for efficient operations. Generally, PLM (Product Lifecycle Management) supports a collaborative environment during the BOL (Beginning of Life) stage, while an ALM (Asset Lifecycle Management) system provides all of the information required to maintain, overhaul, and discard/recycle all or part of a vessel during the MOL (Middle of Life) and EOL (End of Life) stages. The main goal of this paper is to suggest the fundamental configuration of a PALM (Product Asset Lifecylce Management) system and a method that can be used to utilize a marine vessel's lifecycle information during the MOL, emphasizing the maintenance information during the middle of life. The authors also suggest a PALM system configuration in which lifecycle information can be collected by a PEID (Product Embedded Information Device) integrating a microcomputer, sensors, and wireless network communication. Through a prototype PALM system, the suggested features and PALM system configuration are implemented.

A Study on the Consumer Disputes and Protection Measures of the Digital Healthcare Market and O2O Service (디지털헬스케어 시장과 O2O서비스 소비자분쟁 및 보호방안)

  • Byeon, Seung Hyeok
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.121-138
    • /
    • 2020
  • The O2O services in the healthcare sector have only been in full swing for about three years, and unlike existing O2O consumer goods, the scale and scope of the dispute are more complicated due to restrictions on medical treatment. In this study, O2O service platform operators and medical institutions' roles and responsibilities were redefined as a countermeasure for resolving disputes in healthcare O2O services and the laws for changing the transaction environment. A change in institutional mechanisms was proposed. This study looked at the types of consumer disputes related to healthcare O2O services as insufficient information problems, problems in the course of medical service implementation, problems with immunity provisions for platform operators, cancellations, and non-compliance with refunds. All the information generated during transactions in the healthcare sector was extensive in scale and included the most sensitive information among personal information, stressing the importance of ensuring security. The area that started in the O2O range before the medical institution visit also proposed a plan to establish a system for the delivery of proven information as a pre-medical person. The scale and growth will grow faster, given that consumers can experience the information they want anytime, anywhere they want. However, the platform broker's role, a link player, will become more important because consumers who use the service will have their first meeting with non-face-to-face product providers. On the other hand, service providers may have side effects of misleading consumers by providing false information or misleading consumers through exaggerated advertisements. The O2O service market is expected to expand beyond distribution and dining out to the entire industry. However, since it is challenging to check accurate statistics on the detailed market, various disputes and consumer protection measures will be required for each detailed market, and comprehensive leading solutions will be essential in the future.

Stereoscopic Video Compositing with a DSLR and Depth Information by Kinect (키넥트 깊이 정보와 DSLR을 이용한 스테레오스코픽 비디오 합성)

  • Kwon, Soon-Chul;Kang, Won-Young;Jeong, Yeong-Hu;Lee, Seung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.920-927
    • /
    • 2013
  • Chroma key technique which composes images by separating an object from its background in specific color has restrictions on color and space. Especially, unlike general chroma key technique, image composition for stereo 3D display requires natural image composition method in 3D space. The thesis attempted to compose images in 3D space using depth keying method which uses high resolution depth information. High resolution depth map was obtained through camera calibration between the DSLR and Kinect sensor. 3D mesh model was created by the high resolution depth information and mapped with RGB color value. Object was converted into point cloud type in 3D space after separating it from its background according to depth information. The image in which 3D virtual background and object are composed obtained and played stereo 3D images using a virtual camera.

An Energy Efficient Interference-aware Routing Protocol for Underwater WSNs

  • Khan, Anwar;Javaid, Nadeem;Ali, Ihsan;Anisi, Mohammad Hossein;Rahman, Atiq Ur;Bhatti, Naeem;Zia, Muhammad;Mahmood, Hasan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4844-4864
    • /
    • 2017
  • Interference-aware routing protocol design for underwater wireless sensor networks (UWSNs) is one of the key strategies in reducing packet loss in the highly hostile underwater environment. The reduced interference causes efficient utilization of the limited battery power of the sensor nodes that, in consequence, prolongs the entire network lifetime. In this paper, we propose an energy-efficient interference-aware routing (EEIAR) protocol for UWSNs. A sender node selects the best relay node in its neighborhood with the lowest depth and the least number of neighbors. Combination of the two routing metrics ensures that data packets are forwarded along the least interference paths to reach the final destination. The proposed work is unique in that it does not require the full dimensional localization information of sensor nodes and the network total depth is segmented to identify source, relay and neighbor nodes. Simulation results reveal better performance of the scheme than the counterparts DBR and EEDBR techniques in terms of energy efficiency, packet delivery ratio and end-to-end delay.

Two-Daughter Problem and Selection Effect (두 딸 문제와 선택 효과)

  • Kim, Myeongseok
    • Korean Journal of Logic
    • /
    • v.19 no.3
    • /
    • pp.369-400
    • /
    • 2016
  • If we learn that 'Mrs Lee has two children and at least one of them is a daughter', what is our credence that her two children are all girls? Obviously it is 1/3. By assuming some other obvious theses it seem to be argued that our credence is 1/2. Also by just supposing we learn trivial information about the future, it seem to be argued that we must change our credence 1/3 into 1/2. However all of these arguments are fallacious, cannot be sound. When using the conditionalization rule to evaluate conformation of a hypothesis by an evidence, or to estimate credence change by information intake, there are some points to keep in mind. We must examine whether relevant information was given through a random procedure or a biased procedure. If someone with full information releases to us particular partial information, an observation, a testimony, an evidence selected intentionally by him, which means the particular partial information was not given by chance, or was not given accidentally or naturally to us, then the conditionalization rule should be employed very cautiously or restrictedly.

