• 제목/요약/키워드: one call

검색결과 685건 처리시간 0.026초

부가가치화된 부동산 종합정보시스템 개발에 대한 연구 - 신용카드 매출정보를 활용한 상권분석시스템을 중심으로 - (A Study on the Development of a Value-Added Real Estate Information System with a Focus on Marketing Analysis Using Credit Card Data)

  • 김상범;박화진
    • 디지털콘텐츠학회 논문지
    • /
    • 제7권4호
    • /
    • pp.227-234
    • /
    • 2006
  • 웹상에서 제공되고 있는 부동산관련 정보가 단순히 매물정보에 그치고 있다는 점에 착안하여, 본 연구는 부가가치가 향상된 부동산 정보 및 콘텐츠 등을 부동산수요자에 원스톱으로 제공할 수 있는 종합정보서비스 시스템을 개발하여 이를 온라인상으로 구현하는 것에 대한 방법론을 제시하고 있다. 본 연구에서의 부동산종합정보시스템은 GIS를 활용한 지리정보, 사진과 동영상을 활용한 매물정보, 권리분석을 전문으로 하는 부동산과 관련된 각종 권리분석정보, 부동산 검색시 그 자리에서 전문가와 해당부동산에 대한 상담을 시도할 수 있는 웹 콜 센타 (Web Call Center) 기능, 그리고 신용카드회사와 연계하여 신용카드 매출정보를 활용한 상권분석시스템 등의 구현방법에 대해 설명하고 있다.

  • PDF

다중개성 운영체계의 구현에 관한 연구 : 직접 프로시져 호출 방식의 통신기법 (An Implementation of an Operating System with multiple personalities : design of the Direct Procedure Call IPC scheme)

  • 조시훈;방남석;이준원
    • 한국정보처리학회논문지
    • /
    • 제5권9호
    • /
    • pp.2404-2414
    • /
    • 1998
  • 다중개성을 지원하는 운영체계는 각 사용자의 필요성에 따라 수정과 확장이 용이하게 이루어져야만 한다. 마이크로커널 구조의 운영체계로서 적합한 반면, 프로세스간 통신(interprocess communication: IPC)에서 발생되는 마이크로커널구조의 부담 때문에 시스템 성능이 저하되는 문제점을 갖고 있다. 본 논문에서는 기존의 IPC 기법 성능을 개선하기 위하여 운영체계의 구성요소들간에 직접 프로시져 호출방식의 새로운 IPC 기법을 제안한다. 새로운 기법에 의한 통신 부담은 최상의 경우에는 로컬 프로시져 호출 수준이고, 최악의 경우에도 기존의 메시지전송 통신기법보다는 성능이 향상된다.

  • PDF

FINITE-DIFFERENCE BISECTION ALGORITHMS FOR FREE BOUNDARIES OF AMERICAN OPTIONS

  • Kang, Sunbu;Kim, Taekkeun;Kwon, Yonghoon
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제19권1호
    • /
    • pp.1-21
    • /
    • 2015
  • This paper presents two algorithms based on the Jamshidian equation which is from the Black-Scholes partial differential equation. The first algorithm is for American call options and the second one is for American put options. They compute numerically free boundary and then option price, iteratively, because the free boundary and the option price are coupled implicitly. By the upwind finite-difference scheme, we discretize the Jamshidian equation with respect to asset variable s and set up a linear system whose solution is an approximation to the option value. Using the property that the coefficient matrix of this linear system is an M-matrix, we prove several theorems in order to formulate a bisection method, which generates a sequence of intervals converging to the fixed interval containing the free boundary value with error bound h. These algorithms have the accuracy of O(k + h), where k and h are step sizes of variables t and s, respectively. We prove that they are unconditionally stable. We applied our algorithms for a series of numerical experiments and compared them with other algorithms. Our algorithms are efficient and applicable to options with such constraints as r > d, $r{\leq}d$, long-time or short-time maturity T.

마이크로컨트롤러 환경에서 타깃 바이너리 파일 분석을 통한 최대 스택 메모리 사용량 예측 기법 (Maximum Stack Memory Usage Estimation Through Target Binary File Analysis in Microcontroller Environment)

  • 최기호;김성섭;박대진;조정훈
    • 대한임베디드공학회논문지
    • /
    • 제12권3호
    • /
    • pp.159-167
    • /
    • 2017
  • Software safety is a key issue in embedded system of automotive and aviation industries. Various software testing approaches have been proposed to achieve software safety like ISO26262 Part 6 in automotive environment. In spite of one of the classic and basic approaches, stack memory is hard to estimating exactly because of uncertainty of target code generated by compiler and complex nested interrupt. In this paper, we propose an approach of analyzing the maximum stack usage statically from target binary code rather than the source code that also allows nested interrupts for determining the exact stack memory size. In our approach, determining maximum stack usage is divided into three steps: data extraction from ELF file, construction of call graph, and consideration of nested interrupt configurations for determining required stack size from the ISR (Interrupt Service Routine). Experimental results of the estimation of the maximum stack usage shows proposed approach is helpful for optimizing stack memory size and checking the stability of the program in the embedded system that especially supports nested interrupts.

