• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.032 seconds

A Study on the PR Strategy of Public Library (공공도서관의 홍보 전략에 관한 연구- 서울의 공공도서관을 중심으로 -)

  • Lee, Man-Soo
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.3-28
    • /
    • 2007
  • It is thought that the various PRs of public library are the PR within the jurisdiction. outside the jurisdiction, by print media. by audio-video media. by fixture. by event. by media outlet. by campaign, through cyber space. and through associated organization. But the strategy of PR from this study is followed. First. the team for PR should be organized. Second. the librarian for PR should be distributed. Third, the budget for PR should be raised. Forth. the organizations of community should be made the full use of for PR. Fifth, the media outlet of the community should be made the best use of. Sixth. the news letter published by public library should be utilized. Seventh. the internet homepage of public library should be made good use of.

  • PDF

Diagnosis of Managerial Ability of Farmers Practicing Environmental Friendly Agriculture (친환경농업 실천농가의 경영능력 진단)

  • Lee, Ki-Woong;Yu, Chan-Ju;Park, Hyung-Dal
    • Korean Journal of Organic Agriculture
    • /
    • v.14 no.3
    • /
    • pp.267-285
    • /
    • 2006
  • This study diagnosed the managerial ability of farmers in the Gokseong area and the Gwangyang area, and analysis was conducted especially placing focus on the difference in managerial ability on whether environmental friendly agriculture has been implemented or not. According to the analysis results, the average score of all the farmers was 63.9 out of the full score of 100 which can be seen to be a medium to high standard. Also, in the diagnosis results according to whether environmental friendly agriculture has been implemented or not, the ability scores of farmers practicing environmental friendly agriculture were higher than those who were not, but large differences between the item scores for information ability and cooperative ability were shown. This is connoting a very important meaning in terms of the point that correspondence is being made to the conditions required to possess market response capabilities to the high information systemization society to unfold in the future. As a result, the important issue can be seen to be personnel cultivation in order to possess self response capabilities through the development of education programs that can improve this kind of managerial ability and revision of support systems.

  • PDF

Evaluation and management of work process in dredger using ECDIS (ECDIS에 의한 준설선의 작업공정 관리 및 평가)

  • Lee, Dae-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.43 no.3
    • /
    • pp.212-221
    • /
    • 2007
  • This paper describes on the evaluation and management of work process in suction hopper dredger and grab bucket dredger as an application of a PC-based ECDIS system. The dynamic tracking of dredging bucket and the data logging of grab dredging information were performed by using the grab dredging vessel "Kunwoong G-18". The position and route tracking of the dredger moving toward the ocean dumping site of dredged material was performed by using the hopper dredging vessel "Samyang-7". The evaluation of wok process in the dredging field, for grab dredger, was continuously carried out on January to May, 2006, in Incheon Hang and for hopper dredger, on July to December, 2003, in Busan Hang, Korea. The dredging information, such as dredger's position, heading, dredging depth and route track which was individually time stamped during the dredging operation, was automatically processed in real-time on the ECDIS and displayed simultaneously on the S-57 ENC chart. From these results, we conclude that the ECDIS system can be applied as a tool in order to manage the work process during the dredging operation, and also in order to generate the factual record of the dredging activities that is sufficient for dredging inspector to accurately evaluate the contract performance even in the absence of a full-time onboard inspector.

Study of Reading Aids for Improve Text Readability on a Small Screen Mobile Device (Small Screen Mobile 환경에서 가독성을 높이기 위한 Reading Aids의 연구)

  • Kim, Jong-Gon;Choi, Sun-Hyang;Min, Young-Sam
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.147-151
    • /
    • 2008
  • There are many attempts to transfer many applications from PC to mobile which has small screen, cause of a development of mobile technology. To display the whole information of the PC on the tiny screen, it makes many Horizontal Scroll, Horizontal Scroll in mobile screen makes people to miss where they are reading easily and such a frequent error makes readability of the information in mobile screen low. We suggest a Line Marker to help readability of the mobile screen high. This study shows the relationship between the conditions of Line Marker such as fixed or moved or not exists and the factors of the reading time and satisfaction.

  • PDF

Attacking and Repairing the Improved ModOnions Protocol-Tagging Approach

  • Borisov, Nikita;Klonowski, Marek;Kutylowski, Miroslaw;Lauks-Dutka, Anna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.380-399
    • /
    • 2010
  • In this paper, we present a new class of attacks against an anonymous communication protocol, originally presented in ACNS 2008. The protocol itself was proposed as an improved version of ModOnions, which exploits universal re-encryption in order to avoid replay attacks. However, ModOnions allowed the detour attack, introduced by Danezis to re-route ModOnions to attackers in such a way that the entire path is revealed. The ACNS 2008 proposal addressed this by using a more complicated key management scheme. The revised protocol is immune to detour attacks. We show, however, that the ModOnion construction is highly malleable and this property can be exploited in order to redirect ModOnions. Our attacks require detailed probing and are less efficient than the detour attack, but they can nevertheless recover the full onion path while avoiding detection and investigation. Motivated by this, we present modifications to the ModOnion protocol that dramatically reduce the malleability of the encryption primitive. It addresses the class of attacks we present and it makes other attacks difficult to formulate.

