• Title/Summary/Keyword: The number of storage location

Search Result 60, Processing Time 0.021 seconds

Perceived Performance of Sanitary Management of School Food Service Managers in the Seoul Area (서울지역 초등학교 급식관리 영양사의 위생관리와 관련된 직무 수행도)

  • 정유경;곽동경
    • Korean Journal of Community Nutrition
    • /
    • v.5 no.1
    • /
    • pp.100-108
    • /
    • 2000
  • Seven constructs of sanitary management :time temperature, storage, cross-contamination, personal hygiene, equipment facility and documentation management were evaluated to investigate the perceived performance of sanitary management for school food service managers, Using a four-part questionnaire containing the seven constructs of sanitary management HACCP program, demographic information and characteristics of food service facilities participants rated their self-perceptions regarding sanitary management. Of the 550 possible respondents, 248(45.1%) completed the study. For the perceived sanitary manage-ment variables, the participants rated them between 2.66 and 4.16(5-point Likert scale). Temperature management presented the lowest performances while storage management showed the highest. The number of years of work experience of the food service managers and the serving location correlated significantly to sanitary management variables. Documentation management was also highly correlated to the other sanitary management constructs. The respondents ranked the managers leadership and professional knowledge regrading HACCP as most important, followed by the facilitys supporting equipment and human resources second, to successfully implement the HACCP system at the school food service facilites, Awareness of this study indicating low performance on temperature management suggests an active training program is needed for sanitary management of school food service.

  • PDF

Three-Dimensional Stacked Memory System for Defect Tolerance (적층 구조의 3차원 결함극복 메모리)

  • Han, Se-hwan;You, Young-Gap;Cho, Tae-Won
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.11
    • /
    • pp.23-29
    • /
    • 2010
  • This paper presents a method for constructing a memory system using defective memory chips comprising faulty storage blocks. The three-dimensional memory system introduced here employs a die-stacked structure of faulty memory chips. Signals lines passing through the through-silicon-vias (TSVs) connect chips in the defect tolerant structure. Defective chips are classified into several groups each group comprising defective chips having faulty blocks at the same location. A defect tolerant memory system is constructed using chips from different groups. Defect-free storage blocks from spare chips replace faulty blocks using additional routing circuitry. The number of spare chips for defect tolerance is $s={\ulcorner}(k{\times}n)/(m-k){\urcorner}$ to make a system defect tolerant for (n+s) chips with k faulty blocks among m independently addressable blocks.

An Efficient Spatial Index Technique based on Flash-Memory (플래시 메모리 기반의 효율적인 공간 인덱스 기법)

  • Kim, Joung-Joon;Sim, Hee-Joung;Kang, Hong-Koo;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.133-142
    • /
    • 2009
  • Recently, with the advance of wireless internet and the frequent use of mobile devices, demand for LBS(Location Based Service) is increasing, and research is required on spatial indexes for the storage and maintenance of spatial data to provide efficient LBS in mobile device environments. In addition, the use of flash memory as an auxiliary storage device is increasing in order to store large spatial data in a mobile terminal with small storage space. However, the application of existing spatial indexes to flash-memory lowers index performance due to the frequent updates of nodes. To solve this problem, research is being conducted on flash-memory based spatial indexes, but the efficiency of such spatial indexes is lowered by low utilization of buffer and flash-memory space. Accordingly, in order to solve problems in existing flash-memory based spatial indexes, this paper proposed FR-Tree (Flash-Memory based R-Tree) that uses the node compression technique and the delayed write operation technique. The node compression technique of FR-Tree increased the utilization of flash-memory space by compressing MBR(Minimum Bounding Rectangle) of spatial data using relative coordinates and MBR size. And, the delayed write operation technique reduced the number of write operations in flash memory by storing spatial data in the buffer temporarily and reflecting them in flash memory at once instead of reflecting the insert, update and delete of spatial data in flash-memory for each operation. Especially, the utilization of buffer space was enhanced by preventing the redundant storage of the same spatial data in the buffer. Finally, we perform ed various performance evaluations and proved the superiority of FR-Tree to the existing spatial indexes.

  • PDF

A Fundamental Study on the Change of Korean Dwelling Space Terms (한국 주거공간용어 변화에 대한 기초 연구 -문학작품에 나타난 용어를 중심으로-)

  • 신화경;김대년;서귀숙;오혜경;최경실
    • Journal of the Korean housing association
    • /
    • v.9 no.2
    • /
    • pp.97-103
    • /
    • 1998
  • The purpose of this study is to scrutinize the change of Korean dwelling space terms, and confirm the value of literature as data for a study on dwelling space terms. The terms, which describe the dwelling space, were selected in 63 Korean literature. The terms about rooms, working spaces, space for physiology and hygienic, and storage spaces, were analyzed. The terms about rooms were classified by a constituent unit of traditional housing, location, size, function, and so on. Among them, the number of terms about function had increased more and more. These terms were changed by housing size, housing form, structure of house and household, family size, and so on. It was confirmed that literatures have utility values for a study on change of dwelling space terms. In next study, it is required to analyze the meaning and usage of Korean dwelling space terms, and to compare terms in floorplans with terms in literature.

  • PDF

Inversion of Electrical Prospecting Data for Underground Tunnel Detection (전기탐사의 지하터널 조사를 위한 역산에 관한 연구)

  • Suh, Baek-Soo;Ko, Kwang-Beom
    • Journal of Industrial Technology
    • /
    • v.18
    • /
    • pp.125-130
    • /
    • 1998
  • The undergound space is widely developed because of dometic industry and protection of enviornment. The existence and exact location of tunnel is very important for stability of the enormous underground storage house or building. Various types of prospecting methods have been applied to detection of underground tunnel. In this study, electrical prospecting method is applied to detect tunnel because the development of underground space is very connected with groundwater. Sensitivity analysis is introduced for the calculation of elctrical inversion data. The governing equation is Fourier transformed into the 2-dimensional wave number space and solved by using the finite element method.