유방암 환자의 분노관리 자기효능감 증진 프로그램 개발 (Development of a Program for Anger Management Based on Self-efficacy in Patients with Breast Cancer)

  • 오복자;최승이
    • 성인간호학회지
    • /
    • 제21권2호
    • /
    • pp.199-211
    • /
    • 2009
  • Purpose: The purpose of this study was to develop a program for anger management based on self-efficacy. Methods: In this study, four types of approaches to enhance anger control were developed; 1) a role play for vicarious experiences; 2) an assertive training for anger expression; 3) a 30-minute long education program & a 20-minute long telephone call coaching for verbal persuasion; and 4) a booklet for anger management and self care behaviors. One group pretest-posttest design was used for evaluating the program. Study subjects were 6 cancer patients undergoing chemotherapy. The group were received a 4-week intervention, 60 ~ 90 minutes a day weekly, and measured the variables at baseline, 4 weeks later. Anger-in, anger-out, and anger-control were measured by STAXI-K. Data was analysed by Wilcoxon using SPSS/WIN 12.0 program. Anger situation was analysed according to primary anger-thoughts and secondary anger-thoughts based on cognitive theories of anger. Results: The program for anger management consisted of a role play, assertive training, education, telephone call coaching and a booklet. The program revealed significantly less Anger-in (Z = -1.997, p = .046), anger-out (Z = -2.207, p = .027). No difference, however, was found in anger control (Z= -1.826, p=.068). Conclusion: This evaluation suggested that more assertive training and longer intervention may be needed to maximize anger control.

  • PDF

안팍구조(構造)-한국건축공간(韓國建築空間)의 구조주의적(構造主義的) 해석(解析) (The In/Out Structure : Interpretation of the Korean Architectural Space by Structuralism)

  • 이희봉
    • 건축역사연구
    • /
    • 제1권2호
    • /
    • pp.172-182
    • /
    • 1992
  • The binary classification, Yin & Yang, can be shown in our culture. Yin & Yang thinking reveals the Up/Down (Principal/Subordinate) relation in space, and Before/After relation in time, and it shows the sequence of Contrast${\to}$Reconciliation & Unification${\to}$Contrast. For example, a follower is Yin against King, while Yang as a father against his son in our trational cognitive structure. With Left/Right, Front/Rear, and Upper/Lower, In/Out division is a basic body-space term to grasp the space position. In the traditional Korean house, when we go out from the deepest 'In', Anbang to Daechung, we may call Anbang 'In' and Daechung 'Out'. When from Daechung to Anmadang reversely, we call Daechung 'In' and Anmadang 'Out'. Namely, Daechung is both 'In' and 'Out'. This is a fallacy logic in view of western basic conception. 'The In/Out Structure, system of a series of inner spaces, is defined as a transformation of cognitive structure of Yin & Yang thinking to the Korean architectural space. The space structure is one of the important deep structure in Korean society.' The concept of the space structure, apperred in east Asia, can make humane space, for it is not a physical 'type' of typepology but related to cognitive structure of human thinking, The structure is applicable to space design in modern society, for the cognitive structure exists in living culture by transformation.

  • PDF

돼지의 수.포유 행동 I. 수유 행동에서 모돈(랜드레이스$\times$요크셔) 발성음의 특성 (Nursing and Suckling Behaviour in Domestic Pigs 1. Characteristics of the Grunting Sound of the Sow(Landrace $\times$ Yorkshire) during Nursing Behaviour)

  • 장홍희;연성찬
    • 한국임상수의학회지
    • /
    • 제19권2호
    • /
    • pp.191-194
    • /
    • 2002
  • The nursing vocalization of domestic pigs(Landrace$\times$Yorkshire) was investigated with respect to common features. All vocalizations uttered during nursings in 5 sows at 5 days after farrowing were recorded and 305 grunts were processed in a spectrograph. The sow's repeated grunting during nursing can be regarded as a contact call and a signal of the mother to start and synchronize the suckling behavior of the piglets. Analysis in the time domain revealed the gross structure of the call, whereas in the frequency domain the fine structure of single grunts was investigated. Nursing interval, duration of nursing behavior, duration of grunt, grunt rate per 10 seconds, fundamental frequency, 1 formant, 2 formant, 3 formant, 4 formant and spectrum were investigated. The results showed that mean interval between the nursing following one another was 25, 4.6 min and duration of nursing behavior was 3.2 $\pm$ 0.7 min. Average duration of grunt was 203.9 $\pm$ 63.6 ms. The formant contours could be identified. The nursing behavior might be disturbed by the grunts of alien sow.

