• Title/Summary/Keyword: paper break

Search Result 786, Processing Time 0.033 seconds

A Study on Office Rental Cycle and Time-Varying Regression Parameters of Rental Determinants in Hedonic Price Model (오피스 임대료 하락기 및 상승기의 임대료 결정모형 회귀모수의 변화 - 서울시 강남과 도심권역을 중심으로 -)

  • Choi, Jonggeun;Kim, Suhkyong
    • Journal of the Korean Regional Science Association
    • /
    • v.34 no.1
    • /
    • pp.3-17
    • /
    • 2018
  • This paper empirically investigates time-varying regression parameter of hedonic price model for Seoul office rental market in distinct periods of a market cycle. Office rental index is constructed and the index indicates that the global financial crisis differentiates the analysis period into decline stage and recovery stage. Pre-crisis period is classified into decline stage and post-crisis is classified into recovery stage. Structural break-point test suggests structural change of hedonic model of rent determinants occurred in 2008. Evidence indicates that individual regression parameters of hedonic price model for decline stage are significantly different from those for recovery stage. Changes in the regression parameters of land price, distance to metro, building size, building age, and conversion rate are consistent. In recovery stage, the effect of locational advantage on office rent decreases whereas the effect of building characteristics on the rent increases.

A Study on the Safety Test Regulation for the Metallic Sound Barrier of the Absorption Type (금속재 흡음형 방음벽의 안전 시험 규정 분석 연구)

  • Huh, Young
    • Explosives and Blasting
    • /
    • v.20 no.4
    • /
    • pp.5-15
    • /
    • 2002
  • For the noise reduction measures in a construction field where noise sources such as blasting and pile driving works exist, the construction of the sound barrier near the noise source or receiver is often the most economic measure in order to exclude the propagated sound. The dimension of the barrier is decided by the noise and construction design, and the constructive quality of a soundproof panel shall be secured in accordance with KS F4770 to guarantee the safety of sound barriers. In this paper the problems included in the KS F4770-1 that is the regulation for the metallic sound barrier of the absorption type are identified and it is suggested what to be corrected or improved. Through a series of the analyses, conclusion were reached that it is required to improve test methods in KS F4770-1 as well as to break down loads for building more cost-effective sound barrier. In addition, KS F4770-1 was compared with ZTV-Lsw 88 which is the german regulation for sound barrier design. As a result, it was found that the Korean regulation is more conservative than that of Germany.

Robust multiple imputation method for missings with boundary and outliers (한계와 이상치가 있는 결측치의 로버스트 다중대체 방법)

  • Park, Yousung;Oh, Do Young;Kwon, Tae Yeon
    • The Korean Journal of Applied Statistics
    • /
    • v.32 no.6
    • /
    • pp.889-898
    • /
    • 2019
  • The problem of missing value imputation for variables in surveys that include item missing becomes complicated if outliers and logical boundary conditions between other survey items cannot be ignored. If there are outliers and boundaries in a variable including missing values, imputed values based on previous regression-based imputation methods are likely to be biased and not meet boundary conditions. In this paper, we approach these difficulties in imputation by combining various robust regression models and multiple imputation methods. Through a simulation study on various scenarios of outliers and boundaries, we find and discuss the optimal combination of robust regression and multiple imputation method.

Analysis of Ink Transfer Mechanism in Gravure-offset Printing Process (그라비아 옵셋 프린팅 공정에서의 잉크전이 메커니즘 해석 연구)

  • Lee, Seung-Hyun;Nam, Ki-Sang;Lee, Taik-Min;Yoon, Deok-Kyun;Jo, Jeong-Dai
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.28 no.10
    • /
    • pp.1146-1152
    • /
    • 2011
  • Ink transfer process is very important to determine quality of printed pattern, therefore its mechanism should be understood to control printing quality. Although there have been many attempts to understand ink transfer mechanism by numerical simulation and experimental studies, their model was too much simple to model realistic printing process and our understanding is not enough yet. In this paper we designed ink transfer visualization system to present flow visualization of ink transfer process for gravure offset printing. We considered rotational effect of blanket roll which is related with printing speed and used non-Newtonian fluid as working fluid such as Ag paste. For printing unit, cantilever-type blanket roll is used for convenient visualization of ink transfer. Serial images were captured continuously by using high-speed CMOS camera and long range microscope. We investigated the effects of various design parameters such as printing speed and pattern angle on the ink transfer process. We found more stretched ink filament for non-Newtonian fluid than Newtonian fluid. As increasing printing speed, length of stretched ink filament and height of break-up point are also increased. We also compared ink transfer process between CD and MD pattern and its relationship with ink transfer mechanism.