  • PDF

Sensor placement selection of SHM using tolerance domain and second order eigenvalue sensitivity

  • He, L.;Zhang, C.W.;Ou, J.P.
    • Smart Structures and Systems
    • /
    • v.2 no.2
    • /
    • pp.189-208
    • /
    • 2006
  • Monitoring large-scale civil engineering structures such as offshore platforms and high-large buildings requires a large number of sensors of different types. Innovative sensor data information technologies are very extremely important for data transmission, storage and retrieval of large volume sensor data generated from large sensor networks. How to obtain the optimal sensor set and placement is more and more concerned by researchers in vibration-based SHM. In this paper, a method of determining the sensor location which aims to extract the dynamic parameter effectively is presented. The method selects the number and place of sensor being installed on or in structure by through the tolerance domain statistical inference algorithm combined with second order sensitivity technology. The method proposal first finds and determines the sub-set sensors from the theoretic measure point derived from analytical model by the statistical tolerance domain procedure under the principle of modal effective independence. The second step is to judge whether the sorted out measured point set has sensitive to the dynamic change of structure by utilizing second order characteristic value sensitivity analysis. A 76-high-building benchmark mode and an offshore platform structure sensor optimal selection are demonstrated and result shows that the method is available and feasible.

Genotype and Environment Effects on Gliadin Content and Polyphenol Oxidase Activity in Wheat

  • Seo, Yong-Weon;Park, Yong-Hack;Hong, Byung-Hee;Park, Moon-Woong;Nam, Jung-Hyun
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.45 no.1
    • /
    • pp.38-43
    • /
    • 2000
  • The environment in which a given genotype is grown may influence its grain quality characteristics. When varieties are $\times$ evaluated over numerous environments, a variety environment interaction usually is observed, but the relative magnitude of environmental(E), genetic(G), and G $\times$ E effects on quality is unclear. In order to determine relative contribution of genotype, environment, and G $\times$ E interaction to the variations observed in grain quality characteristics, 18 Korean wheat cultivars and experimental lines were evaluated in two environments in 1998 and 1999. Correlation coefficients between grain quality and agronomic characteristics were also estimated. The analysis of variance for the optical density obtained by reaction bet- ween gliadin and anti-gliadin polyclonal antibody (AGPab) indicated that gliadin content measured by Enzyme-Linked Immunosorbent Assay(ELISA) was significantly in- fluenced by environment and cultivar differences. The significant differences of year and year $\times$ location were also found. The ratio of the variances associated with environmental effects to the variances associated with genetic effect gave relatively greater influence of environmental factor on gliadin content. The different protein content from same genotype grown in different environment might be associated with degree of storage protein accumulations. Significant relationships between ELISA and protein content, yield, ten spike weight, and ten spike number were detected. Polyphenol oxidase (PPO) activity was significantly influenced by year, location, cultivar and year $\times$ location. The variance in grain PPO activities among growing years appeared larger than the variation produced by the cultivar examined. This suggested that the growing environment contributed more to variability in grain PPO concentration.

  • PDF

Evaluation of Internal through Analysis of Airflow and Ventilation of Coal Storage Shed (옥내저탄장 기류 흐름 및 환기량 분석을 통한 내부 유동 평가)

  • Jo, Hyun-Joung;Lee, Jin-Hong
    • Journal of Environmental Impact Assessment
    • /
    • v.31 no.5
    • /
    • pp.334-342
    • /
    • 2022
  • The stringent air environment conservation act forced to build an indoor dome for coal storage. However, it causes some problems due to accumulation of fly ash and harmful substances inside. To solve this problem, this study analyzed the pattern of internal airflow and the amount of ventilation for an indoor coal yard. Overall, the airflow inside the indoor coal yard tended to move to the southwest facing the mountain. In addition, sea-breeze was blowing from the northern louver window facing the sea, where airflow was flowing in. The total flow rate flowing into the indoor coal yard was 918,691 m3/h, and the number of natural ventilation per hour was 0.6 times. Therefore, it is proposed to install a forced ventilation device at the location where internal air flow is concentrated.

Design and Implementation of Driving Pattern based Map Matching on Smart Phone (스마트폰에서 운전자 이동패턴을 이용한 맵매칭 설계 및 구현)

  • Hwang, Jae-Yun;Choi, Se-Hyu
    • Spatial Information Research
    • /
    • v.23 no.4
    • /
    • pp.47-56
    • /
    • 2015
  • Recently, there has been an increase in the number of people who use the smart-phone navigation for using various latest functions such as group driving and location sharing. But smart-phone has a limited storage space for one application, since a lot of applications with different purposes are installed in the smart-phone. For this reason, road network data with a large space of memory used for map matching in the device for navigation cannot be stored in the smart-phone for this reason map matching is impossible. Besides, smart-phone which doesn't use the external GPS device, provides inaccurate GPS information, compared to the device for navigation. This is why the smart-phone navigation is hard to provide accurate location determination. Therefore, this study aims to help map matching that is more accurate than the existing device for navigation, by reducing the capacity of road network data used in the device for navigation through format design of a new road network and conversion and using a database of driver's driving patterns. In conclusion, more accurate map matching was possible in the smart-phone by using a storage space more than 80% less than existing device at the intersection where many roads cross, the building forest that a lot of GPS errors occur, the narrow roads close to the highway. It is considered that more accurate location-based service would be available not only in the navigation but also in various applications using GPS information and map in the future Navigation.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.