  • PDF

A study on hard-core users and bots detection using classification of game character's growth type in online games (캐릭터 성장 유형 분류를 통한 온라인 게임 하드코어 유저와 게임 봇 탐지 연구)

  • Lee, Jin;Kang, Sung Wook;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1077-1084
    • /
    • 2015
  • Security issues such as an illegal acquisition of personal information and identity theft happen due to using game bots in online games. Game bots collect items and money unfairly, so in-game contents are rapidly depleted, and honest users feel deprived. It causes a downturn in the game market. In this paper, we defined the growth types by analyzing the growth processes of users with actual game data. We proposed the framework that classify hard-core users and game bots in the growth patterns. We applied the framework in the actual data. As a result, we classified five growth types and detected game bots from hard-core users with 93% precision. Earlier studies show that hard-core users are also detected as a bot. We clearly separated game bots and hard-core users before full growth.

A study on the improvements of Foreign Research Information Center from the perspective of librarians in charge (외국학술지지원센터 개선방안에 관한 연구 - 운영 담당자의 관점을 중심으로 -)

  • Lee, Jongwook
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.3
    • /
    • pp.283-305
    • /
    • 2018
  • Although academic library budgets have been decreasing, the rates of print and electronic journal subscription price have consistently increased. In response to this, as part of efforts to ensure access to foreign academic materials, the Ministry of Education and Korea Education & Research Information Service (KERIS) have initiated and operated Foreign Research Information Center (FRIC) since 2006, pursuing shared acquisition and sharing of foreign print journals. This study investigates the roles/values, issues raised by stakeholders, improvements in services, and new service elements of FRIC through the in-depth interviews with librarians in charge of FRIC in addition to examining its current state. The findings show that FRIC has contributed to sharing of academic materials and to promoting research. However, it was also found that the five types of stakeholders (i.e., the Ministry of Education/KERIS, universities/libraries, users, FRICs, and publishers/agencies) have diverse issues and problems with FRIC. Therefore, this study makes some suggestions to address the issues in terms of policy, system, management, and service.

Network-Coding-Based Coded Cooperation

  • Wu, Suwen;Zhu, Jinkang;Qiu, Ling;Zhao, Ming
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.366-374
    • /
    • 2010
  • Coded cooperation is a promising user cooperation scheme. In this paper, we first propose a novel network-coding-based coded cooperation scheme. When a user decodes its partner's information correctly in the first frame, it transmits the combination of the partner's parity bits and its own parity bits through network coding in the second frame. This is distinct from the classical scheme, where the user only transmits the partner's parity bits during cooperation. We analyze the outage probability of the proposed scheme, and show that it achieves a full diversity order. Numerical evaluations reveal that the proposed scheme outperforms the classical scheme when the inter-user channel is poor, yet is worse when the inter-user channel is strong. Also, the results show that the proposed scheme always outperforms that of no cooperation in various channel conditions while the performance of classical scheme is worse than that of no cooperation with the poor inter-user channels. This means that the performance of the proposed scheme is more stable than the classical scheme and the proposed scheme is more tolerant to the poor inter-user channels. To combine the advantages of the proposed scheme and the classical scheme under different inter-user channel conditions, we propose an adaptive solution. This adaptive scheme enhances the system performance considerably in all channel conditions in spite of the inter-user channel quality, at the expense of only one acknowledgement or non-acknowledgement bit.

An Analysis on the Structural Equation Model for Customer Satisfaction of Information Commons in Digital Library of the National Library of Korea (국립중앙도서관 디지털도서관 정보광장에 대한 고객만족도 구조방정식 모형 분석)

  • Oh, Dong-Geun;Cho, Hyun-Yang;Choi, Sung-Yeol;Yeo, Ji-Suk
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.171-187
    • /
    • 2010
  • This study tries to develop and testify the structural equation model(SEM) for customer satisfaction of information commons in digital library(NDL) of the National Library of Korea and to calculate library customer satisfaction index (LCSI) based both on customers' perceptions and the staff members' expectations. It also compares the customers' perceptions with the staff members' expectations about service quality, satisfaction, and loyalty. Full mediation model is better fit than partial mediation model for this study, and it is proved that this model can be used for both groups. This study calculate LCSI for the information commons as 75.69. The comparison the customers' perceptions with the staff members' expectations shows that all of the figures of the former are higher than those of the latter.

  • PDF

Evaluation Model Development for Web Archival Information Services and the Service Evaluation: Focused on University Archives (웹 기록정보서비스 평가모형 개발과 서비스 평가 - 대학기록관을 중심으로 -)

  • Kim, Hyun-Jee;Rieh, Hae-Young
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.2
    • /
    • pp.59-78
    • /
    • 2009
  • In this study, considering the importance of the providing archival information services over the Web in university archives, the evaluation model of the archival information services was proposed by identifying categories and contents of it. Direction for the improvement was proposed by evaluating and analyzing the Web archival information services of some university archives in Korea. Based on the evaluation, the following directions for improvement were suggested. First, the mission and vision of the archives should be established and published over the Web. Second, the introduction to the records catalogues and records collection should be provided in detail on the Web. Third, advanced search and full-text search functions should be provided, as well as the help information for the search methods. Fourth, university archives' Web sites should provide online exhibitions and newsletters of the archives.