Recent Advances in the Use of Enzymes for Environment-Friendly Swine Diets (환경친화성양돈사료를 위한 효소제 사용의 최근 경향)

  • Hong Jong-Wok;Kim In-Ho
    • Korean Journal of Organic Agriculture
    • /
    • v.9 no.2
    • /
    • pp.55-67
    • /
    • 2001
  • Exogenous enzymes which, for the purpose of this paper, include phytase, $\beta$-glucanase, pentosanase and $\alpha$-galactosidase, are now extensively used throughout the world as aditives in swine diets. The chemical effects of these enzymes are well understand. However, the manner in which their benefits to the swine are brought about is still under debate. Phytase was to increase the availability of plant phytate phosphorus, which reduces phosphorus pollution and allows reductions in the amount of inorganic phosphate used. Also, enzymes have been discovered which have the potential to break down deleterious compounds commonly found in swine rations such as $\beta$-glucanase contained in barley and oats and the soluble pentosans found in rye and wheat thus increasing the digestibility of these non-starch polysaccharides. Future research in these area will allow for more efficient use of the current enzymes, development of more efficient future products and development of more thermotolerant enzymes.

  • PDF

Application of a One-Dimensional Upwind Model for Natural Rivers (일차원 상류이송형모형의 자연하도에 대한 적용)

  • Kim, Won;Han,, Kun-Yeun;Woo, Hyo-Seop
    • Journal of Korea Water Resources Association
    • /
    • v.38 no.5 s.154
    • /
    • pp.333-343
    • /
    • 2005
  • The upwind model is well known to simulate shockwaves, but it is rarely applied to natural rivers because of problems caused by the source terms. Although several methods have been developed to deal with the source terms, none of them has been applied to natural rivers. This paper deals with application of the upwind model to the natural river. An implicit upwind model is applied to a hypothetical irregular channel and a natural river with highly irregular bed, width, and hydraulic structures. Different types of the flows including steady-state flow, flood wave, dam-break wave, and bore are simulated to test accuracy and applicability of the implicit upwind model. It is proved that the model can simulate various types of flows in natural rivers with high accuracy and robustness.

Design of Hierarchical Ring-Mesh Optical Networks Considering Cabling Cost (케이블 비용을 고려한 링메쉬 구조의 광통신망 설계)

  • Han, Jung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1716-1729
    • /
    • 2010
  • In this paper, we deal with a hierarchical ring-mesh optical network design problem. The objective is to minimize the total cost of optical add-drop multiplexers (OADMs) handling intra-ring traffic, optical cross-connects (OXCs) handling inter-ring traffic, and cabling cost among OADMs and among OXCs, while satisfying intra-ring and inter-ring capacities. We develop an integer programming (IP) formulation for the problem and devise some cutting planes that partially break the symmetry of rings. Dealing with the inherent computational complexity of the problem, we devise an effective heuristic procedure that finds a good quality feasible solution within reasonable computing times. Computational results demonstrate the efficacy of the proposed solution procedure; the developed symmetry breaking inequalities significantly reduce the computing time to find an optimal solution for small size problems, and the heuristic procedure finds a better feasible solution than that CPLEX, a commercial optimization software, finds for large size problems.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Process Modeling and Optimization Studies in Drying of Current Transformers

  • Bhattacharya, Subhendu;D'Melo, Dawid;Chaudhari, Lokesh;Sharma, Ram Avatar;Swain, Sarojini
    • Transactions on Electrical and Electronic Materials
    • /
    • v.13 no.6
    • /
    • pp.273-277
    • /
    • 2012
  • The vacuum drying process for drying of paper in current transformers was modeled with an aim to develop an understanding of the drying mechanism involved and also to predict the water collection rates. A molecular as well as macroscopic approach was adopted for the prediction of drying rate. Ficks law of diffusion was adopted for the prediction of drying rates at macroscopic levels. A steady state and dynamic mass transfer simulation was performed. The bulk diffusion coefficient was calculated using weight loss experiments. The accuracy of the solution was a strong function of the relation developed to determine the equilibrium moisture content. The actually observed diffusion constant was also important to predict the plant water removal rate. Thermo gravimetric studies helped in calculating the diffusion constant. In addition, simulation studies revealed the formation of perpetual moisture traps (loops) inside the CT. These loops can only be broken by changing the temperature or pressure of the system. The change in temperature or pressure changes the kinetic or potential energy of the effusing vapor resulting in breaking of the loop. The cycle was developed based on this mechanism. Additionally, simulation studies also revealed that the actual mechanism of moisture diffusion in CT's is by surface jumps initiated by surface diffusion balanced against the surrounding pressure. Every subsequent step in the cycle was to break such loops. The effect of change in drying time on the electrical properties of the insulation was also assessed. The measurement of capacitance at the rated voltage and one third of the rated voltage demonstrated that the capacitance change is within the acceptance limit. Hence, the new cycle does not affect the electrical performance of the CT.