• Title/Summary/Keyword: outside-in 방법

Search Result 745, Processing Time 0.045 seconds

The Study on the Measuring the Economic Use Value of the National Assembly Library Services (국회도서관 서비스의 경제적 이용가치 측정에 관한 연구)

  • Pyo, Soon Hee;Cha, Mikyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.50 no.4
    • /
    • pp.121-142
    • /
    • 2016
  • The purpose of this study was to assess the economic value of the National Assembly Library service utility, and to enhance the users' perception and the stakeholder's supports for the library services. For those purposes, this study applied the measurement methods of time value, replacement service value, and WTP of the three user groups: inside members, outside users, and institutional members of the Library. The replacement service value as annual time valuation was measured 1,948.2 million won by inside members, and 417.057.5 million won by outside users, that was approximately 10 times of the total budget of the year 2015. Also, WTP were measured as 8,528.3 million won by inside member, 33,272.4 million won by outside users, 924 million won by institutional members. This shows 77% of the use value were from outside users. The BC ratio was 1:1.04 in 2015.

A Boundary Matching and Post-processing Method for the Temporal Error Concealment in H.264/AVC (H.264/AVC의 시간적 오류 은닉을 위한 경계 정합과 후처리 방법)

  • Lee, Jun-Woo;Na, Sang-Il;Won, In-Su;Lim, Dae-Kyu;Jeong, Dong-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1563-1571
    • /
    • 2009
  • In this paper, we propose a new boundary matching method for the temporal error concealment and a post processing algorithm for perceptual quality improvement of the concealed frame. Temporal error concealment is a method that substitutes error blocks with similar blocks from the reference frame. In conventional H.264/AVC standard, it compares outside pixels of erroneous block with inside pixels of reference block to find the most similar block. However, it is very possible that the conventional method substitutes erroneous block with the wrong one because it compares only narrow spatial range of pixels. In this paper, for substituting erroneous blocks with more correct blocks, we propose enhanced boundary matching method by comparing inside and outside pixels of reference block with outside pixels of erroneous block and setting up additional candidate motion vector in the fixed search range based on maximum and minimum value of candidate motion vectors. Furthermore, we propose a post processing method to smooth edges between concealed and decoded blocks without error by using the modified deblocking filter. We identified that the proposed method shows quality improvement of about 0.9dB over the conventional boundary matching methods.

  • PDF

The BBA based Power Allocation Method for the User in Outside Service Area in Cognitive Radio (Cognitive Radio에서 서비스 영역 외부의 사용자를 위한 BBA 기반의 전력할당기법)

  • Cho, Ju-Phil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.123-127
    • /
    • 2009
  • Cognitive Radio rules provide that the user outside service region should not utilize communication system in Cognitive Radio environment. The reason why main user should use service without any loss and interference. If this rule is guaranteed, CR users are able to be offered enough services outside service region. In this paper, we target the issue which can operate practical cognitive systems even without causing excessive interference to legacy users. Also, we focus use on non-interference to the primary system rather than realizable benefits for the secondary systems, and using the proposed device. In this paper, we present the possible scheme using Bi-directional Beamforming Antenna.

  • PDF

Evaluation on the Thermal Resistance Capacity of Fire Proof Materials for Improving Fire Resistance of Near-Surface-Mounted FRP in Concrete (콘크리트내에 표면매입 보강된 FRP의 내화성능 향상을 위한 내화단열재 열저항성능 평가)

  • Yeon, Jea-Young;Seo, Soo-Yeon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.18 no.5
    • /
    • pp.51-58
    • /
    • 2014
  • This paper presents a fire exposure test result to evaluate fire resistance capacity of retrofit method using FRP (Fiber Reinforced Polymer) in reinforcement concrete structure. Especially, this paper focused on near-surface-mounted retrofit method; FRP is mounted into the groove after making a groove in concrete. In the test, main parameters are retrofit method and materials for fire proofing. Spray type of perlite and board type of calcium silicate were considered as external fire proof on surface while particle of calcium silicate and polymer mortar as internal one in groove. By increasing the temperature of inside heating furnace, the transfer of temperature from surface of fire proofing material to groove in specimen was measured. As a result, fire proofing using the board of calcium silicate was more effective to delay the heat transfer from outside than spraying with perlite. It was found that the fire proofing could resist outside temperature of $820^{\circ}C$ at maximum to keep the temperature of epoxy below glass transit temperature (GTT).

Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration (데이터 유출 탐지를 위한 이상 행위 탐지 방법의 비교 및 분석)

  • Lim, Wongi;Kwon, Koohyung;Kim, Jung-Jae;Lee, Jong-Eon;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.440-446
    • /
    • 2016
  • Military secrets or confidential data of any organization are extremely important assets. They must be discluded from outside. To do this, methods for detecting anomalous attacks and intrusions inside the network have been proposed. However, most anomaly-detection methods only cover aspects of intrusion from outside and do not deal with internal leakage of data, inflicting greater damage than intrusions and attacks from outside. In addition, applying conventional anomaly-detection methods to data exfiltration creates many problems, because the methods do not consider a number of variables or the internal network environment. In this paper, we describe issues considered in data exfiltration detection for anomaly detection (DEDfAD) to improve the accuracy of the methods, classify the methods as profile-based detection or machine learning-based detection, and analyze their advantages and disadvantages. We also suggest future research challenges through comparative analysis of the issues with classification of the detection methods.

Study on the Eco-friendly Design Methods of the High-rise Residential-Commercial Building -Based on a work of Ken yeang, Bishopsgate Towers- (초고층 주상복합건축물의 친환경적 디자인 방법에 대한 연구 -켄 양의 Bishopsgate Towers를 중심으로-)

  • Kim, Sun-Ok;Oh, Se-Gyu
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2005.11a
    • /
    • pp.283-286
    • /
    • 2005
  • In the modern city in which the high-density and complex land use is needed, high-rise residential-commercial buildings appeared as a scheme to arrange a metropolitan residence with multiple high-techs and to induce activation of the city with leading the settled population to flow into the city. And the need of the times is to actively apply the eco-friendly notion to the architecture. In this study, the works of Ken Yeang who is regarded as an eco-friendly architect to make high-rise residential-commercial buildings ecological should be focused on with analyses of eco-friendly characteristics in inside, intersection between inside and outside, and outside of his works. The result o the study would be the suggestion to design eco-friendly high-rise buildings which make the city rise in quality.

  • PDF

Schedule Management for Outside Duty Personnels Using Mobile Communication Data Synchronization (이동통신 자료 동기화를 이용한 외근 사원 일정관리)

  • Jang, Dae-Jin;Park, Kee-Hyun;Ju, Hong-Taek;Yoo, Sang-Jin
    • Information Systems Review
    • /
    • v.8 no.2
    • /
    • pp.1-15
    • /
    • 2006
  • Schedule Management for outside duty personnels and their groups is fairly difficult since they spend most of their time on working outside individually rather than inside office. Everytime when schedule change for personnels or their groups is needed, it is necessary to call every personnel in order to notify the schedule change. It would be much easier to handle the schedule management problem if outside duty personnels are able to download schedule of their groups(and, upload their schedule) using their mobile communication devices such as PDAs. In this paper, using a data synchronization protocol in mobile communication environments, a schedule management system for outside duty personnels is designed and implemented. Data synchronization in mobile communication environments is a process of maintaining consistency between data stored in mobile devices and data stored in a (central) server at office. In other words, using SyncML data synchronization protocol proposed by OMA(Open Mobile Alliance) as an open standard for data synchronization in mobile communication environments, a schedule management system for outside duty personnels which allows them to check schedule of their groups and to notify their schedule to their groups at anytime anyplace is designed and implemented.

The Waist Dart Knitting Method of the Seamless Knit One-piece Dress (무봉제 니트 원피스 드레스의 웨이스트 다트 편성 방법)

  • Lee, Mi-Sook;Suh, Mi-A
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.5
    • /
    • pp.769-779
    • /
    • 2009
  • The purpose of this study is proposing a knitting method that is suitable for the bodies of women in their 20's and can enhance aesthetic aspect and wearing satisfaction. For this study, four kinds of seamless knit one-pieces were implemented by different knitting method of waist dart each other. The inspection of the exterior and the sensory test of movement adaptability were included in this study. The results of this study were listed below. Exterior evaluation of the four samples results that the sample with outside narrowing and widening get low grade. Thus, we can see that the method having only outside narrowing and widening for waist shaping can cause problems. In addition to that, the sample with inside narrowing and widening get highest grade for almost all test items. The dressing evaluation results that the knitting method of waist dart affect only on the exterior but not on the movement adaptability of the seamless knit one-piece.

  • PDF

Validation and Measurement Uncertainty Estimation in the Testing Method of Cable-harness Shielding Effectiveness (통신케이블 차폐시험방법의 유효성 확인 및 측정불확도 추정)

  • 김종상;조남호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.1
    • /
    • pp.8-19
    • /
    • 2002
  • The laboratory shall validate nonstandard methods, laboratory-designed/ /developed methods, standard methods used outside ther intended scope, amplifications and modifications of standard methods to confirm that the methods are fit for the intended use. Therefor in this paper we propose the Validation methods using the statistical analysis and estimating the uncertainty of measurements estimations in the testing method of cable-harness shielding effectiveness

  • PDF