A Study of the Increasing Returns to Scale in the Internet Business using Non-parametric Analysis Model (비모수 분석모형을 활용한 인터넷비즈니스의 수확체증법칙에 관한 실증연구)

  • Park, Myung-Sub;Seo, Sang-Beom
    • Asia pacific journal of information systems
    • /
    • v.13 no.4
    • /
    • pp.229-255
    • /
    • 2003
  • This article attempts to examine the well-known law that the increasing returns to scale(IRS) is effective in the Internet business. The effect of IRS is one of the hottest issues in the Internet business sector. Many cases and survey studies support the fact that the IRS phenomenon exists in the Internet business. Executives in Internet business generally give a deep trust on this theory. As the Internet business grows, however, the boundary of the business becomes widened and complicated. And each category of Internet business is characterized with a different business style and economic behavior. It may, therefore, be dangerous to accept that the phenomenon of IRS is applied to all areas of Internet business. For this reason, the research for the close look into the IRS phenomenon should provide significant implications for the managers in the Internet business industry. This article divides the internet business into four sub-areas, and analyzes the IRS phenomenon using AHP/DEA-based full ordering technique. Interpretations are given, based upon the research results, for each sub-area of Internet business, as a guideline of setting business strategies for practical managers.

Semantics of exceptives oyey and pakkey in Korean

  • Yeom, Jae-Il
    • Language and Information
    • /
    • v.19 no.2
    • /
    • pp.55-80
    • /
    • 2015
  • In this paper, I show how oyey 'except' and pakkey 'but' in Korean are semantically different from but/except in English. The exceptive oyey is attached only to a definite NP and shows no restriction on the NP that it is associated with. The referent of the NP is removed from either the restrictor, or nuclear scope, of the associated NP, also giving rise to two different inferences about the exception phrase. The inferences are based on the condition that an expression should make a non-trivial meaning contribution in a sentence. The complement of oyey is really taken to be an exception in one interpretation, but not in the other. The exceptive pakkey is assumed to be a NPI. It does not require a phrase that a pakkey-phrase is associated with. It can be attached to any type of phrases, including a NP. Attached to a full phrase, it is interpreted as a scalar item. Its core meaning contribution is to remove weaker alternatives from the scalar set locally. For a general interpretation, the other meanings are captured globally. A pakkey-phrase with a demonstrative has a conjunctive meaning, and it can be analyzed like oyey in one of the two interpretations.

  • PDF

Fast Video Motion Estimation Algorithm Based on Motion Speed and Multiple Initial Center Points Prediction (모션 속도와 다중 초기 중심점 예측에 기반한 빠른 비디오 모션 추정 알고리즘)

  • Peng, Sha-Hu;Saipullah, Khairul Muzzammil;Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1219-1223
    • /
    • 2010
  • This paper proposes a fast motion estimation algorithm based on motion speed and multiple initial center points. The proposed method predicts initial search points by means of the spatio-temporal neighboring motion vectors. A dynamic search pattern based on the motion speed and the predicted initial center points is proposed to quickly obtain the motion vector. Due to the usage of the spatio-temporal information and the dynamic search pattern, the proposed method greatly accelerates the search speed while keeping a good predicted image quality. Experimental results show that the proposed method has a good predicted image quality in terms of PSNR with less searching time comparing with the Full Search, New Three-Step Search, and Four-Step Search.

A practical approach for a lower bound of the number of wavelengths in WDM-based Optical transport networks (광전달망에서 최소 파장 수의 한계값을 구하는 실질적인 방법)

  • 이종원;박구현;이창희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1222-1228
    • /
    • 1998
  • Most of researchers have tried to find heuristic methods for near-optimal solutions of establishing light paths with minimum number of wavelengths in wavelengh-routed optical networks. In order to provide a performance measure for heuristic approaches, we propose a practical approach for a lower bound of the number of wavelengths which is required to provide full connections in WDM-based optical transport networks. This method is based on a path-flow formulation using K-shortest paths for each connection. Compared with a general link-flow formulation, the proposed method has much lower complexity and so needs much less calcuation tiem while it gives the same results as a general link-flow formulation in some sample networks.

  • PDF

Study on the Network Architecture and the Wavelength Assignment Algorithm for All-Optical Transport Network (완전 광전달망에 적합한 망 구조와 파장 할당 알고리즘 연구)

  • 강안구;최한규;양근수;조규섭;박창수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1048-1058
    • /
    • 1999
  • This paper compares some architectures to achieve the optimized WDM architecture for all optical transport network, the comparison is presented in terms of the number of required wavelength and LT. These architecture types are PPWDM, SHWDM, DHWDM and fully optical WDM. Topology is a static ring network where the routing pattern is fixed and traffic pattern has uniform demand. This paper also proposes an algorithm for the wavelength assignment for a folly optical WDM ring network which has full mesh traffic pattern. The algorithm is based on heuristic algorithm which assigns traffic connections according to their respective shortest path. Traffic described here that is to be passed through can be routed directly within the optical layer instead of having the higher layer to handle it.

  • PDF