RTD 방식을 이용한 CDMA 기지국 Traffic 분석에 관한 연구 (The Research of the CDMA Base station Traffic Analysis for Using the RTD Method)

  • 조웅;진용옥
    • 한국통신학회논문지
    • /
    • 제25권5A호
    • /
    • pp.660-667
    • /
    • 2000
  • 이 논문은 CDMA 이동전화 기지국의 통화량(Traffic) 분석을 위한 연구이다. RTD(Round Trip Delay)는 기지국과 이동국 사이의 통화로 구성 소요시간을 계산하는 하나의 개선된 방법이다. RTD 방식을 이용하여 무선통신 구간에서 발생하는 통화로 접속시간을 계산하고, 하나의 기지국(교척교)에서 실험을 실시하여 실제거리와 RTD 값의 차이를 비교 분석하였다. 또한 CDMA 기지국(BTS) Traffic과 중계기(BTS로부터 RF를 직접 분기하여 호를 처리) 사이의 Traffic을 구분하기 위한 하나의 방법으로 RTD 방식을 제안하였고, 이를 확인하기 위해 기지국의 중계기 수신단에 일정한 지연(임의의 Delay) 소자를 삽입하여 모국(BTS)과 자국(중계기)의 수신신호 시간 차이(Gap)에 의한 Traffic 분석 실험을 통해서 그 유효성을 입증하였다.

  • PDF

Classroom Roll-Call System Based on ResNet Networks

  • Zhu, Jinlong;Yu, Fanhua;Liu, Guangjie;Sun, Mingyu;Zhao, Dong;Geng, Qingtian;Su, Jinbo
    • Journal of Information Processing Systems
    • /
    • 제16권5호
    • /
    • pp.1145-1157
    • /
    • 2020
  • A convolution neural networks (CNNs) has demonstrated outstanding performance compared to other algorithms in the field of face recognition. Regarding the over-fitting problem of CNN, researchers have proposed a residual network to ease the training for recognition accuracy improvement. In this study, a novel face recognition model based on game theory for call-over in the classroom was proposed. In the proposed scheme, an image with multiple faces was used as input, and the residual network identified each face with a confidence score to form a list of student identities. Face tracking of the same identity or low confidence were determined to be the optimisation objective, with the game participants set formed from the student identity list. Game theory optimises the authentication strategy according to the confidence value and identity set to improve recognition accuracy. We observed that there exists an optimal mapping relation between face and identity to avoid multiple faces associated with one identity in the proposed scheme and that the proposed game-based scheme can reduce the error rate, as compared to the existing schemes with deeper neural network.

ATM망에서 사용자 변수 제어에 의한 감시 성능 개선에 관한 연구 (A study on improvement of policing perfomance by usage parameter control in asynchronous transfer mode networks)

  • 한길성;오창석
    • 한국통신학회논문지
    • /
    • 제21권6호
    • /
    • pp.1480-1489
    • /
    • 1996
  • In ATM networks there are two methods in traffic control as schemes advancing the quality of service. One is reactive control after congestion and the other which is generally recommended, is preventive control before congestion, including connection admission control on call leel and usage parameter control, network parameter control, priority control and congestion control on cell level. In particular, usage parameter control is required for restricting the peak cell rate of bursy tracffic to the parameter negotiated at call set-up phase since the peak cell rate significantly influences the network quality of service. The scheme for progressing quality of service by usage parameter control is themethod using VSA(Virtual Scheduling Algorlithm) recommended ITU-T. The method using VSSA(Virtual Scheduling Suggested Algorlithm) in this paper is suggested by considering cell delay variation and token rate of leaky bucket, compared VSA and VSANT(Virtual Scheduling Algolithm with No Tolerance) with VSSA which polices violated cell probability of conformed peak cell rate and intentionally excessive peak cell rate. VSSA method using IPP(Interruped Poisson Process) model of input traffic source showed more quality of service than VSA and VSANT methods as usage parameter control because the suggested method reduced the violated cell probability of contformed peak cell rate and intentionally excessive peak cell rate.

  • PDF